{"title":"Towards Third Generation AI: Explainable and Interpretable AI","authors":"Nilgün Sengöz, Tuncay Yiğit","doi":"10.1109/UBMK55850.2022.9919510","DOIUrl":"https://doi.org/10.1109/UBMK55850.2022.9919510","url":null,"abstract":"Today, artificial intelligence-based systems, especially machine learning and deep neural network algorithms, make decisions that directly affect people's lives, from health to autonomous vehicles and even to the defense sector. And yet, algorithms like deep neural networks that are high in performance accuracy but low in explainability and trust bring problems in ethics and interpretability. Explainable Artificial Intelligence (XAJD) is a branch of artificial intelligence that produces highquality interpretability, end-user-oriented understanding and explainable tools, techniques and algorithms. In this study, general information about XAI is given.","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115689764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Türkay Şahi̇n, Tuna Çakar, Tunahan Bozkan, Seyit Ertugrul, A. Sayar
{"title":"Modeling Consumer Creditworthiness via Psychometric Scale and Machine Learning","authors":"Türkay Şahi̇n, Tuna Çakar, Tunahan Bozkan, Seyit Ertugrul, A. Sayar","doi":"10.1109/UBMK55850.2022.9919596","DOIUrl":"https://doi.org/10.1109/UBMK55850.2022.9919596","url":null,"abstract":"Although the predictive power of economic metrics to detect the creditworthiness of the customers is high, there is a rising interest in the integration of cognitive, psychological, behavioral, alternative, and demographic data into credit risk systems and processing the data through modern methods. The primary motivation for the rising interest is increased customer classification accuracy. In this research, customer creditworthiness was modeled through data consisting of personality, money attitudes, impulsivity, self-esteem, self-control, and material values and processed through artificial intelligence. The obtained findings have been evaluated as a reference point for the following research.","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"893 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123251240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Addressing Class Imbalance for Transformer Based Knee MRI Classification","authors":"Gökay Sezen, I. Oksuz","doi":"10.1109/UBMK55850.2022.9919578","DOIUrl":"https://doi.org/10.1109/UBMK55850.2022.9919578","url":null,"abstract":"For assessing knee injuries, Magnetic Resonance Image (MRI) examinations are commonly utilized. Developing an automatic interpretable detection mechanism is an essential task for automating the clinical diagnosis of knee MRI. The imbalanced dataset problem is generally an issue for learning models in which the distribution of classes in the dataset is asymmetrical. The MRI datasets are generally imbalanced in favor of categories with injuries because patients who have an MRI are more likely to suffer a knee injury. Hence, it can be a challenging task to train a machine learning algorithm that can automatically handle class imbalance. In this paper, we propose both a network architecture and a comparison of the handling imbalanced dataset techniques to detect the general abnormalities in knee MR images. A network architecture that consists of CNN and transformer-based layers is proposed. Six different configuration methods for imbalanced data training are developed and compared with evaluation metrics (ROCAUC score, specificity, sensitivity, accuracy). Augmentation of additional data to the under-represented class and use of focal loss yield better classification specificity and AUC.","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129412002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kadir Eker, Ayşe Gül Eker, Dilek Mandal, M. K. Pehlivanoglu, N. Duru
{"title":"Network Traffic Classification with Machine Learning Approaches","authors":"Kadir Eker, Ayşe Gül Eker, Dilek Mandal, M. K. Pehlivanoglu, N. Duru","doi":"10.1109/UBMK55850.2022.9919497","DOIUrl":"https://doi.org/10.1109/UBMK55850.2022.9919497","url":null,"abstract":"Today, detection of malware is often done automatically with artificial intelligence supported systems. In this way, this task, which was previously done manually, can be performed more precisely and more quickly. Darknet traffic is an internet network with many different cybercrime threats. It is also fake traffic observed in empty address space. A globally valid set of Internet Protocol (IP) addresses that are not assigned to any host or device. In this study, a deep learning model and pervasive machine learning classification algorithms are compared using the CIC-Darknet2020 dataset to describe Darknet traffic. The ‘Tor’ and ‘Vpn’ classes in the dataset, ‘Darknet’, ‘Non-Tor’ and ‘Non-Vpn’ classes are also specified as harmless. Various adjustments have been made for the unbalanced dataset, which has been performed with multiple classification, various machine learning algorithms. Random Forest Algorithm, Decision Trees and Deep Learning Model were the algorithms with the most successful accuracy values with %97.3, %97.4 %98.2values respectively.","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129940731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of Video Conferencing Applications on Remote Workers","authors":"Çağatay Aktaş, Mehmet Göktürk","doi":"10.1109/UBMK55850.2022.9919501","DOIUrl":"https://doi.org/10.1109/UBMK55850.2022.9919501","url":null,"abstract":"With the effect of the pandemic that has affected the worldwide in recent years, the spread of remote working has made it popular to conduct collaborative works such as pair programming, debugging and bug finding in software engineering through video conferencing applications. Although this situation makes it difficult for employees to synchronize and adapt with each other from time to time, the advantages of working remotely should not be ignored. In this study, some studies with eye tracking devices in the literature will be mentioned and the results will be summarized in order to measure the interaction of software teams with each other while working remotely with video conferencing applications. Then, the efficiency between face-toface working with the employees of a company that has adopted the semi-remote working methodology and remote paired programming using video conferencing applications will be compared.","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126812428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oguzhan Kizilbey, Murat Arslan, Yusuf Bayrak, Anil Çetinkaya, Aydin Yügrük, Erkan Danaci
{"title":"A Novel Software for Automatic Calibration Factor Measurement of RF Power Sensors","authors":"Oguzhan Kizilbey, Murat Arslan, Yusuf Bayrak, Anil Çetinkaya, Aydin Yügrük, Erkan Danaci","doi":"10.1109/UBMK55850.2022.9919539","DOIUrl":"https://doi.org/10.1109/UBMK55850.2022.9919539","url":null,"abstract":"In this letter, a software for calibration factor (CF) measurement of radio frequency (RF) power sensors (PS) by using VNA-based direct comparison transfer method (VBDCTM) was developed on C# platform. Measurements were performed between 10 MHz and 18 GHz frequency range. When the calibration factors calculated with conventional CF measurement method and novel software were compared, a maximum difference of 4.56% was found in the 10 MHz – 18 GHz frequency band. Therefore, the automatic CF measurement software based on VBDCTM, which has less complexity, can be preferred to conventional method for measuring the calibration factor of power sensors.","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130463424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Mixed Reality Interface for Tactical Data Management in Geographic Information Systems","authors":"F. Keskin, G. Ince","doi":"10.1109/UBMK55850.2022.9919506","DOIUrl":"https://doi.org/10.1109/UBMK55850.2022.9919506","url":null,"abstract":"The requirements of security systems evolve as the complexity of risks and dangers increases in modern times. Due to the nature of security operations, the operator's stress and cognitive load increase, as the operators must strictly report events that occur in certain situations. In this paper, we present an alternative interface design for a command and control software traditionally used in regional security systems. We propose a mixed reality application that uses holograms and superimposition methods to enhance the operator's experience. The proposed interface is tested on four different security operation scenarios which are operational planning, unit tracking, surveillance, and alarm detection. According to the results of applied questionnaires such as NASA TLX, PSSUQ, and SUS, it has been observed that the created interface is more informative and more usable compared to the traditional command and control software in terms of security operations.","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115136022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reviewing the Effects of Spatial Features on Price Prediction for Real Estate Market: Istanbul Case","authors":"Mert İlhan Ecevit, Z. Erdem, H. Dağ","doi":"10.1109/UBMK55850.2022.9919540","DOIUrl":"https://doi.org/10.1109/UBMK55850.2022.9919540","url":null,"abstract":"In the real estate market, spatial features play a crucial role in determining property appraisals and prices. When spatial features are considered, classification techniques have been rarely studied compared to regression, which is commonly used for price prediction. This study reviews spatial features' effects on predicting the house price ranges for real estate in Istanbul, Turkey, in the classification context. Spatial features are generated and extracted by geocoding the address information from the original data set. This geocoding and feature extraction is another challenge in this research. The experiments compare the performance of Decision Trees (DT), Random Forests (RF), and Logistic Regression (LR) classifier models on the data set with and without spatial features. The prediction models are evaluated based on classification metrics such as accuracy, precision, recall, and F1-Score. We additionally examine the ROC curve of each classifier. The test results show that the RF model outperforms the DT and LR models. It is observed that spatial features, when incorporated with non-spatial features, significantly improve the prediction performance of the models for the house price ranges. It is considered that the results can contribute to making decisions more accurately for the appraisal in the real estate industry.","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123772251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Welcome to UBMK'2022","authors":"","doi":"10.1109/ubmk55850.2022.9919561","DOIUrl":"https://doi.org/10.1109/ubmk55850.2022.9919561","url":null,"abstract":"","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124617164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying A New Requirement Template for Business, User, and Functional Requirements: A Real Transformation Journey For Business Analysis","authors":"Yasar Ugur Pabuccu","doi":"10.1109/UBMK55850.2022.9919599","DOIUrl":"https://doi.org/10.1109/UBMK55850.2022.9919599","url":null,"abstract":"Accurate and appropriate requirements are fundamental prerequisites for successful software project implementation. There are numerous methods and techniques to elicit and document the software requirements. However, none of them propose an end-to-end solution from business-level requirements to system-level requirements. Therefore, a requirement writing template -requirement cube- was developed in a prominent Islamic Bank in Turkey based on 5W1H questions along with the software. This paper explains the original idea, how the idea was transformed during the application within the organization, and the architecture of the software that was developed. During implementation, the hierarchy of the requirements changed. One more level - acceptance criteria- was added to the business requirement and the business requirement was moved to the software development request module. Besides, another transition level-sub-function-was introduced to integrate enterprise architecture with the requirements. Consequently, the initial theoretical requirement cube structure evolved into an applicable, practical solution for the software requirements.","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122126326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}