Selin Öztürk, C. Elmas, Fatma Bozyiğbit, Deniz Kılınç
{"title":"Comparison of mobile interaction management products using systematic literature review method and a new product suggestion","authors":"Selin Öztürk, C. Elmas, Fatma Bozyiğbit, Deniz Kılınç","doi":"10.1109/UBMK.2017.8093372","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093372","url":null,"abstract":"Because of innovations and improvements in technology, the use of smartphones that make it easier for users to work has become widespread. At this point, companies can reach their customers more easily and can communicate continuously. Once mobile applications are created, the system infrastructure needs to be improved in response to changing needs and demands to actively retain registered users and continually capture their insights. In this case, a dynamic framework that will create user profiles in a mobile application and provide services according to different user needs. In this study, the main features of the mobile interaction management applications on the market and other features they provide to create a loyal user base have been evaluated using the Systematic Literature Review (SLI) method and the necessary gaps have been discussed. In order to acquire loyal mobile-app user, Machine Learning support system is proposed as solution.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116657883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. C. Kara, S. Esen, Neşe Kahyalar, A. Karakas, Tevfik Aytekin
{"title":"Design and implemenatation of a job recommender system","authors":"K. C. Kara, S. Esen, Neşe Kahyalar, A. Karakas, Tevfik Aytekin","doi":"10.1109/UBMK.2017.8093515","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093515","url":null,"abstract":"Recommender systems help people to find items of interest by utilizing past user interactions (such as product views, ratings, and purchases). Today many e-commerce sites and large scale web applications use recommender systems and provide their customers personalized products. In this work we will share our recent experience in developing a job recommender system based on collaborative filtering at Kariyer.net. In particular, we will explain how and why we choose the recommender algorithm developed in the system, methods for evaluating success, and the system architecture. We will also mention future work that we plan to pursue for solving the problems we face in practice after this successful first attempt.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115365976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy assignment models to build the best project team","authors":"B. Okur, E. Nasibov","doi":"10.1109/UBMK.2017.8093553","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093553","url":null,"abstract":"In this paper, studies on the assignment of the most suitable people to project teams have been developed and a model based on different calculated quality values under different needs has been created. An algorithm that builds a working set for the problem, heuristic algorithms that are intended to solve the problem sets at the best quality, and their comparison is presented.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116169736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A vision based diagnosis approach for multi rail surface faults using fuzzy classificiation in railways","authors":"Orhan Yaman, M. Karakose, E. Akin","doi":"10.1109/UBMK.2017.8093511","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093511","url":null,"abstract":"The heavy construction of railway transportation vehicles is affecting the transportation route. The rail line, which is made with great care, can be damaged by the movements of freight trains. As a result of the use of rail lines, many faults occur. These failures are caused by the manufacturing error or use of the rails. There are many methods for early detection and repair of failures. One of these methods is the camera-based method. The rail components are inspected by taking images from the cameras fixed to the railway vehicle. Faults occurring in rail components are detected. In this study, a method for detecting and classifying faults on railway track surfaces is proposed. In the proposed method, the rail surface was detected using image processing techniques. Property extraction on the rail surface is performed. In addition, the type of fault is determined by using fuzzy logic.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126657801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation and comparison of image segmentation methods for detection of brain tumors on MR images","authors":"E. Dandıl","doi":"10.1109/UBMK.2017.8093425","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093425","url":null,"abstract":"Brain tumors grow in the skull and they can be life threatening in later stages because of the pressure exerted on the brain. Malignant brain tumors have become one of the major causes of human death in recent years. If the tumor can be classified correctly at an early stage, the chances of survival of patients can be improved. The most appropriate treatment to be selected for brain cancer depends on precisely identifying of tumor type, location, size and boundaries by the physicians. Thus, it is important using a computer-aided diagnosis / detection system to detect brain tumors successfully for radiologists and physicians. In this study, Fuzzy C-Means (FCM), Otsu's method, Region Growing and Self-Organizing Maps methods is used for the automatic segmentation of brain tumors on the MR images and results are compared with each other. Application software is designed with a user interface for this purpose. Thus, the ease of decision-making by physicians will be provided. Consequently, the application software will prevent errors and may be used as a secondary means for brain tumor segmentation. It has been shown in detailed test experiments on image dataset that designed application can detect brain tumors successfully.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123746523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical cryptanalysis of “personalized information encryption using ECG signals with chaotic functions”","authors":"M. Gencoglu","doi":"10.1109/UBMK.2017.8093445","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093445","url":null,"abstract":"The chaotic system and cryptography have some common features. Due to the close relationship between chaotic system and cryptosystem, researchers try to combine the chaotic system with cryptosystem. In this study, security analysis of an encryption algorithm which aims to encrypt the data with ECG signals and chaotic functions was performed using the Logistic map in text encryption and Henon map in image encryption. In the proposed algorithm, text and image data can be encrypted at the same time. In addition, ECG signals are used to determine the initial conditions and control parameters of the chaotic functions used in the algorithm to personalize of the encryption algorithm. In this cryptanalysis study, the inadequacy of the mentioned process and the weaknesses of the proposed method have been determined. Encryption algorithm has not sufficient capacity to provide necessary security level of key space and secret key can be obtained with only one plaintext/ciphertext pair with chosen-plaintext attack.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123259350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Remote controlled motorcycle security system (MotoGS)","authors":"Kemal Helvacı, C. Karakuzu","doi":"10.1109/UBMK.2017.8093375","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093375","url":null,"abstract":"In this study, an active alarm and event notification system that can provide security against theft of motorcycles has been designed. With this system, the owner of the motorcycle will be alerted at the moment of burglary action using the voice dialing method. Burglary action will be more difficult and deterrent when the horn on the bike is activated by the system.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131819509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A mapping study on the behavirol analysis of Tor relay protocol","authors":"Ayşe Bilge İnce, M. Aktaş","doi":"10.1109/UBMK.2017.8093391","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093391","url":null,"abstract":"Tor, uses a protocol aimed at ensuring anonymity by distributing its communication over relays all over the world. This protocol designed to protect the privacy of Internet users from traffic analysis attacks launched by an adversary. The studies in the literature have shown that some attacks can be performed in the hidden service relays, or in exit nodes of services by eliminating anonimity. In this paper, a mapping study is conducted among the publications in the literature on Tor Service Protocol behavioral analysis and the results are reported.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131682226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Uğur Yayan, Didem Özüpek, Muhammed Oguz Tas, M. Altan, A. Yazıcı
{"title":"Development of remote controlled mobile robot for planet research simulation laboratory","authors":"Uğur Yayan, Didem Özüpek, Muhammed Oguz Tas, M. Altan, A. Yazıcı","doi":"10.1109/UBMK.2017.8093389","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093389","url":null,"abstract":"In this study, a remote controlled mobile robot is developed for the educational studies at the Planet Researches Simulation Laboratory in the Anadolu University Yunusemre Gozlemevi. The main objective of the study is to increase the interest of students for the technologies developed within the scope of planetary researches. In this context, the mobile robot system has been developed considering the international standards for the autonomous mobile robots. It has a web-based control and management interface. With the developed mobile robot system, many scenarios could be conducted similar to Mars real environment tasks such as remote photograph shooting, drilling and delayed calibration & analysis. Tests are conducted with the developed system for showing usability of the system.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131690395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Onur Açıkgöz, Ali Tunca Gürkan, Burak Ertopçu, Ozan Topsakal, Berke Özenç, Ali Bugra Kanburoglu, Ilker Çam, Begüm Avar, Gökhan Ercan, O. T. Yildiz
{"title":"All-words word sense disambiguation for Turkish","authors":"Onur Açıkgöz, Ali Tunca Gürkan, Burak Ertopçu, Ozan Topsakal, Berke Özenç, Ali Bugra Kanburoglu, Ilker Çam, Begüm Avar, Gökhan Ercan, O. T. Yildiz","doi":"10.1109/UBMK.2017.8093442","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093442","url":null,"abstract":"Identifying the sense of a word within a context is a challenging problem and has many applications in natural language processing. This assignment problem is called word sense disambiguation (WSD). Many papers in the literature focus on English language and data. Our dataset consists of 1400 sentences translated to Turkish from the Penn Treebank Corpus. This paper seeks to address and discuss 6 different feature extraction methods and its classification performances using C4.5, Random Forests, Rocchio, Naive Bayes, KNN, Linear and multilayer Perceptron. This paper calls into question how the described features perform on a morphologically rich language (Turkish) with several classifiers.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130567597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}