2017 International Conference on Computer Science and Engineering (UBMK)最新文献

筛选
英文 中文
Turkey in world perspective: Following the agenda of Turkey with Twitter data 世界视角下的土耳其:用Twitter数据跟踪土耳其的议程
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093404
Kübra Aydın, Fatma Emül, Rahime Belen Sağlam
{"title":"Turkey in world perspective: Following the agenda of Turkey with Twitter data","authors":"Kübra Aydın, Fatma Emül, Rahime Belen Sağlam","doi":"10.1109/UBMK.2017.8093404","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093404","url":null,"abstract":"With the widespread use of internet in the age of information, there has been a continuous growth of social networking which enables people to share breaking news and document personal ideas. Such a significant stream of data enables scientist to conduct research that provides an insight into online social discussions. Aim of this study is to investigate the possibility of summarizing and prioritizing the discussions about Turkey all around the World on Twitter. For this purpose English tweets about Turkey have been collected for 3 months. Findings of the study are twofold; identifying the topics of the discussions about Turkey and following these topics evolution over time. An application of statistical topic modelling has been developed to discover topics and cosine similarity has been utilized to observe the evolution of these topics. Experimental results were compared with the news about Turkey on international news media and the methodology has been observed to be highly promising.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129584633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software engineering issues in big data application development 大数据应用开发中的软件工程问题
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093547
Z. Karakaya
{"title":"Software engineering issues in big data application development","authors":"Z. Karakaya","doi":"10.1109/UBMK.2017.8093547","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093547","url":null,"abstract":"Big Data has become one of the most important concepts that is being studied in Computer/Software Engineering. The data produced in recent years have increased rapidly and exponentially, necessitating the solution of major problems such as the collection, processing and storage of huge volume of data. Big Data Frameworks are developed specifically to solve these problems that facilitates application developers by providing opportunities to collect, process, manage, monitor and analyze these data. A few examples of these frameworks are Hadoop, Spark, Storm, and Flink, which are developed by Software Engineers as open source projects. Although the challenges raised from coordination of IT resources such as huge amounts of computation power, storage area, memory, and network bandwidth in a distributed manner solved by these frameworks, there still remains many Software Engineering problems in application development phase, even if they based on these frameworks. High scalability, fault tolerance, flexibility, reliability and testability can be listed as the main issues need to be carefully considered in terms of Software Engineering. In this paper, we first clarify the terms Framework-Application, and then the overview information about Big Data and related frameworks are given before emphasizing the problems arising in terms of Software Engineering. Nevertheless, we tried to provide guidance to the people who would develop software for Big Data and tried to give the further research guidance.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128884077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Exploring the effect of distribution methods on meta-heuristic searching process 探索分布方法对元启发式搜索过程的影响
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093413
H. Kahraman, Sefa Aras, U. Guvenc, Yusuf Sonmez
{"title":"Exploring the effect of distribution methods on meta-heuristic searching process","authors":"H. Kahraman, Sefa Aras, U. Guvenc, Yusuf Sonmez","doi":"10.1109/UBMK.2017.8093413","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093413","url":null,"abstract":"In this study, the effect of distributions of solution candidates on the problem space in the meta-heuristic search process and the performance of algorithms has been investigated. For this purpose, solution candidates have been created with random and gauss (normal) distributions. Search performance is measured separately for both types of distribution of algorithms. The performances of the algorithms have been tested on the most popular and widely used benchmark problems. Experimental studies have been conducted on the most recent meta-heuristic search algorithms. It has been seen that the search performance of algorithms varies considerably depending on the method of distribution. In fact, better results were obtained than the distribution methods used in the original versions of the algorithms. Algorithms have revealed their abilities in terms of neighborhoods searching, getting rid of local minimum traps and speeding up searches.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"61 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132870729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An embedded multiple sound support application for fare collection systems 一个用于收费系统的嵌入式多声音支持应用程序
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093494
Sadik Arslan, Ercüment Türk, Metin Evin
{"title":"An embedded multiple sound support application for fare collection systems","authors":"Sadik Arslan, Ercüment Türk, Metin Evin","doi":"10.1109/UBMK.2017.8093494","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093494","url":null,"abstract":"Today, fare collection systems are frequently used in public transport. In these systems, some operations such as payment and system management are performed by the driver computer devices. Passengers need to be alerted and informed during these operations. In this study, a multiple sound system needed in fee collection systems have been implemented by an embedded system that includes a microprocessor. All hardware and software developments have been done in the system and necessary applications have been developed.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134335894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A computer aided system for calculation of Ki-67 proliferation index Ki-67增殖指数的计算机辅助计算系统
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093470
Osman Özkaraca, Yelda Dere, Gürcan Çetin, M. Peker
{"title":"A computer aided system for calculation of Ki-67 proliferation index","authors":"Osman Özkaraca, Yelda Dere, Gürcan Çetin, M. Peker","doi":"10.1109/UBMK.2017.8093470","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093470","url":null,"abstract":"Neuroendocrine tumors (NET) are a heterogeneous group of tumors that can develop in almost every localization of the body. The study is the computation of the Ki-67 proliferation index, which is an important information for physicians, from the NET images. The physician control evaluations were carried out on histopathologic forms taken from healthy and NET-diagnosed patients with the designed automated cell counting system performed. The pathological image analysis of the physician were operated for about 10 minutes while the performed system the average of 5 sec depending on resolution and density of the image. The obtained results were close to 98,71% when compared to the findings of the physician. It has been seen that the realized application has produced very short time and much more accurate in the analysis of these NET images than the analysis of the eyes.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133258160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A machine learning approach to database failure prediction 数据库故障预测的机器学习方法
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093426
İsmet Karakurt, Sertay Özer, Taner Ulusinan, M. Ganiz
{"title":"A machine learning approach to database failure prediction","authors":"İsmet Karakurt, Sertay Özer, Taner Ulusinan, M. Ganiz","doi":"10.1109/UBMK.2017.8093426","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093426","url":null,"abstract":"In this study, we apply machine learning algorithms to predict technical failures that can be encountered in Oracle databases and related services. In order to train machine learning algorithms, data from log files are collected hourly from Oracle database systems and labeled with two classes; normal or abnormal. We use several data science approaches to preprocess and transform the input data from raw format to the format, which can be feed to the algorithms. After the preprocessing, several different machine learning classifiers are trained and evaluated on our datasets. Our results show that warnings that lead to failures which is dubbed as abnormal events can be predicted using supervised machine learning algorithms, in particular, the Random Forest algorithm, with a relatively satisfactory Recall (75.7%) and Precision (84.9%) which is visibly higher than the other classifiers.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131970641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Identification of association rules in buying patterns of customers based on modified apriori and Eclat algorithms by using R programming language 基于改进先验和Eclat算法的客户购买模式关联规则识别,使用R编程语言
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093450
I. Huseyinov, Utku Can Aytaç
{"title":"Identification of association rules in buying patterns of customers based on modified apriori and Eclat algorithms by using R programming language","authors":"I. Huseyinov, Utku Can Aytaç","doi":"10.1109/UBMK.2017.8093450","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093450","url":null,"abstract":"The identification of association relationships in buying patterns of customers is an important problem to make proper decision by business companies. Current most research works utilizes commonly traditional Apriori algorithm to solve this problem. In this paper, a modified version of Apriori algorithm, and its combination with Eclat algorithm is suggested. Applying this approach to a case study demonsrates efficiency of the approach versus traditional Apriori algorithm in terms of performance. Implementation of algorithms are done by using R programming language. Some recommendations based on the results of the paper are presented for supermarket companies.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122179309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Boot time optimization for Android-based embedded systems 基于android的嵌入式系统的启动时间优化
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093416
Ercüment Türk, Sadik Arslan
{"title":"Boot time optimization for Android-based embedded systems","authors":"Ercüment Türk, Sadik Arslan","doi":"10.1109/UBMK.2017.8093416","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093416","url":null,"abstract":"Android is an open source operating system which is becoming increasingly popular in embedded systems that are used both in consumer electronics and industrial environments. In order to be able to respond to both user and manufacturer requests, Android have a very flexible and complex structure. This is especially the cause of the prolongation of the boot time. In general, an Android device takes about 40 seconds to boot. This work is seeking a solution to the need for optimization of the previously developed Android-based embedded system boot-up time. As a result, 48% efficiency was achieved with the applied method and the boot time decreased to 19 seconds.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124128262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An intelligent system for predicting location from text content on social media 从社交媒体上的文本内容预测位置的智能系统
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093496
Sedef Demirci, S. Özdemir
{"title":"An intelligent system for predicting location from text content on social media","authors":"Sedef Demirci, S. Özdemir","doi":"10.1109/UBMK.2017.8093496","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093496","url":null,"abstract":"In this study, we have presented an approach to show how location detection can be possible by using social media posts of Internet users. To this end, we have developed a software program to show that locations of Twitter users can be detected just by analyzing the contents of their tweets, even if they hide the location data coming from the background of the tweet. We have collected text-based data from Twitter which are posted by users in İstanbul, Ankara, and İzmir, the largest cities of Turkey according to population. After presenting the preprocessed data in vector space model, we have trained our system using the data by means of Naive Bayes Classifier. After the testing process, experimental results have shown that locations of Twitter users can be detected just by analyzing the contents of their publicly available tweets in the absence of location data with 54.57% accuracy rate for the mentioned three cities of Turkey.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127094542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trustworthy scrum: Development of secure software with scrum 值得信赖的scrum:用scrum开发安全的软件
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093383
Güler Koç, Murat Aydos
{"title":"Trustworthy scrum: Development of secure software with scrum","authors":"Güler Koç, Murat Aydos","doi":"10.1109/UBMK.2017.8093383","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093383","url":null,"abstract":"Software development process models focus on ordering and combination of phases to develop the intended software product within time and cost estimates. However, commonness of software vulnerabilities in the fielded systems show that there is a need for more stringent software development process that focuses on improved security demands. Meanwhile, there are some reports that demonstrate the efficiency of existing security enhanced conventional processes and success of agile projects over conventional waterfall projects. Based on this finding and the demand for secure software, we propose a security enhanced Scrum model (Trustworthy Scrum) by taking advantages of both security activities and Scrum framework which has fast adaptation and iterative cycle. While enhancing Scrum with security activities, we try to retain agile and security disciplines by considering that conventional security approach conflicts with agile methodologies.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127924189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信