{"title":"Copy-Move Forgery Detection in Digital Forensic Images Using CNN","authors":"M. Kaya, Khalid Jibril Sani, Serkan Karakuş","doi":"10.1109/UBMK55850.2022.9919560","DOIUrl":"https://doi.org/10.1109/UBMK55850.2022.9919560","url":null,"abstract":"Digital images are commonly used for sharing visual information and can be manipulated easily. The detection forgery in digital images has become a hot domain of research in digital image forensics due to the prevalent use of image editing tools for manipulating an image to conceal or distort information in the image. One of the most common image forgeries performed is the copy-move forgery. This type of forgery involves copying a segment of the image, which is then pasted to a different segment of the same image. The need for detecting whether an image is authentic becomes essential. The existing methods implemented for detecting image forgeries were based on traditional feature extraction algorithms such as block-based and key point-based algorithms. These traditional techniques employed produce a low-performance result. Deep learning techniques have proven to provide better performance in image processing tasks. In this research, a convolutional neural network based on a pre-trained ResNet50 network was proposed to detect copy-move forgeries in digital images. The proposed model uses the CoMoFoD image dataset in experimenting. The metric evaluation results achieved in the proposed model show that deep learning methods performance is more effective in digital image copy-move forgery detection.","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129844835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Code / Model Review Process of Unmanned Aerial Vehicle Software Compliant with DO-178B Certification","authors":"İbrahim Seyfullah Babaarslan, Mücahit Topçu","doi":"10.1109/ubmk55850.2022.9919556","DOIUrl":"https://doi.org/10.1109/ubmk55850.2022.9919556","url":null,"abstract":"In this paper, the analysis of the errors encountered in the code / model review process, which is a part of the verification approach developed in accordance with the DO-178B certification requirements of the software of the UAV Flight Control Computer, and the lessons learned from this process are presented. The software verification process is a process used to verify that the aircraft's flight control computer behaves in accordance with specified requirements and does not produce unexpected results. One of the most important parts of this process is the code/model review process, in which the code and models created in response to the software requirements are checked to he fully compatible and complete with the requirements. In the paper, first the software architecture will he explained, then the code review process for the code and models written in accordance with the software architecture will he mentioned. Afterwards, the checklist items used for code / model review will he explained, the classification of errors found in code / model review according to the level of criticality and analysis on the most common errors will he made, and lessons learned from this process will he presented.","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114722504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Evaluation of BH-AllStar Approach in the Industry: A Case Study","authors":"D. Ulutas, A. Tosun","doi":"10.1109/UBMK55850.2022.9919514","DOIUrl":"https://doi.org/10.1109/UBMK55850.2022.9919514","url":null,"abstract":"The software testing process plays an important role in the software development life cycle. Test data generation is a critical step for efficient software testing. In the industry, safety-critical software tests must be carried out in a way that ensures software safety standards. Combinatorial Testing (CT) is one of the most frequently used method while generating test data in order to meet standards and also to perform efficient tests with higher code coverage rates. However, the test data explosion is a big problem in CT. To overcome this challange, various meta-heuristic methods are developed by using Search Based CT (SBCT) methods. In this study, the usability of a search-based meta-heuristic method (BH-AlIStar) in the industry, which was developed based on the Black Hole Algorithm (BHA), has been investigated. To achieve this goal, we used a more complex safety-critical industrial Software Under Test (SUT) than the one used in the reference study. Then, we evaluated basic BHA and BH-AIIStar on this SUT with respect to code coverage rate, execution time and number of test cases. According to the results, the BH-AllStar provides a 22% increase in code coverage compared to the basic BHA. This case study strengthens the argument that the BH-AllStar can be used in test data generation in the software industry.","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117252511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gulmira Tolegen, Alymzhan Toleu, R. Mussabayev, Alexander Krassovitskiy
{"title":"A Clustering-based Approach for Topic Modeling via Word Network Analysis","authors":"Gulmira Tolegen, Alymzhan Toleu, R. Mussabayev, Alexander Krassovitskiy","doi":"10.1109/UBMK55850.2022.9919530","DOIUrl":"https://doi.org/10.1109/UBMK55850.2022.9919530","url":null,"abstract":"This paper presents a clustering-based approach to topic modeling via analyzing word networks based on the adaptation of a community detection algorithm. Word networks are constructed with different word representations, and two types of topic assignments are introduced. Topic coherence score and the document clustering results are reported for topic model evaluation. Experimental results showed that it achieved comparable results with the current best. It also showed that the proposed approach produced a higher performance as the number of most relevant words gets larger in $C_{cv}$ coherence score.","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125488414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Author's Corpus of Alisher Navoi and its Semantic Database","authors":"Abjalova Manzura Abdurashetona, Gulomova Nargiza Sa'dullaevna","doi":"10.1109/UBMK55850.2022.9919546","DOIUrl":"https://doi.org/10.1109/UBMK55850.2022.9919546","url":null,"abstract":"Author's Corpus (AC) is an electronic system that contains the texts of a particular author's work, the author's writing style, language and text features in his works are grammatically, semantically and stylistically tagged. AC is an important electronic tool for a deeper understanding of a particular artist's work, research on his texts, study of creative skills and writing style, understanding the language of the period in which the artist lived. The author's corpus of Alisher Navoi, created in this regard, is a valuable corpus due to its historical, educational, pedagogical, social and spiritual significance in the educational process. This article discusses the capabilities of this corpus, its semantic base, and its business process model.","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132413990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly Pattern Analysis Based on Machine Learning on Real Telecommunication Data","authors":"H. Kilinç","doi":"10.1109/UBMK55850.2022.9919564","DOIUrl":"https://doi.org/10.1109/UBMK55850.2022.9919564","url":null,"abstract":"Fraud and anomalies are serious problems in the telecommunication world. These problems can be detected with the machine learning based tools. In this study, we used a Call Detail Record (CDR) data that contains 417000 call records made to 217 different countries. Firstly, we performed call traffic analysis and use K-means clustering to segment multi-valued categorical variables. Secondly, we worked on supervised models such as XGBoost, Extra Trees, Random Forest, unsupervised model such as Isolation Forest, and a new Mixture of Experts model computing average prediction probabilities of supervised models for anomaly detection. Thirdly, we generated anomaly scores by using the sum of the predictions by five models and labeled the calls based on the anomaly score. Finally, we found that 1% of the calls were suspected of fraud and the results were in line with industry reports.","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"622 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132703826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Adali, Sirojiddinov Shuhrat Samariddinovich, Khamroyeva Shahlo Mirdjonovna
{"title":"Comparison of Uzbek-Turkish Derivational Suffixes","authors":"E. Adali, Sirojiddinov Shuhrat Samariddinovich, Khamroyeva Shahlo Mirdjonovna","doi":"10.1109/ubmk55850.2022.9919509","DOIUrl":"https://doi.org/10.1109/ubmk55850.2022.9919509","url":null,"abstract":"In cases where there are few translated texts for two languages, lexical-based parallel corpus are used for computer translation. While this method is easy for fusuonal languages that can take very little affixes, it can be said to be more difficult for agglutinative languages. In agglutinative languages, it is important to know the meaning that the construction affixes give to the word. In this paper, we present comparatively the morphology of the Uzbek and Turkish languages, which we have prepared especially to create a word-based parallel corpus of Uzbek-Turkish languages and to make computer translations, in terms of construction suffixes.","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124882287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of an Information Model of The Portal of Scientific Knowledge by Means of Semantic Web Technology","authors":"Zh.B. Sadirmekova, A. Yerimbetova, A. Ibraimkulov","doi":"10.1109/UBMK55850.2022.9919463","DOIUrl":"https://doi.org/10.1109/UBMK55850.2022.9919463","url":null,"abstract":"The approach to the development of the portal of scientific knowledge model is described. The main purpose of the portal is to provide meaningful access to scientific and educational information resources of this field of knowledge and comprehensive information processing services. The portal of scientific knowledge will provide systematization and integration of scientific knowledge, data and information resources into a single information space, meaningful and effective access to them, as well as support for their use in solving various scientific and educational tasks. One of the approaches to the creation of such portals is the use of Semantic Web technologies, relevant standards and tools in the collection, processing, storage, search and dissemination of information. It should be noted that our approach naturally integrates the most important components of Semantic Web technology, in particular, the use of ontology to represent the semantics of information resources and support their intellectual analysis.","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125091795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Disaggregated Near-RT RIC Control Plane with Unified 5G DB for NS, MEC and NWDAF Integration","authors":"Hale Donertasli, Madhukiran Medithe","doi":"10.1109/UBMK55850.2022.9919594","DOIUrl":"https://doi.org/10.1109/UBMK55850.2022.9919594","url":null,"abstract":"The use-case of RAN Controller with MEC and Network Slicing integration by using unified 5G data collection and analytics is one of the key enablers for 5G networks to function based on the low latency requirements. Connecting these components are challenging for the operators due to the lack of single source of authority and unified data. O-RAN architecture extends the SDN controller concept of decoupling the control-plane (CP) from the user-plane (UP) by enhancing the traditional RAN functions with AI via RAN Intelligent Controller (RIC). However, disaggregating only CP and DP is not enough for the integration of the key enablers, indeed there is a need for disaggregation of CP of Near-RT RIC itself as well so that MEC, NS and NWDAF can connect in form of xApps which are the first anchor point of the authority and data handshake for time sensitive applications to be landed. In this paper, we proposed an architectural perspective focusing on the Near-RT RIC platform with the disaggregated CP enhancements and end-to-end combined xApp-rApp solution for smooth NS, MEC and NWDAF integration.","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122240033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdülkadir Pazar, Fidan Khalilbayli, Kadir Ozlem, Ayse Feyza Yilmaz, A. Atalay, O. Atalay, Gokhan Ince
{"title":"Gait Phase Recognition using Textile-based Sensor","authors":"Abdülkadir Pazar, Fidan Khalilbayli, Kadir Ozlem, Ayse Feyza Yilmaz, A. Atalay, O. Atalay, Gokhan Ince","doi":"10.1109/UBMK55850.2022.9919491","DOIUrl":"https://doi.org/10.1109/UBMK55850.2022.9919491","url":null,"abstract":"Human gait phase detection has become an emerging field of study due to its impact in various clinical studies. In this study, a system is developed to detect the toe-off, mid-swing, heel-strike, and heel-off phases of a gait cycle in real-time by using a textile-based capacitive strain sensor mounted on the kneepad. Five healthy subjects performed walks including those four phases of the gait at a constant speed and gait distance in a laboratory environment while wearing the kneepad. The phases are labeled according to the gyroscope data of the Inertial Measurement Unit (IMU) located on the kneepad. An Long Short-Term Memory (LSTM) based network is utilized to detect the phases using the capacitance data obtained from the strain sensor. Recognition of four phases with 87 % accuracy is accomplished.","PeriodicalId":417604,"journal":{"name":"2022 7th International Conference on Computer Science and Engineering (UBMK)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128141621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}