Atilla Elçi | Hasan Kalyoncu University (original) (raw)
Books by Atilla Elçi
Artificial Intelligence Paradigms for Smart Cyber-Physical Systems, 2020
Edited book published by IGI Global
Challenges and Applications of Data Analytics in Social Perspectives, 2020
Edited book at IGI Global
CFP for 14th Intl Conference on Security of Information and Networks
Call for papers and proposals due date October 10. Check www.sinconf.org for updates.
Proc of SIN 2019, 2019
TOC of the proceedings of SIN 2019: all papers are open access through SIN 2019 website
Topics of interest include, but are not limited to: • Data management, knowledge representation ... more Topics of interest include, but are not limited to:
• Data management, knowledge representation and ontology for Cyber-Physical Systems
• Big data and smart computing for Cyber-Physical Systems
• Algorithms, models, and designs for social Cyber-Physical Systems
• Machine learning for/with Cyber-Physical Systems
• Nature-Inspired Algorithms for Cyber-Physical Systems
• Affecting Ubiquitous Intelligence in Cyber-Physical Computing
• Device Virtualization (DV) in pervasive Cyber-Physical Systems
• Issues and implementation of Privacy, Security, and Trust in Cyber-Physical Systems
• Affecting Context-Awareness for Cyber-Physical Systems
• Design, development, and implementation of Smart Cyber-Physical Systems
• Comparison of artificial intelligence-based approaches to Cyber-Physical Systems
• AI-based fraud detection, and mitigation
• Smart IDS and IPS for Cyber-Physical System
• Cyber-attack forecasting, detection, and mitigation
• Innovative applications of Cyber-Physical Systems in various domains
Proceedings of ICAGNI 2018 v2, 2020
Proceedings of ICAGNI 2018 in Advances in Intelligent Systems and Computing Series Volume 767 By ... more Proceedings of ICAGNI 2018
in Advances in Intelligent Systems and Computing Series
Volume 767
By Springer
Proceedings of ICAGNI 2018, 2020
Proceedings of ICAGNI 2018 in Advances in Intelligent Systems and Computing Series Volume 766 By... more Proceedings of ICAGNI 2018
in Advances in Intelligent Systems and Computing Series
Volume 766
By Springer
Proceedings of the 11th International Conference on Security of Information and Networks
Metacognition and Successful Learning Strategies in Higher Education is a detailed resource of sc... more Metacognition and Successful Learning Strategies in Higher Education is a detailed resource of scholarly perspectives that discusses current trends in learning assessments. Featuring extensive coverage on topics such as spiritual intelligence strategies, literacy development, and ubiquitous learning, this is an ideal reference source for academicians, graduate students, practitioners, and researchers who want to improve their learning strategies using metacognition studies.
Call for Chapter Proposals: New cycle, new deadlines: Upload a chapter proposal of 1,000 to 2,... more Call for Chapter Proposals:
New cycle, new deadlines: Upload a chapter proposal of 1,000 to 2,000 words by September 15th. Notification is by September 30th with full chapter submission by November 30th.
http://www.igi-global.com/publish/call-for-papers/call-details/1423
Information Systems (IS) play a central part in all aspects of our world, from science, medicine,... more Information Systems (IS) play a central part in all aspects of our world, from science, medicine, and engineering, to industry, business, law, politics, government, arts, culture, society, health, operational support in daily life, surveillance of infrastructure and environment, and homeland protection and national security. Without proper security precautions, IS are prone to unexpected and intolerable side effects, such as leakage of operational and confidential data, identity theft and unauthorized access, and possibly modification of private data, services, and systems. Security services are required in order to guarantee information security and protection of privacy, such as data confidentiality, data authentication, anonymity, entity authentication, non-repudiation of origin and receipt, access control, protection against denial of service and phishing, and secure processing and deletion of data. In a nutshell, dependable and trustworthy security solutions based on strong cryptography are needed.
This is a fast track publication opportunity. This book will be published by IGI Global by end 20... more This is a fast track publication opportunity. This book will be published by IGI Global by end 2012 / early 2013.
Recommended topics in theory, tools, and applications of cryptographic solutions for information systems include, but are not limited to the following:
• Cryptography
• Cryptography and Security
• Cryptography and Data Protection
• Cryptography and Privacy
• Cryptography and Cryptanalysis
• Cryptographic Protocols
• Cryptographic Solutions
• Copyright protection
• Agent & Multi-agent System Security
• Authentication & Authorization
• Engineering Secure Information Systems
• Forensics and Ethical Hacking
• Key Management
• Ontology of Cryptographic Solutions
• Public-key Crypto Systems
• Standards, guidelines and certification
Manuscripts in which cryptographic solutions for IS are not the main focus will not be accepted.
Semantic agent systems are about the integration of the semantic Web, software agents, and multi-... more Semantic agent systems are about the integration of the semantic Web, software agents, and multi-agent systems technologies. Like in the past (e.g. biology and informatics yielding bioinformatics) a whole new perspective is emerging with semantic agent systems. In this context, the semantic Web is a Web of semantically linked data which aims to enable man and machine to execute tasks in tandem. Here, software agents in a multi-agent system as delegates of humans are endowed with power to use semantically linked data.
This edited book “Semantic Agent Systems: Foundations and Applications” proposes contributions on a wide range of topics on foundations and applications written by a selection of international experts. It first introduces in an accessible style the nature of semantic agent systems. Then it explores with numerous illustrations new frontiers in software agent technology.
“Semantic Agent Systems: Foundations and Applications” is recommended for scientists, experts, researchers, and learners in the field of artificial intelligence, the semantic Web, software agents, and multi-agent systems technologies.
Dr. Atilla Elçi is a professor of computer science at Toros University, Mersin, Turkey;
Dr. Mamadou Tadiou Kone is a research scientist at International Computing
Research, Boston, MA, USA;
Dr. Mehmet A. Orgun is a professor of computer science at Macquarie University, Sydney, Australia.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
TOC:
PREFACE
Section 1 INTRODUCTION TO AGENTS AND SEMANTICS
1 Rule Responder Agents - Framework and Instantiations.
Harold Boley (National Research Council); Adrian Paschke (Free University Berlin)
2 Specifying and Monitoring Obligations in Open Multiagent Systems using Semantic Web Technology.
Nicoletta Fornara (University of Lugano)
3 Semantic Agent Model for Distributed Knowledge Management.
Julien Subercaze (LIRIS); Pierre Maret (LaHC )
Section 2 ENGINEERING SEMANTIC AGENT SYSTEMS
4 SBVR-driven Information Governance: a Case Study in the Flemish Public Administration.
Pieter De Leenheer (Vrije Universiteit and Collibra nv/sa et al.
5 Argumentation for reconciling agent ontologies.
Cassia Trojahn (INRIA); Jérôme Euzenat (INRIA); Valentina Tamma
(University of Liverpool); Terry Payne (University of Liverpool)
6 Measuring Complexity for MAS Design in the presence of Ontology Heterogeneity
Maricela Bravo (CINVESTAV)
7 Ontology-based Matchmaking and Composition of Business Processes.
Duygu Celik (EMU); Atilla Elci (METU)
8 Semantic Architecture for Human Robot Interaction.
Sebastien Dourlens Amar Ramdane Cherfi (LISV/UVSQ (Versailles University France));
Section 3. APPLICATIONS OF SEMANTIC AGENT SYSTEMS
9 A Semantic Agent Framework for Cyber-Physical Systems.
Jing Lin; Sahra Sedigh; Ann Miller (Missouri University of Science and Technology)
10 A Layered Manufacturing System Architecture Supported with Semantic Agents Capabilities.
Munir Merdan; Mathieu Vallee; Thomas Moser; Stefan Biffl (Vienna University of Technolog)
11 Semantic Multi-Agent mLearning System.
Stanimir Stojanov (Plovdiv University) et al.
12 Identifying Novel Topics based on User Interests.
Makoto Nakatsuji (NTT)
Section 4. FUTURE LOOK
13 Understanding, Misunderstanding, Multi-understanding, and Switchable Understanding by Agents.
Tuncer Oren (University of Ottawa); Levent Yilmaz (Auburn University)
INDEX
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Artificial Intelligence Paradigms for Smart Cyber-Physical Systems, 2020
Edited book published by IGI Global
Challenges and Applications of Data Analytics in Social Perspectives, 2020
Edited book at IGI Global
CFP for 14th Intl Conference on Security of Information and Networks
Call for papers and proposals due date October 10. Check www.sinconf.org for updates.
Proc of SIN 2019, 2019
TOC of the proceedings of SIN 2019: all papers are open access through SIN 2019 website
Topics of interest include, but are not limited to: • Data management, knowledge representation ... more Topics of interest include, but are not limited to:
• Data management, knowledge representation and ontology for Cyber-Physical Systems
• Big data and smart computing for Cyber-Physical Systems
• Algorithms, models, and designs for social Cyber-Physical Systems
• Machine learning for/with Cyber-Physical Systems
• Nature-Inspired Algorithms for Cyber-Physical Systems
• Affecting Ubiquitous Intelligence in Cyber-Physical Computing
• Device Virtualization (DV) in pervasive Cyber-Physical Systems
• Issues and implementation of Privacy, Security, and Trust in Cyber-Physical Systems
• Affecting Context-Awareness for Cyber-Physical Systems
• Design, development, and implementation of Smart Cyber-Physical Systems
• Comparison of artificial intelligence-based approaches to Cyber-Physical Systems
• AI-based fraud detection, and mitigation
• Smart IDS and IPS for Cyber-Physical System
• Cyber-attack forecasting, detection, and mitigation
• Innovative applications of Cyber-Physical Systems in various domains
Proceedings of ICAGNI 2018 v2, 2020
Proceedings of ICAGNI 2018 in Advances in Intelligent Systems and Computing Series Volume 767 By ... more Proceedings of ICAGNI 2018
in Advances in Intelligent Systems and Computing Series
Volume 767
By Springer
Proceedings of ICAGNI 2018, 2020
Proceedings of ICAGNI 2018 in Advances in Intelligent Systems and Computing Series Volume 766 By... more Proceedings of ICAGNI 2018
in Advances in Intelligent Systems and Computing Series
Volume 766
By Springer
Proceedings of the 11th International Conference on Security of Information and Networks
Metacognition and Successful Learning Strategies in Higher Education is a detailed resource of sc... more Metacognition and Successful Learning Strategies in Higher Education is a detailed resource of scholarly perspectives that discusses current trends in learning assessments. Featuring extensive coverage on topics such as spiritual intelligence strategies, literacy development, and ubiquitous learning, this is an ideal reference source for academicians, graduate students, practitioners, and researchers who want to improve their learning strategies using metacognition studies.
Call for Chapter Proposals: New cycle, new deadlines: Upload a chapter proposal of 1,000 to 2,... more Call for Chapter Proposals:
New cycle, new deadlines: Upload a chapter proposal of 1,000 to 2,000 words by September 15th. Notification is by September 30th with full chapter submission by November 30th.
http://www.igi-global.com/publish/call-for-papers/call-details/1423
Information Systems (IS) play a central part in all aspects of our world, from science, medicine,... more Information Systems (IS) play a central part in all aspects of our world, from science, medicine, and engineering, to industry, business, law, politics, government, arts, culture, society, health, operational support in daily life, surveillance of infrastructure and environment, and homeland protection and national security. Without proper security precautions, IS are prone to unexpected and intolerable side effects, such as leakage of operational and confidential data, identity theft and unauthorized access, and possibly modification of private data, services, and systems. Security services are required in order to guarantee information security and protection of privacy, such as data confidentiality, data authentication, anonymity, entity authentication, non-repudiation of origin and receipt, access control, protection against denial of service and phishing, and secure processing and deletion of data. In a nutshell, dependable and trustworthy security solutions based on strong cryptography are needed.
This is a fast track publication opportunity. This book will be published by IGI Global by end 20... more This is a fast track publication opportunity. This book will be published by IGI Global by end 2012 / early 2013.
Recommended topics in theory, tools, and applications of cryptographic solutions for information systems include, but are not limited to the following:
• Cryptography
• Cryptography and Security
• Cryptography and Data Protection
• Cryptography and Privacy
• Cryptography and Cryptanalysis
• Cryptographic Protocols
• Cryptographic Solutions
• Copyright protection
• Agent & Multi-agent System Security
• Authentication & Authorization
• Engineering Secure Information Systems
• Forensics and Ethical Hacking
• Key Management
• Ontology of Cryptographic Solutions
• Public-key Crypto Systems
• Standards, guidelines and certification
Manuscripts in which cryptographic solutions for IS are not the main focus will not be accepted.
Semantic agent systems are about the integration of the semantic Web, software agents, and multi-... more Semantic agent systems are about the integration of the semantic Web, software agents, and multi-agent systems technologies. Like in the past (e.g. biology and informatics yielding bioinformatics) a whole new perspective is emerging with semantic agent systems. In this context, the semantic Web is a Web of semantically linked data which aims to enable man and machine to execute tasks in tandem. Here, software agents in a multi-agent system as delegates of humans are endowed with power to use semantically linked data.
This edited book “Semantic Agent Systems: Foundations and Applications” proposes contributions on a wide range of topics on foundations and applications written by a selection of international experts. It first introduces in an accessible style the nature of semantic agent systems. Then it explores with numerous illustrations new frontiers in software agent technology.
“Semantic Agent Systems: Foundations and Applications” is recommended for scientists, experts, researchers, and learners in the field of artificial intelligence, the semantic Web, software agents, and multi-agent systems technologies.
Dr. Atilla Elçi is a professor of computer science at Toros University, Mersin, Turkey;
Dr. Mamadou Tadiou Kone is a research scientist at International Computing
Research, Boston, MA, USA;
Dr. Mehmet A. Orgun is a professor of computer science at Macquarie University, Sydney, Australia.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
TOC:
PREFACE
Section 1 INTRODUCTION TO AGENTS AND SEMANTICS
1 Rule Responder Agents - Framework and Instantiations.
Harold Boley (National Research Council); Adrian Paschke (Free University Berlin)
2 Specifying and Monitoring Obligations in Open Multiagent Systems using Semantic Web Technology.
Nicoletta Fornara (University of Lugano)
3 Semantic Agent Model for Distributed Knowledge Management.
Julien Subercaze (LIRIS); Pierre Maret (LaHC )
Section 2 ENGINEERING SEMANTIC AGENT SYSTEMS
4 SBVR-driven Information Governance: a Case Study in the Flemish Public Administration.
Pieter De Leenheer (Vrije Universiteit and Collibra nv/sa et al.
5 Argumentation for reconciling agent ontologies.
Cassia Trojahn (INRIA); Jérôme Euzenat (INRIA); Valentina Tamma
(University of Liverpool); Terry Payne (University of Liverpool)
6 Measuring Complexity for MAS Design in the presence of Ontology Heterogeneity
Maricela Bravo (CINVESTAV)
7 Ontology-based Matchmaking and Composition of Business Processes.
Duygu Celik (EMU); Atilla Elci (METU)
8 Semantic Architecture for Human Robot Interaction.
Sebastien Dourlens Amar Ramdane Cherfi (LISV/UVSQ (Versailles University France));
Section 3. APPLICATIONS OF SEMANTIC AGENT SYSTEMS
9 A Semantic Agent Framework for Cyber-Physical Systems.
Jing Lin; Sahra Sedigh; Ann Miller (Missouri University of Science and Technology)
10 A Layered Manufacturing System Architecture Supported with Semantic Agents Capabilities.
Munir Merdan; Mathieu Vallee; Thomas Moser; Stefan Biffl (Vienna University of Technolog)
11 Semantic Multi-Agent mLearning System.
Stanimir Stojanov (Plovdiv University) et al.
12 Identifying Novel Topics based on User Interests.
Makoto Nakatsuji (NTT)
Section 4. FUTURE LOOK
13 Understanding, Misunderstanding, Multi-understanding, and Switchable Understanding by Agents.
Tuncer Oren (University of Ottawa); Levent Yilmaz (Auburn University)
INDEX
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Conference Chairs Dr. Roger Lee, Central Michigan University, USA Dr. Wencai Du, Hainan Universit... more Conference Chairs Dr. Roger Lee, Central Michigan University, USA Dr. Wencai Du, Hainan University, China ... Program Chairs Dr. Haeng-Kon Kim, Catholic University of Daegu, Korea Dr. Simon Xu, Algoma University, Canada ... Publicity Chairs Prof. Paolo Bellavista, Università degli Studi di Bologna, Italy Prof. Shaoying Liu, Hosei University, Japan Prof. Jian Yang, Macquarie University, Australia Prof. Ahmed Jerraya, MINATEC, France Prof. Jongkun Lee, Changwon National University, Korea Prof. Ville Leppänen, University of Turku and TUCS, Finland Prof. ...
ieeexplore.ieee.org
USA Hira Agrawal, Telcordia Applied Research, USA Sheik Iqbal Ahamed, Marquette University, USA C... more USA Hira Agrawal, Telcordia Applied Research, USA Sheik Iqbal Ahamed, Marquette University, USA Christof Budnik, Siemens Corporate Research, USA Bojan Cukic, West Virginia University, USA Ewen Denney, NASA, USA Sudipto Ghosh, Colorado State University, USA Xudong He, Florida International University, USA Murat Kantarcioglu, University of Texas at Dallas, USA Phil Laplante, Penn State University, USA Jenny Li, Avaya Labs Research, USA Yan Liu, Motorola Labs, USA Bruce McMillin, Missouri University of Science and ...
Robin Bradbeer Department of Electronic Engineering City University of Hong Kong, (Retired,), IEE... more Robin Bradbeer Department of Electronic Engineering City University of Hong Kong, (Retired,), IEEE Consumer Electronics Society (eersbrad@cityu.edu.hk) ... Samad Ahmadi De Montfort University, IEEE Consumer Electronics Society (sahmadi@dmu.ac.uk) ... Larry Zhang Past President of IEEE Consumer Electronics Society and Nominations Chair (lzhang1@ti.com) William Lumpkins Past President of IEEE Consumer Electronics Society and Vice President of Standards (xillia@ieee.org) ... Samad Ahmadi De Montfort University, ...
computer.org
Aaron McDonald Aaron Quigley Abhilasa Bhargav-Spantzel Achilles Kameas Adel Al-Hezmi Aditya K. Gh... more Aaron McDonald Aaron Quigley Abhilasa Bhargav-Spantzel Achilles Kameas Adel Al-Hezmi Aditya K. Ghose Ahmad Kayed Akshaye Dhawan Alex Abramovich Alexander Schmitt Alexander Kosin Alexandre David Alfredo Cuzzocrea Ali Bou Nassif Alia I. Abdelmoty Alvin Chan Amr Youssef Ana Sokolova Anand Desai Anastasius Gavras Anatoly Khomonenko Andrea Ahlemeyer-Stubbe Andreas TOLK Andreas Ulrich Andy Neely Aneesh Krishna Angus FM Huang Ankur Teredesai Anna Perini Anwar Mirza Arilo Claudio Arjan van Gemund Arun Bahulkar Arun ...
doi.ieeecomputersociety.org
Sandip Agarwala, IBM Almaden Research Center, USA Sheikh Iqbal Ahamed, Marquette University, USA ... more Sandip Agarwala, IBM Almaden Research Center, USA Sheikh Iqbal Ahamed, Marquette University, USA Marco Aiello, University of Groningen, Netherlands Masoom Alam, SERG, IMSciences, Pakistan Mikio Aoyama, Nanzan University, Japan Danilo Ardagna, Politecnico di Milano, Italy Janaka L. Balasooriya, Arizona State University, USA Sujoy Basu, HP Labs���Palo Alto, USA Boualem Benatallah, University of New South Wales, Australia Elisa Bertino, Purdue University, USA Bharat K. Bhargava, Purdue University, USA Kumar Bhaskaran, IBM TJ ...
computer.org
Azma Abdullah Sheikh Iqbal Ahamed Raihan Al-Ekram Mikio Aoyama Keijiro Araki Ravi Arvapally Isik ... more Azma Abdullah Sheikh Iqbal Ahamed Raihan Al-Ekram Mikio Aoyama Keijiro Araki Ravi Arvapally Isik Aybay Hüseyin Aysan Ryan Babbitt Doo-Hwan Bae Jung Ho Bae Xiaoying Bai Jongmoon Baik Pooyan Balouchian Kevin J Barker Paolo Bellavista Fevzi Belli Maarten Boasson Jan Bosch Zachary Bourque Ying Cai Jan Camenisch Sungdeok Cha Heung-Seok Chae Liton Chakrabarty WK Chan Carl K. Chang YC Chen SC Cheung Kyoungmin Cho Byoungju Choi William Chu Ivica Crnkovic James Cross Alan Davis Derek Ditch Bertrand du Castel Eric Dubois Omar ...
Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı? (... more Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı? (How much and what type of personal data is being collected during medical processes? Are such private data safe? What to do?) Bu sunuşum aynı zamanda benim Anlamsal Etmenler ve Büyük Veri Çözümlemesi projelerimle de ilgilidir. Paneldeki diğer konuşmacılar için bkz. http://ab.org.tr/ab17/ozet/240.html. Resimler için bkz. https://goo.gl/photos/AFjLeR2ofPQeYwBd6 ) (Also relevant for my other projects: Semantic agent systems, Big data & analytics. Other presenters in this panel: see http://ab.org.tr/ab17/ozet/240.html Pictures: see https://goo.gl/photos/AFjLeR2ofPQeYwBd6 )
Advances in Systems Analysis, Software Engineering, and High Performance Computing, 2021
Engineering Science Reference, [2021] | Includes bibliographical references and index. | Summary:... more Engineering Science Reference, [2021] | Includes bibliographical references and index. | Summary: "This book focuses upon the recent advances in the realization of Artificial Intelligence-based approaches towards affecting secure Cyber-Physical Systems. It features contributions pertaining to this multidisciplinary paradigm, in particular, in its application to building sustainable space by investigating state-of-art research issues, applications and achievements in the field of Computational Intelligence Paradigms for Cyber-Physical Systems"-Provided by publisher.
emo.org.tr
ÖZET Güvenli olmayan ağlarda kimlik belirleme hizmetini kırmaya yönelik şifre çözümlemesi korunmu... more ÖZET Güvenli olmayan ağlarda kimlik belirleme hizmetini kırmaya yönelik şifre çözümlemesi korunmuş bilgilerin elde edilmesi olasılığına işaret ediyor. Buna göre araştırmacılar daha güvenli temelleri geliştirip uygulamaya çalışmaktadırlar. Gizli yazım (steganography) yoluyla MD5 ve SHA1 algoritmaları uygulanarak anahtarın gizlenmesi temelinde yeni ve güvenli bir yöntem olarak ParseKey önerilmektedir. Bu yöntem aynı zamanda, istemci tarafında giriş bilgilerini tutmak veya sunumcu VT'ndaki anahtarı değiştirme gereği gibi zayıflıkları ...
Security of Information and Networks: Proceedings of the First International Conference on Security of Information and Networks (SIN 2007), Jan 17, 2008
Abstract. This paper presents the ParseKey+, an approach to a new highlysecure and safe authentic... more Abstract. This paper presents the ParseKey+, an approach to a new highlysecure and safe authentication service. The scheme includes authentication process for both client and server sides in addition to passwords of each side. ParseKey+ employs transposition to hide the encrypted key in a key file retrievable only by the other side knowing the indices and lengths of sub-keys inside ParseKey+ encrypted file. ParseKey+ avoids client and server impersonations in addition to mutual client/server authentication. Therefore, the ...
computer.org
In addition to the Program Committee members, a large number of individuals who belong to review ... more In addition to the Program Committee members, a large number of individuals who belong to review committees for the CIMCA 2008, IAWTIC 2008 and ISE 2008 conferences. The Conference Committee would like to thank them for their assistance in reviewing papers submitted to the abovementioned conferences. ... Andreou Andreas, University of Cyprus, Cyprus Anthony Dekker, DSTO, Australia Ardeshir Karami Mohammadi, Shahrood University of Technology, Iran Arshad Ali, National University of Science and Technology, Pakistan Ashutosh Tiwari, ...
computer.org
Carl K. Chang, Iowa State University, USA Ephraim Feig, Innovations-to-Market, USA Hemant Jain, U... more Carl K. Chang, Iowa State University, USA Ephraim Feig, Innovations-to-Market, USA Hemant Jain, University of Wisconsin–Milwaukee , USA Frank Leymann, University of Stuttgart, Germany Calton Pu, Georgia Tech, USA Liang-Jie Zhang, IBM TJ Watson Research Center, USA ... Sriram Anand, Accenture, India Ali Bahrami, Boeing Research and Technology, USA Akhilesh Bajaj, University of Tulsa, USA Sujoy Basu, HP Palo Alto Labs, USA Manish A. Bhide, IBM India Research Lab, India Zhixiong Chen, Mercy College, USA Cecil Chua, Nanyang ...
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)
This article proposes an Intelligent Tracking System for Acute Respiratory Tract Infection (Track... more This article proposes an Intelligent Tracking System for Acute Respiratory Tract Infection (TrackARTI) via a smart mobile for monitoring disease term of 0-6 age group child patients remotely (e.g. home, clinics). It is possible to maximize the quality of life of the child patients and decrease parental anxiety by keeping the child under control during monitoring stage and achieve a proper distant diagnose by the patient's clinician. This is possible with the designs of intelligent M-Health systems that can be used for diagnosing and monitoring the child patients away from hospitals by presenting the instant medical data to their registered doctors. Intelligent M-Health systems require strong knowledge management technology and ease of extension to provide information from additional medical tools. With the contribution of intelligent M-Health systems, it is possible to infer new facts from the certain gathered medical data during examination from child patients. This article mentions an intelligent and easy medical data gathering system that can be used by pediatricians or parents any time. In addition, the system has its own inferencing mechanism that involves two main steps, inferencing on image processing and Semantic Web rule knowledge base.
Advances in Computer and Electrical Engineering
One of the most important IT sectors that requires big data management is mobile data communicati... more One of the most important IT sectors that requires big data management is mobile data communication systems (MDCS) of GSM companies. In the charging mechanism of current MDCS, a subscriber “surfs” on the internet that creates data traffic and a counter subtracts the amount of data used by the user from the subscriber's quota. In other words, instant constant quota values are assigned to subscribers without concern for their previous amount of internet usage in current MDCS. Moreover, constant quota values cause constant charge calls in control traffic that are repeated for all new quota requests. Thus, performance degradation occurs because of the repetition of quota request calls and allocations. In this chapter, a dynamic quota calculation system (DQCS) is proposed for dynamic quota allocations and charging in MDCS using data mining approaches as two cascaded blocks. The first block is self-organizing map (SOM) clustering based on a sliding window (SW) methodology followed by ...
Current approaches to feature selection for text classification aim to reduce the number of terms... more Current approaches to feature selection for text classification aim to reduce the number of terms that are used to describe documents. Thus, documents can be classified and found with greater ease and precision. A key shortcoming of these approaches is that they select the topmost terms to describe documents after ranking all terms using a feature selection measure (scoring function). Lesser high-ranking terms below the topmost terms are discarded to reduce computational costs. Nevertheless, in many cases, they may have considerable discriminative power to enhance the text classification precision. In order to address this issue, we proposed a new feature weighting formalism that ties the topmost terms with lesser high-ranking terms using probabilistic neural networks. In the proposed method, probabilistic neural networks are formed using relative category distribution matrix and topmost terms are re-weighted and passed to Rocchio classifier. This is achieved without increasing the ...
2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), 2018
Obesity is a public health problem that has become widespread worldwide. Obesity may increase the... more Obesity is a public health problem that has become widespread worldwide. Obesity may increase the risk for many health problems such as early puberty, Type 2 diabetes, certain types of cancer, high blood pressure, heart diseases, and sleep apnea. The detection of obesity in children and adolescents at early stages is important and it is crucial to start individual based treatments. Due to the widespread use of smart mobile devices among family members and increasing number of m-Health applications to fight against obesity as well as other diseases, m-Health applications can be a good choice for early detection of obesity in childhood and adolescence stages. Recently, many studies about mobile-based obesity tracking system that mostly for adults have been done. This research study especially emphases obesity management in childhood and adolescence stages with the contribution of Semantic Web technology. Therefore, the system is an ontology-based obesity tracking system for children and adolescents which has its own Obesity Tracking Ontology and medical semantic rule knowledge base with an inference engine.
Blockchain Technology for Data Privacy Management, 2021
Approaches are needed for providing advanced autonomous wheeled robots with a sense of self, imme... more Approaches are needed for providing advanced autonomous wheeled robots with a sense of self, immediate ambience, and mission. The following list of abilities would form the desired feature set of such approaches: self-localization, detection and correction of course deviation errors, faster and more reliable identification of friend or foe, simultaneous localization and mapping in uncharted environments without necessarily depending on external assistance, and being able to serve as web services. Situations, where enhanced robots with such rich feature sets come to play, span competitions such as line following, cooperative mini sumo fighting, and cooperative labyrinth discovery. In this chapter we look into how such features may be realized towards creating intelligent robots. Currently through-cell localization in robots mainly relies on availability of shaft-encoders. In this regard, we would like to firstly present a simple-to-implement through-cell localization approach for rob...
Diger kurumlar gibi belediyelerin de basarilarini yuksek tutmak icin calisanlarinin belediyelere ... more Diger kurumlar gibi belediyelerin de basarilarini yuksek tutmak icin calisanlarinin belediyelere olan bagliliklarini ust seviyede tutmalarina baglidir. Bagliliklarin ust duzeyde olmasi calisanlarin orgute olan katkilarini da yukseltecektir. Calismamizda, belediye calisanlarinin kurumlarina bagliliklari, kurumlarinin gelisimi ve amaclarina ulasilmasinda orgutsel bagliligin onemli oldugu varsayimindan yola cikilarak Aksaray iline bagli ilce belediye calisanlarina Orgutsel Baglilik Olcegi uygulanmis ve belediye calisanlarinin orgutsel baglilik duzeylerini olcmek hedeflenmistir. Oncelikli olarak Allen ve Meyer (1991) tarafindan gelistirilen bu olcek alt boyutlari olan duygusal baglilik, devam bagliligi ve normatif baglilik boyutlari dogrultusunda 147 belediye calisanina uygulanarak baglilik duzeyleri incelenmeye calisilmistir. Calismanin sonucunda personelin kurumlarina bagliliklarinin duygusal baglilik boyutu yuksek gorulmustur.
This is the call for paper for the 13th International Conference on Security of Information and N... more This is the call for paper for the 13th International Conference on Security of Information and Networks (SIN 2020) to be held on 4-7 November 2020
fully ONLINE.
List of accepted papers for oral presentation during LightSec 2016, Sept. 21-22 at Aksaray Univer... more List of accepted papers for oral presentation during LightSec 2016, Sept. 21-22 at Aksaray University, Cappadocia, Turkey
Final draft of SIN'16 program schedule. Final version is accessible at www.sinconf.org
SIN'15 late-breaking paper submission deadline is May 25th. In Technical Cooperation with AC... more SIN'15 late-breaking paper submission deadline is May 25th.
In Technical Cooperation with ACM Special Interest Group on Security, Audit and Control (SIGSAC).
Proceedings by ACM Press; all papers will be inserted into the ACM Digital Library.
Symposium on Web Technologies & Data Analytics of 39th IEEE COMPSAC 2015, July 1-5, 2015 Tunghai ... more Symposium on Web Technologies & Data Analytics of 39th IEEE COMPSAC 2015, July 1-5, 2015 Tunghai University, Taichung, Taiwan. Call for Papers due Jan 27. CFP @
"CALL FOR PROPOSALS: Phase 2 deadline: July 31'st. Please refer to the updated CFP file attac... more "CALL FOR PROPOSALS:
Phase 2 deadline: July 31'st. Please refer to the updated CFP file attached below.
Papers, special sessions, tutorials, and workshops addressing all aspects of security in information and networks are being sought.
Keynotes by:
Georges ATAYA, Ali AYDIN, Ludmila BABENKO, Bart PRENEEL, Erkay SAVAŞ, Rudrapatna SHYAMASUNDAR, Edgar WEIPPL.
Topics of Interest:
-------------------
Possible topics include:
• Access control and intrusion detection
• Cyber Physical Systems
• Autonomous and adaptive security
• Security tools and development platforms
• Computational intelligence techniques in security
• Security ontology, models, protocols & policies
• Computer network defense
• Standards, guidelines and certification
• Cryptographic techniques and key management
• Security-aware software engineering
• Industrial applications of security
• Trust and privacy
• Information assurance
• Cyber Warfare (attacks and defenses)
• Next generation network architectures
• Malware analysis
• Network security and protocols
• Security challenges in Mobile/Embedded Systems"
Call For Papers: ------------------ We envisage a strong undercurrent of intelligent software ... more Call For Papers:
------------------
We envisage a strong undercurrent of intelligent software
agents, mobile agents, and MAS running through this workshop;
side by side with the use of semantic technologies, there are
several foci of interest:
• Software Agents, Mobile Agents, and MAS,
• Agent, MAS and Semantic Web Technologies,
• Ontologies for Agents and MAS,
• Platforms for semantic agent and MAS implementation,
• Semantic Intelligence and Semantic Robotics,
• Other subjects of relevance in semantic technologies, semantic software agents, mobile agents, agent-based and multi-agent systems.
In: Antipova T., Rocha A. (eds) Digital SciAdvances in Intelligent Systems and Computing, vol 850. Springer, Cham, 2019
In recent years, blockchain technology has affected to a large extent all aspects of life, howeve... more In recent years, blockchain technology has affected to a large extent all aspects of life, however, until now paper-based elections have been practiced. It is time to upgrade the election scenario using modern technology such as blockchain and advanced cryptography methods. Actually, both of Estonia and New South Wales have been using i-voting systems, but after developing an example software of their systems for the purpose of analysis, it is discovered that it has weaknesses against many kinds of attacks, such as malwares, network attacks, and servers attacks. The fact that the blockchain technology has demonstrated infinite immutability and resistance against hacking, so it is possible to use it to secure election results from fraud by saving every single piece of data, record or transaction with unchangeable history. By abandoning the traditional database and compensating it with two blockchains instead of one ensures voter/vote privacy, as well as, safeguards the results from manipulation. Also, using blockchain's distributed network reduces the load on the network. Finally, solutions to problems of impersonation and vote selling are suggested. The technology behind the digital voting system design is explained in terms of the processes involved, such as ID creation, authentication, voting, and vote tallying.
The proceedings of AOW-07, Jan 1, 2008
IEEE COMPSAC'08. 32nd Annual Conference, Jan 1, 2008
Abstract Web mining treats the World Wide Web as the ultimate data source. This area of research ... more Abstract Web mining treats the World Wide Web as the ultimate data source. This area of research is more interesting than data mining involving extracting data from in-house corporate databases or data warehouses. Gathering information from Web sources via distributed intelligent software agents in enterprise architecture can be implemented securely, platform independent, reusable, and would be better modeled in n-tier or enterprise-tier architecture. The purpose of this paper is to develop a novel distributed ...
IEEE COMPSAC'08. 32nd Annual Conference, Jan 1, 2008
Distributed intelligent software agents (DISA) are software agents that help out users and act on... more Distributed intelligent software agents (DISA) are software agents that help out users and act on their behalf. Such agents might be robots or virtual software systems. They are able to intelligent if they interact with their environment in an approach that would generally be observed as intelligent if that communication were carried out by a human being. As a result,
SWWS 2008, Jul 2008
The Semantic Web Technologies (SWTs) are utilized in different areas of research as a tool to rep... more The Semantic Web Technologies (SWTs) are utilized in different areas of research as a tool to represent meaningful and inferable data. Yet researchers try to come up with standardization for usage of SWTs to be able to apply it in various fields. However, the current implementations are very specialized to task and are not flexible for different instances. In this paper, we focus on design and implementation of an interface between matrix data structures utilized in various mathematical software and OWL ontology files. Therefore, ontology files can be embedded into math software for reasoning and calculation purposes. Moreover, the result of math software can be represented in form of ontology files. This issue resolves the lack of math engines to work with semantic web services. In this case a new framework for real-time human interactive communication and semantic software agents are proposed. The representation of traffic network as labyrinth into ontology files helps other information systems to interact much easier. This representation is in terms of an optimized adjacency matrix. As result, the realtime system can detect an ambulance and flow the traffic in such a way that it reaches the nearest hospital much faster. Hence, the labyrinth data should be transformed to an optimized matrix for labyrinth discovery software agents to respond user interactive queries such as finding the best path to an accident for traffic police officers. In this framework, collecting the Drivers' identities and also passengers with use of RFID tags as a part of their ID cards is possible. These data could be used for statistics purposes. The results of the developed system have been tested on cooperative labyrinth discovery agents with great achievements.
Keynote Talk at SIN'18 Blockchain of BitCoin caught most by surprise by its recent rise to stardo... more Keynote Talk at SIN'18
Blockchain of BitCoin caught most by surprise by its recent rise to stardom. There is hardly any realm of computing left without its tentacles touching or about to touch soonest. Besides its simple database roots it has been picked up for roles eventually and necessarily combining security, privacy and trust premises in recently evolved information systems.
This talk will survey Blockchain and related technologies, their uses and limits with a view towards how to take advantage of its eminent rise.
Episode 10: Q&A on Big data, IoT, infrastructure, computing
Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı? ... more Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı?
(How much and what type of personal data is being collected during medical processes? Are such private data safe? What to do?)
Bu sunuşum aynı zamanda benim Anlamsal Etmenler ve Büyük Veri Çözümlemesi projelerimle de ilgilidir.
Paneldeki diğer konuşmacılar için bkz. http://ab.org.tr/ab17/ozet/240.html.
Resimler için bkz. https://goo.gl/photos/AFjLeR2ofPQeYwBd6 )
(Also relevant for my other projects: Semantic agent systems, Big data & analytics.
Other presenters in this panel: see http://ab.org.tr/ab17/ozet/240.html
Pictures: see https://goo.gl/photos/AFjLeR2ofPQeYwBd6 )
Invited talk at Theory and Practice of Digital Textbooks, Moscow, Russia. Digital textbook desig... more Invited talk at Theory and Practice of Digital Textbooks, Moscow, Russia.
Digital textbook design, development and utilization; MetaSystems vision; Meta-Era infrastructure and API; my recent related works.
The part big data and analytics will be playing in our lives, especially security and privacy asp... more The part big data and analytics will be playing in our lives, especially security and privacy aspects, is being highlighted. Projection is made and possible measures to alleviate its effects are considered.
Call for Chapters- AIP-SCPS, 2020
Topics of interest include, but are not limited to: • Data management, knowledge representation ... more Topics of interest include, but are not limited to:
• Data management, knowledge representation and ontology for Cyber-Physical Systems
• Big data and smart computing for Cyber-Physical Systems
• Algorithms, models, and designs for social Cyber-Physical Systems
• Machine learning for/with Cyber-Physical Systems
• Nature-Inspired Algorithms for Cyber-Physical Systems
• Affecting Ubiquitous Intelligence in Cyber-Physical Computing
• Device Virtualization (DV) in pervasive Cyber-Physical Systems
• Issues and implementation of Privacy, Security, and Trust in Cyber-Physical Systems
• Affecting Context-Awareness for Cyber-Physical Systems
• Design, development, and implementation of Smart Cyber-Physical Systems
• Comparison of artificial intelligence-based approaches to Cyber-Physical Systems
• AI-based fraud detection, and mitigation
• Smart IDS and IPS for Cyber-Physical System
• Cyber-attack forecasting, detection, and mitigation
• Innovative applications of Cyber-Physical Systems in various domains
IEEE COMPSAC Website, 2020
Papers are sought on the following tracks: - e-Health and Applications - Artificial Intelligence ... more Papers are sought on the following tracks:
- e-Health and Applications
- Artificial Intelligence with Web Technologies and Data
- Recommendation Systems, and
- Web Technologies, Services, and Applications.