2017 International Conference on Computer Science and Engineering (UBMK)

5-8 Oct. 2017

Filter Results

Displaying Results 1 - 25 of 227
  • Table of content

    Publication Year: 2017, Page(s):10 - 18
    Request permission for reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Committee

    Publication Year: 2017, Page(s):4 - 8
    Request permission for reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): 2
    Request permission for reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Welcome to UBMK'17

    Publication Year: 2017, Page(s): 9
    Request permission for reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2017, Page(s): 3
    Request permission for reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2017, Page(s): 1
    Request permission for reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Automated detection and extraction of skull from MR head images: Preliminary results

    Publication Year: 2017, Page(s):171 - 176
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    Skull extraction from Magnetic Resonance (MR) head image datasets is the process of segmentation of brain tissues from other tissues (e.g., skin, bone, fat) and has an important role in computer-assisted operations. Because, the accuracy of skull extraction affects the next stages of digital image processing or analysis. Semi-/full automated detection and extraction of the skull from MR datasets i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer-based segmentation, change detection and quantification for lesions in multiple sclerosis

    Publication Year: 2017, Page(s):177 - 182
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (142 KB) | HTML iconHTML

    Multiple Sclerosis (MS) is a neurological, progressive widespread disease whose diagnosis, treatment and monitoring have vital importance. However, manual method based on visual inspection for diagnosis and time-series assessments of changes in MS lesions is not re-producible and quantitative. Also, it is subjective and yields in inter-/intra-observer variabilities. Furthermore, the conventional m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of mobile interaction management products using systematic literature review method and a new product suggestion

    Publication Year: 2017, Page(s):183 - 188
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (193 KB)

    Because of innovations and improvements in technology, the use of smartphones that make it easier for users to work has become widespread. At this point, companies can reach their customers more easily and can communicate continuously. Once mobile applications are created, the system infrastructure needs to be improved in response to changing needs and demands to actively retain registered users a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach for creation and implementation of national cyber security strategy

    Publication Year: 2017, Page(s):189 - 194
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    In this study, it is aimed to demonstrate how to develop a strategy in order to ensure effective cyber security of the assets owned, information and communication systems and infrastructures in cyberspace and to be a powerful force in cyber warfare and deterrence in a country. In this context, an approach is established for the creation and implementation of a national cyber security strategy requ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service governance in service oriented architecture

    Publication Year: 2017, Page(s):195 - 200
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    In today's world, enterprise information systems exhibit a heterogeneous distribution due to highly coupled applications and systems. As a result of this coupling, there are many problems such as inefficient code, delayed project deliveries, code repetition, lack of documentation and reduced happiness and productivity among software developers. An application named Enterprise Service Governance (E... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote controlled motorcycle security system (MotoGS)

    Publication Year: 2017, Page(s):201 - 205
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (447 KB)

    In this study, an active alarm and event notification system that can provide security against theft of motorcycles has been designed. With this system, the owner of the motorcycle will be alerted at the moment of burglary action using the voice dialing method. Burglary action will be more difficult and deterrent when the horn on the bike is activated by the system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel bit based reversible image watermarking method

    Publication Year: 2017, Page(s):206 - 210
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (439 KB)

    Digital image watermarking methods are one of the mostly used methods for copyright protection and image content authentication. In this article, a new bit-based reversible digital image watermarking method (BB-RIW) is proposed for authentication in images. The proposed BB-RIW method consists of identifying the pixels to be stigmatized, generating the stamp, embedding the stamp, stamping, and imag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-shelf product detection: Post-processing with a hidden Markov model

    Publication Year: 2017, Page(s):211 - 214
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (161 KB)

    In recent years, automatic detection of on-shelf products has become an industrial need along with the technological improvements in the field of computer vision. In this respect, localization of on-shelf products and detection of the brands of these products have evolved into two main objectives. In this work, a hidden Markov model, which is commonly used in signal processing for post-processing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An intrusion detection system based on a hybrid Tabu-genetic algorithm

    Publication Year: 2017, Page(s):215 - 220
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (171 KB) | HTML iconHTML

    In this paper, we proposed a framework for detecting network's intrusions using Genetic Algorithm (GA) with multiple criteria. First of all, we build an intrusion detection system (IDS) using a pure GA with multiple selection methods. Then, we proposed one of the few hybrid algorithms in the literature, which is hybridized using a GA and a Tabu search (TS) algorithm. The proposed hybrid algorithm ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtualization and security: Examination of a virtualization platform structure

    Publication Year: 2017, Page(s):221 - 226
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (229 KB)

    Virtualization is the creation of components, such as hardware platform, operating system, storage, processing power, memory, or network resource, in virtual environments. The applications of virtualization are spreading rapidly and the critical systems are working on virtualization infrastructures. However; the effects of security vulnerabilities which may occur can also be high. In this study, s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparison of classification approaches for deep face recognition

    Publication Year: 2017, Page(s):227 - 232
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    Face recognition is a mature domain with lots of different techniques proposed in the literature. Convolutional neural networks have been the most successful approach to face recognition problem recently. In this work, performance of three different face recognition models are compared. Features are extracted using a pre-trained convolutional neural network. The first model is trained using the av... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A message broker based architecture for context aware IoT application development

    Publication Year: 2017, Page(s):233 - 238
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    Internet of Things (IoT) refers to interconnectivity of different devices and services through applications, sensors and industrial equipments. A fundamental aspect of this interconnectivity is the transfer of the data from providers to requestors via a data transportation channel. However, the many-to-many relationship between the requestors and providers makes communication management difficult.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An experimental comparison of software effort estimation methods of ORM based 4GL software applications

    Publication Year: 2017, Page(s):239 - 243
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (101 KB) | HTML iconHTML

    Software effort estimation is important in planning and project budgeting for both developers and customers. Although there are many popular effort estimation techniques which have gone through significant developments in the past, software development methodologies and technologies are developing rapidly as a result of the need to improve the existing models. To this end, this paper compares and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trustworthy scrum: Development of secure software with scrum

    Publication Year: 2017, Page(s):244 - 249
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (246 KB)

    Software development process models focus on ordering and combination of phases to develop the intended software product within time and cost estimates. However, commonness of software vulnerabilities in the fielded systems show that there is a need for more stringent software development process that focuses on improved security demands. Meanwhile, there are some reports that demonstrate the effi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Product aspect detection in customer complaints by using latent dirichlet allocation

    Publication Year: 2017, Page(s):250 - 254
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    Nowadays, people take into account complaints of customers about products or services before purchasing them. However, inconsistency as a result of information pollution on the internet make it difficult to get reliable information for users. In terms of companies, they spend a great deal of time and human resource to read complaints one by one. So, it is very important to address the focus of cus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Categorizing the Turkish web pages by data mining techniques

    Publication Year: 2017, Page(s):255 - 260
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (191 KB)

    Today, it is not possible to use human power alone to cope with the increasing amount of data. For this reason, some automated methods are needed to group similar documents together or to place documents in predefined categories according to certain rules. The use of automated classification techniques is becoming increasingly important for this reason. In this study, a database consisting of 22 t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Methods of privacy preserving in collaborative filtering

    Publication Year: 2017, Page(s):261 - 266
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (97 KB) | HTML iconHTML

    Privacy considerations of individuals becomes more and more popular issue in recommender systems due to the increasing need for protecting confidential data. Even though users of recommender systems enjoy with personalized productions, they behave timidly about sharing their private data due to the some privacy concerns about price discrimination, unsolicited marketing, govern-ment surveillance an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of classification algorithms for indoor positioning system

    Publication Year: 2017, Page(s):267 - 270
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (162 KB) | HTML iconHTML

    Positioning applications become more popular with the advancement of location aware services. Global Positioning System is a successful solution for outdoors whereas it is not suitable for indoor environments due to the lack of line of sight for radio frequency signals. Therefore, various systems have been developed to solve the indoor positioning problem. Enhancing the performance of these system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless sensor network based fire detection system for libraries

    Publication Year: 2017, Page(s):271 - 276
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (358 KB)

    The library environment is vulnerable to fire threat due to the paper based publications it contains. Since it is a public open environment and it contains valuable resources like handwritten historical documents, it is very important to ensure the safety of life and property in libraries. Therefore, gas and smoke detection based fire detection systems are used. In this study, using wireless senso... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.