5-8 Oct. 2017
Filter Results
-
Table of content
Publication Year: 2017, Page(s):10 - 18|
PDF (88 KB)
-
-
[Copyright notice]
Publication Year: 2017, Page(s): 2|
PDF (37 KB)
-
Welcome to UBMK'17
Publication Year: 2017, Page(s): 9|
PDF (34 KB)
-
[Title page]
Publication Year: 2017, Page(s): 3|
PDF (107 KB)
-
[Title page]
Publication Year: 2017, Page(s): 1|
PDF (43 KB)
-
Automated detection and extraction of skull from MR head images: Preliminary results
Publication Year: 2017, Page(s):171 - 176Skull extraction from Magnetic Resonance (MR) head image datasets is the process of segmentation of brain tissues from other tissues (e.g., skin, bone, fat) and has an important role in computer-assisted operations. Because, the accuracy of skull extraction affects the next stages of digital image processing or analysis. Semi-/full automated detection and extraction of the skull from MR datasets i... View full abstract»
-
Computer-based segmentation, change detection and quantification for lesions in multiple sclerosis
Publication Year: 2017, Page(s):177 - 182Multiple Sclerosis (MS) is a neurological, progressive widespread disease whose diagnosis, treatment and monitoring have vital importance. However, manual method based on visual inspection for diagnosis and time-series assessments of changes in MS lesions is not re-producible and quantitative. Also, it is subjective and yields in inter-/intra-observer variabilities. Furthermore, the conventional m... View full abstract»
-
Comparison of mobile interaction management products using systematic literature review method and a new product suggestion
Publication Year: 2017, Page(s):183 - 188Because of innovations and improvements in technology, the use of smartphones that make it easier for users to work has become widespread. At this point, companies can reach their customers more easily and can communicate continuously. Once mobile applications are created, the system infrastructure needs to be improved in response to changing needs and demands to actively retain registered users a... View full abstract»
-
An approach for creation and implementation of national cyber security strategy
Publication Year: 2017, Page(s):189 - 194In this study, it is aimed to demonstrate how to develop a strategy in order to ensure effective cyber security of the assets owned, information and communication systems and infrastructures in cyberspace and to be a powerful force in cyber warfare and deterrence in a country. In this context, an approach is established for the creation and implementation of a national cyber security strategy requ... View full abstract»
-
Service governance in service oriented architecture
Publication Year: 2017, Page(s):195 - 200In today's world, enterprise information systems exhibit a heterogeneous distribution due to highly coupled applications and systems. As a result of this coupling, there are many problems such as inefficient code, delayed project deliveries, code repetition, lack of documentation and reduced happiness and productivity among software developers. An application named Enterprise Service Governance (E... View full abstract»
-
Remote controlled motorcycle security system (MotoGS)
Publication Year: 2017, Page(s):201 - 205In this study, an active alarm and event notification system that can provide security against theft of motorcycles has been designed. With this system, the owner of the motorcycle will be alerted at the moment of burglary action using the voice dialing method. Burglary action will be more difficult and deterrent when the horn on the bike is activated by the system. View full abstract»
-
A novel bit based reversible image watermarking method
Publication Year: 2017, Page(s):206 - 210Digital image watermarking methods are one of the mostly used methods for copyright protection and image content authentication. In this article, a new bit-based reversible digital image watermarking method (BB-RIW) is proposed for authentication in images. The proposed BB-RIW method consists of identifying the pixels to be stigmatized, generating the stamp, embedding the stamp, stamping, and imag... View full abstract»
-
On-shelf product detection: Post-processing with a hidden Markov model
Publication Year: 2017, Page(s):211 - 214In recent years, automatic detection of on-shelf products has become an industrial need along with the technological improvements in the field of computer vision. In this respect, localization of on-shelf products and detection of the brands of these products have evolved into two main objectives. In this work, a hidden Markov model, which is commonly used in signal processing for post-processing ... View full abstract»
-
An intrusion detection system based on a hybrid Tabu-genetic algorithm
Publication Year: 2017, Page(s):215 - 220In this paper, we proposed a framework for detecting network's intrusions using Genetic Algorithm (GA) with multiple criteria. First of all, we build an intrusion detection system (IDS) using a pure GA with multiple selection methods. Then, we proposed one of the few hybrid algorithms in the literature, which is hybridized using a GA and a Tabu search (TS) algorithm. The proposed hybrid algorithm ... View full abstract»
-
Virtualization and security: Examination of a virtualization platform structure
Publication Year: 2017, Page(s):221 - 226Virtualization is the creation of components, such as hardware platform, operating system, storage, processing power, memory, or network resource, in virtual environments. The applications of virtualization are spreading rapidly and the critical systems are working on virtualization infrastructures. However; the effects of security vulnerabilities which may occur can also be high. In this study, s... View full abstract»
-
A comparison of classification approaches for deep face recognition
Publication Year: 2017, Page(s):227 - 232Face recognition is a mature domain with lots of different techniques proposed in the literature. Convolutional neural networks have been the most successful approach to face recognition problem recently. In this work, performance of three different face recognition models are compared. Features are extracted using a pre-trained convolutional neural network. The first model is trained using the av... View full abstract»
-
A message broker based architecture for context aware IoT application development
Publication Year: 2017, Page(s):233 - 238Internet of Things (IoT) refers to interconnectivity of different devices and services through applications, sensors and industrial equipments. A fundamental aspect of this interconnectivity is the transfer of the data from providers to requestors via a data transportation channel. However, the many-to-many relationship between the requestors and providers makes communication management difficult.... View full abstract»
-
An experimental comparison of software effort estimation methods of ORM based 4GL software applications
Publication Year: 2017, Page(s):239 - 243Software effort estimation is important in planning and project budgeting for both developers and customers. Although there are many popular effort estimation techniques which have gone through significant developments in the past, software development methodologies and technologies are developing rapidly as a result of the need to improve the existing models. To this end, this paper compares and ... View full abstract»
-
Trustworthy scrum: Development of secure software with scrum
Publication Year: 2017, Page(s):244 - 249Software development process models focus on ordering and combination of phases to develop the intended software product within time and cost estimates. However, commonness of software vulnerabilities in the fielded systems show that there is a need for more stringent software development process that focuses on improved security demands. Meanwhile, there are some reports that demonstrate the effi... View full abstract»
-
Product aspect detection in customer complaints by using latent dirichlet allocation
Publication Year: 2017, Page(s):250 - 254Nowadays, people take into account complaints of customers about products or services before purchasing them. However, inconsistency as a result of information pollution on the internet make it difficult to get reliable information for users. In terms of companies, they spend a great deal of time and human resource to read complaints one by one. So, it is very important to address the focus of cus... View full abstract»
-
Categorizing the Turkish web pages by data mining techniques
Publication Year: 2017, Page(s):255 - 260Today, it is not possible to use human power alone to cope with the increasing amount of data. For this reason, some automated methods are needed to group similar documents together or to place documents in predefined categories according to certain rules. The use of automated classification techniques is becoming increasingly important for this reason. In this study, a database consisting of 22 t... View full abstract»
-
Methods of privacy preserving in collaborative filtering
Publication Year: 2017, Page(s):261 - 266Privacy considerations of individuals becomes more and more popular issue in recommender systems due to the increasing need for protecting confidential data. Even though users of recommender systems enjoy with personalized productions, they behave timidly about sharing their private data due to the some privacy concerns about price discrimination, unsolicited marketing, govern-ment surveillance an... View full abstract»
-
Integration of classification algorithms for indoor positioning system
Publication Year: 2017, Page(s):267 - 270
Cited by: Papers (2)Positioning applications become more popular with the advancement of location aware services. Global Positioning System is a successful solution for outdoors whereas it is not suitable for indoor environments due to the lack of line of sight for radio frequency signals. Therefore, various systems have been developed to solve the indoor positioning problem. Enhancing the performance of these system... View full abstract»
-
Wireless sensor network based fire detection system for libraries
Publication Year: 2017, Page(s):271 - 276
Cited by: Papers (2)The library environment is vulnerable to fire threat due to the paper based publications it contains. Since it is a public open environment and it contains valuable resources like handwritten historical documents, it is very important to ensure the safety of life and property in libraries. Therefore, gas and smoke detection based fire detection systems are used. In this study, using wireless senso... View full abstract»