Anil Çetinkaya, A. K. Doğan, Erkan Danaci, Halit Oğuztüzün
{"title":"AUTORFPOWER: Automatic RF Power Measurement Software for Metrological Applications","authors":"Anil Çetinkaya, A. K. Doğan, Erkan Danaci, Halit Oğuztüzün","doi":"10.1109/iisec54230.2021.9672386","DOIUrl":"https://doi.org/10.1109/iisec54230.2021.9672386","url":null,"abstract":"AUTORFPOWER software has been developed for automatic RF power measurement at microwave frequencies. In this study, the capabilities of AUTORFPOWER are explained and compared with commercial alternatives. The advantages of the developed software to metrological works and its contributions to future metrological R&D are discussed.","PeriodicalId":344273,"journal":{"name":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115402141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Pest Management: An Augmented Reality-Based Approach for an Organic Cultivation","authors":"Nitharshana Mahenthiran, Haarini Sittampalam, Sinthumai Yogarajah, Sathurshana Jeyarajah, S. Chandrasiri, Archchana Kugathasan","doi":"10.1109/iisec54230.2021.9672432","DOIUrl":"https://doi.org/10.1109/iisec54230.2021.9672432","url":null,"abstract":"The agricultural world faces more difficulties due to crop pests that damage or infliction cultivated plants. The main challenges to those interested in cultivation are pest attack and disease. Pests spread the disease, and the yield is decreased. However, it is possible to control pest attacks and infections in the early attack stage to reduce pesticide use and keep the farm safe. Mobile applications can provide accurate identification rather than manual detection. Mobile applications and technologies are created when considering the solution. The importance of the proposed solution is to increase the rate of the plant product and achieve high revenue without any cost. One of the main components used in this system is the image processing technique. The pest images will be taken, and they will be subjected to various preprocessing for noise reduction and enhancement of the pictures. Using image processing, the user can determine the pest's life cycle stage. The user can identify the stage of the damaged plant by applying the classification algorithm. The content analysis is based on the machine learning process, especially using a Convolutional Neural Network. Hence, the proposed system will help to get knowledge of organic pest prevention methods. In the system, we determined the type of pest with 90% accuracy by submitting a damaged leaf and a pest image. The pest's lifecycle stage and stage of the affected plant also can be identified in our system with high accuracy. Moreover, it shows the organic prevention methods.","PeriodicalId":344273,"journal":{"name":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115511553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Encryption Using Lorenz's Attractor and Fractional Fourier Transform","authors":"Ökkeş Erdem Tekerek, Adem Tekerek","doi":"10.1109/iisec54230.2021.9672362","DOIUrl":"https://doi.org/10.1109/iisec54230.2021.9672362","url":null,"abstract":"In this study, a new image encryption and decoding algorithm is developed using fractional fourier transform, lorenz attractor and masking. In the proposed algorithm, firstly, the image is masked with a randomly generated mask and fractional fourier transform is applied to the masked image. These two processes were applied 3 times in a row, making the image more complex. The resulting image was then decomposed into 256 parts. 16 chaotic outputs were obtained from lorenz attractor. These outputs are calculated in base 256. The parts with the same index number as the output were selected and mixed among themselves. The scrambled image parts are combined and the encryption process is completed. The degree of the function applied in the algorithm is a rational number. The use of lorenz attractor provides chaotic outputs. These 2 features make the algorithm resistant to attacks. The use of a chaotic set of differential equations is reduced the probability of finding the scrambled method by an analytical approach and the linear predictability of the method for attacks on the scrambled image. The analysis of chaotically generated random numbers was made and produced successful results. The algorithm is confidential and usable against most common attacks such as brute force. The data contained in the key is encrypted using the RSA algorithm.","PeriodicalId":344273,"journal":{"name":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126034911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A parallel closed centrality algorithm for complex networks","authors":"K. Erciyes","doi":"10.1109/iisec54230.2021.9672334","DOIUrl":"https://doi.org/10.1109/iisec54230.2021.9672334","url":null,"abstract":"Complex networks are large and analysis of these networks require significantly different methods than small networks. Parallel processing is needed to provide analysis of these networks in a timely manner. Graph centrality measures provide convenient methods to assess the structure of these networks. We review main centrality algorithms, describe implementation of closed centrality in Python and propose a simple parallel algorithm of closed centrality and show its implementation in Python with obtained results.","PeriodicalId":344273,"journal":{"name":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125475287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power Saving, Safety and Remote Controlling Smart Building Based on IoT","authors":"Farhad Muhammed-Ameen Zebari, M. Er","doi":"10.1109/iisec54230.2021.9672374","DOIUrl":"https://doi.org/10.1109/iisec54230.2021.9672374","url":null,"abstract":"Currently, everything has become digitalized due to the rapid and remarkable advancements in technology in all aspects of life especially the Internet and smart technology. Automation system (AS) is a part of this rapid development due to its multiple and various utilization such as smart building control systems. This paper will study smart building control system, which monitors and manages power consumption and safety. It presents two different models named remote control appliances and safety. The first model is employed to reduce power consumption by controlling building appliances remotely and the second model consists of sensors, which increase the safety by monitoring temperature & humidity, gas and fire in buildings. The system's design is based on Internet of Things (IoT) through using NodeMCU microcontroller and Blynk platform via Internet connection. The building appliances such as A/C, water heater (W-H), TV and lights are connected to the control board (CB). The owner of the building can monitor and control the status of appliances via Blynk application through Internet connection. Moreover, safety is based on sensors such as DHT22, gas and flame sensors, which are placed to monitor the vulnerable areas in the building and sending alert message (notification and email) in real-time to the owner via Blynk Application if there are any critical values detected by the sensors. Such monitoring system increases the building safety. The implementation results of the presented system shows a major impact on power saving which reduce power consumption as well as increasing safety of the building.","PeriodicalId":344273,"journal":{"name":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128754418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and Comparison of Honeypot Activities on Two ISP Networks","authors":"Devran Yener, Tansel Özyer, Emin Kugu","doi":"10.1109/iisec54230.2021.9672371","DOIUrl":"https://doi.org/10.1109/iisec54230.2021.9672371","url":null,"abstract":"While the enormous growth of cyberspace makes life easier, it also brings new challenges to overcome. The concept of the Internet of Things (IoT) is the main actor of this metamorphosis. They are spreading very quickly due to their advantages and cost-effective nature. These systems also cause risky situations by ignoring security requirements. By their nature, honeypots help us to understand and prevent malicious activities by the attackers. Although significant research has been completed by using honeypots, many of them have not evaluated the real-world scenarios, and some of them have covered only the cloud or a single network. Comparison between Internet Service Providers (ISPs) or cloud providers has been neglected. In our work, we try to fill this gap by positioning the Kippo honeypot behind two different ISP lines with some known IoT device credentials. We have collected Kippo logs for a fifteen-day period. The study shows us that all devices can be discovered by mass scan. Therefore, both ISP networks are at the same amount of risk from cyberattacks. Although there was no significant change in the number of attacks per day during the fifteen-day test period, it is quite high compared to previous studies. This comparison highlights the fact that protecting cyber assets is getting harder every year.","PeriodicalId":344273,"journal":{"name":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128271205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Intrusions with Machine Learning Methods","authors":"Beyzanur Bostanci, A. Albayrak","doi":"10.1109/iisec54230.2021.9672361","DOIUrl":"https://doi.org/10.1109/iisec54230.2021.9672361","url":null,"abstract":"Today, especially with the emergence of social networks and IoT technologies, big data has entered the literature. With the development of technology, the size of the data has increased and accordingly data security gaps have emerged. In this study, Support Vector Machines and Random Forest algorithms, which are Supervised Machine Learning Algorithms, were used to analyze a data set consisting of unauthorized network logins. As a result of the experimental studies, it was observed that both algorithms produced good results, but the Random Forest approach produced better results.","PeriodicalId":344273,"journal":{"name":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121569913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zuhal Kurt, A. Keskin, Gökhan Kocaova, Levent Boynukisa, Okan Can Ülgen
{"title":"Development of 'SeniorHouse’ Application for Online Education","authors":"Zuhal Kurt, A. Keskin, Gökhan Kocaova, Levent Boynukisa, Okan Can Ülgen","doi":"10.1109/iisec54230.2021.9672438","DOIUrl":"https://doi.org/10.1109/iisec54230.2021.9672438","url":null,"abstract":"With the diffusion of technology worldwide, almost every individual is starting to have at least one mobile device, making mobile applications very popular and an important sector. Given the direction in which many sectors, including education, are moving, there is a clear and evident need for communication on-line rather than in-person. Concerning universities, the communication gap between teachers and students was particularly compromised in light of the Covid-19 pandemic. This study is aimed to fill in this gap by developing a social platform where students and teachers can share their posts and create their personal profiles. The Firebase database and Android Studio are the chosen technologies for this paper due to their compatibility as well as popularity as a chat application, along with Java as the programming language. The developed platform, named “SeniorHouse”, is focused on educational content to provide both faculty and students with a two-way, real-time communication to share updates, posts, documents, project ideas, and personal profiles, to name a few. The SeniorHouse application has significant potentials to be expanded into a major hub for future on-line education.","PeriodicalId":344273,"journal":{"name":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132632856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Urban Intelligent Traffic Management Problems: Sensors and Methods","authors":"Candan Güven, Özgür Karaduman, E. Avci","doi":"10.1109/iisec54230.2021.9672412","DOIUrl":"https://doi.org/10.1109/iisec54230.2021.9672412","url":null,"abstract":"Researchers have developed various methods for the smooth flow of traffic due to the density of vehicles and environmental restrictions in urban traffic, and they have benefited from various sensors while applying these methods. The fact that the urban traffic is multi-factorial increases the difficulty of the problems compared to other intelligent transportation systems issues. Therefore, it is inevitable for the methods to be developed to be more comprehensive and to use more diverse and capable sensors in order to realize this in urban traffic management problems. In this study, current studies on smart systems developed to manage urban traffic are discussed in terms of the methods and sensors used. Taxonomies have made for the main problems in urban traffic, and then their relations with the sensors used in the solution of these problems have been revealed. Understanding the sensor-method relationship is very important for developing new approaches to solving problems. In addition, it has aimed to shed light on the studies to be done in this field by making a general analysis of the studies discussed in the study.","PeriodicalId":344273,"journal":{"name":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132739012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Currency Price Analysis Via Deep Forecasting Approaches for Business Risk Mitigation","authors":"Muhammad Raheel Raza, A. Varol","doi":"10.1109/iisec54230.2021.9672381","DOIUrl":"https://doi.org/10.1109/iisec54230.2021.9672381","url":null,"abstract":"Bitcoin, the most well-known of all the cryptocurrencies, have attracted a lot of attention thus far, and their prices have been quite volatile. While some research employ traditional statistical and econometric methods to discover the factors that drive Bitcoin prices, experimenting on the development of prediction models to be utilized as decision support aids in investment approaches is uncommon. The sudden rise and fall of cryptocurrency rates affects the economies and future perspectives of various businesses. In order to minimize business risks, to track the differences and avoid serious economic loss, prediction of daily digital currency rates becomes a crucial task. Our study performs a comparative analysis of Bitcoin price prediction utilizing efficient neural network techniques such as LSTM and GRU. A better RNN-based approach is derived as a result of the study. This approach will assist to facilitate a secure environment for businesses and to alarms to carryout risk management tasks for business risk mitigation purposes.","PeriodicalId":344273,"journal":{"name":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115032354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}