264 results listed
Among the electrical machines the shaded pole
motors are the most difficult ones in terms of modeling and
analysis. This difficulty is arising from the non-uniform airgap and
unbalanced windings on its stator. Because ofthese the airgap flux
contains rich space harmonics, and this complicates the
mathematical modeling and simulation of these machines. On the
other hand, small size of these machines results in strong end
effects. Hence the 3-D modeling of magnetic field analysis poses an
important advantage. Therefore, in this presentation a 15 W, 4
pole shaded pole motor has been modelled in 3-D using Finite
Elements (FE) method to determine some important performance
parameters such as the airgap flux distribution and the saturation
effects in the motor laminations. In this process magnetic field
distribution have been obtained for three different case which are:
a) Main winding is excited but shading rings and rotor cage are
not excited
b) Shading rings are excited, but stator winding and rotor cage
are not excited
c) Both the stator winding and shading rings are excited, but
rotor cage is not excited
Finally, advantages accrued from such an analysis is discussedin
detail.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Adem Dalcalı
Mehmet Akbaba
Thyroid cancer is the type of cancer caused by the cells of the thyroid gland. This is less common than other types of cancer. If the correct diagnosis is made and appropriate treatment is given, the disease can be completely removed.
In this study, 3D models of thyroid cancer were modeled using DICOM images. As is known, dicom is the de-facto file standard in medical imaging, and these files contain many metadata. We used some of these meta-attributes to calculate the Hounsfield Unit. In addition, the pixel values are calculated according to the average attenuation of the tissue corresponding to a scale of -1024 to + 3071 on the Hounsfield scale. The DICOM images used in the study were obtained from real patients under the supervision of specialist doctors. Thyroid cancer tumors were modeled as 3D using the pixel values of Marching Cubes Algorithm.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ahmet Haşim Yurttakal
Hasan Erbay
T. İKİZCELİ
S. KARAÇAVUŞ
G. ÇINARER
We propose a new clustering ranking based multiobjective evolutionary algorithm. The algorithm uses decision maker’s preferences to reduce the search space and obtain a final set of preferred Pareto-optimal solutions. A new clustering ranking operator using Hierarchical Clustering on Principle Components (HCPC) and K-means methods is developed. We also develop a new crossover operator. The algorithm is implemented on several problems. The work is still in progress.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Erdi Dasdemir
B. Y. ÖZCAN
In any working environment, to perform visual tasks efficiently and accurately, adequate and appropriate lighting should be provided. The quantity and quality of illumination in any work place control by the type and duration of activity. The Illumination can be provided by daylight and artificial light together or separately. To calculate the illumination intensity at point C on the R plane from a light source at point A where the light distribution in space is known; besides the direct rays from point A to point C, the rays reflected from other planes must also be considered. By using this information, for inner work area a computer-aided modeling application has been developed by developing an algorithm that recommends the number and location of the selected luminaire considering the minimum illumination level recommendation specified in EN 12464-1 standard (which is European Standard that specifies lighting requirements for indoor work places). In this study, it was aimed to provide visual comfort in closed areas by focusing on only artificial light illumination.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Bayram Akgül
A.BİLİCİ
H. KUTUCU
The number of people with some kind of physical disabilities in the world is around 1 billion. The rate of people who need physiotherapy increases with the aging world population every passing day. Physiotherapy may not be completed with exercises made only in hospital. Therefore, patients should do the exercises given by the physiotherapist at home. The main problem here is that only 31% of the exercises performed by the patients are done correctly. Nowadays, in addition to traditional treatment methods there are studies on telerehabilitation to solve such problems. The aim of this study is to ensure that the shoulder rehabilitation exercises are performed at home by the patients and to provide physiotherapists with meaningful data about the exercises. In this study, Improved Shoulder Physiotherapy Application (ISPA) was presented using Microsoft Kinect 2 for shoulder rehabilitation exercises. ISPA is a hardware and software product that uses the joints on the patient's skeletal system. In the proposed system, the angular values are calculated using the joint points taken from Kinect 2 and the patients are simultaneously guided to do shoulder rehabilitation exercises correctly.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Burakhan Çubukçu
Uğur Yüzgeç
Raif Zileli
Ahu Zileli
Radio Frequency Identification (RFID) is not a new technology, but it is a new tool for improving performance of the manufacturing systems. There are many references to RFID implementation in the literature. Increase of the efficiency and speed of processes and improvement of information accuracy are some of the common benefits of RFID implementation. But there are many benefits not seen at first glance. Also there is a cost of RFID implementation as well as benefits. In this study, the objective is to carry out a detailed literature review in this field and to compare the studies in the literature for discussing similarities and differences. Thus, the study leads to discover new opportunities to extend research in this field.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Süleyman ERSÖZ
Ali Fırat İnal
Adnan AKTEPE
Ahmet Kürşad TÜRKER
Abstract: Fires, which are a phase of transition from outside the control to a certain time and place, cause social, economic, psychological and psycho-social loss of people. Due to the facts, fires can take place in the field of study of many disciplines. In order to strengthen the defense systems against the fires, both literary and scientific studies have been given to both social sciences and science and engineering.
The purpose of this study is; the distribution ratios of the postgraduate thesis studies done in the field of fire by searching the literature, the related fields and concentration rates shall be determined and to be assigned to the studies planned to be done in the future and to determine the areas that have not been studied.
In this study, 318 postgraduate theses obtained from the screening of the "fire" in the National Thesis Center of Higher Education Council (YÖK) were examined. The obtained data were interpreted using the IBM SPSS Statistics 22 program. Theses prepared mainly in master's degree are written in Turkish and English languages.
As a result, fires address a wide range of masses and neighborhoods, mostly theses on forestry and engineering sciences. Fire safety, forest fires, fire extinguishing systems, fire resistance of materials, fire detection and warning systems. It has been seen that working in the areas of fire intervention and extinguishing, fire terminology, fire behavior and classes, air (area / port) fires, fire extinguishing materials and technologies, fire training and application simulators, fire standards development are inadequate.
Özet: Belli bir zamanda ve mekanda kontrol dışına çıkan yanma olayının geçiş yaptığı bir faz olan yangınlar, insanlar üzerinde sosyal, ekonomik, psikolojik ve psiko-sosyal olarak kayıplara neden olmaktadır. Yangınlar, yapıları itibari ile birçok disiplinin çalışma alanında yer alabilmektedir. Yangınlara karşı savunma sistemlerini güçlendirmek amacıyla hem sosyal bilimlerden hem de ağırlıklı olarak fen ve mühendislik bilimlerinden literatüre bilimsel çalışma kazandırılmıştır.
Bu çalışmanın amacı; literatür taraması yapılarak yangın alanında yapılmış olan lisansüstü tez çalışmalarının dağılım oranları, ilgili alanlar ve yoğunlaşma oranları belirlenerek gelecekte yapılması planlanan çalışmalara önayak olmak ve çalışma yapılmamış alanları belirlemektir.
Bu çalışmada, “yangın” kelimesi Yüksek Öğretim Kurulu (YÖK) Ulusal Tez Merkezi’nden tarama yapılarak elde edilmiş olan 318 adet lisansüstü tez incelenmiştir. Elde edilen veriler, IBM SPSS Statistics 22 programı kullanılarak yorumlanmıştır. Yüksek lisans ağırlıklı olarak hazırlanmış olan tezler Türkçe ve İngilizce dilleriyle yazılmıştır.
Sonuç olarak, yangınlar geniş bir kitleye ve çevreye hitap etmekte olup, ağırlıklı olarak orman ve mühendislik bilimleri konularında tezler yazılmıştır. Yangın güvenliği, orman yangınları, yangın söndürme sistemleri, malzemelerin yangına karşı dayanımları, yangın algılama ve uyarı sistemleri konularında ağırlıklı olarak çalışmalar yapılmıştır. Yangına müdahale ve söndürme, yangın terminolojisi, yangın davranışları ve sınıfları, hava(alanı/limanı) yangınları, yangın söndürme maddeleri ve teknolojileri, yangın eğitimi ve uygulama similatörleri, yangın standartlarını geliştirilmesi konularında çalışmaların yetersiz olduğu görülmüştür.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Mustafa Dogan
M. Ali Biberci
Sedat Cat
Forest fire is an important issue that damages
thousands of hectares of forest and all creatures inside it. In this
study we have developed an early fire detection system running on
low-cost, lightweight Raspberry Pi module integrated with an
infrared camera. The infrared camera acquires the live video of
the fields, then if a fire occurs, our software detects the fire by
taking both motion and color characteristics of a flames into
account. In our study, there exist two phases: first, motion
detection phase is applied to the view, if a motion is detected in the
view, then, color detection phase is applied to determine the
flames. Obtained results indicates that our fire detection system
can detect a forest fire clearly and smoothly without requiring any
external equipment and manual intervention.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Yasin Ortakcı
Emrullah Yildirim
Oğuzhan Dereci
A multiobjective bus transportation problem is studied in this research. Due to the complexity of the problem, a multiobjective evolutionary algorithmbased solution approach is developed. The solution approach is implemented on a real world problem. The preliminary results are promising. The research is still in progress.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Erdi Dasdemir
M.C. TESTIK
O.M. TESTIK
C. TUNCER SAKAR
In this paper, a measurement system composed of a single low-cost sensor and a shape estimation algorithm is proposed. Measurement mechanism consists of a low-cost infrared sensor, two servo motors and a microcontroller. This mechanism provides flexibility to scan at different heights and angle intervals. From the obtained scanning results, the features of the shapes are extracted and objects are classified accordingly.Classified objects are square prism, triangular prism, cylinder and pyramid. The extracted features are change in the width of the object depending on its height, having corner, corner angle and slope of the surface. The algorithm uses segmentation and fractured line fitting on the contour data of the shapes. The proposed algorithm is proved to be superior to our former method using RANSAC algorithm.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Keziban Şaloğlu
Arda Hoşafçı
Merve Birbilen
Alpay Baybörü
Ege Dinler
Ahmet Güneş
It has been widely assumed by the research community
that the network reconnaissance attacks in IPv6 networks are
unfeasible because they would take tremendous effort to perform
address scanning of 2^64 hosts in an IPv6 subnet. However, recent
research has revealed feasibility of these attacks by investigating a
number of native IPv6 networks. The research concluded that an
intelligent attacker could easily reduce the target search space by
predicting the network host addressing schemes when performing the
scanning. This indeed enhances security concerns and undermines the
chances of IPv6 being deployed. This paper overviews the IPv6
addressing strategies currently used and proposes a new replacement
strategy to mitigate reconnaissance attacks. The new strategy is
evaluated against some reconnaissance attack approaches. The
experimental results confirm the effectiveness and validation of the
new addressing strategy in terms of the mitigation of reconnaissance
attacks.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Shubair Abdullah
In this study a novel four dimensional (4D) chaotic system is introduced. To prove chaotic behavior of the system, time series and phase portraits are presented. A novel pseudo random number generator (PRNG) application of the chaotic system is realized to show the system is suitable for engineering applications like encryption and data hiding. In order to realize PRNG, the chaotic system is discretized with numerical methods. The next step is selection of different number of bits from different state variables obtained from the chaotic system. NIST 800-22 statistical tests, the highest international standard, are performed for the generated random numbers to prove the proposed PRNG has sufficient randomness and successful results are obtained.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Sezgin Kaçar
F. YALÇIN
B. ARICIOĞLU
A. AKGÜL
Measuring software maintainability is of vital
importance for improving software product quality. Using a
software quality model in the development life cycle, the quality of
the system can be continuously evaluated and improved to reduce
the maintenance cost. According to ISO/IEC 25010 Software
Quality Models Standard, the maintainability characteristic of
software product quality is composed of five sub characteristics;
modularity, modifiability, reusability, analyzability and
testability. This paper proposes a quality measurement model to
evaluate the maintainability of software classes in terms of their
reusability and modifiability characteristics in large-scale
software systems. The model is based on software properties that
are strongly related to reusability and modifiability, such as size,
complexity, cohesion, coupling, and inheritance. First, our method
categorizes metric values of software classes in the test system as
low, medium and high. This categorization is done based on the
average and median values for these metrics that are obtained
from reference software systems. Then, the proposed
measurement method uses the levels of the metrics to calculate the
reusability and modifiability scores of each class in the system. The
scores fall in one of the five categories; very low, low, medium,
high, and very high. The developers of the software system can
examine classes with low and very low scores and then refactor
them if necessary. This continuous evaluation and refactoring
during the development can increase the quality of the system and
reduce maintenance costs. We applied our model on two largescale
industrial mobile applications and discussed the results with
the development teams of the systems. We saw that our approach
could reasonably grade classes on their reusability and
modifiability characteristics.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Özlem Akalın
Feza Buzluca
The main objective of this research is design and realization of a wireless, secure, remote monitoring, control and feedback systemusing GSM technology for the patient health. In this study, CRUD (Create, Read, Update and Delete) operations can be performed on a Windows Communication Foundation (WCF) server using the developed mobile application andMySQL database. This system also includes a ripped QR scanner that prevents the browsers from entering QR code information because a crypto QR definition of the patient's identity number was developed. All the patients’ assay results and their radiological views are recorded along their reports. Patients who need regular follow-up can send their daily, weekly and monthly results to the physician using this application. In an instant panic situation, this system can communicate to the 112-emergency services and by the help of a push-to-talk button, system can send the patient's instant location to the phone number indicated by short message service (SMS). If 112-emergency departments support the connection, system can also send this location information automatically to 112-emergency systems. Transmitted data is archived and visualized both on a mobile phone and on a central server. The experiments on the proposed system gave promising results that is accurate in scanning, clear in monitoring, intelligent in decision making and reliable in communication.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Hilal Kaya
F.V. ÇELEBİ
T. YILMAZ
M.B. MURATOĞLU
S. ERARSLAN
As known, web crawlers are programs that automatically browse on the web. Their purpose is to automatically navigate pages, saving source links that have target links, marking pages according to the words in those links, saving, indexing, collecting data to bring personalized ads, etc. Although the web crawlering algorithm is simple, it has various difficulties with respect to the existing pages on the web and the resulting amount of data. The semantic web works on generating computer readable data and is intended to overcome the quantity of data generated. Ontologies represent a pivoting source for semantic web applications. Ontology based crawlers scan the web by focusing on related web pages along with a specific ontology based on area ontology. The main advantage of the ontology based web crawlers over other crawlers is that no Conformance Feedback or Training Procedure is required to move wisely. In addition, both the number of documents and the more effective and efficient results will be obtained during the scanning process. As a result; The main advantage of an ontology based web crawler over other web crawlers is that it does not require intelligent, efficient operation and relevant feedback. In this study, traditional and ontology based web crawlers approaches and its infrastructure are examined. In addition, differences between ontology based web crawlers and traditional web crawlers have been investigated. A brief of literature summary on the subject has been included.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Yasemin Gültepe
A.B. ÖNCÜL
E. ALTINTAŞ
F. UĞUR
Nowadays, the content used on the internet is increasingly provided by mobile technologies. Mobile communication, which started with only voice transmission and then continued to undergo a major transformation with messages, mails, images and videos. As the amount of data accessed from mobile media increases day by day, researchers continue to be interested in the network access area, network access speed, data download/upload speed, and data security areas in mobile technologies. In this study, we explained First Generation (1G), Second Generation (2G), Third Generation (3G), Forth Generation (4G) and Fifth Generation (5G). Finally compered them briefly.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Muhammet Çakmak
Zafer Albayrak
Neural networks (NNs) is used to solve many engineering and science problem. Generally, feedforward architecture is preferred and gradient-based learning algorithms are extensively operated to tune all parameters of NN iteratively. This training method is a conventional one, but training process takes a long time due to the slowness of gradient-based learning algorithms. This slowness has been an important drawback in their applications. To overcome this disadvantage, extreme learning machine (ELM) concept introduced to science community in near past. Essentially, ELM is a data-driven learning algorithm for single-hidden layer feedforward neural networks (SLFNs). This algorithm provides extremely fast learning speed. In this study, performance of SLFNs learned by ELM algorithm is investigated on the problem of highly nonlinear dynamic system identification. As a result of studies on selected benchmark problems in the literature, it has been seen that ELM may not provide a good generalization success due to randomly chosen the number of hidden nodes and weight parameters for inputs in SLFN. For both the training and the test data set, very poor results have been obtained and observed surprisingly during the above-mentioned studies. Here, a simple heuristic approach has been proposed in this study in order to eliminate this bad situation and the findings obtained with this approach are discussed. Based on the obtained experimental results, it has been shown that the proposed approach determines the optimal the number of hidden nodes and a reasonable random selection of input weights required for a good generalization performance.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Cihan Karakuzu
Uğur Yüzgeç
The air transport has become the widely used option for the travel. The time saving and comfortable conditions encourage people to choose the airlines. The fierce competition and attractive market forced companies develop different pricing strategies to gain a competitive advantage. The ticket price, the charges for the luggage weight, special good carrying and seat selection are just many of the strategies developed by airline companies. The reaction of the customer is usually to choose the most economic option. Airline companies need a decision support system that will simulate the customer behavior against their strategies considering the strategies of their competitors. In this research we develop a simulation methodology for the domestic market in which we include different prices imposed by the airline companies and the buying preferences of the customers with the assumption that customer always choose the ticket with the minimum price. The airline companies then can analyze the consequences of their price strategies and expected strategies of their competitors.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ahmet Yucekaya
Researchers have been studying to understand and classify biological signals for better diagnose diseases and developing assistive technologies. These technologies are sometimes making it possible to communicate in ALS (Amyotrophic lateral sclerosis) patients, sometimes possible to use our computer, faster and more efficient without using our muscular systems. The steady state visual evoked potential (SSVEP) approach currently provides the high performance and reliable communication for the implementation of these technologies. Performance is usually measured by Information Transfer Rate (ITR) and the most important factor affecting ITR is signal window length.
In the presented paper a SSVEP based BCI (Brain Computer Interface) speller application is introduced and system performance is analyzed for different signal window lengths in experiments. The BCI speller has six box which has six letters in each box on the screen. The six letters in the selected box are distributed as one letter each box after the first selection by application. With the second selection, the letter which desired is displayed on the screen. The application contains Latin letters as well as Turkish letters. Experiments are performed on 3 healthy subjects. Subjects try to choose letter by focusing boxes which has flickering different frequencies. The minimum energy combination (MEC) method is applied to EEG segments that are different length in order to detect SSVEPs. The highest ITR value of 77.55 bit/min is obtained for subject 1 with 2 s signal window length. High accuracy and more useful a BCI system observed when system signal window length set 3 s.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
E. ERKAN
Mehmet Akbaba
In this study, geometric methods used to obtain
rectified photographs that will form a base for drawings of
building facades are examined. Mathematical models are
presented by informing briefly about the methods evaluated.
The subject is exemplified by a test study. In the test study,
firstly, the behavior of the related methods on the created artificial
image was examined and the applications on the real photographic
sets of the models obtained with different types and different
cameras were performed.
The obtained results were evaluated statistically and various
conclusions were drawn and the suggestions were made for those
who want to apply the method and want to do the study in this
subject.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
A.SOYCAN
M.SOYCAN
Data mining and machine learning algorithms are utilized in order to discover meaningful information by thorough analysis of dataset. They are used in multi-disciplinary field. Wart is caused by the human papillomavirus. It inhibits body growth by activating ecdysone steroid production systematically. There are several treatment methods for this illness. These methods focused on offering a solution for people. In this framework, a study on the analysis of the best two wart treatment methods, Cryotherapy and Immunotherapy, is carried out. The first one of these datasets collected by applying the cryotherapy method consists of seven features. The second dataset collected by applying the immunotherapy method consists of eight features. Fuzzy Rule, Naive Bayes and Random Forest based models are designed in order to evaluate the effectiveness of these methods in wart treatment. The performances of these algorithms are judged within the frame of Accuracy and Sensitivity performance measures.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Kemal Akyol
Abdulkadir Karaci
Yasemin Gültepe
Self-Adaptive Systems (SASs) are systems that monitor and adapt their behavior autonomously in response to dynamic state and environmental conditions. A typical architecture of SASs is constituted of a Manager (Autonomic) Sub-System that controls a Managed Sub-System. A well known architecture of the Autonomic Sub-System is the MAPE-K model. It is constituted of the Monitor, the Analysis, the Plan, and the Execution stages and the Knowledge Base. The major challenge of SAS is that all the stages are subject to uncertainty. Consequently, it has a significant impact on the adaptation quality. Currently, uncertainty is considered as a first-class concern in constructing Self-Adaptive Systems. However, few detailed works have been done about uncertainty in MAPE-K Control Loop. This paper intends to survey the most recent research on uncertainty in the MAPE-K using FRAMESELF architecture which is a detailed MAPE-K loop. Precisely, we present the sources of uncertainty in each process of the FRAMESELF model. In addition, we focus on missedsources of that we believe the community should consider.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
S. OUARETH
S. BOULEHOUACHE
S. MAZOUZI
Retinoblastoma is a childhood cancer grows in retina. Although it could be treated in early stages, it can spread to nervous system and also other parts of the body and eventually may cause death in this situation. The prediction of survivability attracts a considerable interest and has been studied at different types of cancers, like breast, lung, colon and thyroid in literature by applying data mining methods. Data used in this study is obtained from The Surveillance, Epidemiology, and End Results (SEER) program which is an authorized data repository of cancer statistics. In our study, the survivability for retinoblastoma is predicted on SEER dataset consisting of 1258 patients by using data mining algorithms (support vector machines, logistic regression, multi-layer perceptron, naïve bayes, random forest and decision trees). Two strategies for imbalanced data which are over-sampling (synthetic minority over-sampling - SMOTE) and under-sampling are used. Results are analyzed and compared with the ones studied in other cancer types.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Gülistan Özdemir Özdoğan
Hilal Kaya
Baha Şen
I. CANKAYA
With the rapid development of computer science, today many universities in their academic departments are using various educational software systems to provide class-related resources, manage the learning activities, and organize the contents of courses. Although these software systems vary widely, the most needed one has tended to be the learning management system. Learning management systems have gained popularity in recent years in conducting online academic programs more commonly to develop and support off-campus education. Learning management systems make it easier for students and teachers to share resources and communicate with each other. As technology influx has expanded alternatives for educational software solutions in distance education organizations, the need for usability testing for learning management systems has increased for better learning experience. This study determined to measure how students perceive the usability of a cloud-based learning management system that is widely used by students and faculty members in many universities.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Hakan Özcan
B. G. EMİROĞLU
In this study, a voice encryption application is realized by using a four dimensional (4D) chaotic system with single parameter. The main purpose of use of a single parameter chaotic system is reduction of computational load in order to run the voice encryption application on low performance hardware. Since the chaotic system is four dimensional, the system has four state variables and for every state variable different values of initial conditions can be used. This makes the key space length sufficiently long. In the application, the state variables are obtained with Runge-Kutta (RK4) method. The voice encryption is realized by XORing the obtained state variables with the voice data. The security performance of the voice encryption is proved by comparing the encrypted and original voice data in both time and frequency domain.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Sezgin Kaçar
F. YALÇIN
B. ARICIOĞLU
A. AKGÜL
The Student Model is dedicated to personalize and
to adapt the learning. With pedagogical strategy self-switching,
the monitoring of the student model is the cornerstone of
pedagogical strategy adapting. To efficiently achieve the
monitoring operation, we propose a fine grained WildCAT based
Observable Bayesian Student Model. On one side, it represents
how the user relates to the concepts of the knowledge structure
using the pedagogical component. On the other side, it integrates
concept level sensors that results in an Observable Networks’
Sensors. This permits to ensure the collect of the instant student
knowledge level. In addition, it uses a publish/subscribe
communication model to notify the Student Cognitive changes to
the monitoring component. On this side, the Monitoring
Component subscribe as a receiver of appropriate cognitive
changes. To experiment the likelihood and the usefulness of this
model, a framework is constructed using WildCAT on a Student
Cognitive Level.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
S. BOULEHOUACHE
Selma Ouareth
Ramdane Maamri
General fundamentals of mathematics itself, geometric patterns, and tasks of mechanics field, physics, natural science and technology have the deep roots of developing of the theory of curves. The curves were studied in different ways and methods. At this stage of computerization, you can plot any curve. In this paper, an algorithm for finding the extreme points of a curve in explicit form in both polar and Cartesian coordinates is described.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Rita Nauryzbayeva
Nowadays, the effect of social networks on people's lives is quite high. This situation gives rise to the density of information exist over social networks. That is why, analyzing the spreading pattern of information on social networks is an important issue today. The aim of this study is to technically review the background of information spreading, especially the fundamentals of rumor spreading and analyze the well-known methods on SNs. As a result, this article provides an important background for those, who works on the information spreading over SNs.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Burcu SAYİN
Serap Şahin
Measurement and control of environmental variables
such as temperature and relative humidity have a significant
application in science, industry, agriculture, healthcare and
controlling and automation technological processes. These two
environmental parameters are critical to continuously measure
and keep in desired ranges for real working conditions. This paper
aims to obtain the values of temperature and relative humidity via
wireless communication which is one of the most common
communication methods. The transmission of the data was
performed using RF receiver and RF transmitter modules. The
SHT11 sensor was used to measure both temperature and relative
humidity of the environment for the same point. This application
is realized and successfully tested in this study. The transfer of
data to the computer is successfully provided. Obtained results can
be used and applied to increase a system’s life in automation and
control technologies.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
H. BAKIR
Ümit Ağbulut
Muhammet Sinan Başarslan
In this paper we introduce an algorithm for
constructing approximate Voronoi diagram of a set of pairwise
disjoint arcs on a plane. The arcs are represented by parametric
curves. On the first step, we discretize curves using the proposed
adaptive method. Then, we construct Voronoi diagram of the
discretized objects and process the obtained Voronoi graph such
that redundant edges and cells are removed. Finally, the edges of
the processed graph are approximated by Bezier curves giving the
parametric representation of the final Voronoi diagram. The total
complexity of the described algorithm is O(n log n) in average.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Dmytro Kotsur
Vasyl Tereshchenko
The reverse logistics processes, i.e. collecting the
recycling materials, have a major cost for the recycling companies.
Collecting the recycling materials with the shortest route,
recycling companies can reduce the transportation cost. In this
study, we introduce a case study on a travelling salesman problem
encountered in an accumulator recycling company. We introduce
a mathematical model and an artificial bee colony algorithm to
reach the shortest route of the distribution network in the case.
Scenario analysis for the performance evaluation of the proposed
bee colony algorithm has been made on high-scale benchmark
problems in the literature. (see, travelling salesman problems in
OR Library, http://people.brunel.ac.uk/~mastjjb/jeb/info.html).
It has been shown that the algorithm is efficient for an industrial
application, it is able to reach near-optimal solutions in reasonable
solution time.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Oğuzhan KORKMAZ
Çağrı Sel
SQL Injection vulnerability is one of the most important and prevalent vulnerabilities. It is important to make pen tests to develop secure applications. In this paper, we perform a penetration test and implement SQL Injection attack. The results are tested in the demonstration platform testphp.vulnweb.com. By this work, we aim to emphasize the importance of secure systems and make people aware of that. Otherwise, existence of such vulnerabilities in a system can bring to bad results and bad situations. Then, we make an automated tool for SQL Injection penetration test with the aim to finalize the test quickly and to provide a convenience for pen testers.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
A.MURZAEVA
Sedat Akleylek
In the past two decades, human action
recognition has been among the most challenging tasks in
the field of computer vision. Recently, extracting accurate
and cost-efficient skeleton information became available
thanks to the cutting edge deep learning algorithms and
low-cost depth sensors. In this paper, we propose a novel
framework to recognize human actions using 3D skeleton
information. The main components of the framework are
pose representation and encoding. Assuming that human
skeleton can be represented by spatiotemporal poses, we
define a pose descriptor consists of three elements. The first
element contains the normalized coordinates of the raw
skeleton joints information. The second element contains
the temporal displacement information relative to a
predefined temporal offset and the third element keeps the
displacement information pertinent to the previous
timestamp in the temporal resolution. The final descriptor
of the skeleton sequences is the concatenation of frame-wis e
descriptors. To avoid the problems regarding high
dimensionality, PCA is applied on the descriptors. The
resulted descriptors are encoded with Fisher Vector (FV)
representation before they get trained with an Extreme
Learning Machine (ELM).
The performance of the proposed framework is evaluated
by three public benchmark datasets. The proposed method
achieved competitive results compared to the other methods
in the literature.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Saeid Agahian
F.NEGIN
Cemal Kose
Today, breast cancer is the most common non-skin
cancer affecting women. Because mammograms do not give clear
findings until a certain age for the diagnosis of breast cancer,
ultrasounds are applied as an imaging technique. Then, according
to the findings in ultrasounds, imaging techniques like
mammograms or other detection techniques are applied. Patient
will be required mammograms if ultrasound findings look
suspicious or the patient is above a certain age. Patients will have
biopsy according to the mammogram findings and other risk
factor values. Each step in this process will lead the patient
anxiety, and expenditures. But the results of not performing these
processes will lead one case of cancer and leads the patient more
serious problems and expenditures. Therefore, every step of the
process is vital importance to predict the most accurate
information available. Computer-aided diagnostics (CADx)
models are helpful in working on a huge number of variables, and
related the risk factors and risk estimation together. Many CADx
models provide support for experts by evaluating the
mammographic findings and are used by radiologists to increase
the detection rate of missed cancer patients. In this study,
application of well-known data mining techniques is done on a
public breast cancer data set. As a novelty, Migrating Birds
Optimization (MBO) which is a fairly new metaheuristic is also
applied on the same data set and the results are discussed. It is
shown empirically that the MBO meta-heuristic presents
preferable performance to the well-known data mining
techniques.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Muyesaier AIHAITI
Ali Alkaya
- A complete knowledge of Tibiofemoral (TF) joint
kinematics is essential in understanding the function of he al thy
and pathological joint. The objective of the present study is to
determine the six degrees’ translations and rotations of TF joi nt
during 10-minute in-vivo creep loading while standing using Dual
Fluoroscopic (DF) images. A computational model was develope d
for the kinematics analysis of the right knee of a 24-year old
female participant with healthy legs. Magnetic Resonance
Imaging (MRI) was obtained for the unloaded joint and used for
reconstruction of the knee joint model, including soft tissues. A
high-resolution DF system was used to image the distal femur
and proximal tibia during 10 minutes of standing. Braces were
used to minimize flexions and rotations of the TF joint during the
measurement. Translations and rotations of TF joint as functions
of time were determined from the DF images with the JointTrack
software. Coordinate systems were established for 3D
model of distal femur and proximal tibia anatomically.
Rotational and translational orientations of the TF joint were
calculated based on these coordinate systems. The maximum
relative rotations of the distal femur with respect to the proxi mal
tibia during 10-minute creep with approximately half body
weight were 1.167 degrees in varus-valgus rotation, 4.334 degrees
in internal-external rotation, and 0.541 degrees in flexion. The
results showed a vertical displacement of 0.234 mm with very
small rotations during 10-minute standing. Finite element
modeling of the joint is in progress.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Sabri Uzuner
M.L. Rodriguez
Leping Li
Serdar Kucuk
In this study, we consider an intelligent placement of
electrical materials such as luminaire, oven, dishwasher, washing
machine, refrigerator, TV-phone socket, etc. for the appropriate
places for drawing electrical installation diagrams. Electrical
installation project drawings of the buildings are prepared on the
architectural projects which are prepared by the architects. When
the electrical materials as symbols are placed on the project, with
the type of building, the type and size of the inner area, the purpose
of use and most importantly other descriptive symbol drawings
(named as “architectural furnishing symbols”) are taken into
consideration. For example, if an oven symbol is found in a
drawing part, then it means that this part most likely is a kitchen.
Although any of one architectural furnishing has dozens of
different symbols, they are basically similar to each other with
small differences. In our application, "architectural furnishing
symbols" are introduced to the system using artificial neural
networks, then “electrical material symbols” are automatically
placed according to the furnishing symbols detected at the site.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Bayram Akgül
H. KUTUCU
When the evolution of human being is analyzed, it is
seen that almost all activities are developed by trial and error
method. However, it is also known that these methods are not
productive and cause much time loss. Therefore, various methods
have been developed to solve the problems encountered in
different situations. As to educational activities, they mainly have
quite different qualities than others. In general, education and
training is done collectively by bringing people at the same level
together. Although we accept individuals who are brought
together of the same nature, this is not a very correct approach in
many cases. In fact, people have different levels of knowledge and
experience. Scientific studies have even shown that each
individual's learning method differs. Therefore, whatever method
is used, it is difficult to obtain the desired efficiency in collective
learning. In this study, a new learning method based on interactive
learning and knowledge based learning systems has been
developed with reference to the personal differences that emerged
during learning. With this method, first, the strong and weak
aspects of the person related to the subject to be learned are
determined and then the interactive learning is provided with the
designed interface. In this learning method where learning is
performed at different periods with asynchronous learning
techniques, creating permanent learning by taking individual
differences into account is the ultimate goal.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Gokhan Atali
D.KARAYEL
S.S.OZKAN
Turkish Sign Language (TSL), which is a mother tongue of hearing-impaired individuals, is a natural language. Expression patterns used in this language are carried out within the settings of the rules of the language. In this study, a textual interpretation system from Turkish to TSL was developed. Within this context, a corpus consists of 230 sentences was composed. Beside the sentences included in the corpus, also the interpretation of the sentences entered by the user interactively can be made. The rules of both languages were taken
into consideration in the interpretation of the sentences. Firstly, Turkish sentences were parsed to words and then, morphological analyses of the sentences were performed withZe mberek. As a result of the morphological analyses, root/stem of the words and the affixes attached to the words were determined.
Some affixes are not considered as necessary in TSL. Therefore, the affixes which are not considered as necessary should be determined and ignored within the interpretation. Moreover, various rules were constructed for the transformation by considering the results of the morphological analysis rules and usage samples. Descriptions related to 489 signs and 6 non-manual signs were made in order to express the sentences included in the corpus in TSL. The number of the signs out of 489 were as follows: 81 static, 408 dynamic, 334 single, 155 repetitive, 6 sign union and 2 word combination. 6 non-manual signs were as fol l ows; baş önde (head ahead)" bö", baş yukarı da (he ad up) "by", kaş yükseltme (eyebrow raising) "ky", kaş i ndi rme (e yebrow l owe ri ng) "ki", past aspect "di" (past tense suffix) and continuous aspect "yor" (present continuous tense suffix). Usage numbers of the nonmanual
signs were as follows: 66 "bö", 12 "by", 38 "ky", 40 "ki", 94 "di" and 31 "yor".
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Mehmet Fatih Karaca
Şafak Bayır
Rapid developments in information and
communication technologies over the last few decades have led to
cyberspace becoming a part of our daily lives. Protecting cyber
space from harmful activities has become a critical point of action
for policy makers around the globe as societies, governments and
businesses become increasingly dependent on the internet. So, it
is important to prepare and develop a national cyber security
strategy (NCSS) for the management of information and
communication systems, ensuring citizen safety, and protecting
critical infrastructures. In this study, the concepts of cyber
security were mentioned and the national cyber security
strategies of some of the leading were examined. In the last part,
the implementation stages of a good national cyber security
strategy were focused on.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Cihan Ataç
Sedat Akleylek
Co-authorship networks provide a broad view to the connectivity properties of scholars, together with patterns of knowledge diffusion in scientific society. Network science provides a substantial framework for discovering the dynamics of these interactions those are defined by co-authoring a paper together. We constructed a complex network consisting of co-authorship links between authors, using the data retrieved from Web of Science Core Collection. Date retrieved is limited to 67248 publications addressed from Turkey in engineering field, including the timespan between 1975 and 2018. Analysis performed through this massive dataset resulted a complex network of 78883 nodes (authors) and 194232 edges (co-authorship links). Authors exhibit an average degree (neighbor) of 4.925, which increases to 6.687 in weighted analysis. Network exhibits an invincible clustering coefficient of ~0.8, while the average path length is close to 18. Together with the power-law consistent degree distribution that labels the network as scale-free, we also presentedtop “most central” authors of this network with respect to betweenness, closeness and eigenvector centrality measures, each defining the “importance” of an author in different aspects.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
İlker TÜRKER
Rafet Durgut
Oğuz Findik
In the empirical sciences, experiments are carried out in the laboratory so that the results may be applied in other locations where the conditions are the same as in the laboratory. Hence, it should be possible to establish certain causal statements in the laboratory, which can be transported to real-world environment. In the present paper, experiments were carried out on wireless sensor networks in the laboratory and the results were transported to environments where experimentation is impossible. The tool Tetrad was used to arrive at the causal directed acyclic graph for the wireless sensor network in the laboratory. The concepts of selection diagram, the principle of transportability and the condition for failure of transportability are discussed. The applicability of transportation algorithm for typical environment and also the failure of the same are analyzed. Simulations are carried out using the simCausal package in R programming and the validity of the probability expressions transported by the transportation algorithm are shown to be correct.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Karthik P. C.
E.POOVAMMAL
In this paper, performance of joint transmit and receive antenna selection in cooperative MIMO channels is investigated over Rayleigh fading environments. A cooperative MIMO communication scenario in which all of the terminals are equipped with multiple antennas is considered where source want to transmit data to the destination with the help of the relay. The techniques developed in literature to combat error propagation effect in digital relaying networks such as cooperative maximal ratio combining (C-MRC), virtual noise (VN) based detection and selective relaying (SR) are exploited in this study to obtain new antenna selection criteria for cooperative MIMO systems. Only one antenna is selected and activated at each of the three terminals in a manner to minimize the end-to-end bit error rate (BER) of the overall system. This approach eliminates the requirement of space-time signaling in system design and reduces the complexity and cost by minimizing the number of the required RF chains in the network. Unlike most of the studies in the literature, we assume that the direct link between source and destination exists. Numerical results have shown that a diversity order of (nS + nR) * nD can be achieved for VN and SR based transmissions where nS, nR, and nD are the total number of the antennas at the source, relay and destination, respectively. Among the considered schemes, the best performance is obtained in case of SR based system model.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ozgur Ozdemir
Mass appraisal of real estate is a complex problem
because of multiple criteria. Developed technologic methods
provide a solution by transforming into the form of simple and
easy. Multiple Regression Analysis (MRA) is frequently used in
academic and practice studies in the world and our country. New
method quest continues according to recent advances in computer
technology. Artificial Neural Network (ANN) which is one of the
artificial intelligence methods should investigate in order to use in
the valuation because it can imitate human brain.
The aim of this study is to estimate with ANN method the value
of real estate. The study data consisted of the market samples
concerning the plots in Centre Neighborhood of Konya. The data
of the 558 samples were collected as main headings in the form of
Legal, Physical, Locational and Neighborhood Features. The data
set was separated for 70% training and 30% test. The market
values of the plots were forecasted by using 70% training data with
ANN and MRA methods and compared by testing 30% data in
both methods. According to the results, it has seemed that success
of ANN method is higher than the success of MRA method.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Fatma Bunyan Unel
Şükran Yalpır
Today, the role of software testing in the life cycle of
software development has significantly increased. The process of
software testing implementation include: planning, designing,
creating, executing and supporting of the tests. At the same time,
there was a transition from direct testing to quality assurance,
covering the software development cycle in general.
In this paper, we proposed the directions for solving problems in
software testing. Solving of this problems requires knowledge,
logical reasoning, the experience of an engineer for quality control
software. Using an artificial intelligence methods in a software
testing allowed us to found the ways for executing of tests
classification and optimization.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Yuliya Kozina
N. Volkova
O. Osadchiy
The main purpose of the semantic web is to develop standards and technologies that will enable well-defined and linked information and services to be easily computer-readable and computer-understandable in the web environment. Linked data is one of the approaches used to acquire meaningful integrity by gathering data-related data collections by creating semantic links between the web pages that make up the content of the semantic web. Linked data is based on RDF (Resource Description Framework) technology. RDF is a data model that provides space-independent formal semantics with respect to chart resources. In a linked data application, the most important decision point is how to access the linked data. Linked data crawler is a program that explores linked data in web by tracking RDF links. In this work, DBLP (Database Systems and Logic Programming) data set is used as a source of Linked Data. DBLP gradually expanded toward all fields of computer science. An example will be presented related to pageRank sorting of RDF resources in the DBLP dataset. As a result; the search area has shrunk and search results have improved.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Yasemin Gültepe
Kemal Akyol
Abdulkadir Karaci
In this study, Artificial Atom Algorithm, which is a new meta-heuristic algorithm approach, have been used to calculate the threshold value which is frequently performed in image processing applications. The entropy-based method has been adopted for the target function which is common in the meta-heuristic algorithms. For this aim, Shannon entropy and a new entropy method, Fractional Order Entropy, have been used. It is seen on standard test images that the Artificial Atom Algorithm can be applied to image processing applications. In addition, the results of the application were supported by comparing the values produced by certain parameters of fractional entropy with the values produced by Shannon Entropy.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Burak Açma
Emine Çiftçi
Burhan Selcuk
Linear Ordering Problem is an NP-hard
combinatorial optimization problem. Several metaheuristic
algorithms (Tabu Search, Memetic Algorithm, Variable
Neighborhood Search, Simulated Annealing, Scatter Search,
Greedy randomized adaptive search procedure) present for the
linear ordering problem in literature for finding high quality
solutions. This paper presents an Artificial Bee Colony algorithm
for solving the linear ordering problem. The results are compared
between the other implementations of metaheuristics and
Artificial Bee Colony algorithm can produce good solutionsfor the
linear ordering problem instances.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Emrullah Sonuc
In this study, four artificial neural network models
are designed for the daily meal demand in places where mass
meals are produced. It is aimed to avoid the cost of overproduction
in the places where mass meals are produced and at the same time
to prevent the ending of the meals with less food production. In the
study, the number of people eating food was estimated by using the
data obtained from the university dining hall. Feed-forward
neural network, function fitting neural network, cascade-forward
neural network, and multilayer perceptron neural network
models and linear regression methods are used in the developed
prediction models. The best results were obtained with multilayer
perceptron with 93% accuracy and cascade-forward neural
network models with 85% accuracy
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Derya YERGÖK
C.T. GÜVEN
Mehmet Acı
New and less energy consuming methods are developed to reduce the increasing heating costs day by day. Heat transfer method is one of the most commonly used methods for heating an environment. The amount of heat required to heat an environment in a heat transfer technique is found by the amount of heat lost from the environment. In this study, artificial neural networks were used for estimating the monthly heat demand for the heating needs of a greenhouse in Elazığ province with 2017 meteorological and spatial data. The amount of heating has been tried to be estimated using the MATLAB program with the lowest error. Heating Degree-Day (HDD) values and latitude, longitude and altitude data were used for analyzes to be made in the artificial neural network model. It has been estimated that the heat requirement for the heating of the greenhouse is lower than the heat requirement for the heat transfer method in the designed artificial neural network model.The artificial neural networks model has been found to be a useful method for studying the heating of greenhouses.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Özlem Alpay
Ebubekir Erdem
Text classification, which is a sub-field of the natural language processing, is utilized for the solutions of problems in various areas. One of these areas is the author detection in written texts. When a person writes a text, he or she makes several marks due to the spelling characteristics. Author detection or recognition means that ownership of the text is questioned by comparing these spelling features. Different features belonging to the author can be extracted from texts and many comparisons can be made. In this study, author recognition was performed using bigram, trigram and quadrigram frequency property with the Naïve Bayesian approach for decision making. 120 different Turkish books written by 20 Turkish authors in different distributions were studied. Initially, the authors' bigram, trigram and quadrigram frequency properties were extracted from the books. Then, the comparison of the n-grams performances attained by Naïve Bayesian method is examined through this paper.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Samet Kaya
A. GUNES
Recognition and interpretation of human activities
are very interesting and hot topics that are frequently studied in
the field of computer vision. Especially with the advent and
development of the Microsoft Kinect depth sensors, the expansion
of the study fieldhas gained momentum in the positive direction.
Thanks to RGBD cameras, which also provide depth information
in addition to the RGB image, researchers benefit from many
advantages in terms of privacy, accuracy and precision. In this
study, automatic segmentation of repeated 3D human activity is
proposed. A public dataset containing the repeated action
sequences are recorded using the RGBD camera. The action
sequence in this dataset includes similar and different action
information. In order to identify and label each action in sequence,
it is necessary to perform the segmentation process. To be able to
perform a successful segmentation process, the data must be preprocessed
to remove noise. For this purpose, a total variation
based noise removal method is used. Human action recognition
and detailed error analysis can be performed through the
segments derived from the output of this work.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Rafet Durgut
C. OZCAN
Oğuz Findik
The blockchain technology is a hot topic and a new technology in recent years. It is not only an underlying technology for many applications like Bitcoin application, but also it is a kind of thinking including cognitive and mental processing and understanding for artificial intelligence and human enhancement. All data or services are digitized. So, this leads to deal with big data. It is a challenge to deal with big data from the perspective of performance, scalability, availability and privacy in centralized systems. Blockchain is applicable to big data and brings different perspective how to process, store, read and write data. Also, the aim of this paper is to show that better solutions are possible in a decentralized way. Even the technology is in its early stages, the blockchain technology will be in future due to its superior features. Therefore, it is better to adopt this technology as soon as possible to place in future. This paper gives a brief about how the blockchain could approach to big data and analyzes existing information regarding the challenges of big data from the side of the blockchain.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Senem Kaplan
Serap Şahin
İngiltere’nin AB’ye girişi sancılı olmuştu. İki kez Fransa tarafından veto edildikten sonra 1973’te,
o zamanki adıyla Avrupa Ekonomik Topluluğu’na üye olan İngiltere, içine girdiği andan itibaren
en kritik konularda Birlik için hep sorun oldu. Ekonomik bütünleşme için son derece önemli iki
konu olan Schengen Alanı ile Avro Alanının dışında kalmayı tercih eden İngiltere, siyasi
konularda da sık sık Almanya-Fransa eksenindeki ülkelerle ters düştü. İngiltere’nin AB’den çıkış
tartışmalarının hız kazanması Aralık 2009’da yürürlüğe giren Lizbon Antlaşması’ndan sonradır.
Brexit, Birleşik Krallık’ın Avrupa Birliği ile ilişkilerinde en önemli dönüm noktası olmuştur. Bu
nedenle, Brexit’e giden süreci, nedenlerini ve sonuçlarını incelemek konunun daha iyi
anlaşılmasını sağlayacaktır. Referandum, arkasında bölünmüş bir ülke bırakmıştır. Özellikle
İskoçya ve Kuzey İrlanda'da gençler ve kentsel nüfus AB'de kalmayı tercih ederken, büyük
metropol alanlarının dışında yaşayan daha yaşlı ve az eğitimli nüfus İngiltere’nin AB’den
ayrılması yönünde oy kullanmıştır. Referandum sonrasında Avrupa’nın geri kalanı şok içinde ve güvensiz bir durumda kalmıştır. Kimin kazandığının tam olarak belli olmadığı bir referandumun ardından, Brexit’in sonucunda da ne olacağı tam olarak belli değildir. Referandum neticesinde İngiltere tarafından elde edilen siyasi pozisyon, Birleşik Krallık'ın ve belki de AB'nin, dünya siyasetinde egemenlik iddiasını bırakması sonucunu doğurabilir. Bu çalışmanın amacı; AB üyeliğinin devamının İngiltere açısından ekonomik getirileri açıkça ortadayken Brexit nasıl gerçekleşmiştir? Birleşik Krallık’ın AB’ye tam üyeliğine ilişkin alternatifleri nelerdir? Antlaşmasız bir ayrılığın taraflar açısından sonuçları neler olabilir? sorularının yanıtını bulmaktır.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ali AYATA
In large scale software applications, bug
localization is a difficult and costly process. Many issues or bugs
may be reported at both development and maintenance phase of
software development lifecycle. Hence, it is important for
developers to discover the location of the bug. In general, source
codes and bug reports are used for identifying bug location with
the help of Information Retrieval (IR) techniques. In this paper,
we present an IR-based bug localization approach named
BugSTAiR that uses structured information of source files, source
code history, bug reports and bug similarity data if exists. To do
best of our knowledge it is the first system developed for
JavaScript source files. The experimental results show that
accuracy of the system is promising (~%30 on Top 1) on file level
bug localization.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Mustafa Ersahin
Semih Utku
Deniz Kilinc
With the increasing of data size in recent years, processing and analyzing of the big data has become difficult. Therefore, interest in this area has also gone up. In 2006, Geoffrey Hinton, the pioneers in the field of machine learning, developed a deep learning model at the University of Toronto. The basis of the deep learning model is based on the use of a large number of hidden layers in artificial neural networks. Previously, increasing the number of hidden layers in artificial neural networks, deepening the network, was not preferred because it caused complexity in calculation processes. Deep learning that provides a nonlinear transformation of the big data can model complex relationships with a multi-layered structure. As this model provides more comprehensive attribute learning, the classification becomes more successful. For this study, Convolutional Neural Network (CNN) model is represented for the large-scale image classification. CNN is the most widely used deep learning model in feature learning, recognition, and classification. In order to obtain a powerful image classifier, there should be large amount training data. Because of that, data augmentation techniques are used to boost the performance of the deep networks. In this study, data was increased using image augmentation methods that create artificial training examples through different ways of processing techniques such as adding noise, rotating, shifting, shearing, and resizing. The data that consists of car photos taken from the rear and are provided from the literature are separated into 40 categories. Finally, the classification performances using different deep learning CNN models such as AlexNet, VGG16, and VGG19 are evaluated and experimental results are reported.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Kübra Uyar
Erkan Ülker
The purpose of the study is to efficient classification of Cardiotocography (CTG) Data Set from UCI Irvine Machine Learning Repository with Extreme Learning Machine (ELM) method. CTG Data Set has 2126 different fetal CTG signal recordings comprised of 23 real features. Data is two target class description that are based on fetal hearth rate and morphology pattern. The classification criteria based on morphology pattern (A-SUSP) is used in this study to serve better decision options to operators. Accuracy of ELM method will be compared with previous works in literature.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ayşenur Uzun
E. ÇAPA KIZILTAŞ
E. YILMAZ
In this paper, Padé approximation based on truncated total least squares method (P-TTLS) is defined as a nonparametric method to estimate the nonparametric regression model and to obtain an optimal estimation, determination of the truncation level is illustrated. Here, three selection method are used for choosing the truncation level which are GCV, AICc and REML respectively. To compare and interpreting the performances of the criteria, a simulation study is carried out and results are presented.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
D. Aydin
E. YILMAZ
In the last decade, technological innovations and a changing economic and regulatory environment have resulted in a renewed interest for distributed generation. In most cases distributed generation systems are represented in the form of autonomous energy centers, since the connection of distributed generation to centralized electrical networks is being limited to the lack or imperfection of the regulatory framework and effective means of controlling technological regimes. In this paper is carried out a comparative analysis of the operation principles and options for connecting to the distribution network of autonomous power plants using different types of distributed energy resources. While connection of distributed energy resources to distribution network, one of the main tasks is distribution of loads between generating capacities. An algorithm for solving this problem is also presented in the paper.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
A. ARIFJANOV
R. ZAKHIDOV
Nuri Almagrani Ali Almagrahİ
In recent years, with the growing popularity of smartphone, near field communication (NFC) based mobile
applications commenced to be used in public transportation. This development provides an opportunity to collect additional and province independent data about passengers and so it allows development of better data mining applications. The present study is conducted to compare classification algorithms on public transport data collected by NFC-based mobile phone ticketing application for the first time. In this paper, five popular classification algorithms have been considered to investigate various target attributes in terms of accuracy rates: Naive Bayes,
C4.5 Decision Tree, Random Forest, Support Vector Machines, and k-Nearest Neighbor. The study presented in this paper can be useful to provide decision support for public transportation.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ufuk Demir Alan
D. BİRANT
By the development of technology, image
classification algorithms frequently use to identify land use and
land cover of any area in remote sensing studies. Due to the
diversity and complexity of land cover on the wetland areas, it is
quite difficult to obtain accurate results related to the earth's
surface. The main purpose of this research is to compare the
overall accuracies of object based and pixel based image
classification methods. Arslantaş Dam Lake is structured on
Ceyhan River for irrigation, flood control and electricity
generation in Osmaniye province. In this study, Landsat-8 LDCM
satellite image of Aslantaş Dam Lake with spatial resolution of
30m, acquired on December 29, 2017 was used. Firstly, image was
classified by pixel based classification with support vector
machines (SVM) method. After that, image was reclassified by
object based classification with K-nearest neighbour (KNN)
method. Five classes namely lake, agricultural area, soil,
vegetation and building area were determined by using these
algorithms. Ground truth data were gathered from aerial
photographs, available maps and personal informations. Finally,
overall accuracies of these methods were compared. It is observed
from the classification results that object based KNN method
provide higher accuracy than the other classification method.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Mustafa Hayri Kesikoğlu
Sevim YASEMİN ÇİÇEKLİ
Tolga Kaynak
This study aims to compare Turkey’s computer
engineering undergraduate programs to compare with “European
Union country” programs. In this way, it is aimed to contribute to
the improvement of the programs in our country. Additionally,
Erasmus programs of the universities in our country are aimed at
reducing the adjustment problems experienced by the students
going to European Union countries. All these operations are
performed with data mining algorithms.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
S. KILICER
Ruya Samli
In parallel with the development of the technology, the storage of the data more easily and quickly and the faster processing on the stored data can make an important contribution to the creation and analysis of networks of coexistence. Complex networking plays an important role in analyzing and revealing common characteristics and structures of connected clusters depending on various characteristics. In this study, a network of association between male tennis player in the Australian Open, the French Open, the US Open and the Wimbledon tennis tournaments, known as four major international tennis tournaments between 2000 and 2017, has been established.While each tennis player is defined as a node in the network of associations created, the competitions of the tennis players with each other are defined as the links connecting these nodes. The universal principles of complex networks such as scale-free, small world, clustering have been examined. Furthermore, through Gephi software, the structural characteristics of networks are visualized by using the data obtained from this association network. As a result of the study, it was seen that the networks among the tennis players struggling in the related tournaments were carrying real world network characteristics and that the data obtained from these networks can be used for network analysis.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Oğuz Findik
Emrah Özkaynak
Today, with the development of information technologies, studies on the evaluation of relations between people, objects and events to put it simply relations between creatures and facts have taken place among general topics. As the data related to the relationships between creatures and facts continue to increase and become storable together with developing technology, new methods are being developed for analyzing and evaluating these data. There are both semantic and structural relations within the obtained data stacks. Complex network analysis is one of the most common methods used to reach semantic relationships as a result of analyzing and evaluating these relations. In this study, a network was formed among the teams who competed in the UEFA Europe League between 2004-2017 by using the data of football competitions played after the groups. As a result of the evaluation, different categories such as last 32, last 16, quarter final, semi final and final matches are analyzed and the similarities of the networks to the real world networks are compared with the data obtained about the network structures. As a result of the study, it is observed that the teams that compete in the UEFA Europe League are similar to the real world networks.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
E. E. SULAK
H. Yılmaz
Emrah Özkaynak
In this study, two recent nature-inspired optimization
algorithms Salp Swarm Algorithm (SSA) and Ant Lion
Optimization (ALO) were introduced and a comparison with two
algorithms was realized. For these comparisons, constrained
optimization test problems were solved with these algorithms.
The effects of the penalty coefficients on the solution of
constrained problems were also studied. Results were submitted.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Pakize Erdogmus
Muhammed Gocer
Ebru Dudak
Nurcan Ozkan
Existing networking systems are hardware-based and
rely on inflexible architectures. In recent years, Software defined
networks (SDNs) has emerged as a new paradigm for nextgeneration
networks. SDNs are proposed to separate control plane
and data forwarding plane in the traditional networks to reduce
the increasing complexity of the network equipment. This
separation enables a programmable and flexible hardware
infrastructure via OpenFlow protocol and provides great
opportunities in terms of reducing operating cost, simplifying
network management tasks, gathering network statistics, and
accelerating innovation.
Logging is a structure that records the events of a system and the
users in the system. With logging operations, the actions making
by each device can be recorded. Especially in places where more
than one person connects to the internet such as hotels, cafes,
restaurants, student dorms and companies etc., it is necessary to
monitor and take logs of the events. Already, by the Law No 5651,
to combat certain crimes committed on the internet, it has become
obligatory to take logs to institutions or people who provide
collective internet services.
In this paper, a logging and monitoring system has been designed
and implemented. For logging and monitoring proceses, sFlow,
OpenFlow, Floodlight, Open vSwitch, node.js, and MySQL
technologies have been used. sFlow technology is used to monitor
the networks. sFlow standard gives complete visibility into the use
of networks enabling performance optimization, usage, and
defense against threats. OpenFlow is a protocol used in SDN
environments to enable the SDN controller to interact with the
data forwarding plane of the network devices. Floodlight software
is used by SDN controller for network operations. Open vSwitch
software which enables to handle the traffic loads is installed at
Raspberry Pi 3 hardware. The obtained results show that the
proposed system can take the flowtable records, transfer the
records to node.js via sFlow, and save the records to MySQL via
node.js. Finally, the network traffic is successfully monitored and
logged.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Bilal Babayigit
S. KARAKAYA
In this study, we created probability maps of
earthquake occurrences using Kriging method from Geostatistical
techniques with the Geographic Information Systems (GIS) in the
NAFZ (western, central, eastern). Geostatistical techniques had
both the capability of producing a prediction surface and provide
some measure of the certainty or accuracy of the predictions.
Kriging method depended on mathematical and statistical models.
Kriging was an interpolation that can be exact or smoothed
depending on the measurement error model. Kriging used for
statistical models that allow a variety of output surfaces including
probability. We used an instrumental catalog for Ms≥4.0
magnitude between 1900-2017 period.
Additionally, Kriging method fitted a mathematical function to a
specified number of earthquakes or all earthquakes within a
specified radius, to determine the output value for each region. We
have used
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Tuğba Türker
Yusuf BAYRAK
Network security has become one of the most
important issues in today's world. Along with the widespread use
of the Internet, corporations and companies share important
confidential information over networks. The protection of this
information, which may lead to serious harm if third-parties have
access to it, is vital. Moreover, with increased cyber attacks,
corporate or private networks are under serious threat. Increasing
the security of networks is of vital importance, because corporate
networks are especially critical to national security. In this study,
necessary protocols, equipment, technologies and necessary
precautions have been investigated in order to make data
communication in virtual private networks, which is one of the
most used network technologies today, to be done safely.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Seyit Böge
Ali Öztürk
Direction of gravity is a natural way of orienting
oneself in an unknown environment. Human beings do thi s wi th
equilibrioception. It would be beneficial to estimate the directi on
of gravity from a single image for many tasks such as
autonomous driving and augmented reality where the knowledge
of location of the agent is very important.
Extracting this knowledge from an image usually requires a
reference to be identified. For example, a traffic light can give
away the direction of gravity as it has to be placed in an
environment in a specific way with respect to the gravity.
Reference-based approaches require a lot of hand modeling for
solving the problem. When there are a lot of images with ground
truth data is available, one can model these references implici tly
using machine learning techniques.
We propose to use a set of images along with readings from
inertial magnetic unit (IMU) taken from a smart camera
observing an indoor environment. This data includes a lot of
images as well as ground truth labels for gravity direction
extracted from the IMU readings. The data is fed to a
convolutional deep neural network to estimate the gravity
directions formulated as regression as well as classification
problem. We show that this modeling works quite well with a fe w
hundred images when we formulate the estimation as a
classification problem. The details of the networks trained and
the results obtained are presented in depth. Further research
with more images but with less accurate ground truth data is
underway.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Betül Z. Türkkol Abuzarifa
Yakup Genç
The technology to calculate the fire and failure rate of the glass from the glass line in the glass factories that are manufactured is facilitated by the technology. Waste and mistakes must be identified and improved for product and service quality. One of the methods used to calculate these rates is Failure Mode Effect Analysis (FMEA). The FMEA technique is a very powerful numerical analysis technique for preventing errors before they occur. In this study, a sample application of the Process FMEA study, one of the FMEA variants, was carried out for the glass sector. The problem to be addressed is defined as determining the error and waste rates of the glass from the thermopane line in a quality oriented business with the Perfect Scanner machine to reduce these ratios and increase the productivity. Types of errors obtained from Perfect Scanner data; the questionnaire survey conducted in the production area and the feedback from the customers were collected in 5 issues. These; scratches, stains (fingerprints), coating failure, stains between laminating glass, air bubbles. We determined and implemented the changes that will improve the process to eliminate or reduce the reasons for the types of errors encountered. Thus, by measuring the performance of the thermopane line of this company which has an important place in the glass industry, the negativity of the performance in production is minimized and customer satisfaction is increased.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Adnan AKTEPE
Behiye Beste ŞAKAR
Umut Aydın
Ayşe Nur Hayyaoğlu
Süleyman ERSÖZ
- Although the number of lanes of roads in residential
cities is constant, the number of vehicle in traffic is increasing
every year. This causes traffic congestion at certain times, such as
before and after work hours. Thus, instead of traditional methods,
intelligent systems have become a necessity to control traffic lights.
For this problem, there are traffic signaling applications
developed with using image processing and artificial intelligence
techniques in literature. In this study, an application was
developed to provide more detailed data for traffic signaling
applications. Used Faster R-CNN model was trained and tested in
Karabük and trained model detected 76 of 79 vehicles in 23 test
frames and achieved 96% success.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
murat GENÇER
Nesrin Aydın Atasoy
Data collection, data retention and analysis are
becoming more and more important every day because of the fact
that technology is involved almost all our life. The processing and
analysis of the data can become more difficult with increasing
precision.
In three-dimensional surface modeling, due to the increase in
sensitivity and data size depending on the surface state and extent
of the surface, collecting and processing the data may become
difficult. As a solution to this situation, we can see that
Computational Geometry is used extensively. Computational
Geometry derives intermediate interpolations by taking the start
and end data as references instead of keeping each data separately.
In this way, it is possible to model by determining intermediate
values based on the mentioned reference points.
There are various methods in Computational Geometry such as
intersection detection, point position and triangulation. According
to the needs, a solution way can be produced by various geometric
computations. In our study, "Delaunay Triangulation" which is
the most used type of triangulation methods will be examined.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Mustafa Aksin
Emrullah Demiral
Ismail Rakıp Karas
This study aims to simulate the actual working environment of the excavator type work machine and to train the operator the driving movements on a robot excavator. In this study, the design, manufacture and control of training simulator was realized for the purpose of obtaining driving ability of excavator on simulator before actual machine use was started. In our country, the training of the work machine operators is carried out on real machines.
For use in work, small size excavator robot which has two palettes and composed of boom, stick and bucket and able to control these organs with hydraulic flow such as real machine was manufactured. The simulation of hydraulic components to real machine movements is provided and with the designed drive circuit, the movement of the pallets and the return of the upper structure were performed with wireless control over the RF channel.Control functions of the excavator robot resemble the use of real machine driving. A camera was placed in the driver's cabin on the robot and the camera images were transferred to the video glasses system of the instructor outside the robot working area. The purpose of using video glasses is to simulate actual use. The trainer has the impression that he is using the excavator completely inside the robot independent of the outside space.
Three different experimental studies were carried out using the excavator robot. Experimental environment has been prepared so that the operator who will receive the training can perform these applications. These are: 1) Canal digging, 2) Ramp up and lowering from ramp, 3) Using the excavator as a crane.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Oguz Cevik
İbrahim Çayıroğlu
This paper describes an antenna design that is suitable for microwave imaging and radar applications. Microwave imaging technology has attracted many interests nowadays and it has been used in a variety of applications such as: non-destructive testing and evaluation, through-the-wall imaging, concealed weapon detection at security check points, structural health monitoring and medical imaging. Similarly, radar-based applications have been popular in many areas. The basic idea of using microwave imaging and radar systems is to transmit electromagnetic waves from a transmitting antenna to the target material and receive the scattered waves at a receiving antenna. For this reason, the choice of the antenna plays an important role for the system. There is a need for compact sized, low cost and high efficiency antennas which can radiate ultra-wideband signal to transmit short pulses. Furthermore, these antennas should have similarly end-fire radiation pattern to obtain good resolution of the produced images for using both in imaging systems and radar applications. In this study, firstly a conventional compact-sized rectangular patch antenna is designed. Then, various optimizations are performed on that antenna by using High Frequency Structural Simulator (HFSS) software. After that, this antenna is fabricated and tested with Vector Network Analyzer. The fabricated antenna has a simulated and measured bandwidth from 4 GHz to 9 GHz for |S11|<10 dB, respectively. The return loss results show that the good impedance matching is obtained through the working frequency band. The proposed antenna has nearly stable end-fire radiation patterns throughout the frequency range. All of the results exhibit that the designed antenna can be used in high range radar applications and is a good candidate for microwave imaging applications.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ali Recai Çelik
M.Bahattin Kurt
Selcuk Helhel
Easy availability and cheapness of microcontrollers, intelligent sensors and wireless technology equipments have paved the way for different engineering and industrial applications of control systems. Conventional closed greenhouses, which are one of these spaces, have been converted into high-tech plant production units. A low-cost greenhouse automation system which can be monitored at computer environment by virtue of an interface created in Matlab GUI programming language is proposed in this study. To this end, a model greenhouse system taking into consideration temperature, air humidity, light intensity and soil’s physical quantities as input parameters was made. The output parameters used in the model greenhouse were heating, ventilation, irrigation and lighting control. It was determined that the system created by comparing with conventional control systems, was more advantageous in terms of usage, monitoring and programming. Ease of use was provided to the user due to control and monitoring of physical quantities in the greenhouse by virtue of the Matlab GUI interface. The most prominent characteristic of the offered system is that it can easily be used for other agriculture and poultry stockbreeding areas by making small changes in the software infrastructure.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ferzan Katircioglu
Lifting hooks are the components that ensure reliable and economical lifting and transport of loads. By selecting the shapes, dimensions and appropriate materials to be used, a reliable and economical lifting hook is obtained. In this study, stress analyzes of lifting hooks were carried out primarily with two different analytical approaches. Then, modeling of the hook was made in computer environment and the finite element analysis was done in the computer environment. The analysis results and standardized values for different loads are compared under the same conditions. The study shows that computer-aided finite element analysis can be applied reliably and economically in studying the stress states of lifting hooks.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Alp Ozdemir
Yusuf Aytaç Onur
Metamaterials are man-made artificial materials that are not a natural material but rather have different electromagnetic properties. One of the features mostly studied in recent years is that it nearly absorbs all incoming electromagnetic waves. These features make it possible to invisibility against remote sensing systems. Thus, the radar cross-section area (RCA) representing the radar visibility can be reduced by covering the target plane with metamaterial. As a first step in this work, the unit cell of the metamaterial, which has a resonance effect, is designed to achieve high absorption at 6.0 GHz. Then, using the unit cell's scalability feature for this metamaterial, two more-unit cells with resonance effect at 5.0 GHz and 7.0 GHz were designed, respectively. Subsequently, all three were brought next to each other and super-cell structure was introduced. The structure obtained shows 94.62% absorption at 5.08 GHz, 99.95% absorption at 5.98 GHz and 90.42% absorption at 7.02 GHz, respectively, in the C band region (4-8 GHz).
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Barış Doruk Güngör
Serdar Kucuk
M. Kasap
Various coating methods are used in the development of organic textures. The MALDI method is one of the most important one amongst the others. Three-axis robotic spraying devices are frequently used in tissue engineering. The inboard joints of the robot manipulator are designed with prismatic joints. The last two joints are designed with two revolute joints which are composed of a two-axes spherical wrist. With this design, complex surfaces can be reached with any orientation angle.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Barış Doruk Güngör
Serdar Kucuk
M. Kasap
Unmanned Aerial Vehicles (UAVs), are air aircraft that can fly autonomously without human control or that can be controlled by a ground station. In parallel with the technological developments of the present day, it has been observed that the use of UAVs is also greatly increased. In this context, new working areas were needed together with the widespread use of UAVs. As a result of the researches, the autonomous control works was seen to become the foreground. Within the scope of this study, an autonomous landing system has been implemented for UAVs. The images taken with the help of the camera located at the bottom of the UAV are subjected to image processing techniques on the Linux based operating system to determine the landing track. In the scope of the study, the landing station detected is a circle with a "H" in the middle. The letter "H" on the landing station can be changed color according to the location. For example; the landing station can be red in football ground, can be blue in empty ground. Images taken from the camera are subject to the image processing technique. First of all, the image is removed from noises. Then, it is classified according to the “H” letter color on landing station. Pixels which are same with "H" letter are changed to white color, others changed to black color. So that, it is determined how many shaped has been found. The shapes are ordered according to their size and compared with the landing station. If the similarity rate is over 75%, the target is determined.Once the determination, the altitude of UAV will gradually decrease and the image acquisition and measurement process will be repeated until it reaches a desired position. After arriving at the desired position (Eg z<=20 cm), the UAV performs descent by stopping engines.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Çağrı Çiçekdemir
H. UCGUN
Uğur Yüzgeç
M. KESLER
One of the purposes of video surveillance systems is
to detect anomalies which are unexpected situations at a certain
location or at a frame. Anomalies can be related to motion or
appearance according to its spatial position. In this paper, we
propose an anomaly detection system based on spatio-temporal
features. Features from Accelerated Segment Test (FAST) is used
for detection of corners location. Optical Flow magnitude and
orientation of these points is used as spatio-temporal features. A
grid is
to the frames to neutralize the effect of proximity to the camera.
Normal patterns are clustered with an unsupervised neural
network so called Self-Organizing Maps (SOM). In test videos if
extracted features cannot model with normal clusters, associated
grid cell will be marked as anomaly
Keywords - Video Surveillance, Anomaly Detection, Features
from Accelerated Segment Test (FAST), Optical Flow, SelfOrganizing
Maps (SOM)
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Kadriye Öz
Ismail Rakıp Karas
In the literature, machine learning algorithms are
frequently used in detecting anomalies in network traffic and in
building intrusion detection systems. Deep learning is a subfield of
machine learning that trains a computer-based system to perform
humanitarian tasks, such as disease diagnosis, speech recognition,
image recognition, fraud detection, and making predictions. In the
experimental study, NSL-KDD dataset was used for evaluating the
performance of the proposed deep learning based DDoS detection
model. NLS-KDD dataset contains normal network traffic and 23
different DDoS attacks that consists of 41 features. In the
experimental study two different experiments are carried out.
Firstly, the proposed deep neural network detected the Dos attacks
with 0.988 classification accuracy. In the second experiment, the
number of features of NSL-KDD is reduced to 24 by examining the
previous feature reduction research on NSL-KDD dataset. The
proposed deep neural network classified the all cyber-attacks with
0.984 classification accuracy. The 10-fold cross validation is used
for all experiments. As a result, the proposed deep learning based
DDoS detection achieved good performance.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ayşegül Sungur Ünal
Mehmet Hacibeyoglu
EEG signals are commonly used data sources in BCI
applications. For this reason, recent studies to analyze the EEG
signals in the most accurate way are increasing rapidly. When
features are extracted from EEG signals, the use of methods
sensitive to local variations is of great importance for correct
classification of the signals. In this study, 1D-local binary pattern
(LBP) method which is sensitive to local changes was applied to
motor imager/movement EEG signals and the obtained features
were classified with the k-NN and SVM classifiers. Accordingly, in
the case of using the k-NN method, the lowest 99.98%, and highest
100% classification accuracy was obtained.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Funda Kutlu Onay
Cemal Kose
Light sleep is a sleeping period which occurs within
each hour during the sleep. This is the period when people are
closest to awakening. With this being the case people tend to move
more frequently and aggressively during these periods. In this
paper the most suitable moment for waking a person up will be
described. The characteristics of sleeping stages, detection of light
sleep periods and analysis of light sleep periods were clarified. The
sleeping patterns of different subjects were analyzed. The
detection of this moment and the development process of a system
dedicated to this purpose will be explained, and also some
experimental results that are acquired via different tests will be
shared and analyzed.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Egemen Turkyilmaz
Alper Akgul
Erkan Bostanci
Mehmet Serdar Guzel
With the development of technology, remote sensing
is commonly used for ecological studies and monitoring wetland
and management. Artificial Neural Networks are extremely
simplified model of the brain occurring by neurons and layers
connecting to neurons so artificial neural networks method is
frequently used to classify satellite images. In this study, Landsat5
satellite image with spatial resolution of 30m, acquired on
October 29, 2007 and Landsat-8 acquired on November 27, 2017
were used to identified the coastline changes at Kozan Dam Lake.
The lake is used as drinking and irrigation water. Therefore, it is
very important to examine the coastline changes of the lake. In
first step, image to image registration was made to conform image
coordinate systems of images to each other. Second step, images
were classified by artificial neural networks method. Four classes
namely lake, agricultural area, soil, and vegetation area were
determined. Third step, image classification accuracies were
determined. Finally, the changes in coastline of Dam Lake were
calculated by post classification comparison method. Coastline
change of Dam Lake was calculated as 0.6 km2 increase and the
change image map was created. At the end of the study Kozan Dam
Lake coastline changes were monitored by using remote sensing
methods.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Tolga Kaynak
Sevim YASEMİN ÇİÇEKLİ
Mustafa Hayri Kesikoğlu
This article will discuss the effect of performance variables in achieving optimal solution in single machine scheduling problem. First of all, To determine whether genetic algorithm solution is optimal, optimal solution values for different job size will be obtained by mathematical model. In this model, Primary performance measure is Tmax, while secondary performance measure is the number of tardy jobs (nt) and total tardiness (TT) values. Genetic algorithm performance variables are crossover and mutation ratio, generation and population size. However other variables are job size, strategies of scheduling. We will utilize statistical methods to understand the effect of performance variables. Application study is to schedule the bottleneck machine for a company in the textile industry.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Tugba Tunacan
S. Büşra ORTOĞLU
Inventory control models are one of the most mature
fields in the area of supply chain management but it is not
obvious how to extend inventory control models under different
types of problems where each problem has specific features and
includes many different limitations and constraints. In addition,
the dynamism of the real-world interactions occurring in
inventory control systems should be modeled with much details,
realities, and complexities. At this point, Simulation Optimization
(SO) models along with modern computing power provide a
significant opportunity to respond effectively in a dynamic and
stochastic environment. To remain competitive and viable in
today’s business climate, SOcan be explicitly taken into account
as a complementary tool. In this study, SO is used to develop a
multi-objective search for the inventory control system with
supplier selection where objectives of the SO model are
minimizing total supply chain cost and maximizing average
service level. The optimal values of the initial inventory, re orde r
point, and order-up-to level for supply chain members are
determined by proposed SO model. The proposed model has an
ability to analyze dynamics of the supply chain members and to
transform it into a clear structure for supply chain decisions.
This is very important in real-world settings because proposed
models lead to a large number of variants to manage a wide
range of decisions in the supply chain.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ayşe Tuğba Dosdoğru
Aslı Boru
Mustafa Göçken
Social media platforms such as Twitter have grown at
a tremendous pace in recent years and have become an important
source of data providing information countless field. This situation
was of interest to researchers and many studies on machine
learning and natural language processing were conducted on
social media data. However, the language used in social media
contains a very high amount of noisy data than the formal writing
language. In this article, we present a study on diacritic restoration
which is one of the important difficulties of social media text
normalization in order to reduce the noise problem. Diacritic is a
set of marks used to change the sound values of letters and is used
on many languages besides Turkish. We suggest a 3-step model for
this study to overcome the top of the diacritic restoration problem.
In the first stage, a candidate word producer produces possible
word forms, in the second stage the language validator chooses the
correct word forms and at the final word2vec is used to create
vector representations of the words and make the most
appropriate word choice by using cosine similarities. The
proposed method was tested on both synthetic and real data sets,
and we achieved a relative error reduction of 37.8% in our data
sets compared to the previous study with an average of 94.5%
performance.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Zeynep Ozer
İlyas özer
Oğuz Findik
In this paper, historical data of stocks in the XU030 index of BIST are examined by considering their trends and seasonal behaviors in order to forecast next five year’s stock prices by using ARIMA or seasonal ARIMA technique. Then, a mixed integer programming model is executed for generating a portfolio management for next five years. The proposed mixed integer programming model is based on knapsack problem. The knapsack problem is one of the most applicable portfolio management models.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Oğuzhan Ahmet Arık
As an instrument of democracy, voting is a critical issue. Although paper-based voting systems are still used commonly, e-voting systems have started to substitute under favor of improvements in the technology. This situation gives rise to need for secure, reliable, and transparent e-voting systems to make people trust. To do this, there are some security requirements that should be concerned and satisfied such as privacy, fairness, verifiability etc.
This study has an educational intuition that analyzes those requirements, theoretical background information related to cryptographic schemes behind them and creates a place-based e-voting design which was implemented for kiosk voting. As a contribution, Paillier homomorphic cryptosystem is used in our system. Moreover, our study includes a detailed criticism for the implemented system in terms of chosen cryptosystems and design modules with security and e-voting requirements.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Leyla TEKİN
Hüseyin Güven ÖZGÜR
Burcu SAYİN
Arzum KARATAŞ
Pelin ŞENKULA
Emre IRTEM
Serap Şahin
In the present study, effect of austenitizing time at
intercritical austenitizing temperatures was investigated on the
microstructural features of ductile cast iron. For this aim,
unalloyed ductile cast iron samples intercritically austenitized at
790 and 800 ° C for 1, 5, 15, 30, 60 and 120 min. The samples
were water quenched following intercritical austenitizing. Ferrite
+ martensite dual phase matrix structures have been observed in
intercritically austenitized and quenched samples. Martensite
volume fraction was increased with increasing austenitizing time.
The martensite volume fraction was significantly increased up to
30 min and no remarkable increment in martensite volume
fraction after 30 min. The martensite volume fraction can be
controlled both intercritical austenitizing time and temperatures.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Volkan Kılıçlı
Mehmet Erdoğan
Visible light communication (VLC), popularly known as light fidelity (Li-Fi), is a promising alternative to overcome the limitations of radio-wave communication. VLC is a green technology which uses light-emitting diode (LED) illumination to transmit data without needing fibre cables. VLC is applicable for both indoor and outdoor communication. In this study, we investigate the effect of sandstorms on VLC via simulating a vehicular-to-road VLC (V2LC) outdoor application. Sandstorms are a weather phenomenon which frequently occurs in the Arab peninsula and other parts of the world; in this context, researchers have not thus far addressed the effect of sand particles, which absorb and scatter light, on VLC. Our simulation is conducted using MATLAB software, and the results show that the effect of sandstorms on VLC is similar to that of fog and rain as investigated by other researchers. However, sandstorms are also different in terms of the nature of sandstorm particles, with different sizes and refraction indices when compared with rain and fog particles. We also find that high-density-clay sandstorms, among other types of storms, most severely affect VLC communication and limit the transmission range. Other low- and medium-density storms less severely affect VLC while exhibiting a relatively larger communication range.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
K. J. EBRAHIM
Alauddin Al-Omary
This article attempts to solve the problem of efficient
design of proportional+integral+derivative (PID) controller
applied to automatic voltage regulator (AVR) by employing
recently introduced symbiotic organism search (SOS) algorithm
for the first time. SOS is a metaheuristic proved recently to be
promising by benefitting from the idea of imitating natural
phenomena of interactive behavior seen among organisms living
together in a similar environment. PID controller design needs
proper determination of three control parameters. Such a design
problem can be taken as an optimization task and SOS is invoked
to find out better controller parameters through the new cost
function defined in the paper, which allows to evaluate the control
behavior in both time-domain and frequency-domain. For the
performance analysis, distinct analysis techniques are deployed
such as transient response analysis, root locus analysis and bode
analysis. The efficacy of the presented technique is widely
illustrated by comparing the obtained results with those reported
in some prestigious journals and it is shown that our proposal
leads to a more satisfactory control performance from the
perspective of both time-domain and frequency-domain
specifications.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Emre Çelik
In this paper, based on the laws of conservation and change of energy in the combination of the finite element method and minimization of the energy functional, is obtain a linear system of algebraic equations, the solutions of which allow us to find the values of the unknown variables.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Kanat Amirtaev
— Concrete steel bars used in the construction sector are
produced according to Turkish Standard, “TS 708 Steel for The
Rainforcement of Concrete- Reinforcing Steel”. Suppliers,
produce concrete steels using the Tempcore system that provide
the desired properties by developing processes for high safety and
low cost. The tempcore system is a process of giving a certain
amount of water to the surface of the concrete steel bar coming
from the finish rolling mill. In our study, our purpose is
estimating the mechanical physics properties of the concrete steel
bar produced by the tempcore system which is most common
method with multiple linear regression. Generating to elements of
chemical composition which are carbon, manganese and silica,
also parameters (water discharge, size etc.) affecting the strength
in the rolling process were determined as “independent
variables”. “The Yield Strength” and “Tensile Strength” as a
dependent variable is estimated by the Multiple Linear Regression
Method.
As a result of the study, it is aimed to reduce the amount of scrap
product that is erroneous and/or to be released to the waste by
preventing the production faults by predicting which yield values
of the input variables such as water flow will yileding in the
chemical composition.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Fuat Şimşir
Hande Vurşan
Social network analysis investigates relationships in a networked structure in order to interpret the roles of individuals and evaluate their respective importance. The common approach is employing graph theory that models the network as a graph data structure. Graphs are mathematical abstractions to model pairwise relations between objects. A graph is comprised of nodes connected with edges. While nodes indicate individuals in a network, edges signify relationships or interactions. In this paper, we evaluate the research performance of the European countries considering the research activities within the framework of European Cooperation in Science and Technology (COST). Founded in 1971, COST is the oldest and widest scientific intergovernmental framework in Europe supporting 37 countries including Turkey. COST can be considered as an incubator to set up interdisciplinary research networks since it provides support for network activities such as meetings, training schools, short scientific exchanges, etc. but does not fund the research itself. Therefore, we believe that the research network under COST can be a good indicator to analyze relationships between countries in research activities and evaluate the research performance of the countries. In this paper, we considered research actions funded by COST between 2012-2017 and evaluated research performance of the countries according to their participations andinteractions. To assess the performance, we modeled the relationships between countries on a directed graph and applied centrality analysis which is a common approach to evaluate the relative importance of a node within the network. Each action is coordinated by a management committee which is composed of a chair and at most two delegates per participant country. In the graph, each participant country is denoted with a node. We classify the countries according to their roles in the action. Since the proposer of the action becomes the chair, usually,we regard the country of the chair as a gateway to access the action. Therefore, to signify the relationship between two countries, a directed edge is added from the participant country to the respective country of the chair. Note that several projects were considered over a span of 6 years and multiple interactions between two nodes are indicated as the edge weight.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
İzzet Fatih Şentürk
Burak Taş
Recently, object tracking methods based on deep learning have shown great successes. Using deep neural network methods allows following the object even in highly complex scenarios by learning more details of the object in the video and the object motion model. The developed network architecture needs to be trained with a powerful dataset. The variety and size of the selected dataset affect the success of object tracking methods’ results directly. Some object tracking studies have also used image datasets to obtain the diversity in the training set in addition to the video dataset. The object in the image has gained some kind of artificial motion/action between the two images by making the certain rotational or translational movements. But the uses of this technique brings out the question of whether the object has gained a right action or not. In this study, a new perspective is introduced to provide the data the diversity which is required by deep learning-based methods. In this paper, ADnet, which is a deep learning based object tracking method, is used to test our new perspective which is mentioned above. For the training of the ADNet method, color spaces such as HSV, L*a*b*, NTSC, YCbCr, inverted HSV (converted to HSV channeled by taking BGR instead of RGB) were analyzed. As a result of the analysis, HSV and inverted HSV (IHSV) color spaces have been found out to provide stronger and more varied training dataset. Moreover, in order to prepare a proper training set for the object tracking, two different datasets were created with the videos taken from Vot2015 and Vot2014 datasets. Six different training sets were created for each group by translating them into RGB, HSV and IHSV color spaces. A separate ADNet network architecture was trained for each training set. Tests were carried out for each method with the dataset, which included 61 videos. This test dataset includes some videos which are not used in training dataset. In conclusion, it was found that stronger training sets could be created by applying different color transformations such as HSV and IHSV to strengthen the training set.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Hüseyin Üzen
K. Hanbay
In this paper, the magnetic field exposure analysis of
a human body due to underground power cables is carried out as
the simulation study. Simulations are implemented through a
finite element method (FEM). Human body is modeled as a two
layered cylinder. Upper layer of the cylinder is selected as an
average skin tissue and the inner layer is formed as an average
muscle tissue with realistic values at an extremely low frequency
(ELF) region. Shielding is applied as the mitigation technique and
aluminum (Al) is used as a shielding material. The thickness of 1,
2, 3 and 4 mm shielding materials are applied, respectively.
Evaluations are implemented with respect to the magnetic flux
density and the induced current density. 4 mm shielding which is
the thickest material used simulations shows the best shielding
results to mitigate the magnetic flux density and induced current
density. The worst shielding is obtained for the 1 mm thickness of
the material, as expectedly. Furthermore, as the distance of the
source increases, both magnetic flux density and induced current
density decrease. In other words, these parameters depend on the
distance between a source and observation points. Different
induced current density values of skin and muscle are observed
due to the different electrical properties of tissue. Assessments
have been done according to exposure limits published by the wellknown
organizations.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
K. ATES
H. Feza Carlak
Sukru Ozen
Speckle noise, inherent in synthetic aperture radar (SAR) images, degrades the performance of the various SAR image analysis tasks. Thus, speckle noise reduction is a critical preprocessing step for smoothing homogeneous regions while preserving details. Therefore, in a recent study, SDD-QL method was proposed which is a variational approach where
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Fatih Nar
Ferhat Atasoy
As known, attribute selection is a method that is used before the classification of data mining. In this study, a new data set has been created by using attributes expressing overall satisfaction in Turkey Statistical Institute (TSI) Life Satisfaction Survey dataset. Attributes are sorted by Ranking search method using attribute selection algorithms in a data mining application. These selected attributes were subjected to a classification test with Naive Bayes and Random Forest from machine learning algorithms. The feature selection algorithms are compared according to the number of attributes selected and the classification accuracy rates achievable with them. In this study, which is aimed at reducing the dataset volume, the best classification result comes up with 3 attributes selected by the Chi2 algorithm. The best classification rate was 73% with the Random Forest classification algorithm.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Adil Çoban
Ilhan Tarimer
Computational forensic is a far-reaching field for criminal and civil laws in this age. Aim of this project is to develop an educational tool to analyze persistent storage devices to find possible evidences. Evidences are found as metadata information on these drives. These metadata information are collected in a comma separated value-CSV format document. This CSV file can be imported to a database and can be easily analyzed. By the classical forensic investigator tools mostly can analyze only one media at a time, but by this way more than one digital evidence can be comparatively analyzed. Also, deleted files may hold evidences, so recovering of deleted files is an additional topic for this study. The structured codes and related documents have shared on github as an open project; to give a chance to extension of this study by new projects and we hope that the product of this study can be useful tool for computational forensic courses.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Hüseyin Güven ÖZGÜR
Serap Şahin
In this paper, we propose an anti-spoofing method
that employs the fusion of various full-reference and no-reference
image quality assessment techniques to detect fake and real ear
images presented to biometrics systems under print attacks. In this
context, full-reference image quality assessment measures such as
Error Sensitivity Measures, Pixel Difference Measures,
Correlation-Based Measures, Edge-Based Measures, Spectral
Distance Measures, Gradient-Based Measures, Structural
Similarity Measures and Information Theoretic Measures are
used. Additionally, no-reference image quality assessment
measures such as Distortion Specific Measures, Training Based
Measures and Natural Scene Statistics Measures are implemented
to distinguish fake and real ear images. A comparative analysis of
the performance of these quality metrics and the proposed method
using decision-level fusion of all aforementioned measures are
performed. The experimental results are presented using AMI and
UBEAR ear databases by creating print attack counterparts of the
ear images used in these databases.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
İmren TOPRAK
Önsen Toygar
Image Enhancement is a required and indispensable technique in order to improve the image quality of digital images. Much as the digital cameras and mobile phones are available everywhere, lack of clearness on the side textures, emerging of dark or bright areas and creation of noise occurs due to reasons such as failure of camera foci, lack of lighting and atmospheric disturbances. As such, it is necessary and beneficial to develop an effective improvement algorithm in digital images addressing such negative issues and noises. The fundamental function of image improvement is to generate a new density value for each pixel value in the image through utilization of the transformation function after the density value of each pixel of introduction image is received. The proposed conversion function is named Regional Similarity Transfer Function (RSTF) in the study and the conversion is applied by taking into account the density distribution similarity between neighbor pixels. The intuitional optimization technique preferred mostly in engineering applications recently, named Gravitational Search Algorithm (GSA) has been utilized with an eye to optimize the parameter values of the proposed RSTF conversion function (1). An objective evaluation criterion was employed with a view to measure the quality of the images by finding the parameters of the conversion function with GSA. The objective function three performance measures-namely entropy value of images, sum of edge densities and number of edges- of which were combined, was preferred (2). Our experimental results reveal the fact that the proposed method efficiently eliminates the noises received from the images while increasing the image quality.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ferzan Katircioglu
Zafer Cingiz
In this paper, one-shot-learning gesture recognition
methods are reviewed and an approach of hand gesture
recognition using one-shot-learning is proposed. This approach
aims to recognize new categories of gestures from a single video
clip of each gesture. The gestures are generally related to a
particular task, for instance, hand signals used by divers, finger
codes to represent numerals, etc. In this study, both RGB and
depth images are utilized for a given dataset. A rich dataset,
namely the ChaLearn Gesture Dataset (CGD2011), are employed.
The dataset is divided into 20 different files which include 940
videos in total. Although training the system with only one
example is difficult, depth and RGB images provide many new
possibilities. We used the standard deviation of the depth images
of a gesture and motion history image (MHI) method. Also, two
dimensional fast fourier transform (2D FFT) is used to reduce the
effect of camera shift. It is seen that FFT has no distinct effect on
the image quality. Then, we compare image templates based on the
correlation coefficients and Levenshtein, Mahalanobis, Frobenius
distance measures. The Levenshtein distance measure is more
suitable to match image templates compared to other distance
measures. It is observed that MHI method gives better hand
gesture recognition accuracy about one-shot-learning.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Esma Şeker
Oğuz Findik
In software development processes, architectural documents can be prepared by the beginning of the project like Big Design Up front (BDUF) if software projects requirements are prepared with details and reviewed by the team. However, software projects with a lot of uncertainties or ambiguous requirements do not have any process to prepare and record architectural decisions during the software development. In recent years, agile software development has become very popular in the software industry. Therefore software development teams try to adopt their software processes against changing requirements and dynamic market conditions with using agile methodologies. Because of the underlying philosophy of agile, agile teams started paying more attention to working product over comprehensive documentation and big design up front. However agile software development also contains architectural and design decisions during the development. One of the agile principles also points that the best architectures, requirements, and designs emerge from the agile team during the development. Nevertheless, agile methodologies do not offer any processing cycle for architectural documentation in their process. In this article, we will propose how the architectural decisions will be documented in agile frameworks, which one is the most popular Scrum framework.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Mustafa Savasci
Fatih Cetin
Caglar Cakir
Oğuz Findik
As is known, it is often difficult to store and
transmit images used in various computer applications. A
possible solution to this problem is to use one of the known data
compression techniques because they help to reconstruct the
image with a lower number of measurements. In this study, a
new Singular Value Decomposition (SVD)based technique is
proposed to compress images. The advantage of using SVD is
that it both has energy compression capability and is easily
adaptable to local statistical variations of the image.
Furthermore, the SVD can be implemented with non-square,
non-reversible matrices of size m x n. However, how to
determine the threshold value for image compression in the
SVD technique is still one of the fundamental problems. In this
study, the desired threshold value is calculated by dividing the
sum of the differences between the obtained singular values by
the rank of the matrix. Simulation results confirm the feasibility
of our proposed method.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
A. SUTCU
Ali Degirmenci
Ömer Karal
I. CANKAYA
This paper shows the implementation of an impedance control method to regulate the interaction forces between a robotic arm and the environment,when there is connect between them. A complete description of the system to model and control both an RR robot arm and its interaction with the environment is simulated and detailed by Matlab/Simulink; from the generation of a mechanical model in SimMechanics (Matlab) after export its 3D drawing. The description and setting of a dynamic model based on computed torque control, to cancel out the nonlinearities existing on the dynamic model of the robot. It is based on feedback linearization and computes the required arm torques using the nonlinear feedback control law, and lastly control of the reaction forces is done using the impedance control method after modeling the environment. This type of control modifies the dynamic behavior of the robot when there is contacting with the environment and it is widely used in industrial robots.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ali Alshawi
Selcuk Kizir
Today, there are some difficulties of planning a social activity. One of the biggest challenges is that people have more mobile lifestyles in the last few decades. For this reason, the possibility of participating of people in a particular event varies according to the person’s current location. However, the fact that today's people are mobile as well as online, this makes it possible to reach them virtually even if they are not physically reachable. In this study, an approach has been developed to identify and recommend the most suitable candidates according to the compliance and location of the people for a social activity that is planned at a certain capacity. In the developed approach, people are weighted according to their compliance and physical distance to the event. Then, people are sorted by the location of the event. The most suitable people are identified, not more than the capacity of the event. The proposed approach uses person characteristics (gender, age, areas of interest), the Euclidean distance of the people to the event and the location where the event is to be done. The proposed approach also uses the Clarke & Wright Saving Algorithm, which is a heuristic algorithm and is mostly used in vehicle routing problems in the logistics area. Thus, the most appropriate persons can be identified that can be invited to an event with minimal cost. Furthermore, in addition to the use of this algorithm, if people invited to the event are taken by car, it is possible to determine the most suitable routes and to ensure that people are collected according to these routes and participate in the event.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Levent Sabah
Mehmet Şimşek
Computer-aided curve and surface design models are used to design surfaces that do not have a particular shape. Since these surfaces cannot be expressed by known mathematical functions, curve and surface modeling methods such as Bezier, B-Spline and Non-Uniform Rational B-Spline (NURBS) have been developed. In this study, an application is developed that allows the NURBS curve algorithm, which is used as a method in 3D modeling, to be computed using Field Programmable Gate Array (FPGA) with parallel processing capability and displayed on the LCD touch screen. The B-Spline basis function which NURBS based on are sampled mathematically. The parametric values used in the display of the NURBS curves and surfaces are presented on the LCD with user interaction. Parametric values such as control points, knot vector, and weight vector are separately sampled for curves and mathematical solutions are given. The NURBS curve for user-defined control points can be displayed in real time on the screen. In addition, an implementation of the NURBS algorithm in the Visual Studio platform was developed and obtained results were compared.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Yasin Öztürk
C. OZCAN
In daily life we may encounter many different optimization problems. There are many different algorithms developed for solving these problems. The abundance of optimization problems in every field, such as science, engineering, economics, health, communication, production, etc., have made these algorithms are more popular. These algorithms are divided into two main groups as mathematical based and meta-heuristic based algorithms. The meta-heuristic algorithms are inspired by the nature events in general. In this study, we deal with the Vortex Search (VS) algorithm, which is one of the meta-heuristic algorithms. This algorithm is inspired from the vortex pattern produced by the vortical flow of stirred fluids. We proposed some improvements on vortex search algorithm to increase the performance of the original VS algorithm. To show the performance of Improved Vortex Search (ImpVS) algorithm, we used well-known meta-heuristic algorithms, such as Differential Evolution (DE) algorithm, Particle Swarm Optimization (PSO) algorithm, Artificial Bee Colony (ABC) algorithm, Simulated Annealing (SA) algorithm and original Vortex Search (VS) algorithm. The obtained Benchmark results show that the proposed ImpVS algorithm has got the competitive performance for the optimization problems.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Gökhan Uçar
Uğur Yüzgeç
Using Synthetic Aperture Radar images become popular in many military or civilian applications such as algorithm design, geo-referencing and Automatic Target Recognition. One of the main reason is SAR images can be obtained in any weather condition like rainy or cloudy weather even without daylight.However, Synthetic Aperture Radar (SAR) images contain multiplicative noise called speckle which makes analyzing images difficult. Therefore, there are many algorithms developed about despeckling SAR images in last decades. Each algorithm has strengths and weaknesses such as some algorithms work great in texture areas and some can work fine about homogeneous regions. To achieve more efficient result in despeckling SAR images, we proposed a method which uses 3 despeckling algorithms (SSD, MSAR_BM3D and FANS) and apply those algorithms in the regions which they are powerful. The proposed method splits a SAR image into smaller images and use Convolutional Neural Networks to categorize the sub images to find which algorithm is the best for that region. Afterwards, sub images despeckled using the algorithm which CNN selected and sub images come together and create the final despeckled image. The proposed method aimed despeckling of noises from the Synthetic Aperture Radar images more effective than the available despeckling algorithms.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Yusuf Şevki Günaydın
Baha Şen
Hiding and securing information is a basic demand
throughout humanity. People have used their own bodies,
languages, writings, etc. to provide this need. Steganography is
acknowledged by science and art that researches hiding
information methods. Steganography consists of two element
basically that cover and secret information. In the past, people
used their bodies and poems, diaries for cover and used tattoo and
acrostic methods for secret information. In recently thanks to the
developments of technology, Steganography has widened its
methods and study areas. There are four Steganography methods
which are text, image, audio and video in computer science. All
types of Steganography methods have distinctive different ways to
hide information. But if we want to mention the most used ones,
we can say that changing characteristic of text (like color, font size)
in text Steganography and changing Least Significant Bit(LSB)
way for other types of Steganography methods. The LSB is a way
that we overwrite the LSB of each byte of the cover (image, video,
audio) with secret information binary representation. In our
project, we are developing an android mobile application that
allows user to hide a secret information inside any image. The
image can be captured instantly or selected from user gallery. We
are using LSB image Steganography method in order to hide
secret information in image. Beside this, we encrypt the secret
information with an encryption algorithm before inserting it in
image. At the end, user can save the result image for the future or
share with somebody who able to see the secret information only
with this application.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Celalettin Misman
Mehmet Hacibeyoglu
This study proposes an information security risk
assessment approach based on Bayesian networks and Fuzzy
Inference System in order to evaluate and calculate both
qualitative and/or quantitative risks. The proposed preliminary
model is developed to analyse test processes for a software services
company in order to evaluate the information security risks. In
order to collect data for our risk assessment model, assets,
vulnerabilities, threats, and related risk values are identified and
analyzed with experts and managers based on the testing process
in the company. Threats, vulnerabilities, risks, and their relations
are constructed with a Bayesian network and marginal
probabilities for each risk are calculated. Several fuzzy
membership functions are designed for assets’ values, risks’
probabilities, and relative risk values. Fuzzy decision rules are
constructed for some of the chosen risks by using the assets’ values,
relevant risk probabilities, and relative risk values. In the final
stage, the impacts of risk (loss) values are calculated by
aggregation and defuzzification. Promising results have been
obtained so far and this preliminary model will be used as a basis
for an enhanced model, which can be successfully used for
information security risk assessment and management with less
subjectivity, more reliability, and more flexibility.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Sevilay Beken
Mete Eminağaoğlu
The use of machine learning techniques has significantly increased recently. The classification of normal or abnormal situations in network traffic is successfully applied with machine learning techniques. It is possible to encounter False Positive situations during the classification process. With Probabilistic Neural Network (PNN) model, it is aimed to explore the intrusion and its types within network traffic with probabilistic distribution. Knowledge Discovery Dataset (KDD99) will be used in this study.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ibrahim Atay
Osteoarthritis (OA) is the most common form of joint disease, and its impact is set to grow as the prevalence of obesity rises and our elderly population increases. As a result of this disease, it is necessary to make structural examinations for the determination of the deformations that occur. One of the methods used for structural analysis of biological samples is the wide-angle X-Ray scattering (WAXS) device. In this study, hip bone samples taken from humans during surgery were investigated using wide-angle X-ray scattering technique. Hip bone specimens were primarily compared based on regional density and later on based on sex. As a result of scatter patterns, the presence of crystal structures has been determined. The values of crystal structure obtained depending on low and high dense region and sex are different.As a result of gender related comparisons, it was found that crystal structures were better in males than females.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Tuba Çayir
D.KARAARSLAN
K.MEMİŞOĞLU
Semra Ide
O.Gundogdu
The finite element method (FEM) is a computational
technique that is often used to solve biomedical engineering
problems. The biphasic cartilage model plays important role in
representing the mechanical behaviour of the articular cartilage .
In order to obtain accurate results in finite element analysis of
articular cartilage, it is necessary to determine appropriate FEM
parameters such as mesh density and finite element type. Mode l s
with small element sizes in the FEM allow more accurate re sul ts
to be obtained however it requires longer calculation time. In
contrast, large element size can lead to non-precision results
while shortening the calculation time. The type of the elements
may also change the results of FEM analysis for biomechanical
problems. The purpose of this study is; to evaluate the effect of
the mesh size and type of the finite element on the resul ts of the
numerical biphasic tissues. In this study, in order to achieve thi s
goal a series of compression analyzes were performed on the 3D
biomedical models with different mesh density and element types
using ABAQUS 6.13 software and the results were compared.
The analysis results showed that mesh density element type and
element type had little effect on the maximum reaction force . On
the contrary, the mesh density had greatly increased the
computational time.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Sabri Uzuner
E. ZURNACI
M.L. Rodriguez
Serdar Kucuk
The use of technological devices in education has become inevitable today as technology is proceeding at a dizzying pace. Technological devices and softwares developed within the scope of these devices have become especially used within the game-based learning system. Especially in pre-school level, to teach some concepts to illiterate children, game based learning system is used.
In this study, a platform based on Kinect V2 was developed with the aim of teaching English words to pre-school children. The study was tested on a select group of pre-school children. Eventually it has been observed that the English equivalents of the concepts of color and shape have been retained for a longer period of time due to the support of this visual and audio software material. In addition, it has been determined that the motivation of the student is made permanent because it enables to learn by amusing.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Merve Varol Arısoy
Ecir Uğur Küçüksille
Recently, through development of several 3d vision
systems, widely used in various applications, medical and
biometric fields. Microsoft kinect sensor have been most of used
camera among 3d vision systems. Microsoft kinect sensor can
obtain depth images of a scene and 3d coordinates of human joints.
Thus, anthropometric features can extractable easily.
Anthropometric feature and 3d joint coordinate raw datas which
captured from kinect sensor is unstable. The strongest reason for
this, datas vary by distance between joints of individual and
location of kinect sensor. Consequently, usage of this datas without
kinect calibration and data optimization does not result in
sufficient and healthy. In this study, proposed a novel method to
calibrating kinect sensor and optimizing skeleton features. Results
indicate that the proposed method is quite effective and worthy of
further study in more general scenarios.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Mahmut Selman Gökmen
Mehmet Akbaba
Oğuz Findik
Many people live with various health problems due to smoking, obesity and sedentary life. Especially, many people have severe illnesses such as lung cancer and asthma because of smoking. However, people unfortunately do not quit smoking easily. It is aimed to change the lifestyles of people with the mobile application that will be developed in order to solve these problems. In the proposed system, a cloud based mobile application will be developed under the supervision of a family physician. The treatment plan will be given as a result of the medical history and physical examination who applied to family physicians to quit smoking. Patients will be able to access this treatment plan through mobile application. After that, patients will be able to record and monitor daily cigarettes, nutrition and exercise. The doctor will check the information that the patient has entered and will be able to detect if the patient is not fit in treatment. Accordingly, doctor can update the treatment plan and create the most appropriate treatment model for the patient.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
İlay Ilter
Alp Kut
Vildan Mevsim
Semih Utku
This paper describes the stages faced during the
development of an Android program which obtains and decodes
live images from DJI Phantom 3 Professional Drone and
implements certain features of the TensorFlow Android Camera
Demo application. Test runs were made and outputs of the
application were noted. A lake was classified as seashore,
breakwater and pier with the accuracies of 24.44%, 21.16% and
12.96% respectfully. The joystick of the UAV controller and
laptop keyboard was classified with the accuracies of 19.10% and
13.96% respectfully. The laptop monitor was classified as screen,
monitor and television with the accuracies of 18.77%, 14.76% and
14.00% respectfully. The computer used during the development
of this study was classified as notebook and laptop with the
accuracies of 20.04% and 11.68% respectfully. A tractor parked
at a parking lot was classified with the accuracy of 12.88%. A
group of cars in the same parking lot were classified as sports car,
racer and convertible with the accuracies of 31.75%, 18.64% and
13.45% respectfully at an inference time of 851ms.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ali Canberk Anar
Erkan Bostanci
Mehmet Serdar Guzel
Filtering can be used for different purposes in image
processing. One of them is to reduce noise in the image. In this
study, local variance based on switching filter is designed to
remove Gaussian noise from gray scale images. During filtering
process, local variances of each pixel is calculated and then pixels
are classified as five clusters according to their local variance
values by the k-means clustering method. Depending on the result
of the clustering, variance of the Gaussian filter kernel is tuned. In
the smooth regions, in which variances of the pixels are low, higher
standard deviation Gaussian filter is applied. Higher variance
pixels represent the edge pixels, therefore lower standard
deviation Gaussian kernel is applied to preserve the edges. In
clusters with medium variance pixels, the standard deviation value
in the Gaussian filter is changed depending on the local variance
values. Experimental results show that designed local variance
based switching filter gives better performance to remove the
Gaussian noise at various levels compared to the classical filters.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ali Degirmenci
I. CANKAYA
Ömer Karal
Recep DEMIRCI
In almost all areas of the life-cycle, measurement, contolling and even achieving in stable/desired values of temperature have big importance. The man-kind’s daily activities are influenced by various control systems in almost every direction. Also, control systems are widely used in all sectors of the industry. This study mainly focused on measuring and controlling the temperature values. The purpose is to keep stable the analog temperature data at the desired temperature by performing the necessary control procedures. In designed temperature control system, analog temperature values were measured by K type thermocouple. Since the temperature measured by the thermocouple is in the mV level, this data must be raised to 0-5 V to be supplied to the Arduino analog input (A0). The AD620 instrumentation amplifier was used for the upgrade. The digital output data from the Arduino PWM3 block is transmitted to the SSR (Solid State Relay) using the 74HC244 buffer. Temperature control was performed by the PID control software preparing in the LabVIEW program. In this study, temperature values are successfully obtained with a ±%1.5 accuracy via Labview.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
H. BAKIR
Muhammet Sinan Başarslan
Ümit Ağbulut
Customer satisfaction plays an essential role in financial institutions. Particularly in the banking sector, a series of customer satisfaction studies is carried out in order to ensure the continuity of the customers with the bank. The most important ones of these are; questionnaires, feedback from the branch staff, and the increase in the client's banking transactions. By analyzing these studies, the satisfaction level of the customers can be measured. However, these measurements do not have a complete mathematical accuracy and can be misleading. In this study; the facial image of the customers who come to the bank are perceived by the camera and evaluated by emotional analysis. In this way, it is determined that the customer is satisfied or non-satisfied when leaving the bank. Problematic banking applications are also identified with the help of the analytical result of emotional analysis. In addition to this, the branch personnel of the bank who behave well to the customers are determined and performance evaluation is made more accurately.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Bulut Karadağ
A system is a set of interacting components are
connectedin such a way that the vibration or response in the state
of one component affects the state of others. A dynamic system is
described by time differential equations; therefore, the future
response of the system is determined by the present state of the
system (the initial conditions) and the present input. Modeling and
simulation are the prerequisite to the design of a dynamic system,
as the designing and manufacturing a system and then testing it
for expected performance would be unavoidably expensive. Wide
spread availability of high speed and high storage capacity
computers makes the simulation process even more attractive
before the manufacturing stage for observing the expected
performance of complex dynamic systems. However, before
simulation phase of a system the mathematical model of the system
must be prepared. For complex mechanical systems it is not always
easy to establish the mathematical model. On the other hand, it is
much easier to establish the mathematical model of an electrical
system. Furthermore, simulation software is richer for electrical
systems. For these reasons in this manuscript modeling of a
complex mechanical systems will be realized using electrical
circuit analog and then will be simulated as an electrical circuit.
Advantages of this approach will be explored.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Mehmet Akbaba
Adem Dalcalı
M. GÖKDAĞ
Power quality problems due to short circuit faults, are
defined as changes in voltage, current, or frequency in the power
system. Among the power quality problems in distributed
generation systems are island mode operation, harmonics in
current and voltage, voltage sags/swells, voltage interruptions and
transients. The most common power quality problem in the
distribution system is the voltage sags and swells caused by a short
circuit fault. In this study, various Power quality problems due to
short circuit faults such as line-to-ground, line-to-line and
multistage faults are modeled in MATLAB/Simulink
environment. In order to detect the voltage sag and swell
problems, firstly the voltage sag that occurs in case of failure is
examined and the response of the power system is observed. The
study also models multi-stage failures as a result of failure to
achieve relay synchronization. Examination of the voltage sags
and swells clearly revealed the resulting waveforms, the response
of the power system to the fault condition. Another advantage of
the realized work is that the developed model can be used to
measure the performance of the distributed generation system in
failure diagnosis and classification studies.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
A.YILMAZ
Gökay Bayrak
Today, the use of meta-heuristic algorithms in solving non-linear and complex problems is becoming popular. These algorithms are inspired by natural selection, swarm intelligence, physical events and nature. Crab mating optimization algorithm is one of the meta-heuristic algorithms which was developed by V.R. Chifu in 2014. The crab mating optimization algorithm imitates the mating behavior of crabs in nature. One of the biggest shortcomings of this algorithm is that it has got the quite long running times for optimization problems. In this study, to increase the running speed of the original crab mating optimization algorithm, the mating process of the crabs in population was modified. A male crab mates with only a female crab in the new mating procedure. Therefore, the name of the proposed meta-heuristic algorithm comes from this new mating process as a Monogamous Crab (MC) mating algorithm. Vehicle routing problem (VRP) is the popular combinatorial optimization problem. VRP relates to the most appropriate route design to be delivered to a range of customer service by a number of fleets. In this study, the developed MC algorithm is adapted for the vehicle routing problem. The performance of MC algorithm was compared with those of metaheuristic algorithms. The results show that MC algorithm provides promising and competitive performance.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Burakhan Çubukçu
Uğur Yüzgeç
The Tree-Seed Algorithm, TSA for short, has been proposed for solving single-objective optimization algorithm by inspiring the relation trees and seeds in nature. In this study, its multi-objective variant tree-seed algorithm, MOTSA, is proposed for solving multi-purpose optimization problems by motivating its performance on single-objective problems. In order to overcome selection issue in multi-objective problems, the well-known strategies, non-dominated sorting and crowding distance, of NSGA-II has been integrated with the proposed MOTSA. By doing this, the highest quality solutions from the combined populations of trees and seeds are selected and transferred to the next generation. The MOTSA are applied to solve well-known three multi-objective benchmark problems and obtained results show that MOTSA is an alternative multi-objective optimization algorithm.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Gül Özcan
Ahmet Özkış
Mustafa Servet Kıran
Predicting movie success with machine learning algorithms has become a very popular research area. There are many algorithms which can be applied on a data set to make movie success prediction if the data set is prepared and represented properly. In this study, we explained how IMDB movie data was used for movie rating prediction. The data set extracted from IMDB was formatted and prepared for datamining algorithms. These algorithms were executed on WEKA application environment and the performances in movie ratings and confusion matrices were obtained. The seven machine learning algorithms used have performed well on the data set with varying performance ratings of 73.5% to 92.7%. Random Forest algorithm had the best performance of 92.7%. This is the highest score obtained among similar studies.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Didem Abidin
C. BOSTANCI
A. SİTE
In this research, we studied the new generation of telephone exchanges, and discussed how to convert the public number of the recipient into the new IPv6 system, within the telephone exchange and the possibility of serving recipient with the multimedia system.
The rapid development of telecommunication systems over the past decades has led to the latest development in the technology and the volume of services provided by the telephone exchange to recipients through the development of the software architecture.
The presence of modern microprocessors, their speed of work and their ability to implement a greater number of operations have created the possibility of providing many The idea of the work is to find the possibility of transferring the recipient number from the normal numbering system to the IPv6 network system by rearranging the distribution of the address again, eliminating the DHCP feature and redistributing the fields to suit the new numbering. Considering that any country is a major server and has a fixed address of the new address and small sub-division takes its title from the main server, and these sub-subdivisions can give new label to the recipients belonging to them.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
A. Hussian
A. Abdurrahman
Adam Abid Urbanek
Methods: In the provinces of Ankara, Adana and
Mersin, 9 chemical working job security survey studies and work
safety experts were carried out in this study. Computer software
is developed by creating a fuzzy logic based risk assessment
analysis model considering various hazards in occupational health
and safety in the chemical industry. Results: It is very difficult to
model risk in a workplace environment with many specific and
ambiguous hazards and model a system to simulate these hazards.
Software was developed by creating a fuzzy logic based risk
assessment analysis model in consideration of many hazards in
occupational health and safety in the chemical industry. An
alternative approach to risk assessment has been proposed using
fuzzy decision making approach and matrix method. With this
approach, occupational health and safety in the Chemical Industry
specialists are provided with blurred linguistic assessments before
calculations are made, and the inconsistencies in decision making
are reduced by taking arithmetic averages of these assessments. It
has been seen that the three most important risks in the metal
work done by creating the fuzzy logic based modeling of work
safety risk analysis model and software using the fuzzy decision
making approach and the matrix method to increase the job
security in the chemical industry. Conclusion: It is very difficul t
to assess risk in the chemical industry which are many specifi c
and indeterminate hazards, and to model a system to
simulate these hazards. In this study, a computer software
and hardware was developed by creating a fuzzy logic base d
risk assessment analysis model considering many hazards in
occupational health and safety in the chemical industry.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Mehmet Zile
Methods: In the provinces of Adana and Mersin, 10
metal working job security survey studies and work safety experts
were carried out in this study. Computer software is developed by
creating a fuzzy logic based risk assessment analysis model
considering various hazards in occupational health and safety in
the Metal Industry. Results: It is very difficult to model risk in a
workplace environment with many specific and ambiguous
hazards and model a system to simulate these hazards. Software
was developed by creating a fuzzy logic based risk assessment
analysis model in consideration of many hazards in occupational
health and safety in the Metal Industry. An alternative approach
to risk assessment has been proposed using fuzzy decision making
approach and matrix method. With this approach, occupational
health and safety in the Metal Industry specialists are provided
with blurred linguistic assessments before calculations are made,
and the inconsistencies in decision making are reduced by taking
arithmetic averages of these assessments. It has been seen that the
three most important risks in the metal work done by creating the
fuzzy logic based modeling of work safety risk analysis model and
software using the fuzzy decision making approach and the matrix
method to increase the job security in the metal industry.
Conclusion: It is very difficult to assess risk in the metal
industry which are many specific and indeterminate hazards,
and to model a system to simulate these hazards. In this
study, a computer software and hardware was developed by
creating a fuzzy logic based risk assessment analysis mode l
considering many hazards in occupati onal health and safety
in the metal industry.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Mehmet Zile
– In this study, real-time online mine detection unde r
water is performed using an unmanned underwater vehicle.
According to the underwater position of the vehicle, the data
from the vehicle camera is used to identify mine in a real-time
video stream. Here is an approach for underwater mine detection
based on the use of trained classifiers. Algorithm performance i n
real time video shooting of the vehicle is optimized to reduce false
positive rate by aiming to identify a mine segment of each picture
frame. According to the results obtained, it was ensured that
mine parts are successfully detected under changing conditions
with incorrect positive detection. Algorithms are developed using
the Python program.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
M.BERİK
Seda Karadeniz Kartal
Wireless Sensor Networks (WSN) are used for the
monitoring of objects in various fields of application as well as the
monitoring of military and civilian environments. The energy
consumption of sensors and the optimization of network lifetime
in WSNs are among the important problems that are constantly
investigated and for which solutions are developed by linear
programming method. Furthermore, different algorithmic
solutions have been developed to perform the dynamic deployment
of the nodes efficiently for the solution of this problem. The
proposed solutions require that the targets in the network are
covered by a minimum number of sensors. k-coverage, that
determines the degrees of coverage of the targets in the area of
interest, is an important criterion in determining the number of
sensors covering each target after the deployment of the sensors.
Because the coverage of the targets by a minimum number of
sensors and the minimization of the intersection area of the sensor
increase the lifetime of the network by optimizing the energy
consumptions of the sensors.
In this study, the dynamic deployment approach based on the
Whale Optimization Algorithm was proposed to provide the
optimum solution to the k-coverage problem of WSNs by ensuring
that the targets in the area are covered by a minimum number of
sensors. This approach, that performs the effective dynamic
deployment of sensors by covering the maximum number of target
points and ensuring the minimum degree of k-coverage, was
compared with the MADA-EM in the literature. Simulation
results have shown that this approach is optimum and can be
recommended in the solution of the k-coverage problem by
ensuring that the targets are covered by a minimum number of
nodes.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Recep Özdağ
Murat Canayaz
In this paper we present a cross-layer optimization
method for adaptive video streaming in cellular networks. The
proposed method makes use of a new scheduling algorithm,
tailored to adaptive video streaming applications, which provides
better allocation of radio resources in order to increase the video
quality experienced by the users. After introducing our novel
scheduling algorithm, we compare its performance with the stateof-the-art,
using DASH as the adaptive video streaming technique
and LTE as the cellular network technology. The results show that
introducing DASH-awareness into the network increases the
streamed video quality and the network utilization. We believe
that the proposed novel cross-layer optimization method can also
be applied to future cellular network technologies, such as 5G,
where application-aware resource allocation will be crucial in
supporting the required quality-of-service (QoS).
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ali Alkaya
Talha DEMIR
Burak GORKEMLI
Sinan TATLICIOGLU
Optimization algorithms yield acceptable results in
the shortest time, even if they cannot always guarantee the best
end result in the given problem. There are classical mathematical
methods and meta-heuristic methods that have become very
popular for solving optimization problems. Meta-heuristic
algorithms can be categorized in many type such as physics based,
social based, biological based, chemistry based, sport based,
swarm based, mathematics based and also hybrid based. In this
study, the Artificial Atom Algorithm (A3) is applied in parallel to
solve the Traveling Salesman Problem (TSP). A3 is chemistrybased
technique that is improved by inspired the compounding
process of atoms and the application of parallel A3 is particularly
easy and promises significant gains in performance especially for
large scale TSP. TSP is one of the route planning problems that
finds the lowest cost path of visiting all the cities on the giving map
and returns to starting point, it was aimed to plan the best route.
The performance of algorithm in terms of the city number, the
route distance and the calculation time of this route will be
examined. An interface will be designed to implement the
application and observe the experimental results.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ayşe Nur Altintaş Tankül
Burhan Selcuk
AntLion Optimization (ALO) algorithm is one recent of the meta-heuristic algorithms that was developed by Mirjalili in 2015. ALO algorithm imitates the antlion's hunting behaviour in its larvae phase. The long run time of ALO algorithm is the biggest disadvantage of this algorithm. To overcome this deficiency, we proposed some improvements on the mechanisms of the original ALO algorithm. In order to improve the ALO algorithm, firstly, the random walking distance was changed as twenty percent of maximum iteration instead of the maximum iteration number in the original ALO algorithm. We defined new movements between boundaries around the antlion on the phase of trapping antlion pits. In addition, the boundary checking process, the catching prey and rebuilding the pit were developed. The parallel machine scheduling problem (PMS) is defined that it is a set of independent jobs to be scheduled on a number of parallel machines. Scheduling process optimizes the production job sequences in terms of the different patterns. When there are the similar type of machines to be existing in multiple numbers, the jobs can be scheduled over these parallel machines at the same time. To show the performance of improved ALO (IALO) algorithm, some of well-known meta-heuristic algorithms were used in comparison works. The obtained PMS results show that the proposed IALO algorithm has very competitive results in terms of the mean, best, worst cost and standard deviation metrics.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Haydar Kılıç
Uğur Yüzgeç
In this paper, a particle swarm optimization (PSO)
algorithm is introduced to determine learning parameters
required for the backpropagation (BP) learning algorithm, which
is used for training of a feed-forward neural network (FFNN).
PSO algorithm utilized within the paper works slightly different
compared to conventional PSO (CPSO) algorithm in such a way
that each particle adjusts its position based on the best midposition
of all particles and its group’s previous best. The major
reason of such a change is to enhance the performance of CPSO
algorithm, which is explained in detail in the study suggested by
Tamer, S and et.al. To test the proposed method, a FFNN with
three layers is designed for function interpolation. Learning
parameters of the designed NN are determined by both
conventional error and trial method and the proposed method.
Afterwards, using these two groups of learning parameters, the
NN is trained and tested under the same conditions. According to
the test results, learning parameters determined by the PSO
provide a better performance and interpolating capability for the
NN than those determined by the conventional method.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Emre Çelik
Nihat Ozturk
Adem Dalcalı
The Galactic Swarm Optimization (GSO) is a novel method inspired by the movements of stars and star clusters. The GSO is a framework that uses the optimization methods known in the literature. GSO has a two-stage structure. In the first stage, the optimization method identifies possible good solutions by scanning the search space. In the second stage, the best solution is tried to be found by using possible good solutions. In the original GSO study, Particle Swarm Optimization (PSO) was used as an optimization method in both stage. In this study, Tree Seed Algorithm (TSA), a new optimization method in the literature, is used in GSO framework instead of PSO. In the experimental study, the performance of the GSO_TSA model has been investigated on numeric benchmark functions and obtained results are compared with GSO_PSO model.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ersin Kaya
Oğuzhan Uymaz
Sedat Korkmaz
Eyüp Sıramkaya
Mustafa Servet Kıran
Handwriting character recognition has been a popular problem among scientists for a few decades. United States Postal Service can be given as an example for a company that uses the recognition of digits in real life environment consistently. USPS uses digit recognition system to extract digits from pay checks and fastens the process of sending and receiving checks. Handwriting character recognition problem can be divided into two categories. Online character recognition and offline character recognition. A recognition pattern mainly based on angle of the strokes of stylus is called online recognition. A system is called offline when system takes images as inputs and tries to predict characters from given images by applying machine learning methods. We have worked on offline character recognition problem in this project. Many machine learning methods have been proposed over the years for solving this problem. In this paper we implemented 6 most popular machine learning methods to solve offline handwriting character recognition problem and compare the performance results to decide which method gives best accuracy results under pre-defined conditions. We have selected 92255 images from NIST Special 19 Database and used them as input images during the training phase of the selected machine learning methods. These methods are SVM, Decision Tree, Bag of Trees, Artificial Neural Networks (ANN), Deep learning network with autoencoders and Convolutional Neural Networks (CNN). We implemented all of these methods and compare the performance of the results according to accuracy metric. The results obtained from the comparison is going to help in deciding which ML method should be used to solve Offline Handwriting Character Recognition problem.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ş.G.KIVANÇ
Ahmet Emin Baktır
Baha Şen
With the increase in population density in cities, the use
of motor vehicles is increasing. In addition, traffic congestion,
causes some issues such as air pollution noise pollution that affect
both human health and urban life negatively. For the elimination
of the disadvantageous of the motor vehicle usage people have to
be encouraged to transport with non-motorized vehicle s such as
bicycle. In this study, views about cycling were taken by online
survey for the purpose of popularize the usage of bicycle in
Karabuk University Campus and campus transportation.
According to the obtained data, 30% of the participants were
female and 70% were male and they have the biggest share in the
age distribution, with 80% and 15-25 age range. Looking at the
educational status, 78% of them gave undergraduate education
and 13% gave a postgraduate education. 15% of the participants
were working and 85% were students. In the scope of the study,
bicycle usage of the people was examined. Accordingly, 43% of the
participants have a bicycle. It is also seen that bicycle use is 61%
when it is not bicycle owner. 84%, the highest rate in the
questionnaire assessed participants of the purpose of using the
bike has to have a positive effect on health. Among the factors
limiting the use of bicycles, the rate of 71%, which was the highest
rate, was the lack of bicycle routes and 65% was shared with motor
vehicles.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Özlem Battal
Zeynep Ozer
Optical Character Recognition (OCR) is the extraction of letters, numbers, punctuation marks, shortly the texts, from the images in the digital settings. As a result of this process, electronic images are converted into editable texts. In this study, the performances of character recognition techniques on upper-case letters, lower-case letters and numbers were evaluated in terms of various features. At first, training images with 10 typefaces were generated. Then, testing images were obtained by adding extra 10 typefaces into the system. The training images were formed in 36pt font size. However, the testing images were also formed in 12, 36 and 60pt font sizes in order to see the effects on OCR. Firstly, images were parsed into the characters, then, these images were stretched or squeezed into 100x80, 50x40, 25x20 and 5x4 pixels. Then, thresholding was applied to image files and each character was expressed as vectors having pixel value either 1 or 0.
For the OCR process, 3 algorithms were used; k-Nearest Neighbors (kNN), S upport Vector Machines (S VM) and Artificial Neural Network (ANN). Eucli dean Di stance, Inner Product and
Cosine Similarity were used for the measurement of similarity in kNN. The following results were obtained when the results are evaluated in terms of average means; the best classification was
realized with ANN and the least with Inner Product (k=3) in upper-case letters, the best classification was realized with ANN and the least with Inner Product (k=10) in lower-case letters and the best classification was realized with ANN and the least with Inner Product (k=10) in numbers. The best classification was realized with 36pt and the least with 12pt i n upper-case and lowercase
letters; and the best classification was realized with 60pt and the least with 12pt in numbers.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Mehmet Fatih Karaca
Şafak Bayır
Over past two decades, many algorithms taking
inspiration from natural phenomena have been proposed by the
researchers. One of the famous algorithms is Artificial Bee Colony
(ABC) algorithm which is inspired by the intelligent behaviors of
the honey bees. Although original ABC algorithm has been
proposed for solving continuous optimization problems, in order
to effectively solve binary optimization problems original ABC
should be modified. Using logic operator, genetic operator, and
transfer function are the strategies to obtain binary solutions.
Knapsack is a well-known binary optimization problem which
aims to obtain a maximal knapsack packing. In this paper, various
binary variants of ABC algorithm (xorABC, crossoverABC,
vFunctionABC) are applied to 0–1 knapsack packing problem.
The performance of three binary variants of ABC is investigated
with respect to time and quality.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Bilal Babayigit
A. AYTIMUR
In industry, the priority of services provided by the companies are 7X24 (7 days 24 hours) uninterrupted services. Hence, the main reason why database should provide continuous uninterrupted services. The attributes of database services that provide high accessibility services should be reliability, availability and maintainability; features referred to as RAM (Reliability, Availability, Maintainability) in the literature. In addition to that in this paper, mathematical computation pertaining to the location and accessibility in ITIL processes will also be examined.
It is also aimed to investigate what should be done at the architectural level to ensure that the commands coming from Structured Query Language (SQL) results in high performance. When database or system administrators wrongly configures the architectures processing the queries, it may result in inadequate power systems that could have operated with high performance. This article then discusses what might be the necessary adjustments in order to use the resources of query systems more efficiently.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Nejat Yumuşak
Ahmet Yorulmaz
DC motors have a wide range of usage in the industry. So its control is one of the important topics. In literature, there are different control algorithms for the speed control of DC motor. This paper presents a comparative study of PI and Self-Tuning PI controller for the speed control of DC motor. DC motor is modeled and classicPI controller applies for the speed control of DC motor. Pole Placement method is used to get parameters of the PI controller which are Kp and KI. Fuzzy Logic is used for Self-tuning PI controller design. In this controller, Kp and KI controller gains are adjustable parameters and are updated depending on the speed error and change of error. Simulations of these two controllers are performed in the Matlab/Simulink. PI and Self-tuning PI controller are compared and results are given in graphs. The simulation results show that the Self-tuning PI controller has better efficiency than the classic PI controller.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Nurettin Gökhan Adar
Mustafa Eroğlu
R. KOZAN
This study was designed to investigate with ANFIS
(Adaptive network-based fuzzy inference systems) prediction
model for the behavior of concrete containing zeolite under the
effect of H2SO4. For purpose of constructing this model, 3
different mixes with 27 specimens of the 28, 56 and 90 hydration
days compressive strength experimental results of concrete
containing zeolite used in training for ANFIS system was gathered
from the tests. The data used in the ANFIS model are arranged in
a format of six input parameters that cover the age of samples,
Portland cement, zeolite, aggregate, water and hyper plasticizer
and an output parameter which is compressive strength of
concrete. In the model, the testing results have shown that ANFIS
system has strong potential as a feasible tool for predicting 28, 56
and 90 hydration days the compressive strength of concrete
containing zeolite under the effect of H2SO4.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Gıyasettin Özcan
Muammer Akçay
Yılmaz Koçak
Eyyüp Gülbandılar
Forest ecosystems play an increasingly important role
in the global carbon cycle that storing CO2 in the form of different
chemical compounds (lignin, cellulose, etc) from atmosphere by
photosynthesis. Determination of the amount of carbon is
extremely important in reducing greenhouse effect and preventing
global warming. Two different methods are used for determining
the amount of carbon stored in forests. In both cases, control
points necessary to determine the parameters of the different
stand. However, these studies are time consuming and costly. But
using geographical information systems and remote sensing
techniques can provide more accurate information in a shorter
time. In this study, we tried to estimate the amount of aboveground
carbon stored in pure scoth pine stands using various vegetation
indices. For this purpose Kunduz Forest Management Chiefdom
selected for study area. Forest management plans, topografic maps
and satellite image were used. The amount of carbon of pure scoth
pine stands were determined using single tree carbon allometric
equations. Relation between determined carbon data and various
vegetation indices obtained from Sentinel 2A satellite images in
2017 were examined. In order to determine relations various of
vegetation indices were tested. Relationship between results and
the band combinations investigated by using correlation analysis,
relationships between the variables modelled with help of
regression analysis.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Cemİle Çakir
In the stand pipes, which are the only evacuation point of
the raw gas released during the high temperature coking of the
coal, the section reduction occurs due to the carbonization and the
problem of degazing of the raw coke gas is experienced. This leads
to an increase in the internal pressure of the raw gas in the furnace
and emissions to the doors, which are the weakest points for sealing.
It also leads to energy losses depending on the amount of leakage.
The raw gas passing through the vertical chimneys is 900 degrees
and it is isolated with fireclay bricks to protect the metal parts. In
this improvement, high-alumina castable mortar is used instead of
fireclay bricks. This has resulted in a reduction in emissions and
maintenance costs.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Adnan NEHROZOĞLU
Erdal ÜNAL
Bülent ÖZTÜRK
Murat YAMAN
Ozan TURHAN
RC4 is an algorithm that encrypts a data in the form of a bit string with a specified key. The security of RC4 with high encryption speed depends on the random key. Speed of image encryption is very important parameter due to size of the data. Performance analysis was examined using color image encryption, because RC4 is usually used in speed-critical applications. RC4 showed that the desired values could not be obtained when examining the histogram, correlation coefficient and information entropy analysis results. Because of this, chaotic systems are used to increase the performance criteria of image encryption with RC4. Chaotic systems are very sensitive due to their inherent dependence on the initial conditions and dynamic variables. Not random and non-periodic oscillations these systems are performed in a certain frequency range. The RC4 algorithm are enhanced by using chaotic system-based encryption algorithms because of its key size capability and speed. Performance criteria have been improved using 2D Cat Map, Tent Map and Lorenz chaotic systems. When we examine only the encryption made with RC4 and the encryption made with RC4 supported with chaotic systems; more successful results are obtained from histogram, correlation coefficient and knowledge entropy analysis. In addition, the structure of chaotic systems is increased key sensitivity and key size and thus a more secure algorithm is obtained.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Sefa Tunçer
Cihan Karakuzu
F. UÇAR
The real estate has an important position
economically in the world. Proper valuation of the real estate
is important for the country's economy. For the real estate
valuation, it is necessary to know well the concept of value
related to real estates and the factors, which affect the real
estate value around the area. With the development of
computer technology, it is possible to reach quick and
accurate results by making detailed analyzes. In recent years,
developments in artificial intelligence technologies have
made artificial intelligence methods more attractive in real
estate valuation. Also, advanced geographical information
system (GIS) technology has started to use extensively in the
real estate valuation. Thus, the creation of the databases,
which has predominantly spatial information, for real estates
increased the role of GIS in real estate valuation methods.
In this study, positional analysis of agricultural data in the
GIS environment was conducted and the factors affecting
depreciation were examined. Artificial neural networks
model is developed by data that are prepared in GIS
environment. Subsequently, the success of the predicted
outcome was assessed. As a result of this work is aimed to
obtain accurate information about the value of agricultural
land using mathematical modeling. The results show that real
estate prediction study using ANN was in good agreement
with absolute success value of 93% and correlation
coefficient (R2) value of %76.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Şükran Yalpır
Osman Orhan
Hari̇ka Ülkü
Gamze Sarkım
Güneri Ervural
The number of vehicles in our country is increasing
day by day. Therefore, the most important reason for traffic
accidentsis human. These accidents are caused by reasons such as
nuisance, insomnia, alcohol consumption, excessive speed, not
obeying traffic rules.
In this study, it is determined that the driver in the car is
drowsy. If the driver closes own eyes and yawning, alert system
gives a warning. In this real time application, eyes and mouth are
detected using Viola-Jones algorithm. Eyes and mouth according
to head movements are performed with Kanade-Lucas-Tomasi
algorithm. A counter is used for no iris detection on the eyes and
mouth is too more open state. These are using parameters in the
developed system. The developing prototype system works
successfully.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Furkan ÇAKMAK
Nesrin Aydın Atasoy
In core banking applications, delivering innovative ideas in a fast and reliable manner is extremely important for any corporation or organization. In the existing scenario, the result of increased competition between the companies and products, the core banking industry needs to better respond to dynamic market requirements, by offering new initiatives and services to better the user experience. This process needs to be minimal and with customer support interaction with technology in mobile and internet banking. In the past few years of financial industry, engineering education and knowledge are easy, intuitive for the user and provide the perfect customer experience. In the digital banking platform, the cutting-edge technology innovations and financial user experience designs create DevOps culture.
DevOps, which is a conceptual framework for the re-integration of development and operations in Information Systems, extends the agile methodology to create applications and deliver them across the environment in a fast and automated manner to improve the performance and the quality assurance. The approaches of Continuous Integration (CI) and Continuous Delivery (CD) are crucial for the practices of application development and release management. The objective of this paper is to create a proof of concept for management of systems that have a critical importance; quick and continuous copying of application files and database objects in a single package between Development, Test, Pre-Production and Production environments, integration with Load Balancer Systems, integration with request and call management applications, integration with source code management platforms, implementation of static code analysis and code review process, integration with automatic antivirus scan before testing, with only one automation for testing composed with built result application files for the creation automatic test process and definitions and only one platform structure that can make a new version deployment a release to many application architectures.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ahmet Sefa Oztas
Eren YEMEN
Ercan TUZUN
Appraisal of real estates which have a large important
for the country economics is pretty a hard occupation field. The
value of real estate indicates important level changes in
accordance with location and neighborhood features of their
places apart from legal and physical factors. Using value
prediction by explaining as mathematical these changes is a
complex problem. It is appropriate to use Geographical
Information Systems (GIS) application because of the size of the
study area in real estate valuation and the need to integrate the
attribute information into the map.
The purpose of this study is to provide using neighborhood
features affecting the value of real estate for mass appraisal. In
Centre Neighborhood of Konya, the neighborhood features were
taken into account, standardized with the help of GIS software by
producing the prediction and thematic maps in form of simple and
easy and made the ready form for valuation analysis. These maps
will be able to use as the base in all practices of valuation from
taxation to expropriation.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Şükran Yalpır
Fatma Bunyan Unel
The global problem of the growing city centres has many causes and requiring many different solutions. Existing urban infrastructures are having difficulty to meet the needs within the increasing population and urbanization of the cities. In this context, innovations must be made in many areas of the infrastructure of the cities such as Transport, Energy and Environment cleanliness. The most important increase due to the population growth in urban areas occurs in the traffic intensity. The number of vehicles increasing in traffic brings with it many new problems such as energy, time, and environmental pollution. Several field studies have been done so far to reduce and minimize traffic intensity. In this context, different solutions have been tried, such as speed controls, camera systems equipped with image processing techniques, and measures to reduce the intensity of intersection connections. As a result of interviews and determinations within the scope of this study, it is seen that traffic lights have a serious effect on traffic regulation.
In this study, the working principle of traffic lights was first investigated. In particular, the optimization and the techniques of signaling times of traffic lights have been examined. Traffic lights, which usually operate for a fixed period of time, can cause the vehicles to remain in traffic for a longer time and increase traffic intensity. Systems that operate according to the vehicle density cause very important improvements if they are operated through the appropriate mathematical model. In our work, queuing theory is mentioned, the application areas of theory are investigated and the data obtained from the field have been tested through this model. According to the queuing theory, the intensity of the intersection arms, the performance of the lights, arrival and the service ratios were obtained. With this study, it is aimed to bring a new approach to the density at the intersection of the city centers.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Fatih Güneş
Selim Bayraklı
Abdul Halim Zaim
Today, approximately 200 million people around the world are required to regularly check blood sugar levels every day, and this number is increasing day by day. If hyperglycaemia and hypoglycemia occur as a result of blood sugar level abnormalities, serious tissue and organ damage and, most importantly, vital risks can occur. In generally, blood glucose level measurement methods are divided into three categories, which are invasive, minimally invasive and non-invasive. In invasive methods people need to measure blood glucose levels by drilling their fingers, squeezing blood droplets on test strips and treating the results with portable glucometers. The process can be uncomfortable and complicated and has to be repeated many times each day. By using minimally invasive methods, the glucose ratio is determined by the help of tissue fluid or very little blood. Actually this method is uncomfortable for human life too. For this reason, there is a growing need for a new generation of non-invasive glucose-level monitoring systems in which the glucose level can be reliably determined. The goal of the ongoing works in literature are to prevent or delay early diagnosis and complications, rather than to treat the diabetes. This review giving a comprehensive knowledge about non-invasive design methods used in the literature.General definitions are given for each of the design methods. Scientists, laboratories and universities have been working on the design of non-invasive glucometer with various methods, yet there is no product that can measure with high accuracy.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ercan Mengüç
Selcuk Helhel
The importance of analysis high resolution satellite
imagery plays an important research topic for geographical
information analysis of cities. Geospatial data plays an important
role in important issues such as governmental, industrial, research
topics on traffic management, road monitoring, GNSS navigation,
and map updating. In this study, road detection from satellite
imagery methods are classified as classification-based, knowledgebased,
mathematical morphology and dynamic programming. In
the beginning, the road structures including feature and model are
analyzed. Then, the advantages and disadvantages of road
detection methods are evaluated and summarizez their accuracy
and performance based on road detection principles. Therefore, in
order to obtain remarkable results for road detection, it is better
to use more than one method. In after days, performing a complex
road extraction from a satellite image is still a necessary and
important research topic.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
İdris Kahraman
Ismail Rakıp Karas
Path planning problem plays an important role in mobile robot works. The robotic systems use intelligence algorithms to plan the path of the robot from one point to the other point. The main goal of path planning is to find the allowable movements of a robot in an environment with obstacles. These motions involve a path free of collision from the start position to the target position. In this study, Gray Wolf Optimization (GWO) algorithm was adapted to solve robot path planning problem. GWO algorithm imitates the hunting behavior and social leadership of gray wolves in nature. The leadership hierarchy consists of four grey wolf groups: alpha, beta, delta, and omega wolves. This algorithm comprises hunting mechanism with three stages: searching for prey, encircling prey, and attacking prey. In the test simulations of the robot path planning, we used a map with three circular obstacles. GWO algorithm was adapted to this problem. While finding the candidate solutions in path planning, three coordinate points are used between start and target points. For each iteration, these coordinate points are updated by GWO algorithm. If the solution point is in the obstacle zone, then violation is added to the cost function. The performance of GWO algorithm was evaluated with those of meta-heuristic algorithms for solving the robot path planning problem. The results obtained by GWO algorithm show that the optimal path is found for used test map.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Lokman DOĞAN
Uğur Yüzgeç
In recent years, intrusion detection (IDS) and
prevention systems (IPS) are vital in small and medium-sized
computer networks where data security is important. Examples of
these systems are Raspberry Pi (RasPi) computer with open source
IDS software. It is necessary to develop a rule-based architecture
in order to detect the attack by analyzing the traffic with this
system on a network. In this study, Snort IDS module has installed
on RasPi v3 computer and it has tried to measure alert
performance value according to the number of rules of developed
system. The scenario has that a total of an attack of 1 million data
packets, including one packet attack in 50 microseconds, to a
server on the network has been found to result in a nearly 15%
decrease in alert performance after about 7500 rules.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Mustafa Coşar
H. E. KIRAN
This paper concentrates on a face biometric system
to investigate the face biometric and problems related to face
recognition under different illumination variations, pose and
partial occlusion. A face recognition system is developed to
recognize face images based on Principal Components Analysis
(PCA). The implemented scheme applies histogram equalization
and mean-and-variance normalization for image preprocessing
step to reduce the effects of the illumination. In order to improve
the recognition performance, we implement a feature selection
method based on Genetic Algorithm (GA). The implemented
method improves the recognition performance of system by
selecting the optimized sub set of PCA features and removing the
irrelevant data. Several datasets of ORL, FERET and BANCA
databases are used in order to test the robustness of the developed
face recognition system.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Omid Sharifi
M. Ç. YILDIZ
M. ESKANDARI
Detection of the breast cancer at the early stage has gained much attention over last decades. In this paper, a simulation study of a radar-based ultra-wideband microwave system is presented to detect breast cancer tumors. The main principle of this technique is based on the significant difference in the dielectric properties of malignant breast tumors and normal breast tissue in the microwave frequencies. The tumor’s electrical properties, in particular conduction and specific absorption rate (SAR), change significantly from those of healthy biological tissue when exposed to microwave radiation. In the measurements, a simple planar breast phantom that consisted low dielectric constant material to represent the fat tissue and high dielectric constant material to represent the tumor is used. An ultra-wideband and high gain antenna is used to measure electromagnetic field data for tumorous and non-tumorous breast tissue. According to the obtained results, the used antenna and microwave system are successful for detecting the breast cancer tumor. Measurement system is developed by using High Frequency Structural Simulator (HFSS) software. Antenna design parameters, properties of the breast phantom, analysis and measurement results are demonstrated and explained clearly in the paper.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ali Recai Çelik
M.Bahattin Kurt
Selcuk Helhel
The increasing population ratio in cities and the
increase in vehicle and pedestrian traffic due to this population
also brought problems with the transition of emergency vehicles
such as ambulance and fire brigade. The aim of this study is to
present solutions for problems with traffic congestion in vehicles
with transit superiority in an emergency. It is also intended to
provide wireless communication between traffic signaling lights in
operation and visual warning monitors used in designated
locations and emergency vehicles. When the route is determined
via the mobile device on the emergency vehicle, the traffic light and
the predetermined locations are communicated and the other
drivers in the traffic will be alerted in an audible and visual
manner. Since these alerts will make in advance in the area where
the traffic intensity is, traffic accidents would be resolve and the
emergency vehicles would be continue without losing time.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Selim Özdem
Songül OZUM
Over the last decade, agile practices become very popular amongst software development. According to one of the phrases of the Agile Manifesto “Working software over comprehensive documentation” sometimes could lead practitioners to the misunderstanding of “documentation is not valuable” or “not needed at all”. Because of this understanding from software community, agile practitioners do not give enough attention to architectural related documents. However, documentation is also a communication way between people and this communication should be also simple and lean considering agile principles. Commonly used traditional architectural documentation is very comprehensive and detailed. Creation and maintenance of this architectural documentation take too much effort for agile teams. Therefore, existing architectural template documents cannot serve agile teams in the best way. Rather than using existing architectural documents, this article presents a new lightweight architectural documentation template that can be used maintained easily in agile projects.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Caglar Cakir
Fatih Cetin
Mustafa Savasci
Oğuz Findik
Many robot competitions are organized in the national and international arenas. Many different robots compete in many different categories. The difficulties encountered during the competition are tried to be solved later in the competitions. This contributes to the development of automation technology. In this kind of competition, there are robot categories such as sumo robot, mini sumo robot, and line follower robot. Competitions can be done using tournament, elimination and ranking procedures. In this study, automation suitable for all three types of procedure has been developed and expert systems were used. Significant features of the automation include; tournament automation with dynamic elements completely dependent on the field of display, QR code creation and reading, bidirectional and multiple communication, SQL database connection and configuration.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Abdulkadir Gül
Emel Soylu
In this study, multi-objective vortex search algorithm (MOVS), a new multi-objective metaheuristic optimizer, has been used to solve 3 different constrained benchmark problems. The performance of the MOVS algorithm is compared with NSGA-II, is a well-known multi-objective evolutionary algorithm, on different performance metrics. Obtained metric results show that the MOVS is a promising algorithm for solving multi-objective benchmarks. This study encourages researchers working on constrained mathematical or real-world problems to use the MOVS algorithm.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ahmet Özkış
Gül Özcan
Ahmet Babalik
Mustafa Servet Kıran
Fast developing GPU technology
increases the performance of search algorithms
used to solve NP-hard problems. Travelling
Salesman Problem (TSP) is a well-known NP-hard
problem. In this paper, we parallelize a popular
swarm algorithm, Artificial Bee Colony, to solve
TSP. Proposed algorithm is tested on small scale
benchmarks obtained by modifying Mandl’s Swiss
Road Network. Proposed implementation is tested
by three experiments performed on a host PC and
a GPU card. The results are compared against the
results generated by the serial implementatio n,
which is executed on the host PC. Test results for
the fully connected benchmark show that the
proposed parallel implementation has increased
the performance of the computation up to 150
times compared to the serial implementation.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Fouad Asil
Mustafa Gök
Building effective schedules in academical institutions considering the wishes and needs of administrative staff, professors and students at the same time is a rather difficult and time-consuming activity for staff involved in this work. Despite improvements in software and hardware technology in recent years, charts are still manually created in many educational institutions and the desired efficiency has not achieved. In this study, the course chart of Mersin University Engineering Faculty was built using Ant Colony Optimization (ACO) technique. While the course schedule was being formed, 9 departments, 24 common classrooms, 105 faculty members, 239 courses, 14.374 students who have attendance obligations and 8286 students who have not attendance obligations were taken into consideration. In the placement of the courses, adaptation to ACO algorithm has been achieved by targeting the maximum lecture minimum classroom usage. The appropriate hours of the lecturers were accepted as strict constraints and other cases were added to soft constraints. All courses of Mersin University Engineering Faculty have placed the course schedule to appropriate classrooms at the rate of 99% using ACO technique, and 17 classrooms of common 24 classrooms were determined to be sufficient for educational activities.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Semir Aslan
Cigdem Aci
Image segmentation is one of the most tedious and
challenging research of image processing field and defined as the
partitioning of a given image to a finite number of nonoverlapping
regions such that every homogenous region is
connected through a sharp line. When segmenting an image, each
pixel is assigned a label so that similar labelled pixels have
certain visual characteristics. Image segmentation is a popular
image processing task for image interpretation and analysis.
Especially, the scope of medical image segmentation includes a
wide spectrum of subjects including locating tumors, measuring
tissue volumes, planning the treatment, enhancing the medical
images, diagnosis, image retrieval etc. For image segmentation
and/or other image processes, various color spaces are used:
RGB, CMYK, HSI and YIQ. Each color space was proposed for
specific purposes and each of them has certain advantages over
the others. Color image segmentation provides the user much
more information comparing to grayscale image segmentation.
This paper performs different medical image segmentations
using CIE L*a*b color space. Images are converted to L*a*b
color space and color difference idea is used to segment the user
selected regions. This paper also covers commonly used color
models such as RGB, CMYK, HSI and YIQ.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Emrah Irmak
The field of human computer interaction (HCI) involves the creation of interactive computing systems for humans to enhance the quality of life of people especially with disabilities all over the world. This study proposes a multimodal system to give the opportunity to carry out all daily works with a personal computer (PC) for disabled people that cannot use their hands. In this study, it's aimed to create an interaction between the user and a machine that is performed by user's voice and eye movements. Turkish Speech Recognition was performed by using mel-frequency cepstral coefficient (MFCC) extraction, hidden markov model (HMM) and artificial neural networks (ANN). As a joint part of the software, an efficient eye tracking system with a Tobii 4C eye tracker, was developed having a feature of eye blink detection for controlling an interface that provides an alternate way of communication. This multimodal system was developed by the authors using Java language and Matlab library and the system performed promising results for Turkish training words. To increase the system's performance, usage of natural language processing methods is planned as a future work.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Hilal Kaya
F.F. İÇEL
F. ÖZATAK
S. KARAKOÇ
O. SARIYER
In this study, it was designed to investigate with four
different artificial neural network (ANN) prediction models for
the concrete behavior containing zeolite and diatomite under the
effect of H2SO4. The constructing purpose of this model, 3
different mixes with 27 specimens of the 28, 56 and 90 days
splitting tensile strength experimental results of concrete
containing zeolite and diatomite. Those experimental results used
in training and testing for ANN systems were gathered from the
tests. The days (age of samples), Portland cement, zeolite,
diatomite, aggregate, water and hyper plasticizer as input data
parameters and splitting tensile strength of concrete as an output
parameter are used in the ANN models. The four different ANN
models have strong potential as a feasible tool for predicting 28,
56 and 90 days the splitting tensile strength of concrete containing
zeolite and diatomite in according to the training and testing
results.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Yılmaz Koçak
Gıyasettin Özcan
Muammer Akçay
Eyyüp Gülbandılar
The using and importance of web services that
flexibly meet the need for communication regardless of
parameters such as platform, operating system are
increasing day by day. In a simple sense, Web services carry
a lot of data because they provide communication. With the
increasing usage of web services and evolving technology,
various methods have been developed to conceal data, to
provide security and to prevent access by third parties in
web services. At the same time, attack and injection
methods for web service servers or web services have been
developed. Some of these methods exploit the fact that the
web services are XML-based. For example, XML injection,
XPath (which stands for XML path language) injection are
some of them. However, perhaps the most common type of
attack are DOS and XDOS attacks. The purpose of this
study is to gather the reasons of web service attacks, the
precautions to be taken against the attack, the solutions for
the exploits.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Furkan Sabaz
Yüksel Çelik
Technology evaluation is quite important field of technology management. Potential technology investments can be assessed thanks to technology evaluation methods in practice. Patent documents are extensively used for technology evaluation in the literature. The use of patent documents provides an objective evaluation of technology in real life engineering applications. In this study, patent documents are analyzed based on mining high utility itemsets. Mining high utility itemsets is a data mining approach. HUP-growth mining algorithm is one of the algorithm proposed for mining high utility itemsets in the literature. HUP-growth mining algorithm is utilized for the analysis of patent documents in this study. To show the application of the algorithm in the field of technology evaluation, all patents related to geothermal energy are retrieved from the United States Patent and Trademark Office (USPTO). The results obtained from this study show that HUP-growth mining algorithm can be easily and effectively used for technology evaluation based on patent documents.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Serkan Altuntas
Mehmet Sezer
In this study, the real time yaw and depth controller
of unmanned underwater vehicle (UUV) are performed
experimentally. Firstly, the mathematical model of UUV is
obtained. The controllers are designed based on mathematical
model data. Then, the controllers are performed based on
experimental data. Data transmission from vehicle is provided
with fiber optic cable which is connected operator console in the
experiment. This operator console is connected to computerwhich
has MATLAB inteface. Vehicle is controlled with proportional
(P)-integral (I)-derivative (D) designed in MATLAB/Simulink
environment. Communication between the vehicle and controller
is provided using MATLAB interface during the experiment. The
experimental controller responses are compared with the
controller response of mathematical model.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
E. ERTUĞRUL
A. DEMİR
Ö.ŞENYÜREK
Seda Karadeniz Kartal
The Salp Swarm Algorithm (SSA) is one of the recently proposed nature-inspired metaheuristic algorithms. SSA mimics the life cycle of salp swarms. Salp swarm is an animal group which lived in oceans. The navigating and foraging behaviors are the characteristic properties of the salp swarms. These behaviors are modeled as an optimization algorithmin SSA and it is firstly proposed for solving continuous optimization problems. In literature, there is no binary version of this algorithm which uses transfer functions. In this work, SSA is modified for solving binary optimization problems by using transfer functions. Transfer functions are used to convert the continuous decision variables to the binary decision variables. With this modification, the structure of SSA has not been changed, but only the Sigmoid and the Tangent Hyperbolic transfer functions are adapted. In order to validate the performance of the proposed binary SSA, a well-known pure binary optimization problem, uncapacitated facility location problems (UFLP), set is considered. UFLPs are used for a benchmarking of many metaheuristic algorithms such as; artificial bee colony, tree-seed algorithm, particle swarm optimization, differential evolution and artificial algae algorithm. The experimental results of 12 UFLPs are compared with each other and state-of-art algorithms. Experimental results demonstrate that the SSA is a promising solver for lower dimensional problems, but its performance should be improved on higher dimensional problems.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ersin Kaya
Ahmet Cevahir Çınar
Oğuzhan Uymaz
Sedat Korkmaz
Mustafa Servet Kıran
In this study, specific absorption rate (SAR)
simulations of rat model have been carried out by using a finite
integration technique (FIT). Although FIT is similar with finite
difference time domain (FDTD) method in most ways, an integral
form of Maxwell’s equations are used in the FIT method. A
monopole antenna working at 900 MHz has been designed for the
electromagnetic source. Conductivity and permittivity of tissue
have been selected from realistic values and implemented for the
voxel based rat model.
Simulations have been implemented with the 5 W stimulation
power. Aforementioned antenna has been located at 3.5 cm and 5
cm away from the nearest point of the rat model, respectively.
Total SAR values are found as 0.483 W/kg for the 3.5 cm distance
and 0.315 W/kg for the 5 cm distance. Maximum SAR induced at
a head region as it is expected. Furthermore, cross section of the
head and body results indicate that induced SAR vary in different
parts of a body because of electrical properties of each tissue. As
the distance of the antenna increases, the SAR value decreases.
Results show that average SAR value in 1 gr rat tissue is higher
than the value in 10 gr rat tissue.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
K. ATES
H. Feza Carlak
Sukru Ozen
A well balanced dataset is crucial for the performance of the data mining classification algorithms. In medical datasets, the percentage of normal labeled classes is higher than the percentage of abnormal labeled ones, which is called as class imbalance problem in data mining. If training dataset is imbalanced, the classification algorithm generally predicts the labels of the majority class instances correctly and the minority class instances incorrectly which leads to a major problem for artificial intelligence based medical diagnosis systems. To overcome this problem, many researchers proposed over-sampling and under-sampling techniques in the literature. Over-sampling techniques increase the number of minority class instances, where the randomly chosen instances from minority class is duplicated and added to the new training dataset or synthetic instances are generated from the minority class. Under-sampling techniques decrease the number of majority class, where the randomly chosen subset of majority class is combined with the minority class instances as the new training dataset. In this study, the effect of over-sampling and under-sampling techniques in medical datasets is examined. For the experimental study, several medical benchmark datasets and well-known classification algorithms are used.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Mehmet Hacibeyoglu
Mohammed Hussein IBRAHIM
In recent years, ransomware have become one of the most important threats facing both individuals and organizations. Attackers use strong encryption methods to create dangerous and comprehensive malware, making their ransom software flawless. Surveys indicate an increase in the number of assailants in parallel with the increase in the number of victims and the increase in illegal income. In the early years, especially at the risk of individual ransom viruses, more complex attacks are now beginning to appear that lead to the encryption of multiple machines targeting companies and every device connected to the Internet. In this study, ransom virus attacks against Internet of Things (IOT) network which is formed by connecting multiple devices with each other are examined and a study is presented about the measures to be taken.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Semih Gençay
Yüksel Çelik
The importance of immovable value in urban areas
increases day by day. The immovable valuation is a planned,
disciplined and a wide-ranging subject. In this study, the
immovable value changes created by the changes in the properties
of the buildings and the immovable properties of the urban
structures from the past to the present day are examined. Plants
and buildings, which form the basis of urban construction of the
application, have been used together.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Şükran Yalpır
SÜleyman Şişman
Ali Utku Akar
There are many qualitative and quantitative decision-making criteria in supplier selection (e.g., cost, quality, service or lead time). The today’s business environment requires choosing the right supplier with the environmental concerns in addition to the well-known selection criteria. We claim that a supplier selection accounting for the environmental concerns increases the supply chain responsibility, e.g. customer satisfaction, cost reduction and a clean environment. Therefore, we introduce a multi-criteria decision-making problem accounting for the environmental and social indicators that might be used to select the supplier of a wood glue which does not contain environmentally hazardous substances. A real-life case encountered in the furniture industry, is analysed with an expert choice software using the analytic hierarchy process decision making methodology.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
B. BALIBAS
Çağrı Sel
Nowadays everyone is trying to record the moment everywhere and wants it to be perfect. Beyond resolution, there is a desire to get steady shots regardless of the environmental conditions. The gimbal stabilization system ensures a stable image by blocking motion-related vibrations before they are transferred to the camera lens axes. Thanks to the Three Axis Gimbal, perfect images can be achieved by minimizing the vibrations while jogging, climbing or coming down stairs, cycling, or using any kind of vehicle. In short, a three-axis gimbal can be integrated everywhere a fixed image is needed. It is envisaged that gimbal stabilization system will be needed in many scientific studies in the following periods.
The aim of this study is to present the Three Axis Gimbal mechanism. Three separate brushless servo motors are installed on each axis for absorbing unwanted movements. The gimbal is also equipped with an inertial measurement unit consisting of a gyroscope and accelerometer close to the camera mount point. The general control system and PID controller are simulated by using MATLAB and the results are shown graphically.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Emi̇ne Dere
M.OZCAN
Süleyman CANAN
Quadratic Assignment Problem (QAP) is based the facilities allocation, and it is a difficult combinatorial optimization problem. The objective of this problem is to make total assignment cost minimum while being assigned facilities to locations that are already known. To solve this problem, the different methods are used in the literature. Meta-heuristic algorithms are ones from these methods and in this study, we present a new version of recent antlion optimization algorithm for QAP. AntLion Optimization (ALO) algorithm was developed by Mirjalili in 2015. ALO algorithm is based on the hunting behaviour of the antlion. This algorithm comprises five stages: random walking mechanism, constructing trap, trapping in the antlion’s pit, sliding ants in the pit, catching the prey and reconstructing the pit. Although ALO algorithm is successful in benchmark functions of multi dimensions, it has got some drawbacks. The most notable improvement is the use of tournament method instead of roulette wheel method. In ALO algorithm, the antlion is chosen from the population by roulette wheel method for using in each ant's random walking model. The roulette wheel method is more successful in maximization problems. In the minimization problems, the tournament selection method is more efficient method than the other selection methods Therefore, we used the tournament selection method in this study instead of the roulette wheel method on random walking mechanism. This proposed algorithm has been called the tournament selection based antlion optimization algorithm (TALO). To evaluate the performance of TALO algorithm, we used well-known meta-heuristic algorithms. The results provide the proposed TALO algorithm has the best performance in comparison with those of the other algorithms.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Haydar Kılıç
Uğur Yüzgeç
Keeping the quality goals in software is not a matter of chance. It needs proper planning and continuous attention of the development team. The main responsible for achieving the quality goals is the software architect. The architect needs to contribute in: clarifying and defining the goals, make a design that maps the required quality. However, that’s not enough. The architect needs to govern all development and test activities to move towards the goals in harmony as a team. In the end, software quality depends on the design decisions, implementation and the also definition of the goals itself. A process for tracking the architectural quality is presented in this paper with an analogy to the development processes: “V Model” and “W Model”.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Onur Taviloglu
Fatih Cetin
Nowadays, it is tried to predict the future events through the data. Practical areas such as deep learning are primarily trying to regulate data, and then these data are used for estimation. There are many algorithms used in this area. Besides these algorithms, artificial neural networks are also widely used in this field. ANFIS is a special network that uses artificial neural network and fuzzy classifier. It computes the output by distributing the input data blurred by the membership functions with the fuzzy rules on the network. Some parameter values need to be set in ANFIS. In this study, ANFIS networks will be trained with the Whale Optimization Algorithm, one of the current swarm-based meta-heuristic algorithms to find suitable parameter values and evaluation will be made on sample problems.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Murat Canayaz
Recep Özdağ
In this study, the Opposition based learning Spiral Optimization Algorithm (OBLSOA) is presented for training Multi-Layer Perceptron (MLP). The main idea of Spiral Optimization Algorithm (SOA) is based on the dynamic step dimension in its spiral path trajectory. The primary opposition based learning (OBL) concept first was come from the Yin-Yang symbol in the ancient Chinese philosophy. According to OBL concept, if a candidate point is far from the solution, the opposite point of this candidate can be closer to the solution than that point. We applied OBL concept to spiral optimization algorithm for training MLP. OBLSOA comprises two main stages: the first is the opposition-based learning population initialization and the other is opposition-based learning generation jumping. To evaluate the performance of the proposed OBLSOA, we used eight standard datasets including four classification datasets (XOR, balloon, Iris, breast cancer) and three function-approximation datasets (sigmoid, cosine, and sine). The performance proposed OBLSOA was compared with the original SOA for all datasets in terms of the Mean Square Error (MSE) metric. The training and test results show that the proposed OBLSOA is able to be provide very competitive and effective in training MLPs.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Uğur Yüzgeç
Cihan Karakuzu
Network coding has emerged as a paradigm for communication systems in which each intermediate node in the network generates and transmits output data by encoding previously received packets in a manner to increase the bandwidth efficiency of the system. The multiple access relay channel (MARC) is one of the real-world reference network coded communication scenarios where multiple users transmit data to a common destination through the use of one or multiple relays. In this paper, performance of demodulate and forward protocol which is among the prominent digital relaying techniques is considered in MARC systems. A convolutional code is used as the channel code. Maximum likelihood (ML) detection and user selective relaying are utilized in order to decrease the performance degradation due to decision errors at the relay. The simulation results obtained for Rayleigh fading channels have shown that the examined joint channel-network coding approach is superior with respect to non-cooperative system by providing full diversity gain.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ozgur Ozdemir
Every new development in the field of software engineering opens new possibilities for education practices and engenders new opportunities for learning environments. In the world of rapidly developing information technology, cloud computing has given new directions to the structures of traditional learning management systems. Today online learning, as a form of distance learning or e-learning, has developed the capacity of organizations to reach more students than in a traditional classroom setting via scalable online services mainly thanks to cloud-based software solutions. Moreover, organizations have become more equipped with the help of sharing resources and gained enrichment by avoiding large expenditure on hardware and software for the required learning management systems. This work-in-progress study tries to analyze and summarize some trending features directly related with cloud-based learning management systems.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Hakan Özcan
B. G. EMİROĞLU
Sign language recognition is used to help communicate effectively between normal hearing peoples and hearing-impaired. According to literature review, Turkish sign language recognition studies are very few. For this reason, this study has been performed on Turkish sign language recognition. Depth cameras, such as the Leap Motion controller, allows the researchers to exploit depth knowledge to better understand hand movements. In this study, data of 10 letters in Turkish sign language was taken from Leap Motion. Five of these data are composed of letters (I, C, L, V, O) that It can be expressed with one hand, while the other five are composed of letters (B, D, M, N, K) that It can be expressed with two hands. The dataset was taken by two different people. Each person made five trials for each letter. Ten samples were taken at each trial. In this study, Artificial Neural Network, Deep Learning and Decision Tree based models were designed and the effectiveness of these models in recognizing the Turkish sign language is evaluated. Regression (R), Mean Square Error (MSE) and Estimation Accuracy performance metrics are used to evaluate models' performance. The data set was randomly divided into 30% for training and 70% for testing. According to the experimental results, the most successful models for the data set with 120 features are decision tree and DNN models. For the data set with 390 features, DNN is the most successful model.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Abdulkadir Karaci
Kemal Akyol
Yasemin Gültepe
In this study, we analyzed the hyper-parameters
which are frequently used in deep learning methods on a generated
DNN. On the Fashion-MNIST dataset, we had chance to interpret
the evolution of the model to the end as a result of tests performed
on a low epoch number. At the end of the study, we reached a
success rate of about 90 percent on the test data and showed that
the selected hyper-parameters by created model were the most
accurate.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Yusuf Yargı Baydilli
Ü. ATİLA
In this study, we presented the use of the A-Star algorithm to find the shortest path between a starting-point and ending-point on the map which is taken from Google Maps and segmented as grid-cells. The active paths on Google Maps are specified in the Algorithm Map by dividing into grids, and it is desirable to find the shortest path from the A* algorithm. In addition, the traffic intensity of various roads is shown on the Google Maps. This information is processed on the Algorithm Map so that the algorithm can find the shortest route by considering traffic density.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Emi̇ne Dere
A.DURDU
The use, interest and analysis of e-sales systems are growing by the innovations the internet data processing technologies. Institutions, which want to provide better services to the customers, must first handle the demands, needs, and requirements of the customers. State Supply Office is an institution that meets to a large extent of purchasing needs of institutions in Turkey. In this study, a scorecard was created for each customer by segmenting the customers using recency, frequency and monetary (RFM) analysis method on the state supply office dataset. These scorecards were used to determine which the customers are loyal and which customers are being lost. Then, Apriori Algorithm was utilized to conduct a joint analysis on the products purchased by the lost customers for tendering campaigns and discounts. In order to regain the lost customers, the campaign and discount schemes were constructed considering scope of the right products obtained by the Apriori Algorithm.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Hasan Ali Türköz
İsmail Babaoğlu
The main objective of this study is to automatically extract tea gardens from large geographic areas using high-resolution digital orthophoto maps. To achieve this objective, object-based image analysis and decision tree (DT) classifier were integrated. For segmentation, multi-resolution image segmentation algorithm was used which is implemented in Definiens Developer commercial software. Both scale and compactness parameters were empirically calculated that produced optimal results. The segmented objects were selected manually for training the DT classifier from all used images. Spectral and textural features were extracted from each segment and to make the features robust against local variations, they were extracted at two image scales and final feature vector was formed by averaging the two feature vectors. The selected optimal features were used to train the DT classifier and then applied it on the test data to generate thematic maps for tea gardens. The performance of the proposed method was evaluated by comparing results with the reference data that produced promising results for mapping tea gardens (overall accuracy 88%) on our dataset.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Akhtar Jamil
B. BAYRAM
Target detection and tracking in video data is a complex problem. Especially for designing and developing surface to air tracking systems should be dealt with this problem strictly. In this study a combination of an image processing technique and Probabilistic Multi-Hypothesis Tracker (PMHT) is used. The target is discriminated from the video data for target initiation. In the subsequent steps the same discrimination method is used to obtain proper data for track continuation. For target identification from video data a transformation is used and target based pixels are discriminated from the background. Then image is transformed into point measurement data with amplitude information. Thus, video data is made suitable for tracking with PMHT. The resulting algorithm performs target detection and tracking operations automatically.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ahmet Pakfiliz
Nowadays, many mobile applications have proposed to provide healthcare service. One of the most important healthcare problem all over the world is failure of the early detection and treatment of visual impairment. In this study, we have developed VisualDetector, a low-cost, user friendly and mobile visual impairment detection system which has two components. First component is an integrated circuit attached to the smartphone that measures the distance between user and smartphone, then, sends the measured distance to the smartphone via Bluetooth. Second component of VisualDetector is android-based mobile application that interacts with the user by executing vision tests. VisionDetector can detect visual acuity and colorblindness problems of the user without requiring to go to an eye clinic. Thus, early detection of visual impairment can be possible, and the expense of treatment will be decreased. The results indicate that our proposed system has a potential to use as an early detection tool for visual impairment.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Yasin Ortakcı
Alperen Toksoz
Burak Keskin
In this work, a new system depending on a device that can encode and decode push-button signals, modulated using Morse code conventions, were developed to build a low-cost communication medium based on Internet of Things (IoT). The proposed system consists of two parts: a base station and handheld terminals. The base station is a single board computer with a web application based on Node.js. Handheld terminals are small battery powered devices, developed using MCU's, that can communicate with the base station over the wireless network. They can encode and decode Morse code, and convert to text or speech depending on the configuration of the terminal, which can be extended by using different add-ons, such as an OLED screen or a text to speech module. Communication between terminals is orchestrated by the base station using IoT Technologies like MQTT. The handheld terminals can be used by disabled people as a mean for private conversation, or a gadget for entertainment purposes. The system is an uncomplicated and low-cost communication medium and implemented to find alternative use cases for the IoT technologies.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ovunc Ozturk
Yunus Emre Küçük
Ahmet Yalnız
3D models of scenes are widely used but reconstructing them in 3D is a challenging task. The task generally starts from data acquisition and ends with 3D model of the scene. There are various methods to achieve the task but most of them don’t offer a suitable solution for large scenes and implementing them is laborious even in the case of a small scene. The document is prepared to propose a solution to these problems and explain a project which implements the solution. The solution benefits from two approaches; a multi-agent drone system and an image based 3D reconstruction pipeline. These approaches and how the project implements them are explained in details.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Metehan Aydın
Erkan Bostanci
Mehmet Serdar Guzel
Internet of Things has entered our lives as many forms and devices and enabled us to connect even the smallest-size devices to the internet. This progression aided us by deploying sensors on the workspace we need, such as hospitals, buildings, all sort of vehicles, logistics, even automated manufacturing and factories. In terms of quantity, around 8 billion of sensors are connected to IoT systems by 2017. These sensors may be utilized in many ways, such as emergency reporting and data collecting. IoT mesh networks function not only in normal conditions, even in emergency situations such as climate disasters, fire, flood, earthquake, tsunami, war or terrorism-related nuclear, biological or chemical attacks or conventional attacks. Such circumstances cause mass panic and chaos resulting in serious consequences unless contained and controlled. In this study, we propose a conceptual design of a functioning prototype which has the operational ability to provide an auxiliary network connection, as well as detecting Internet of Things devices in the area of disaster, collecting IoT device info and providing a mobile WAN access to the user.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
B.KAYMAZ
T.ERCAN
Since the beginning of the 21st century, there have been revolutionary developments in technology with Industry 4.0. Artificial Intelligence has become a part of daily life in many fields, complex software has become capable of working in real time on devices such as mobile phones. Such advances in the technology get together humanity to Augmented Reality. In this field, both developed software are used for many purposes such as game, tourism, travel, medicine, military, industry, entertainment and education. In this study, a mobile application based on Augmented Reality working in both indoor and outdoor environment is presented in the architectural field.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
M.OKUR
M. BULUT
Y. SANTUR
In this study, we intended to recommend possible books to be checked out from Seattle Public Library (SPL) within a month. While it seems possible to make daily estimates from existing data, it will be more useful to make monthly data forecasts since SPL provides fresh data every month. The information obtained here will contribute to logistic modelling. Since some assumptions on the location of the books and storage capacity of each location are required for the better management of the resources, this problem can be considered as a warehouse resource allocation problem. In order to perform the required predictions, Naïve Bayes (NB) algorithm is applied on the Seattle Public Library Dataset (SPLD), which contains all of the checkout records between 2005 and 2017 in the SPL.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
A.KARAMANLIOĞLU
A. ÇETİNKAYA
A.DALKIRAN
M. KOÇA
A.KARAMANLIOĞLU
In this study, the world's largest graphics card manufacturer Nvidia's deep learning assisted drawing software tool "GauGan" has been investigated. GauGan which is firstly announced Nvidia GPU Technology Conference (GTC 2019) is basically a drawing tool. The difference between the other drawing tools is that it can transform simple drawing lines into realistic nature pictures by using deep learning. It is improved on previous drawing software tool which is called "pix2pixHD”. Nvidia has announced that it will use 1 million images on the Flickr platform as a set of data for the development of Deep Learning.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Y. SANTUR
In production systems, one of the main part routing problems is the determining the best process sequence and the
best machine-operation pairing. In real world systems, flexibility
is important to provide alternative part routings. The system is
considered flexible when certain operation of a part can be
processed on more than one machine. However, flexibility
increases the complexity of system. This paper deals with
assignment of operations to a machine and determining the best
process plan for each part under flexible environment. We used a
harmony search algorithm to cope with highly complex and
nonlinear problem in which makespan is considered as the
objective function and evaluated by using a simulation model.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ayşe Tuğba Dosdoğru
Aslı Boru
Mustafa Göçken
With the digital transformation era that we are in, the
systems that we physically process are now transferred to
electronic systems. In these days, Bitcoin [1] that is concept of
virtual money which is one of the popular topics entered our lives.
It is an end-to-end digital payment system over a decentralized
network. This system works with the Blockchain algorithm. We
can apply this technology to other areas in our digitalized life not
only to money transactions. In this project, electronic election
system is proposed and designed using the Blockchain technology
and preserving privacy.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
B. ESEN
M. ÖZKURT
İlhami Muharrem ORAK
Underwater sensor networks (UWSNs) are
composed of a certain amount of sensors and/or vehicles that
interactively glean data from underwater environment and
cooperatively perform predetermined tasks. Each of these
battery-limited sensors dissipates a considerable amount of
energy during sensing, communicating and data processing
activities, where replenishing the drained batteries is impractical
and time consuming, and interrupts the ongoing communication.
Therefore, energy conservation and routing strategies are vitally
important for accomplishing a certain task for a particular
underwater application. In this paper, we review the recent
advances in UWSNs, including their applications and joint
routing optimization and energy conservation techniques.
Finally, several appealing directions for future research on
UWSNs are presented.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Halil YETKİN
Faced with the growing demand for quality products
in markets and industries in agricultural sectors . from
consumers, sellers, and producers. The research aims to
respond to this, by using effective and efficient
technologies, namely image processing and computer
vision, to automate the process of inspection and
evaluation of the quality of agricultural products.
Conducted for many years by human experts. The use of
these technologies concerns both the detection of fruit
diseases and their classification. To follow this concept,
we chose to focus our work on fruits classification. whose
purpose is to separate infected fruits from those that are
not affected. However, based on the concepts of
computer vision, the proposed technique is centered on
three steps. The first step concerns preprocessing and
segmentation, in which, we resize and improve the
quality of the images. The second step involves, deep pretrained
models (Alex-Net), these are used for the
extraction of the features in the different fruits (banana,
apples, oranges). And finally, we performed the
classification, by using multi-class SVM. The studies
were conducted on the public dataset, the Kaggle dataset,
to obtain a 99.50% classification accuracy and on a new
dataset for a accuracy of 85.7%. The results clearly show
that the proposed method works well in terms of
improvement in classification accuracy and precision.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Rhudie Grace Zang Edzang
Mehmet Göktürk
In this study, it is aimed to estimate the fatigue life of
magnesium alloy by an artificial bee colony algorithm. Since notch
factor, stress rate and stress amplitude factors influence the
fatigue life, mathematical function models have been utilized for
the solution of the problem and the parameters of the function
optimized with artificial bee colony algorithm. The predicted
results were compared with the experimental results. These results
show that heuristic algorithms can be successfully applied in
fatigue life estimation.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
S. KARAGÖZ
C.B. KALAYCI
Ö. KARAKAŞ
Automated recognition and classification of bacteria
species from microscopic images have significant importance in
clinical microbiology. Bacteria classification is usually carried out
manually by biologists using different shapes and morphologic
characteristics of bacteria species. The manual taxonomy of
bacteria types from microscopy images is time-consuming and a
challenging task for even experienced biologists. In this study, an
automated deep learning based classification approach has been
proposed to classify bacterial images into different categories. The
ResNet-50 pre-trained CNN architecture has been used to classify
digital bacteria images into 33 categories. The transfer learning
technique was employed to accelerate the training process of the
network and improve the classification performance of the
network. The proposed method achieved an average classification
accuracy of 99.2%. The experimental results demonstrate that the
proposed technique surpasses state-of-the-art methods in the
literature and can be used for any type of bacteria classification
tasks.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Muhammed Talo
Property value is a reflection of locational, physical,
legal and economic factors. Spatial factors are the most important
factors among evaluation criteria. Geographic Information
System (GIS) provide capable tools that can be used to record
spatial information about value properties. The purpose of this
study is to developing a property valuation GIS tool, which
capable to estimate residential properties values. To achieve this
objective, tabular data was developed that geographically
represent of property information factors. Then, multi criteria
decision analysis MCDA used to evaluate the property value. The
tool capable to generate property values as percentage in the
tabular data. In this study, Safranbolu-Turkey region has been
studied. The property value influence factors are distance to main
roads, distance to markets, distance to child parks, distance to
schools, age of building, floor of building and distance to city
center. The tool capable to help Safranbolu municipality to
generate property evaluation for priced fair pricing, renting,
buying or taxation and based on the data updating.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
S.K.M. ABUJAYYAB
I.R. KARAS
C. AKICI
G. OZKAHRAMAN
Online marketing platforms have turned into large
volumes of information and opinion for customers with the
transition to Web 2.0. Customers refer to these resources in order
to obtain information before they purchase a product and to reach
the potential views of others about possible experiences. Businesses
also need customer feedback to improve the services they provide
and to explore which reviews are more valuable product
specifications. In this study, Sentiment Analysis (SA) was
performed with 2-pole (positive-negative) classification about
hotel businesses on an opinion dataset created by users. Deep
Learning based Recurrent Neural Network (RNN) architecture
was used in these analyzes. With the results of the RNN
architecture, the results of the classification based on score
conditional and editorial interpretation were compared and it was
observed that the performance of classification with RNN was
successful.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Kürşat Mustafa KARAOĞLAN
Volkan Temizkan
Oğuz Findik
Although the increasing data density in recent years
positively affects our learning and development speed, it also
brings complexity and difficulties in decision-making processes.
The time allocated to interpret and understand all the data turns
into a process that users do not want. Especially in areas such as
the media sector, many news, video and audio content produced
cannot be used because of their length. In financial markets, a lot
of content is produced on the same subject throughout the day
due to foreign policy and politics. Markets are affected by a wide
range of news such as corporate earnings reports, mergers and
acquisitions, regulatory changes and geopolitical events. It
becomes a very difficult process for investors to follow these
news. At this point, automatic text and voice summarization
stands out as a powerful tool for processing complex information
quickly and effectively.
This paper deals with a specially created dataset for
summarizing Turkish stock market news and the automatic
summarization process with language models adapted to this
dataset. The Turkish language poses special challenges to natural
language processing models due to its unique agglutinative
structure and limited data resources. Compared to classical
natural language processing approaches, open source language
models that have emerged in recent years have achieved
significant success in different languages by making inferences
from big data. In this context, mt5-base, mbart-50, Gemini and
GPT 3.5 were used in our study. As a dataset, 240 news texts
were obtained from Dunya.com. As the second dataset, 7000
Turkish economy news texts from the Hugging-Face platform
were used. The two datasets were used for fine tuning approach
and comparison of the models. The datasets were divided into
70% training, 10% validation and 20% testing. The models were
run with a learning rate of 2e-5 and a number of cycles ranging
from 20 to 100. Rouge, Bleu and BertScore metrics were used in
the evaluation phase. The summarization models in the study
were converted into APIs. The models published as open source
on the Github platform can be used in various interfaces using
API addresses.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Güncel SARIMAN
Nebi Berke İÇÖZ
Cutting and packing problems are critical in industrial applications where efficient space utilization directly impacts cost
reduction and resource optimization. These problems arise in manufacturing, logistics, and material usage planning, where the goal is to
arrange objects of varying dimensions within a finite space while minimizing unused areas and reducing waste. Traditional solutions, including
robust algorithms, often struggle with high computational complexity when scaling to larger problem instances.
This study introduces a Genetic Algorithm (GA)-based approach to address the cutting and packing problem by leveraging evolutionary
optimization techniques. The proposed method represents object placement sequences and orientations as chromosomes, applying selection,
crossover, and mutation operators to iteratively refine solutions. A specialized fitness function is designed to maximize material utilization
while ensuring feasible arrangements.
The experimental evaluation involved multiple test cases with varying object sizes and space constraints. Results indicate that the GA-based
approach achieves a 30-50% reduction in material waste compared to random placement strategies. Furthermore, a comparative analysis
against traditional greedy methods demonstrates that GA provides superior adaptability and efficiency, particularly in non-trivial configurations
where local optimizations fail to generalize effectively.
The findings of this study highlight the potential of genetic algorithms in solving complex cutting and packing problems, offering a robust
balance between computational feasibility and solution quality.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Bahaeddin Turkoglu
In modern database management systems,
optimizing query performance is a critical requirement,
especially for large scale non-spatial data. Traditional indexing
techniques use data structures such as B-Trees to optimize
queries on non-spatial data. However, since B-Trees can organize
data only on a single column, they cannot efficiently process
complex queries involving multiple attributes. To handle such
queries, database designers use composite indexes on attributes
(columns) that are frequently queried together. However,
composite indexes also have certain limitations and inefficiencies.
In composite indexes, each column is sorted based on the column
before it; therefore, if the previous column is not included in the
query, the index becomes inactive. Consequently, to utilize a
composite index, unnecessary columns must also be included in
the query, making it inefficient. In this study, we propose a novel
approach using PostgreSQL's cube extension to transform
multiple non-spatial attributes into multidimensional data. Each
non-spatial attribute represents a dimension in the space. This
transformation enables the use of spatial indexing methods such
as R-Tree, significantly improving query performance. At the
same time, it eliminates the limitations of composite indexing.
Particularly in large scale databases, this approach provides
substantial performance improvements in filtering and range
queries, offering significant advantages over traditional indexing
techniques. By indexing and querying non-spatial data as
multidimensional objects, this method achieves a query
performance that increases linearly compared to traditional
methods as the query range grows in range queries. This study
provides a practical and effective solution for databases handling
complex multi-attribute queries, bridging the gap between spatial
and non-spatial indexing techniques in terms of query
performance and flexibility
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Enes Özdeniz
Hazim İşcan
Claim moderation processes in industries like airline
compensation, insurance and regulatory compliance are
becoming increasingly complex. Manual moderation methods are
time consuming, error prone and can’t handle the variety of file
types clients submit – PDFs, images, audio files etc. To address
this challenge this paper proposes an AI based moderation
system that can automatically process and classify supporting
documents in any format and validate them against the claims
being made. The motivation for this work is the need for faster,
more reliable and scalable moderation systems that can extract
relevant data from diverse files and ensure regulatory
compliance. The main gap this paper addresses is the inefficiency
and inaccuracy of current moderation processes that can’t scale
with large volumes of claims and diverse document formats.
Existing solutions either rely on rigid rule based approaches that
lack flexibility or basic machine learning models that don’t
generalize well across different file types. Identifying this gap the
proposed AI moderation system integrates advanced machine
learning techniques for file classification, metadata extraction
and inappropriate content detection to provide a more robust
solution than previous approaches. The novelty of this work is
the ability to handle multiple file types – text documents, images,
multimedia files etc. with focus on extracting key data required
for claim validation. Unlike previous studies that focus on a
narrow range of document types or use simple classification
methods this system uses deep learning models to classify files,
detect inappropriate content and validate metadata and provides
real time feedback to users. The contributions of this paper are:
(1) a comprehensive multi-format AI moderation system for
document processing in regulatory claims (2) novel methods for
automated metadata extraction and inappropriate content
detection (3) fills the gaps by addressing the limitations of
existing solutions in terms of scalability, flexibility and accuracy.
The ability to process complex claims with diverse file formats
differentiates this system from current models and provides
significant improvement in moderation speed, accuracy and
overall effectiveness
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Elzana Dupljak
Afan Hasan
Bekim Fetaji
This paper presents a retrieval-augmented
generation (RAG) system for translating natural language
questions into SQL queries, enabling non-experts to interact
intuitively with relational databases. By addressing limitations
in conventional query interfaces—such as schema complexity
and ambiguous user intent—the proposed approach aims to
democratize data access and enhance usability.
The system adopts a two-stage RAG framework: (1) a
retrieval phase using similarity search and pre-trained
language models (e.g., LLaMA, DeepSeek) to identify relevant
database schemas and tables, achieving 97.20% accuracy in
schema identification on the Spider benchmark; and (2) a
generation phase that employs instruction-tuned models (e.g.,
Flan-T5) to synthesize SQL queries from natural language
inputs. Preliminary results highlight the effectiveness of the
retrieval phase in resolving schema ambiguity and mitigating
error propagation, outperforming baseline methods in
complex join scenarios. Evaluation of full pipeline execution
accuracy is ongoing, with initial qualitative analysis indicating
improved usability for non-expert users.
This work advances NLP-driven database interaction by
integrating retrieval-augmented models with text-to-SQL
tasks. Its open-source implementation lowers the technical
barrier for real-world adoption, underscoring the potential of
RAG architectures to improve accessibility, precision, and
efficiency in data-centric applications.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Levent ÖZDEMİR
Semih YUMUŞAK
Agriculture being the foundation for the
existence and progress of the developing countries contributes to
strengthen the health of the public. It is highly necessary and
essential to enhance agricultural productivity towards
sustainable and eco-friendly practices. A traditional mechanism
will not enable to check the multiple factors required for
determining the holistic approach towards complete development
of sustainable agriculture. Examining the performances of key
factors of agriculture is possible using machine learning
techniques which are potentially capable for finding hidden
patterns and perform predictive analytics.
The key factors which build sustainable agricultural
practices are soil health, crop health, water stress management,
pesticide usage and yield prediction.
The soil with consistent ability to produce healthy crops
is the main support for agriculture. Health of the crop is defined
by health of the soil. A common important factor for the health of
soil and crop both is water stress management in crops and soil
which is responsible for crops to absorb nutrition from the soil
and for soil to retain its alkalinity and nutrition profile.
This article gives review about various machine
learning techniques applied on the mentioned key factors of
agriculture, effectiveness of these techniques on agriculture,
scope for the betterment of the results to infer precise conclusions
and finally concludes that Machine learning can lead towards
complete development of the sustainable agriculture.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Mr Sachin Desai
Swetha Goudar
Pranati.R.Karajagi
Manjunath Managuli
Among the most complicated and limiting
disorders affecting the human nervous system are
neurological disorders, that involve multiple sclerosis,
Parkinson's disease, Alzheimer's disease, and Huntington's
disease. Therapeutic development is particularly difficult
because of their complex nature, increasing disease, and
variety of clinical presentation. Traditional methods of
drug discovery are frequently excessively costly, timeconsuming,
and likely to failure, particularly in late-stage
clinical trials. Artificial Intelligence, particularly
computer vision, has emerged as a powerful solution for
tackling these challenges and advancing drug discovery by
facilitating the large-scale autonomous analysis of
biological images. Computer vision facilitates the accurate
and methodical examination of cellular structures, tissue
organization, and disease development. This article
presents a comprehensive analysis of the role of computer
vision in driving progress within research focused on
treatments for neurological disorders. It highlights key
techniques, including multimodal fusion approaches that
integrate imaging with genomic and clinical data,
supervised learning methods for tasks like classification
and segmentation, as well as unsupervised and selfsupervised
approaches for identifying patterns and
insights.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Pranati.R.Karajagi
Swetha Goudar
Mr Sachin Desai
Manjunath Managuli
Accurate offline localization is a critical challenge in
IoV and Wireless Sensor Networks (WSNs), where GNSS-denied
environments, sensor noise, and computational constraints hinder
real-time positioning. This paper explores the integration of
Belief Propagation (BP) with Swarm Intelligence (SI) to enhance
localization accuracy and scalability. BP employs probabilistic
message passing to iteratively refine node positions, while SI techniques leverage adaptive optimization for faster convergence. A
mathematical model incorporating Gaussian probability updates
is implemented to manage uncertainty. Visualization experiments
illustrate how mobility, communication range, and obstacles
impact localization performance. Comparative analyses show that
the proposed BP and SI hybrid method achieves average of 98%
localization accuracy with 0.7589m RMSE, in different scenarios,
outperforming standalone SI methods. This study contributes to
next-generation IoV localization strategies, improving real-time
adaptive positioning in intelligent transportation networks.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ossama Bin Raza
Michael Bidollahkhani
Pınar Haskul
Parisa Memarmoshref
Traditional databases support data in one dimension
only and, consequently, can’t keep a complete history of changes
made to the state of the data over time. In contrast, the bitemporal
database automatically handles both dimensions such as
transaction time and valid time simultaneously. This advanced
approach offers greater integrity and traceability of data. This is
important in decision-making, for instance, in areas such as fraud
detection, compliance with law, digital forensics, and regulation
compliance. This research assesses articles obtainable from IEEE,
Scopus, ProQuest, PubMed, and Web of Science up to 2025 with a
systematic literature review methodology. Through the PRISMA
framework, 74 primary studies were acquired from 102 relevant
articles, providing a comprehensive and transparent evidential
basis. Next, we performed a scientometric analysis using
bibliometric tools like VOSviewer to examine citation trends,
keywords, leading authors, and prominent journals. This research
analyzes the temporal aspect of existing models of bitemporal
systems. Also, it summarizes the strengths and weaknesses of
bitemporal databases from existing studies. It examines each use
case that adopted bitemporality in its research and identifies the
research gaps. Finally, it reveals the new research directions for
upcoming technologies like Artificial Intelligence, cloud
architecture, blockchain, and improvement of bitemporal
databases to detect their probable use in various domains like
supply chain, healthcare, and financial. The originality of this
research contributes to the existing knowledge by offering a
scientometric analysis alongside a systematic literature review
while also identifying critical research gaps that need to be
addressed in future studies.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Gokul Neelamegam
Jagdev Bhogal
Parnia Samimi
Omer Ozturkoglu
The Diabetic Retinopathy (DR) continues to be a leading cause of
blindness worldwide, fueled by diabetic complications that lead to retinal damage. Early diagnosis via retinal fundus imaging is critical to avoid irreversible
blindness. This process of manual grading of the images is time-consuming and
vulnerable to human error. With advancements in machine learning (ML) and
deep learning (DL), autonomous systems have proved capable of outperforming
conventional diagnostic methods. This article reports a systematic review of latest developments in DR detection and classification using fundus images, comparing the performance of different ML and DL methods. It discusses fundamental aspects of the diagnostic pipeline, such as image pre-processing, data
augmentation, feature extraction, and classification algorithms. The review also
discusses the application of Federated Learning (FL) as a privacy-maintaining
method for decentralized healthcare data. Benchmark datasets, evaluation metrics, and main challenges in clinical integration are addressed. The paper posits
that the integration of DL architectures with secure learning algorithms such as
FL can result in more efficient and scalable DR diagnostic systems, leading to
improved clinical decision support.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Jagruth K Raj
Hemanth B M
Jayanth R Rao
Harini D K
Koushik A R
Most of the banking systems all over the world
operate with conventional system. This system may depend on
human and local operations. In this study we introduce a design
and implementation of a virtual banking system. This system is
integrated with NFC card payment technology and eliminating
the need for physical branches.
Virtual banking is broadly defined as the provision of banking
services via means other than traditional physical branches.
Currently, virtual banking exists in the forms of ATM, phone
banking and Internet banking.
The system simplifies cashless transactions for individuals and
merchants by eliminating the need for traditional POS machines.
It combines ASP.NET for bank management, .NET Core for
NFC card token management, SHA-256 for token generation,
Arduino with RFID modules for card interaction, and an
Android application as a POS system.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
El Fadel Boukezane
İlhami Muharrem ORAK
Learning programming poses significant challenges,
especially for beginners. Syntactic complexities and the abundance
of abstract concepts can lead to a loss of motivation in the learning
process. In this study, a web-based, drag-and-drop programming
tool has been developed to minimize these difficulties and make
learning programming easier. The system allows users to create
algorithms without the need to write any code and automatically
translate these algorithms into common programming languages
such as PHP, Python and JavaScript. The system is designed so
that users can access it only through a web browser, without the
need to install any software or compiler. Users have the
opportunity to view the equivalents of an algorithm in different
programming languages and to examine the structural features of
these languages in a comparative manner. In this way, both
conceptual and practical programming skills of users are
supported and the learning process is made more interactive and
meaningful. Modern and reliable technologies have been
preferred in the technical infrastructure of the application. The
user interface has been developed using React and TypeScript to
provide an interactive user experience. In the backend, a fast,
secure and consistent data communication is realized by using the
Inertia.js library together with the Laravel framework. The
infrastructure that makes it possible to convert the algorithms
created by users into different programming languages is built
with Docker technology. Thanks to Docker, each user is provided
with an isolated working environment. In this way, it is aimed to
ensure both security and system performance.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ahmet Karaaslanoğlu
Onur Çakırgöz
This article explores the vital role that activation
functions (AFs) play in deep learning and neural networks. AFs
are essential elements that help hidden layers and the output
layer communicate with one another. They are also crucial for
controlling calculations and computations in these designs. One
unique aspect of this survey is its thorough cataloguing of most
AFs used in deep learning applications, along with an
explanation of current trends in their real-world use. By
methodically presenting the dynamic interaction between AF
applications in real-world contexts and the most recent results
from the deep learning literature, this endeavour stands out as
a ground-breaking addition, setting it apart from traditional
AF-centric research. This work is notable for its timing and for
providing a novel investigation that surpasses previous AFfocused research. This study is a priceless tool for practitioners
and academics, helping them make well-informed decisions by
offering an unmatched synthesis of AF trends in real-world
applications coupled with research findings. Beyond improving
our knowledge of whether AI is appropriate for different
applications, this paper creates, for the first time in the broad
field of deep learning, a comprehensive compilation that
clarifies the intimate relationship between AI applications and
the state-of-the-art research in the field.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Jay Mehta
Srushti.v.Vaidya
Feeling sleepy while driving is one of the leading
reasons behind road accidents around the world. That’s why
detecting drowsiness early is so important for keeping people safe
on the road. This paper takes a closer look at different ways to spot
drowsiness in drivers, including methods based on computer
vision, body signals, machine learning, and driving simulations.
Among these, computer vision techniques focus on tracking facial
features like blinking, yawning, and head movements to spot signs
of tiredness. Physiological signal-based techniques include
Electrooculogram, and heart rate variability, which are very
accurate but intrusive and complex for real-world applications.
Approaches from machine learning and deep learning,
Convolutional Neural Network, demonstrate strong promise
through real-time prediction that combines visual and behavioral
indicators. Systems for detection are improved with the
incorporation of simulation-based systems with signals derived
from both vehicle-based and driver-monitoring ones within
controlled environments
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Nihit Jain
Jivika Kashyap
Nikhil Sharma
Nand Kishor Yadav
The integration of electric vehicle infrastructure into Smart Grids
is a critical step toward sustainable energy systems, and artificial
intelligence plays a pivotal role in this transformation. AI enhances
the efficiency of charging networks, optimizes energy management,
and improves the user experience for electric vehicle owners.
Advanced AI tools facilitate demand forecasting, dynamic energy
distribution, and the detection of fraudulent activities in the energy
sector. Additionally, Vehicle-to-Grid technology, powered by AI,
enables bidirectional energy flow, reducing peak loads and
supporting grid stability. This article explores the technological
framework and AI-driven solutions for the seamless integration of
electric vehicles into modern energy systems.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Stanislav Horbachenko
Tetiana Kuklinova
Nikita Razinkin
Communication systems play a crucial role in
various industries and human life. Since the emergence of
legacy communication systems, human lives have become
more interconnected. At first, wired communication
systems with short-distance connections were invented
then evolved into wireless systems, which we now heavily
depend on in our daily lives. Zero Generation (0G) (precellular
communication systems) was the beginning of
Wireless communication, followed by the First Generation
(1G), which introduced cellular networks using analog
transmission. The Second Generation (2G) introduced
Global System for Mobile Communication (GSM) systems
with digital transmission technology which is regarded as
more effective and robust than Analog technology. Later
generations, such as Third Generation (3G) with Universal
Mobile Telecommunications System (UMTS) and Fourth
Generation (4G) with Long Term Evolution (LTE) evolved
to meet new requirements. With each generation,
communication capabilities have significantly advanced to
break limitations of last one and meet requirements in
current one. Fifth Generation (5G) has been in deployment
since 2020 with many advanced technologies being
leveraged due to the diverse scenarios of 5G, and research
on Sixth Generation (6G) is currently in progress. In this
work, we provide a thorough analysis of mobile
communication systems to help researchers understand
each generation specifically. Since 6G is still in the
research phase and has not yet been deployed, we highlight
key challenges and issues to assist researchers in
identifying solutions and exploring potential 6G
advancements.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
ABDULAZIZ ALDAIAH
IMAN ELAWADY
Today, complex network analysis is widely used in
examining interrelated systems. Complex network analysis is
used in various fields such as brain research, health,
cybersecurity, education, e-commerce, urban and transportation
planning, and social networks. The subfield of complex network
analysis that examines social relationships is called social
network analysis. Social network analysis examines network
parameters using nodes and connections between nodes. Actormovie collaboration networks, a type of social network analysis,
are a type of network that examines collaboration between actors
playing in the same movie.
This study used data compiled from the website Box Office,
which records movie data. Within the scope of the study, a
complex actor-movie collaboration network consisting of Turkish
movies made between 2012 and 2022 was created. The number of
movies examined was 1803. The created dataset has 5182 nodes
(actors) and 55216 links (collaborations). Using the obtained
dataset, general analyses were conducted, such as the most
collaborating actors, the distribution of movie numbers and
genres by year, and the most successful actors in the industry
according to movie revenues. The actor- movie collaboration
network was examined using complex network analysis
parameters. Regarding network parameters, metrics belonging to
the network structure were calculated, such as node degree
distribution, average shortest path in the network, degree
centrality, average clustering coefficient, and network density.
The network metrics calculated the average shortest path as 3.3,
network diameter as 8, average degree as 21.3, average clustering
coefficient as 0.774, and network density as 0.004. In addition, the
actor movie network was visualized using Gephi software to
perform clustering and community analyses. The node degree
distribution graph of the actors was plotted on the log-log axis.
According to the metric analysis results, it was observed that the
actor- movie collaboration network consisting of Turkish movie
was characterized by real network parameters such as high
clustering, hub node, and average distance.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Elanur GÜL
Sait DEMİR
Traffic accidents are a critical problem that causes significant economic losses on a global scale and threatens human life.
Increasing vehicle density is one of the main factors that directly affects the frequency and severity of accidents. Therefore, it is important
to examine the effect of the number of vehicles on traffic accidents in detail and to develop strategies to increase traffic safety. In this
study, the dynamics of accident occurrence depending on the number of vehicles were analyzed using data from past accidents and the
cost and complexity of accidents were modeled. Statistical analyses and machine learning algorithms were used in the modeling process.
In line with the findings obtained, a risk analysis model that estimates the probability of traffic accidents was developed and proactive
measures were presented for traffic management systems. In addition, drivers and relevant public authorities were informed with risk
maps created depending on traffic density, and especially the areas where accidents occur most were determined and possible measures
were optimized. Thus, a safer and more sustainable transportation infrastructure was contributed to for urban and intercity roads.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Büşra Partigöç
Ahmet Albayrak
Understanding biomedical signals is inherently
complex, and manually extracting features from such signals is
an exhaustive and time-consuming process. In the field of
biomedical signal processing, there is a critical need for
innovative approaches to accurately interpret medical signals
while minimizing time and effort. This need is particularly
pronounced in the diagnosis of cardiac disorders, where
electrocardiogram (ECG) signals play a crucial role.
This study proposes an automated method for feature
extraction from ECG signals obtained from two leads. A novel
algorithm was developed based on the Highly Comparative Time-
Series Analysis (HCTSA) library, which enabled the extraction of
7,730 features from each ECG lead. Subsequently, multiple
machine learning models were trained to classify ECG signals as
either normal or indicative of specific cardiac conditions, namely
Left Bundle Branch Block (LBBB), Right Bundle Branch Block
(RBBB), and Premature Ventricular Contractions (PVC).
Among the tested models, Logistic Regression demonstrated
the best classification performance, achieving an accuracy of
85%, precision of 86%, recall of 85%, and an F1-score of 85%.
These findings highlight the potential of such automated methods
in real-world clinical applications, particularly in hospital
settings, where they can significantly reduce the workload of
healthcare professionals while enhancing diagnostic efficiency.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Taha ELHARİRİ
Ahmet Reşit KAVSAOĞLU
Cyberattacks continue to become more frequent
and sophisticated, posing serious threats to network security.
The paper proposes a multi-stage machine learning approach
for improving cyberattack detection and classification
utilizing the CICIDS 2017 dataset, a comprehensive intrusion
detection reference. The suggested technique is divided into
three stages: anomaly detection using the One-Class Support
Vector Machine (OC-SVM), attack categorization with
CatBoost and LightGBM, and false-positive reduction to
improve Zero-Day attack detection. The use of Principal
Component Analysis (PCA) for dimensionality reduction and
balanced data sampling guarantees that the model is robust
and efficient. Results demonstrate that the CatBoost
algorithm surpasses LightGBM in key measures, with an F1-
weighted score of 0.97 and a Zero-Day recall rate of 0.91. A
solution for real-world cybersecurity applications that
advances the state of the art in machine learning-based
intrusion detection systems.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Bulut Karadağ
Gökhan Kesin
Sümeyye Alpay
İsmet Köroğlu
İsmail Fırat Çelik
Gökhan Görmüş
Aslıhan Çandır
Fatih Alagöz
Breast cancer is the most common cancer type among
women worldwide, with approximately 2.3 million new cases
diagnosed annually. Early detection significantly improves
treatment success and survival rates. Mammography remains the
standard imaging method for early-stage breast cancer detection.
However, conventional evaluation suffers from interpretation
variations among radiologists and difficulties in distinguishing
between malignant and benign lesions, resulting in diagnostic
accuracy rates remaining relatively low. The aim of this study is to
enhance breast cancer diagnostic accuracy in mammography
images using deep learning-based meta-ensemble models. The
research implements a novel meta-ensemble approach integrating
five different feature extraction models (VGG16, EfficientNet,
ResNet50, DenseNet, and MobileNet) with four distinct model
architectures (Multilayer Perceptron (MLP), 1-Dimensional
Convolutional Neural Network (1D CNN), Transformer, and
CNN-Transformer hybrid). In the proposed methodology, hybrid
sample selection methods that identify critical points in data
distribution were integrated with ensemble feature selection
techniques that automatically filter features based on different
models' predictive power. This innovative approach improves
classification performance, particularly in complex and
imbalanced datasets. Experiments conducted on the Digital
Database for Screening Mammography (DDSM) dataset
demonstrated that the meta-model approach outperforms any
individual model. The meta-ensemble model achieved 94.17%
accuracy, 94.20% precision, 94.18% recall, 94.16% F1-score, and
98.17% Area Under Curve (AUC). The results indicate that AIassisted
diagnostic systems can significantly enhance the reliability
and efficiency of the breast cancer diagnostic process. This
research directly relates to conference themes of deep learning
technique integration in medical image analysis and AI-assisted
medical diagnostic systems.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Samet AYMAZ
The research study predicts surgical operations
based on patient characteristics using different types of Learning
Vector Quantization algorithms. The primary goal is to identify
whether a patient requires surgery or not and classify the type of
surgery needed. The paper utilizes a disease dataset containing
many patient attributes, including disease-specific factors and
medical history to train and evaluate the models. Also, tested
types of LVQ algorithms including LVQ, RSLVQ, Soft LVQ
(SLVQ), Generalized LVQ (GLVQ), Fuzzy LVQ, and LVQ3.
Results show that GLVQ achieved the highest performance with
an accuracy of 98.42%, precision of 0.99, recall of 0.97, and F1-
score of 0.98. The discovery shows that advanced GLVQ can be
very useful in healthcare for making predictions. This model can
help doctors make better decisions by accurately predicting
whether a patient needs surgery.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ali Asghar
Oğuz Findik
Emrah Özkaynak
This research paper presents an automated
monitoring system developed using several technologies combining
cloud computing and the Internet of Things (IoT). The system
integrates motion sensing, image capture, and cloud-based facial
recognition (AWS Rekognition) powered by artificial intelligence
(AI) algorithms, designed to enhance security measures by tracking
and identifying individuals within designated surveillance areas.
Upon motion detection by a sensor connected to the Arduino
device, an image of the moving object (person) is captured. The
image is sent to Amazon S3, which triggers an AWS Lambda
function that uses Amazon Rekognition to recognize faces.
Combining Arduino hardware with serverless computing and
scalable cloud services provides a cost-effective solution to realtime
surveillance and identification.
Preliminary tests have shown their real ability in identifying
faces using motion alerting and prove their utility value for various
security and monitoring applications.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Emilija Velinova
Valentin Cvetanoski
Kliment Chakarovski
Daniela Mechkaroska
Ervin Domazet
A growing problem that affects the financial sector
throughout time is financial fraud. Numerous approaches have been
devised to tackle this problem, but data collection has shown to be an
efficient means of funding the automated analysis of vast quantities of
complex data. Data collection has also been essential for identifying
credit card fraud in online purchases. Credit card fraud detection is a
data mining problem. It is challenging for two primary reasons: first,
the characteristics of normal and fraudulent activity are constantly
shifting, and second, the credit card fraud data sets are heavily biassed.
This study examines and evaluates the effectiveness of Decision Tree,
Random Forest, XGBoost, and Logistic Regression using highly
skewed credit card fraud data. The project intends to increase financial
security, decrease false positives and negatives, and increase the
accuracy of fraud detection by combining these strategies. The
suggested method strikes a balance between interpretability and
prediction performance. The approach offers a scalable and effective
fraud detection framework that can be integrated into real-world
banking and payment systems, assisting financial institutions in
mitigating fraud risks while maintaining a seamless user experience.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
K. Maharajan
D. Durga Prasad Reddy
G. Kamalakar Reddy
B. Varun Teja
The security of critical infrastructures has always
been at the epicenter of in-depth assessments.
Today, with Information and Communication Technologies
(ICT), particularly the Internet, playing an increasingly
important role in the operation of critical infrastructures, these
environments are increasingly vulnerable, making them
attractive targets for cybercriminals.
In recent years, more and more infrastructures in developing
countries, particularly in Africa, have fallen victim to largescale
cyber-attacks, and the trend is growing exponentially.
With the complexity, volume and frequency of cyber-attacks
increasing, and their devastating consequences, new, more
advanced and more effective protection technologies seem
necessary. As a result, for the cyber defense of vital sectors and
services, many current approaches are focused on the use of
Artificial Intelligence (AI) technologies, in particular Machine
Learning (ML) and Deep Learning (DL).
This article explores the current state of critical
infrastructures security in developing countries, particularly in
Africa, with a particular focus on Senegal.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Semou NDIAYE
Idy DIOP
Demba FAYE
Doudou DIONE
The accurate and timely diagnosis of renal
pathologies, including cystic lesions, stones, and tumors, remains
a critical challenge in clinical practice. Traditional manual
analysis of computed tomography (CT) images is inherently
susceptible to inter-observer variability and is resource-intensive,
necessitating the development of robust automated diagnostic
methodologies. This study introduces an artificial intelligencedriven
framework, employing the state-of-the-art YOLOv11 deep
learning architecture, for the classification and segmentation of
renal abnormalities within CT dataset. Utilizing the publicly
available CT KIDNEY DATASET: Normal-Cyst-Tumor and
Stone, comprising 12,446 unique CT slices (3,709 cyst, 5,077
normal, 1,377 stone, and 2,283 tumor), a multi-stage pipeline was
developed. Initially, an expert reader performed rigorous
segmentation of kidneys, stones and cysts excluding extraneous
anatomical structures. Subsequently, to enhance model
robustness and generalization, a suite of preprocessing
techniques, including median filtering, contrast-limited adaptive
histogram equalization, and comprehensive data augmentation,
were implemented. A YOLOv11 classification model was then
trained to accurately distinguish between normal kidneys and
those affected by cystic lesions, stones, and tumors, achieving an
F1-score of 0.9993 across all four classes. Following the
classification, dedicated YOLOv11 segmentation models were
trained, utilizing the classification results for normal, stone and
cyst classes, to achieve precise delineation. The performance of
the segmentation models, measured by mean Average Precision,
yielded scores of 0.9951 for kidney, 0.9670 for stone, and 0.9522
for cyst segmentation. A comprehensive experimental study has
been conducted, and the proposed model has achieved high
performance for both classification and segmentation tasks. In
conclusion, this automated system can be used as a decision
support tool for radiologists, potentially shortening diagnostic
delays and improving overall diagnostic accuracy.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Abdullah Aldemir
Huseyin Kocaturk
Selcuk Levent Gorgec
Selcan Kaplan Berkaya
This paper presents the development of a multifunctional desktop assistant designed to enhance productivity
through task automation, text extraction, and developer-centric
utilities. The assistant includes features such as text extraction
using Optical Character Recognition (OCR) for retrieving text
from images, task reminders integrated with Google and Microsoft calendars, sticky notes, a to-do list, and a QR scanner
for decoding embedded information. A unique clipboard manager
securely tracks and stores up to 20 copied items persistently,
with encrypted storage for enhanced security. Additionally, the
assistant features a specialized Developer Mode, offering tools like
a package installer for seamless library installations, a function
finder for retrieving information on built-in functions, a system
variable path editor for efficient environment variable management, and a multiple monitor setup for optimizing multi-screen
workflows. The screen time manager further improves digital
well-being by tracking screen usage, scheduling breaks, and
activating night mode when necessary. This research discusses
the system’s architecture, implementation, and performance,
demonstrating its effectiveness in streamlining user workflows
and improving overall efficiency.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Rahul S
Santhosh P
Rajvignesh B S
Dr. R S Ponmagal
Diabetic Retinopathy (DR) is a leading cause
of visual loss and blindness in adults in their active
working age. Early detection and accurate classification
of retinal pathology are critical to enable informed clinical
decisions. This paper suggests an end-to-end deep learningbased retinal disease segmentation and disease severity
classification system to aid automatic diagnosis by an
ophthalmologist. The new system will address the two most
important problems of lesion segmentation and disease
grading. For lesion segmentation, object-level and pixellevel approaches will be employed. The microaneurysms,
hard exudates soft exudates, and hemorrhages will be
segmented accordingly as signature lesions using a pretrained encoder-decoder model based on convolution with
DeepLabV3 architecture. Segmentation will be boosted by
adding YOLOv8, a new state-of-the-art object detection
model that can do fast detection and localization of retinal
lesions. For grading of disease severity, a single-task multioutput CNN classifier will identify the severity of Diabetic
Retinopathy and Diabetic Macular Edema risk from retina
fundus images. The classification model exhibited significant training accuracy and test data generalization. Finally,
the entire pipeline is made available as a point-and-click
web application based on Flask so that users can upload
retinal images and obtain segmented lesion outputs along
with real-time disease grade predictions.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Jagruth K Raj
Hemanth B M
Jayanth R Rao
Harini D K
Koushik A R
Errors in web-based applications negatively affect
user experience and cause operational efficiency losses for
businesses. This study proposes a hybrid error management
system integrated into CI/CD (Continuous Integration and
Continuous Deployment) pipelines. The system consists of two
main components: real-time monitoring of system metrics (API
response codes, CPU, memory, disk usage, etc.) using
Prometheus and Grafana, and analysis of user logs with ELK
Stack (Elasticsearch, Logstash, Kibana). The collected data was
cleaned in the preprocessing stage and balanced using the
SMOTE-ENN method. For error classification, a rule-based
model (if-else) was compared with machine learning algorithms
(SVM, KNN). The system was containerized with Docker and
Kubernetes and deployed via Jenkins, reducing error detection
time. This study provides a framework combining rule-based and
machine learning approaches to optimize traditional error
management processes.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ahmet Albayrak
Berna Gövercin
The development and widespread use of new
technologies has led to an increase in cyber-attacks. As these
technologies become more accessible and interconnected, they
create expanded opportunities for malicious actors to exploit
vulnerabilities. Traditional methods are insufficient to detect new
cyber-attacks because these methods generally work signaturebased.
It is necessary to use new and up-to-date solutions to detect
current and complex attacks. Machine learning and related
concepts, which have become popular recently, also find a wide
application area in cyber security. These concepts are used to solve
cyber security tasks such as anomaly detection, malware analysis,
attack prediction and attack classification. In this study, a
comprehensive comparison of machine learning, deep learning,
and transformer models was conducted to evaluate their
performance in the classification of endpoint attack logs. The data
set used in the study was obtained by collecting the sysmon logs
generated during a series of endpoint attack scenarios. These logs
were classified according to the tactics in the Mitre Attack
Framework to be used in model training. The findings
demonstrated that among the models tested, an NLP model
RoBERTa achieved the best performance, with an accuracy of
88,79% and a notable ability to recognizing patterns in endpoint
attacks logs. These results highlight the model's effectiveness in
detecting and classifying attack patterns, offering valuable
insights for enhancing endpoint security measures.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Özge Seren Sürgit
Ümit Atila
The study explores the relationship between
Enhancing Record Management through ICT Adoption in
Selected Secondary Schools in Mogadishu, Somalia. A
descriptive-correlational method was employed, using a
sample of 133 respondents from three schools. Results
indicated a high level of ICT adoption (Mean = 3.03) and
record management practices (Mean = 2.99). A substantial
positive correlation (r = 0.510, p = 0.000) and regression
analysis (R² = 0.260) validate the essential function of ICT in
enhancing record keeping. Findings support ICT investment,
training, and policy implementation to enhance educational
administration.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Jamila Hassan Mohamed
In today where digitalization is rapidly increasing, it
has become a critical necessity for e-commerce platforms to adapt
to user expectations and market dynamics. Especially while multivendor online platforms offer significant advantages such as
product diversity, price competition and accessibility for users;
they also create the opportunity for sellers to reach new markets,
achieve operational efficiency and manage their processes in an
integrated manner in a digital environment. But the success of
such platforms is not limited to offering a wide range of products;
the quality of the user experience, the technical robustness of the
system and the effectiveness of process management are at least as
important factors
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Rıza YALÇIN
Nedim BÜKE
Integrating deep learning-based object detection
models with unmanned aerial vehicles (UAVs) enables faster,
more efficient, and cost-effective livestock monitoring. However,
deep learning models require large and diverse datasets to achieve
high accuracy. Traditional data augmentation techniques may be
inadequate for complex tasks like object detection. Therefore, this
study evaluates the performance of deep learning models on goat
and cattle images using Cutout, CutMix, MixUp, and Mosaic
data augmentation techniques. Ablation experiments revealed
that Mosaic augmentation contributed the most to model success.
These findings highlight the critical role of selecting the right data
augmentation strategy in enhancing the stability and scalability
of UAV-based livestock analysis.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Çetin Yalçın
Yusuf Yargı BAYDILLI
As digital images grow exponentially, duplicate detection and removal are necessary for effective storage management and data organization. The conventional approaches of pixel-by-pixel comparison or metadata analysis are computationally intensive and fail to identify transformed duplicates such as resized or colormanipulated images. To overcome these shortcomings, this study presents a strong and scalable solution employing perceptual hashing methods such as Difference Hash, Average Hash, Perceptual Hash, and Cryptographic hashing.These algorithms create short hash values that retain crucial visual characteristics, making it possible to detect similar images even when they have been transformed. The suggested system focuses on delivering a robust and efficient solution for the detection of duplicate images, alleviating the inefficiencies of the current methods and proposing a multiparameter decision-making strategy for duplicate detection through hashing methods.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
G Subrahmanya Swamy
B PruthviRaj Goud
K Sudheer Reddy
K Praveen Kumar
In recent years, the transparency and explainability of artificial intelligence systems' decision-making processes have gained a great deal of
importance, both technically and ethically. Explainable artificial intelligence (XAI) plays an important role in the development of more trustworthy systems,
especially in areas such as healthcare, law, and economics. This paper discusses model-independent explanation methods such as LIME and SHAP and evaluates
their applicability to classical machine learning models. Moreover, the recent proliferation of large language models (LLMs) such as GPT, PaLM, LLaMA, etc.,
has led to a different approach in XAI, both in terms of their powerful text generation capabilities and the need for the explainability of their output. The methods
developed to analyze the decision logic of LLMs have been evaluated through approaches such as chain of thought, attention visualization, and in-context
explanation. However, due to the generative nature of LLMs, their accuracy, stability, and capacity to provide confidence to the user are still open to debate. This
paper compares classical XAI methods and annotation approaches applied to LLMs and provides examples to illustrate how explainability can be achieved in
LLM-based decision support systems. The findings show that technical and end users can better understand the reasons for LLM outputs
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Batyr Orazbayev
Yerlan Izbassarov
Lyailya K urmangaziyeva
This paper introduces a recommendation system based on deep learning that is intended to recommend
accessories after users upload images of t-shirts, pants or even sarees. Users are able to upload any of these items and the
system will recommend accessories specific to each item. Fashion recommendations have always been a hot topic, this paper
solves one of the deep problems of fashion recommendations. It employs a multiclass classification method in the first stage
that involves a general classifier which first evaluates the clothing type and then evaluates the subcategory gen, colour and
design. For example, a T-shirt would be broken down further into gender-specific sleeves, number of sleeves, colours, and
different designs. These attributes are then indexed into a recommendation structure to retrieve suitable accessories such pants,
shoes, watches, sunglasses, bangles, and rings. The user interface is created in React to optimize the user experience while
Flask is used as a backend for REST APIs. This project utilizes a modular system as well as advanced Deep Learning
architectures and guarantees improvements over existing solutions for fashion recommendations through machine learning by
fostering greater personalization and precision of recommendations. A prospective enhancement may include monitoring user
preferences and providing feedback to maximize the system’s value for e- commerce databases.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Tulsi Choudhari
Vivek Madhavi
Nikita Ghadge
Mansi Deore
Artificial Intelligence (AI) is increasingly integrated
into everyday life, raising concerns and expectations about its
future. Traditional surveys and interviews have been conducted
to understand societal feelings about AI, but they have been
limited in capturing spontaneous feelings. This study utilizes
social media as a data source to analyze emotions regarding AI's
trajectory to obtain spontaneous and freely shared contemporary
content by various segments of society. A fine-tuned BERT
model, trained on the GoEmotions dataset with 28 emotion
categories, was used for multiclass emotion classification.
Analysis of Reddit posts and comments across AI-related
subreddits spanning from 2012 to 2022 revealed a spectrum of
emotions, with neutrality being the most prevalent, followed by
curiosity and approval. The least common categories were relief
and pride. Moreover, among these 28 emotion categories, seven
categories (i.e., excitement, fear, approval, disapproval,
optimism, confusion, and curiosity) were chosen and examined
how their frequencies have changed over time. Spikes in fear and
confusion correlated with AI advancements, such as the 2015
autonomous weapons debate and the 2017 AlphaGo victory.
More recent discussions exhibited increased approval and
excitement, particularly during the COVID-19 pandemic when
AI applications gained prominence. The key idea of this study
was to understand societal feelings and their trends from large
amounts of text data and to build classifiers that can detect more
than Ekman’s five emotion classes to explore richer empirical
results. These insights contribute to AI policy discussions,
human-centered AI innovation, and the methodological
integration of computational techniques in social science
research.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ayse Ocal
Facial Emotion Recognition is an important area of
research in Computer Vision. Because it allows computers to
understand human emotions. Effective facial emotion detection
depends on the extraction of reliable features from facial images.
Feature extraction is a critical step in this process, as it directly
affects the accuracy of recognition. Traditional feature extraction
methods mainly rely on hand-crafted filter banks, such as Gabor
Filter, while more advanced techniques such as Deep Learning
(DL) methods utilize Convolutional Neural Networks (CNNs) to
learn complex features from large datasets. However,
computational resources and the number of parameters for filter
banks required for these methods can be substantial. They make
them both hard to construct and less suitable for real-time
applications. Therefore, there is a need for lightweight feature
extraction mechanisms that can efficiently process facial images
while maintaining high accuracy. In this paper, a novel filter
design was proposed and compared with the classical Gabor
Filter. CK+48 Dataset and LightGBM were used for the
comparison. Different features were extracted using Gray-Level
Co-occurrence Matrix. The proposed filter design demonstrated
better performance than the Gabor Filter. Thus, the proposed
filter is a more efficient solution for Facial Emotion Recognition in
Computer Vision applications
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ömer Mintemur
Intrusion detection systems (IDS) are critical to
assuring network security. These systems collect traffic data
from networks or systems and analyze it to identify potential
risks. Traditional methodologies, such as signature-based and
anomaly-based approaches, usually fail to adequately handle
the ever-changing nature of cyber threats. This work
investigates the use of machine learning approaches, notably
Random Forest and K-Nearest Neighbors (KNN), to improve
the detection capabilities of IDS. Random Forest uses many
decision trees to generate reliable classification results, whereas
KNN discovers anomalies by comparing them to established
patterns. The suggested approach demonstrated better
accuracy and precision in identifying intrusions after training
these models on recognized benchmark datasets and evaluated
their performance using key metrics. This study illustrates that
machine-learning-augmented IDS provides a comprehensive
and adaptive method to instant threat identification, solving the
limits of traditional techniques and advancing network security.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Suhana Nafais A
Deja Chandru S
Harishkumar M
Sanjai B
The core of kinship verification is to automatically
determine if two individuals are from the same family, in other
words, to verify if two or more individuals are in a kin
relationship by analyzing the given dataset. Kinship verification
becomes an important research area in the computer vision field.
Many previous datasets were collected from the internet, and
various factors affect them, such as image lighting, low internet
quality images or videos, facial expressions, and others. We
assume that the human voice can contain some features that can
be used to verify kinship. In this paper, we establish a novel
kinship dataset called Kinship Families Voices (Kin-FVs)
contains many families’ voices. Kin-FVs consists of 25 families of
94 individuals, where each individual has six voice records;
therefore, the total voice records is 564 recorded in various
languages such as Arabic, Assyrian, Kurdish, Turkmen, Turkish,
Swedish, Greek, and German. We performed data pre-processing
and analysis, then used MFCC, Delta, and Double Delta to
extract features and save them in csv file. We perform a
preliminary experiment by using a multilayer perceptron (MLP)
model, which achieves 78.5% accuracy. We reshape the.
extracted features and fed it to a 2D CNN, which achieves 87.0%
accuracy. These results prove the effectiveness of the new dataset
to be a new direction in the field of kinship verification based on
the features extracted from the human voice using machine
learning techniques
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Olivia Khalil Oraha
Yusra Faisal Mohammad
The rapid advancement of artificial intelligence in
healthcare has opened new avenues for early disease prediction
and clinical decision support. This paper presents a Multi-Disease
Prediction System (MDPS) that integrates machine learning and
deep learning models for predicting various diseases using
sequential data for better understanding of each patient’s health
conditions. Specifically, this research extends previous studies and
addresses the challenges and limitations. Many open-source
models and systems are available but all have very generic datasets
and based on machine learning Deep learning can make models
more complex but also gives more useful insights but it needs
different types of datasets and processing. Based on the data
collected for each disease, we selected the most suitable model
some are deep learning and some are machine learning depending
on what works best. Some models are left as machine learning
because they already perform well and cannot be improved much
with current data. the results of this investigation are relatively
surprising since previous studies have mainly focused on machine
learning classification for most of the part. LSTM / RNN and DNN
had a significant impact on the temporal (continuous) data.to
understand the feature relationship, we have tried to implement
GNN based model which gives insights which can be mainly used
by the hospitals for the analysing of the key feature relationship
and impact of them on patient’s Health. This hybrid, modelspecific approach offers valuable support for healthcare
professionals. The system also includes a simple health chatbot for
basic health-related conversations and suggestions that is
currently powered by ollama models but can configure any NLP
models based on availability. A user-friendly Streamlit web app is
used as the frontend to make the system easily accessible for both
users and healthcare professionals. Streamlit integrates all the
models and provides a compact website with a stacked prediction
system in one place. This can be a life-changing solution in rural
areas where diagnostic materials and tools are not easily available
and for normal users who want to check their health conditions by
themselves.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Rishiram B
Aravind A
Vinay Vunnava
Kanipriya M
Our understanding of road safety and efficiency
has completely changed as a result of the introductiomn and evolution of autonomous vehicles (AVs) into transportation systems.
AVs can organize and control the movements of the vehicles and
react dynamically to traffic problems by utilizing the Internet of
Vehicles (IoV) to make easier to identify the real-time communication between cars and infrastructure. They are vulnerable
to cyberattacks, especially Distributed Denial of Service (DDoS)
attacks, because they are connected to the networks in high
degree. These assaults have the potential to seriously collapse
the traffic,and interupt with communication, and decrease the
safety.In order to meet the high demand for AVs to have a more
flexible cybersecurity solution, this study presents the DDoS
Attack Detection System (DADS) using hybrid detection model.
A Hybrid Detection Model (HDM) serves as the foundation for
DADS. To detect the complex attack patterns, the HDM uses a
variety of classification machine learning techniques, including
Random Forest, Adaboost, Naive Bayes, K-Nearest Neighbors
(KNN), and decision trees. Together, these algorithms monitors
the network traffic and differentiate between benign and malicious behavior.This increases the system’s performance and that
is applicable in dynamic contexts by enabling it to recognize
and react in real time to zero-day vulnerabilities and new DDoS
attacks.The CIC-DDoS2019 dataset, a well-known benchmark
for DDoS attack scenarios, and simulations carried out in SUMO
(Simulation of Urban Mobility) were used to test the system. The
results showed that DADS is a potential solution as it achieves
high detection accuracy and offers a robust defense mechanism
against both known and unknown DDoS threats in vehicle networks.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Rishika S
Senthilprabha R
In this study, it is posited that with the rapid
advancement of digitalization, the importance of social
engineering attacks in cybersecurity has increased, and they pose
great threats to organizations and individuals. Social engineering
is an attack that manipulates human psychology to circumvent
technical security measures. These attacks target individuals'
emotional and cognitive processes, especially natural tendencies
such as trust, benevolence and curiosity. This study aims to
analyze the underlying causes of social engineering attacks,
examine the role of human error in such attacks, and explore
effective security measures that can be implemented to combat
them. In this context, a comprehensive defense framework known
as CyberGuard has been developed. This framework employs a
holistic approach, encompassing both technical measures and
human factors in the context of social engineering attacks.
CyberGuard aims to empower organizations to establish a more
robust defense against such incursions by incorporating
awareness training, social engineering simulations, email security
protocols and security measures such as two-factor
authentication (2FA). Furthermore, this framework encompasses
measures such as the appropriate configuration of social media
privacy settings and regularly updating security policies. The
study concluded that implementing and continuously updating
the CyberGuard framework against social engineering attacks
would enhance the cybersecurity infrastructure of organizations
and render them more resilient against security threats.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
İsa AVCI
Murat KOCA
Buse KÖSE
Yahya ZAKRYA KHAN
Aslihan INAN
This study introduces a novel convolutional neural
network (CNN) architecture integrating multi-scale dilated
convolutions with a sequential dense network for improved lung
disease detection in computed tomography (CT) scans. Dilated
convolutions increase the receptive field without adding extra
parameters, enabling the model to capture spatial features from
various scales. The proposed model effectively detects subtle
patterns associated with lung conditions such as cancer, benign
tumors, and normal tissues. Evaluated on the IQ-OTH/NCCD
dataset containing 1,190 CT images across three classes, the model
achieved its highest accuracy of 95.33% with a dilation rate of 32,
also showing high sensitivity (95.33%) and specificity (97.67%).
Comparative analysis across multiple dilation rates (4, 8, 16, 32,
64, 128) showed that mid-range dilation values yield optimal
performance, while excessive dilation leads to diminished returns.
To mitigate class imbalance, geometric data augmentation
techniques were employed. Unlike traditional CNNs, our
approach balances computational efficiency and high
classification performance, making it suitable for real-world
deployment in resource-constrained settings. The model’s ability
to accurately classify small and dispersed abnormalities enhances
its potential in early diagnosis. In summary, the proposed multiscale dilated CNN offers a robust and efficient solution for CTbased lung disease detection, demonstrating promising results for
integration into clinical decision support systems.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Aleyna YERLİKAYA
Alper Talha KARADENİZ
Zafer Cömert
In nature, the honeycomb structure is a recurring
phenomenon that is admired for its efficiency, durability, and
optimum utilization of space. These qualities have inspired the
development of man-made honeycomb structures, which are
widely applied in various fields, including engineering,
architecture, and materials science. Among these applications,
the use of honeycomb networks offers significant advantages in
constructing hierarchical structures, such as enhanced
scalability, robustness, and geometric flexibility. In this paper, we
investigate labeling and Hamiltonian path algorithms specifically
designed for Hierarchical Honeycomb Networks (HHMs) by
presenting a novel strategy. The proposed labeling algorithm
systematically generates the coordinates of HHM nodes at
multiple hierarchical levels, utilizing an recursive approach to
ensure consistency and efficiency. Additionally, we investigate a
Hamiltonian feature with the same algorithm designed to define a
path that visits each node exactly once within the HHM
framework. This study demonstrates, through theoretical
analysis and algorithmic implementation, the effectiveness of the
new strategy in optimizing the construction and traversal of
HHM, providing potential insights for applications in network
design, computational geometry, and spatial data organization.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Burhan Selçuk
Ayşe Nur Altintaş Tankül
Saliha Özgüngör
Ali Karcı
Non-Line of Sight (NLOS) imaging is an advanced
computational imaging technique that utilizes indirect light
reflections to detect objects obscured by obstacles. This approach
is particularly significant in critical applications such as search
and rescue operations, surveillance, and detecting living beings
trapped under debris in post-disaster scenarios. Unlike
conventional imaging systems, which capture photons reflected
directly from visible objects, NLOS systems reconstruct hidden
objects by analyzing secondary reflections. However, current
NLOS methods often involve high computational complexity,
require expensive hardware, and are sensitive to environmental
variations, leading to various limitations in practical applications.
This study proposes an innovative approach for detecting living
beings beyond the Non-Line of Sight using laser signals. In the
proposed system, photons emitted from a laser light source strike
a hidden object via a reflective surface and are subsequently
collected back from the reflective surface as primary and
secondary signals. The obtained reflection signals undergo
preprocessing steps before being analyzed for vitality detection.
Within the scope of this study, laser reflection signals were
collected from human subjects located outside the field of view as
well as from various inanimate materials, thereby enabling the
differentiation between living and non-living entities.
Experimental studies conducted on human subjects demonstrated
that the system operates with an accuracy of 76% and is capable
of detecting living beings beyond the Non-Line of Sight. The NLOS
human detection system based on laser signals is evaluated as a
promising approach for emergency response applications.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Nevzat OLGUN
Mücahit ÇALIŞAN
İbrahim TÜRKOĞLU
The use of Natural Language Processing (NLP) has
become increasingly essential in enhancing the efficiency and
responsiveness of customer support systems. This paper provides
a comprehensive review of NLP techniques applied in this domain,
focusing on research published between 2020 and 2024. It focuses
on the comparative performance of widely adopted algorithms,
including Support Vector Machines (SVM), Bidirectional Encoder
Representations from Transformers (BERT), Term Frequency-
Inverse Document Frequency (TF-IDF), Convolutional Neural
Networks (CNN), Multilayer Perceptron (MLP), and K-Nearest
Neighbors (KNN). These methods were evaluated across common
tasks such as sentiment analysis, chatbot response generation, and
customer review classification.
The study highlights a significant performance advantage of
deep learning models over traditional approaches. While
traditional models such as TF-IDF combined with SVM exhibited
varying accuracy (ranging from 40% to 87.41%) depending on
dataset quality and feature engineering, deep learning models
(architectures based on BERT and its variants) achieved
remarkable accuracies, reaching as high as 99.21%. Furthermore,
the review notes that most studies rely on static datasets, this may
limit how well their outcomes apply to real-time customer service.
This paper contributes to the field by presenting a comparative
synthesis of state-of-the-art NLP techniques applied in customer
support, emphasizing performance patterns and practical
challenges. The findings provide useful guidance for researchers
and practitioners aiming to develop or enhance NLP-based
customer service systems.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Nisreen BOUTA
Mohamad ZUBI
Bilal YOUSFI
Ammar ALQADASI
In today's world, with the rapid increase in
digitalization, data security has been of critical importance for
both individuals and organizations. In this context, encryption
methods are widely used to protect sensitive information and stand
out as a fundamental tool in ensuring data security. Encryption
functions as an important protection mechanism for information
security by guaranteeing that data is only accessible to authorized
users. Together with the impact and performance of advanced
analytical techniques such as data mining and machine learning
on encrypted datasets, constitute one of the focal points of current
research. This study aims to evaluate the effects of original
datasets and encrypted forms of these datasets using symmetric
encryption algorithms on the performance metrics of models
trained with artificial neural networks through a comparative
analysis method. In the scope of the study, four datasets with
different characteristics, including Breast Cancer, Hepatitis, Iris,
and Study Depression have been utilized. In the initial phase of the
study, the original versions of the data sets used were processed
through the relevant data mining preprocessing steps, trained with
artificial neural network models, and their performances were
evaluated through various metrics. Afterward, the datasets were
encrypted using AES (Advanced Encryption Standard), DES
(Data Encryption Standard) and RC4 (Rivest Cipher 4) of the
symmetric encryption algorithms. The same data mining
preprocessing steps have also been applied to the encrypted data
sets, and performance analyses have been conducted by training
with artificial neural network models. Lastly, the performance
results of the artificial neural network for the original and
symmetrically encrypted datasets have been analyzed
comparatively for each encryption algorithm separately. The
findings put forward indicate that the trainings carried out with
artificial neural networks after the encryption of the data
exhibited a performance very similar to the trainings carried out
with the original data. Consequently, this study shows that while
symmetric encryption algorithms ensure data security,
simultaneously similar performance results can be obtained with
the original data in artificial neural networks-based model
training. Even though the encryption processes carried out using
AES, DES, and RC4 algorithms cause minor acceptable changes
in model performance, they do not affect the overall validity of the
results. While preserving the performance of artificial neural
network training, ensuring data security stands out as an
important balancing factor. This development encourages the
integration of data security with neural network applications,
contributing both to the widespread adoption of these technologies
in high-security areas and to the more efficient realization of
secure data processing
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Rabia Günbaş
Merve Yılmaz
Mustafa Servet KIRAN
Transformer architectures are powerful deep
learning methods widely used in both image processing and
natural language processing. Transformer models are quite
advantageous in learning long-range dependencies, mostly due to
the self-attention mechanism. Image Transformer (ViT)
generalizes this concept to image processing by dividing images
into parts and then treating each part as a sequence, unlike other
structures such as CNNs. In this way, it provides better learning
due to the connection of the divided image with other parts and the
attention mechanism. Compared to CNNs, the image is not
directly processed and thus offers an effective usage. The training
process in this research was done with ViT model. It was done with
images taken from the eye disease classification disease dataset.
The research aims to determine the effect of resolution on model
accuracy. Various performance metrics were used to compare
models trained on learning and generalization images. The results
show the sensitivity of ViT models to resolution for the best
resolution selection. The results benefit not only academia but also
industry in the form of increased efficiency in deep learning
models. In this study, the effects of images with different resolution
values on the performance of the ViT model and comparisons on
running times were made
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Hafize Esra ÖZDENİZ
Alper KILIÇ
Agriculture is today a major player in the global
economy and has been the foundation of societies throughout
history. As agricultural systems become increasingly complex,
crop diseases have become a major challenge, threatening
productivity and food security. Recent technological advances
have opened up new possibilities for addressing these issues,
particularly with the use of convolutional neural networks
(CNNs). Still, running CNN models on edge devices—like
smartphones or compact processors—hasn’t been explored
enough, even though such tools could be a game-changer for
farmers in remote areas. They enable prompt, real-time diagnosis
without the need for internet connectivity or extensive
infrastructures. This study takes a closer look at four lightweight
CNN models: MobileNetV2, SqueezeNet, ShuffleNetV2, and
MnasNet. Using a dataset of diseased plant images, we tested each
model’s accuracy, processing time, and resource demands. The
aim is to find which model strikes the best balance between
precision and performance on limited hardware. ShuffleNetV2
emerged as the most effective, achieving a validation accuracy of
99.35% and offering the highest efficiency for deployment on edge
devices.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Thabet Righi
Mohammed Charaf Eddine Meftah
Potato crops, crucial for global food security,
are highly vulnerable to diseases like late blight and
early blight, leading to significant yield losses and
economic damage. Traditional disease detection
methods are inefficient, prompting the rise of machine
learning (ML) techniques in agriculture. This paper
reviews recent advancements in using ML, particularly
image recognition models such as convolutional neural
networks (CNNs), for early disease detection and
classification. It also explores ML-driven solutions for
disease management, including predictive analytics
and optimised pesticide use. The review highlights
challenges like data scarcity and model generalization,
and discusses future research directions to enhance
sustainable potato farming through ML
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Deepak Yadav
Gaurav Kumar Singh
Dr. Avinash Kumar Sharma
The refugee problem is one of the most important
issues worldwide which has gained tremendous media attention
that has influenced public opinion in relation to displaced
populations. This study investigates the application of natural
language processing (NLP) to predict and analyze news articles
on the refugee crisis. The refugee crisis remains an urgent
humanitarian issue with over 117 million forcibly displaced
people by the end of 2024. This study aims to develop an
automated system to predict and analyze news articles on the
refugee crisis using NLP techniques to gain better insights into
migration patterns and highlight key areas for consideration.
Mass migration and asylum-seeking pose major challenges for
host country authorities, non-governmental organizations
(NGOs) and international humanitarian organizations trying to
solve the problems associated with the refugee crisis. Using news
datasets from sources such as The Guardian and Kaggle, the
study refined over 55,000 general category news articles to
extract 6344 refugee-related articles by fine-tuning a Large
Language Model (LLM), “Mistral 7b v0.3”. This study addresses
existing gaps in AI applications by employing LLM to predict key
themes, detect bias, and analyze media narratives on the refugee
crisis. The methodology follows the CRISP-DM framework and
uses pre-processing, prediction and visualization techniques. The
results of this study include highlighting key refugee issues such
as health, shelter, nutrition, security and women’s issues. In
addition, it identifies potential gaps in the treatment of
disadvantaged groups such as LGBTQ+ and disabled people. The
study shows that, LLM outperforms traditional keyword
searches, as three times more relevant articles were extracted
through LLM. The findings of this study give significant details to
strategy makers and NGOs to make more informed decisions on
these important issues. Limitations, such as resource
compatibility and dataset availability, affect the overall results
yet the study highlights the potential of Artificial Intelligence (AI)
in addressing the complexity of global crises and provides a
foundation for future work in multilingual and multimedia
analysis.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ahmed Asif
Jagdev Bhogal
Glioma is one of the most common and aggressive
types of brain tumors. This study aims to predict the glioma type
and its evolutionary process using the YOLOv8 deep learning
model based on segmented MR images. The segmented MR images
obtained from the BraTS dataset were processed into 2D slices
using a custom algorithm. The model was trained using transfer
learning, and the Adam optimizer was employed for optimization.
The model's performance was evaluated using YOLOv8's
standard metrics, including mAP, IoU, Precision, and Recall. The
results demonstrate that the YOLOv8 model trained on 2D data
derived from segmented images achieved 98.5% accuracy, 98.5%
F1 score, and 88% sensitivity, effectively classifying glioma types
and reliably predicting the evolutionary process.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Rashid Hamidov
Ferhat Atasoy
Publicly available compound and bioactivity
databases, such as ChEMBL, provide the main foundation for
data-driven drug screening. In this work, we were interested
in the Prostate-Specific Antigen (PSA), which is the most
important biomarker in the context of the diagnostics and the
therapy of prostate cancer. The dataset comprised about 95%
of high-confidence bioactivity data, it is the major resource
for construction of a good Random Forest classification
model. After connecting PSA-targeted bioactivity data with
the molecular descriptors and genomic counts, a machine
learning model was developed, that was then able to predict
bioactive compounds with high accuracy. After cleaning,
extracting the features from the data, together with training of
the machine learning model we have got the most reliable
prediction. Our Data reveals that the introduction of genomic
and structural features notably enhances prediction
performance using the traditional QSAR approach. The final
mode continuously can not only identify active, but also
inactive compounds with high confidence and reliability.
This method not only simplifies early drug discovery but also
shows the strength of AI-driven methods that can identify
those drugs that are expected to be the most effective PSA
inhibitors for prostate cancer therapy.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Manjunath Managuli
Swetha Goudar
Sangmesh C Managuli
SER (Speech Emotion Recognition) is a notably
advancing field. Its primary purpose is the identification of
emotions delivered via speech; it is essential for applications
involving computer and human interaction in fields such as
healthcare, entertainment, and psychology. This research studies
the use of SER in feature extraction implemented with the help of
a library based on Python called Librosa, an application of CNN
(Convolutional Neural Network) and SVM (Support Vector
Machine) for segregating emotions. The issues are resolved by
enhancing the reliability and precision of systems in the
identification of emotions by analyzing the efficiency of CNN as
well as SVM in segregating emotions such as Sadness, Surprise,
Happiness, Neutral, and Anger. The outcomes are that CNN
performs much more efficiently with 89.20% accuracy, whereas
SVM only has about 80.50% accuracy. Consistency is maintained
by CNN, which has higher F1 scores, recall, and precision in all
categories. This proves its ability to deal with the complexities of
segregating emotions delivered via speech. It is divulged through
the confusion matrices that both models can give good
performance while handling certain emotions, but CNN acquires
a higher accuracy with fewer incorrect classifications, especially
while figuring out emotions that have acoustic properties that are
quite similar. The research concluded by stating that CNN is more
suitable for tasks implementing SER because of its ability to
capture detailed patterns of emotions in speech more efficiently
than SVM. Future work may include architectures of deep
learning, which are more advanced, like Transformer-based
models or RNN, and having the dataset expanded so that there is
an increase in generalization of different emotional backgrounds
and expressions. Also, incorporating approaches to reduce noise
and different audio environments would help enhance the model
so that it adapts easily to applications used in the real world,
offering applicable and robust SER systems.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
B. Pavin
Dr.N.V. Chinnasamy
This article discusses the study and
analysis of modeling methods for controlling the
operating modes of a benzene production plant under
conditions of uncertainty of initial information.
The implementation of methods for visualizing
fuzzy logical inference based on mathematical models
using the Python programming language is presented.
The obtained results can be useful for improving
the efficiency of the installation and minimizing the risks
associated with inaccuracy of input parameters.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Batyr Orazbayev
Yerlan Izbassarov
Oğuz Findik
Lyailya K urmangaziyeva
Chatbots now play a vital role across various sectors because text
messaging platforms developed rapidly. They anchor their position
in customer service operations and data restoration functions and
entertainment domains. The informing application Wire serves as a
robust platform to develop logical chatbots through its framework.
The research paper focuses comprehensively on developing a
Message chatbot through implementation of Python programming
language. This paper provides comprehensive guidelines on
developing functional chatbots for Message using Python
programming language that addresses both design principles and
execution procedures.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Vaishanavi Kumari
Nidhi Sharan
Nidhi Sharma
The rapid advancement in Unmanned Aerial Vehicle
(UAV) technology in recent years has led to their widespread
adoption across various sectors. However, positioning challenges
encountered by UAVs in challenging environments such as
indoor spaces, deep canyons, and military operation zones have
emerged as a significant research concern. Given the critical
importance of precise positioning information for safe UAV
operations, the development of alternative solutions has become
imperative in situations where satellite-based positioning systems
prove inadequate. In this context, extensive research has been
conducted on visual, inertial, and visual-inertial fusion
approaches in the literature. Recent research in this field has
particularly focused on deep learning-based methods, which have
demonstrated effective performance even in the presence of
complex environmental conditions and noisy inertial data. In
existing studies, the sequential order has been preserved during
training processes, considering the time series nature of the data.
However, in fusion-based approaches, the potential of
Convolutional Neural Network (CNN) architectures to operate
independently of time series has not been adequately
investigated. This research proposes a novel model that combines
CNN-based visual feature extraction with Bidirectional Long
Short-Term Memory (BiLSTM)-based inertial feature extraction.
The original contribution of this study lies in its systematic
examination of the effects of shuffling operations on the dataset.
Experimental results reveal that despite the time series nature of
the data in visual-inertial fusion models, the shuffling operation
leads to significant improvements in model performance.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Mahmut Karaaslan
Ersin Kaya
Embedding models play a crucial role by capturing
the semantics of contexts in information retrieval, complementing
traditional lexical methods. With the rise of Retrieval-Augmented
Generation (RAG) systems, information retrieval has become an
essential component of text generation. Generative models tend to
produce misleading answers when an answer requires an external
source, when the model hallucinates, or when the response
becomes outdated due to the temporal limitations of training
datasets. Retrieval-augmented methods enhance response
reliability and accuracy by leveraging relevant retrieved
information. Therefore, improving retrieval performance is
essential for ensuring more precise and dependable outputs.
As a core component of RAG systems, embedding models can
be multilingual, including up to a hundred languages. However,
they have inadequacies with low-resource languages such as
Turkish, because training data cannot provide equal coverage
across all languages. In contrast, text-matching-based lexical
search algorithms work independently of language. Nevertheless,
they have shortcomings with mismatching cases due to suffixes
and prefixes with agglutinative languages. While lemmatization
and stemming provide partial solutions, these methods cannot be
applied directly to morphologically more complex languages like
Turkish.
This study introduces Turkuaz-Embeddings, a novel model
specifically optimized for Turkish. It consistently outperforms
widely used multilingual and Turkish embedding models,
achieving up to 20% and on average 9% improvements in retrieval
performance across diverse benchmarks. In some scenarios, it
ranks highest among both multilingual and Turkish embedding
models. Moreover, compared to its baseline architecture, it shows
up to 35% improvement, with an average gain of 20%. The model
also excels in zero-shot retrieval tasks, demonstrating robust
generalizability.
This study also proposes an innovative token-based lexical
retrieval method. By leveraging sub-word tokens from a Turkish
tokenizer, without relying on lemmatization and stemming, this
approach enhances traditional lexical search performance. It
yields up to 10% improvement and consistently achieves an
average gain of 5% across evaluation scenarios.
Both advancements in this study contribute to improved
semantic representation, more efficient lexical matching, better
information retrieval, and eventually, more accurate and
contextually relevant generations in Turkish RAG systems.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Enes Sadi Uysal
Mehmet Fatih AMASYALI
Epilepsy is a neurological disorder that affects
approximately 1% of the global population, and its accurate
detection is crucial for effective diagnosis and management.
Electroencephalography (EEG) is a widely used, non-invasive
tool for monitoring brain activity in epileptic patients. This paper
presents a deep learning-based framework for classifying
epileptic EEG signals using a hybrid Convolutional Neural
Network (CNN) - Bidirectional Long Short-Term Memory
(BiLSTM) architecture. The model processes raw EEG signals as
well as time-frequency decompositions using the Discrete
Wavelet Transform (DWT), enabling better representation of
non-stationary brain dynamics. To assess performance, we
conducted extensive binary and multiclass classification
experiments on the Bonn EEG dataset. Binary tasks included
distinguishing epileptic vs. non-epileptic activity, seizure
prediction (interictal vs. ictal), and healthy brain states under
different conditions. Our model, especially when trained with
DWT features, achieved a maximum accuracy of 99%, with
100% sensitivity and 98% specificity, outperforming raw data.
Multiclass classification results also showed strong
generalization, with the DWT-enhanced model reaching 89.5%
accuracy when classifying among healthy, interictal, and ictal
states. These results confirm that combining time-frequency
decomposition with a CNN-BiLSTM architecture offers a robust
solution for reliable and accurate EEG-based epilepsy detection.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Nadjla Bettayeb
Amina Achaibou
Nidaa elislam Benferdia
Significant advancements have been made in the
analysis of medical images through systems developed using deep
learning methods. The detection of fractures using computer
vision is one of the current areas under investigation. Identifying
bone fractures in X-ray images is a time-consuming process that
requires specialized expertise. Pediatric bone fractures, in
particular, are common and situations that require prompt
treatment to prevent future complications. Consequently, deep
learning-based detection systems hold great importance in
supporting clinical decision-making processes and saving time for
specialists. This study evaluates five recent YOLO algorithm
versions (YOLOv8-YOLOv12) for pediatric wrist fracture
detection in X-rays. The Pediatric Wrist Trauma X-ray dataset
(GRAZPEDWRI-DX) was used, and training was conducted on
10,300 X-ray images. The models' accuracy, speed, and
generalization capabilities were analyzed, and it was observed
that the YOLOv9s and YOLOv12m models achieved the best
performance (0.944 mAP50 and 0.90 Recall), with all trained
models showing similar results. This study aims to demonstrate
the performance of YOLO-based models in the automatic
detection of bone fractures in X-ray images, contributing to the
acceleration of the diagnostic process for these common injuries.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Ayşe Aybilge MURAT
Mustafa Servet KIRAN