Atilla Elçi | Hasan Kalyoncu University (original) (raw)

Books by Atilla Elçi

Research paper thumbnail of Artificial Intelligence Paradigms for Smart Cyber-Physical Systems

Artificial Intelligence Paradigms for Smart Cyber-Physical Systems, 2020

Edited book published by IGI Global

Research paper thumbnail of Challenges and Applications of Data Analytics in Social Perspectives

Challenges and Applications of Data Analytics in Social Perspectives, 2020

Edited book at IGI Global

Research paper thumbnail of SIN2020 CFP

CFP for 14th Intl Conference on Security of Information and Networks

Call for papers and proposals due date October 10. Check www.sinconf.org for updates.

Research paper thumbnail of SIN19-Proceedings

Proc of SIN 2019, 2019

TOC of the proceedings of SIN 2019: all papers are open access through SIN 2019 website

Research paper thumbnail of Call for Chapters: Artificial Intelligence Paradigms for Smart Cyber-Physical Systems

Topics of interest include, but are not limited to: • Data management, knowledge representation ... more Topics of interest include, but are not limited to:

• Data management, knowledge representation and ontology for Cyber-Physical Systems
• Big data and smart computing for Cyber-Physical Systems
• Algorithms, models, and designs for social Cyber-Physical Systems
• Machine learning for/with Cyber-Physical Systems
• Nature-Inspired Algorithms for Cyber-Physical Systems
• Affecting Ubiquitous Intelligence in Cyber-Physical Computing
• Device Virtualization (DV) in pervasive Cyber-Physical Systems
• Issues and implementation of Privacy, Security, and Trust in Cyber-Physical Systems
• Affecting Context-Awareness for Cyber-Physical Systems
• Design, development, and implementation of Smart Cyber-Physical Systems
• Comparison of artificial intelligence-based approaches to Cyber-Physical Systems
• AI-based fraud detection, and mitigation
• Smart IDS and IPS for Cyber-Physical System
• Cyber-attack forecasting, detection, and mitigation
• Innovative applications of Cyber-Physical Systems in various domains

Research paper thumbnail of Call for Chapters AIP SCPS

Research paper thumbnail of Call for Chapters: Artificial Intelligence Paradigms for Smart Cyber-Physical Systems

Research paper thumbnail of Call for Chapters: Artificial Intelligence Paradigms for Smart Cyber-Physical Systems

Research paper thumbnail of Call for Chapters: Artificial Intelligence Paradigms for Smart Cyber-Physical Systems

Research paper thumbnail of Call for Chapters: Artificial Intelligence Paradigms for Smart Cyber-Physical Systems

Research paper thumbnail of Call for Chapters: Artificial Intelligence Paradigms for Smart Cyber-Physical Systems

Research paper thumbnail of Smart Computing Paradigms: New Progresses and Challenges, Volume 2

Proceedings of ICAGNI 2018 v2, 2020

Proceedings of ICAGNI 2018 in Advances in Intelligent Systems and Computing Series Volume 767 By ... more Proceedings of ICAGNI 2018
in Advances in Intelligent Systems and Computing Series
Volume 767
By Springer

Research paper thumbnail of Smart Computing Paradigms: New Progresses and Challenges, Volume 1

Proceedings of ICAGNI 2018, 2020

Proceedings of ICAGNI 2018 in Advances in Intelligent Systems and Computing Series Volume 766 By... more Proceedings of ICAGNI 2018
in Advances in Intelligent Systems and Computing Series
Volume 766
By Springer

Research paper thumbnail of SIN'18 Proceedings - Frontmatter

Proceedings of the 11th International Conference on Security of Information and Networks

Research paper thumbnail of Metacognition and Successful Learning Strategies in Higher Education

Metacognition and Successful Learning Strategies in Higher Education is a detailed resource of sc... more Metacognition and Successful Learning Strategies in Higher Education is a detailed resource of scholarly perspectives that discusses current trends in learning assessments. Featuring extensive coverage on topics such as spiritual intelligence strategies, literacy development, and ubiquitous learning, this is an ideal reference source for academicians, graduate students, practitioners, and researchers who want to improve their learning strategies using metacognition studies.

Research paper thumbnail of Semantic Aspects of MetaSystems Learning Design.pdf

Research paper thumbnail of Handbook of Applied Learning Theory and Design in Modern Education

Call for Chapter Proposals: New cycle, new deadlines: Upload a chapter proposal of 1,000 to 2,... more Call for Chapter Proposals:

New cycle, new deadlines: Upload a chapter proposal of 1,000 to 2,000 words by September 15th. Notification is by September 30th with full chapter submission by November 30th.

http://www.igi-global.com/publish/call-for-papers/call-details/1423

Research paper thumbnail of Theory and Practice of Cryptography Solutions for Secure Information Systems

Information Systems (IS) play a central part in all aspects of our world, from science, medicine,... more Information Systems (IS) play a central part in all aspects of our world, from science, medicine, and engineering, to industry, business, law, politics, government, arts, culture, society, health, operational support in daily life, surveillance of infrastructure and environment, and homeland protection and national security. Without proper security precautions, IS are prone to unexpected and intolerable side effects, such as leakage of operational and confidential data, identity theft and unauthorized access, and possibly modification of private data, services, and systems. Security services are required in order to guarantee information security and protection of privacy, such as data confidentiality, data authentication, anonymity, entity authentication, non-repudiation of origin and receipt, access control, protection against denial of service and phishing, and secure processing and deletion of data. In a nutshell, dependable and trustworthy security solutions based on strong cryptography are needed.

Research paper thumbnail of Theory and Practice of Cryptography Solutions for Secure Information Systems

This is a fast track publication opportunity. This book will be published by IGI Global by end 20... more This is a fast track publication opportunity. This book will be published by IGI Global by end 2012 / early 2013.
Recommended topics in theory, tools, and applications of cryptographic solutions for information systems include, but are not limited to the following:
• Cryptography
• Cryptography and Security
• Cryptography and Data Protection
• Cryptography and Privacy
• Cryptography and Cryptanalysis
• Cryptographic Protocols
• Cryptographic Solutions
• Copyright protection
• Agent & Multi-agent System Security
• Authentication & Authorization
• Engineering Secure Information Systems
• Forensics and Ethical Hacking
• Key Management
• Ontology of Cryptographic Solutions
• Public-key Crypto Systems
• Standards, guidelines and certification

Manuscripts in which cryptographic solutions for IS are not the main focus will not be accepted.

Research paper thumbnail of Semantic Agent Systems - Foundations and Applications

Semantic agent systems are about the integration of the semantic Web, software agents, and multi-... more Semantic agent systems are about the integration of the semantic Web, software agents, and multi-agent systems technologies. Like in the past (e.g. biology and informatics yielding bioinformatics) a whole new perspective is emerging with semantic agent systems. In this context, the semantic Web is a Web of semantically linked data which aims to enable man and machine to execute tasks in tandem. Here, software agents in a multi-agent system as delegates of humans are endowed with power to use semantically linked data.
This edited book “Semantic Agent Systems: Foundations and Applications” proposes contributions on a wide range of topics on foundations and applications written by a selection of international experts. It first introduces in an accessible style the nature of semantic agent systems. Then it explores with numerous illustrations new frontiers in software agent technology.
“Semantic Agent Systems: Foundations and Applications” is recommended for scientists, experts, researchers, and learners in the field of artificial intelligence, the semantic Web, software agents, and multi-agent systems technologies.

Dr. Atilla Elçi is a professor of computer science at Toros University, Mersin, Turkey;

Dr. Mamadou Tadiou Kone is a research scientist at International Computing
Research, Boston, MA, USA;

Dr. Mehmet A. Orgun is a professor of computer science at Macquarie University, Sydney, Australia.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
TOC:

PREFACE

Section 1 INTRODUCTION TO AGENTS AND SEMANTICS

1 Rule Responder Agents - Framework and Instantiations.
Harold Boley (National Research Council); Adrian Paschke (Free University Berlin)

2 Specifying and Monitoring Obligations in Open Multiagent Systems using Semantic Web Technology.
Nicoletta Fornara (University of Lugano)

3 Semantic Agent Model for Distributed Knowledge Management.
Julien Subercaze (LIRIS); Pierre Maret (LaHC )

Section 2 ENGINEERING SEMANTIC AGENT SYSTEMS

4 SBVR-driven Information Governance: a Case Study in the Flemish Public Administration.
Pieter De Leenheer (Vrije Universiteit and Collibra nv/sa et al.

5 Argumentation for reconciling agent ontologies.
Cassia Trojahn (INRIA); Jérôme Euzenat (INRIA); Valentina Tamma
(University of Liverpool); Terry Payne (University of Liverpool)

6 Measuring Complexity for MAS Design in the presence of Ontology Heterogeneity
Maricela Bravo (CINVESTAV)

7 Ontology-based Matchmaking and Composition of Business Processes.
Duygu Celik (EMU); Atilla Elci (METU)

8 Semantic Architecture for Human Robot Interaction.
Sebastien Dourlens Amar Ramdane Cherfi (LISV/UVSQ (Versailles University France));

Section 3. APPLICATIONS OF SEMANTIC AGENT SYSTEMS

9 A Semantic Agent Framework for Cyber-Physical Systems.
Jing Lin; Sahra Sedigh; Ann Miller (Missouri University of Science and Technology)

10 A Layered Manufacturing System Architecture Supported with Semantic Agents Capabilities.
Munir Merdan; Mathieu Vallee; Thomas Moser; Stefan Biffl (Vienna University of Technolog)

11 Semantic Multi-Agent mLearning System.
Stanimir Stojanov (Plovdiv University) et al.

12 Identifying Novel Topics based on User Interests.
Makoto Nakatsuji (NTT)

Section 4. FUTURE LOOK

13 Understanding, Misunderstanding, Multi-understanding, and Switchable Understanding by Agents.
Tuncer Oren (University of Ottawa); Levent Yilmaz (Auburn University)

INDEX

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Research paper thumbnail of Artificial Intelligence Paradigms for Smart Cyber-Physical Systems

Artificial Intelligence Paradigms for Smart Cyber-Physical Systems, 2020

Edited book published by IGI Global

Research paper thumbnail of Challenges and Applications of Data Analytics in Social Perspectives

Challenges and Applications of Data Analytics in Social Perspectives, 2020

Edited book at IGI Global

Research paper thumbnail of SIN2020 CFP

CFP for 14th Intl Conference on Security of Information and Networks

Call for papers and proposals due date October 10. Check www.sinconf.org for updates.

Research paper thumbnail of SIN19-Proceedings

Proc of SIN 2019, 2019

TOC of the proceedings of SIN 2019: all papers are open access through SIN 2019 website

Research paper thumbnail of Call for Chapters: Artificial Intelligence Paradigms for Smart Cyber-Physical Systems

Topics of interest include, but are not limited to: • Data management, knowledge representation ... more Topics of interest include, but are not limited to:

• Data management, knowledge representation and ontology for Cyber-Physical Systems
• Big data and smart computing for Cyber-Physical Systems
• Algorithms, models, and designs for social Cyber-Physical Systems
• Machine learning for/with Cyber-Physical Systems
• Nature-Inspired Algorithms for Cyber-Physical Systems
• Affecting Ubiquitous Intelligence in Cyber-Physical Computing
• Device Virtualization (DV) in pervasive Cyber-Physical Systems
• Issues and implementation of Privacy, Security, and Trust in Cyber-Physical Systems
• Affecting Context-Awareness for Cyber-Physical Systems
• Design, development, and implementation of Smart Cyber-Physical Systems
• Comparison of artificial intelligence-based approaches to Cyber-Physical Systems
• AI-based fraud detection, and mitigation
• Smart IDS and IPS for Cyber-Physical System
• Cyber-attack forecasting, detection, and mitigation
• Innovative applications of Cyber-Physical Systems in various domains

Research paper thumbnail of Call for Chapters AIP SCPS

Research paper thumbnail of Call for Chapters: Artificial Intelligence Paradigms for Smart Cyber-Physical Systems

Research paper thumbnail of Call for Chapters: Artificial Intelligence Paradigms for Smart Cyber-Physical Systems

Research paper thumbnail of Call for Chapters: Artificial Intelligence Paradigms for Smart Cyber-Physical Systems

Research paper thumbnail of Call for Chapters: Artificial Intelligence Paradigms for Smart Cyber-Physical Systems

Research paper thumbnail of Call for Chapters: Artificial Intelligence Paradigms for Smart Cyber-Physical Systems

Research paper thumbnail of Smart Computing Paradigms: New Progresses and Challenges, Volume 2

Proceedings of ICAGNI 2018 v2, 2020

Proceedings of ICAGNI 2018 in Advances in Intelligent Systems and Computing Series Volume 767 By ... more Proceedings of ICAGNI 2018
in Advances in Intelligent Systems and Computing Series
Volume 767
By Springer

Research paper thumbnail of Smart Computing Paradigms: New Progresses and Challenges, Volume 1

Proceedings of ICAGNI 2018, 2020

Proceedings of ICAGNI 2018 in Advances in Intelligent Systems and Computing Series Volume 766 By... more Proceedings of ICAGNI 2018
in Advances in Intelligent Systems and Computing Series
Volume 766
By Springer

Research paper thumbnail of SIN'18 Proceedings - Frontmatter

Proceedings of the 11th International Conference on Security of Information and Networks

Research paper thumbnail of Metacognition and Successful Learning Strategies in Higher Education

Metacognition and Successful Learning Strategies in Higher Education is a detailed resource of sc... more Metacognition and Successful Learning Strategies in Higher Education is a detailed resource of scholarly perspectives that discusses current trends in learning assessments. Featuring extensive coverage on topics such as spiritual intelligence strategies, literacy development, and ubiquitous learning, this is an ideal reference source for academicians, graduate students, practitioners, and researchers who want to improve their learning strategies using metacognition studies.

Research paper thumbnail of Semantic Aspects of MetaSystems Learning Design.pdf

Research paper thumbnail of Handbook of Applied Learning Theory and Design in Modern Education

Call for Chapter Proposals: New cycle, new deadlines: Upload a chapter proposal of 1,000 to 2,... more Call for Chapter Proposals:

New cycle, new deadlines: Upload a chapter proposal of 1,000 to 2,000 words by September 15th. Notification is by September 30th with full chapter submission by November 30th.

http://www.igi-global.com/publish/call-for-papers/call-details/1423

Research paper thumbnail of Theory and Practice of Cryptography Solutions for Secure Information Systems

Information Systems (IS) play a central part in all aspects of our world, from science, medicine,... more Information Systems (IS) play a central part in all aspects of our world, from science, medicine, and engineering, to industry, business, law, politics, government, arts, culture, society, health, operational support in daily life, surveillance of infrastructure and environment, and homeland protection and national security. Without proper security precautions, IS are prone to unexpected and intolerable side effects, such as leakage of operational and confidential data, identity theft and unauthorized access, and possibly modification of private data, services, and systems. Security services are required in order to guarantee information security and protection of privacy, such as data confidentiality, data authentication, anonymity, entity authentication, non-repudiation of origin and receipt, access control, protection against denial of service and phishing, and secure processing and deletion of data. In a nutshell, dependable and trustworthy security solutions based on strong cryptography are needed.

Research paper thumbnail of Theory and Practice of Cryptography Solutions for Secure Information Systems

This is a fast track publication opportunity. This book will be published by IGI Global by end 20... more This is a fast track publication opportunity. This book will be published by IGI Global by end 2012 / early 2013.
Recommended topics in theory, tools, and applications of cryptographic solutions for information systems include, but are not limited to the following:
• Cryptography
• Cryptography and Security
• Cryptography and Data Protection
• Cryptography and Privacy
• Cryptography and Cryptanalysis
• Cryptographic Protocols
• Cryptographic Solutions
• Copyright protection
• Agent & Multi-agent System Security
• Authentication & Authorization
• Engineering Secure Information Systems
• Forensics and Ethical Hacking
• Key Management
• Ontology of Cryptographic Solutions
• Public-key Crypto Systems
• Standards, guidelines and certification

Manuscripts in which cryptographic solutions for IS are not the main focus will not be accepted.

Research paper thumbnail of Semantic Agent Systems - Foundations and Applications

Semantic agent systems are about the integration of the semantic Web, software agents, and multi-... more Semantic agent systems are about the integration of the semantic Web, software agents, and multi-agent systems technologies. Like in the past (e.g. biology and informatics yielding bioinformatics) a whole new perspective is emerging with semantic agent systems. In this context, the semantic Web is a Web of semantically linked data which aims to enable man and machine to execute tasks in tandem. Here, software agents in a multi-agent system as delegates of humans are endowed with power to use semantically linked data.
This edited book “Semantic Agent Systems: Foundations and Applications” proposes contributions on a wide range of topics on foundations and applications written by a selection of international experts. It first introduces in an accessible style the nature of semantic agent systems. Then it explores with numerous illustrations new frontiers in software agent technology.
“Semantic Agent Systems: Foundations and Applications” is recommended for scientists, experts, researchers, and learners in the field of artificial intelligence, the semantic Web, software agents, and multi-agent systems technologies.

Dr. Atilla Elçi is a professor of computer science at Toros University, Mersin, Turkey;

Dr. Mamadou Tadiou Kone is a research scientist at International Computing
Research, Boston, MA, USA;

Dr. Mehmet A. Orgun is a professor of computer science at Macquarie University, Sydney, Australia.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
TOC:

PREFACE

Section 1 INTRODUCTION TO AGENTS AND SEMANTICS

1 Rule Responder Agents - Framework and Instantiations.
Harold Boley (National Research Council); Adrian Paschke (Free University Berlin)

2 Specifying and Monitoring Obligations in Open Multiagent Systems using Semantic Web Technology.
Nicoletta Fornara (University of Lugano)

3 Semantic Agent Model for Distributed Knowledge Management.
Julien Subercaze (LIRIS); Pierre Maret (LaHC )

Section 2 ENGINEERING SEMANTIC AGENT SYSTEMS

4 SBVR-driven Information Governance: a Case Study in the Flemish Public Administration.
Pieter De Leenheer (Vrije Universiteit and Collibra nv/sa et al.

5 Argumentation for reconciling agent ontologies.
Cassia Trojahn (INRIA); Jérôme Euzenat (INRIA); Valentina Tamma
(University of Liverpool); Terry Payne (University of Liverpool)

6 Measuring Complexity for MAS Design in the presence of Ontology Heterogeneity
Maricela Bravo (CINVESTAV)

7 Ontology-based Matchmaking and Composition of Business Processes.
Duygu Celik (EMU); Atilla Elci (METU)

8 Semantic Architecture for Human Robot Interaction.
Sebastien Dourlens Amar Ramdane Cherfi (LISV/UVSQ (Versailles University France));

Section 3. APPLICATIONS OF SEMANTIC AGENT SYSTEMS

9 A Semantic Agent Framework for Cyber-Physical Systems.
Jing Lin; Sahra Sedigh; Ann Miller (Missouri University of Science and Technology)

10 A Layered Manufacturing System Architecture Supported with Semantic Agents Capabilities.
Munir Merdan; Mathieu Vallee; Thomas Moser; Stefan Biffl (Vienna University of Technolog)

11 Semantic Multi-Agent mLearning System.
Stanimir Stojanov (Plovdiv University) et al.

12 Identifying Novel Topics based on User Interests.
Makoto Nakatsuji (NTT)

Section 4. FUTURE LOOK

13 Understanding, Misunderstanding, Multi-understanding, and Switchable Understanding by Agents.
Tuncer Oren (University of Ottawa); Levent Yilmaz (Auburn University)

INDEX

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Research paper thumbnail of Publicity Chairs

Conference Chairs Dr. Roger Lee, Central Michigan University, USA Dr. Wencai Du, Hainan Universit... more Conference Chairs Dr. Roger Lee, Central Michigan University, USA Dr. Wencai Du, Hainan University, China ... Program Chairs Dr. Haeng-Kon Kim, Catholic University of Daegu, Korea Dr. Simon Xu, Algoma University, Canada ... Publicity Chairs Prof. Paolo Bellavista, Università degli Studi di Bologna, Italy Prof. Shaoying Liu, Hosei University, Japan Prof. Jian Yang, Macquarie University, Australia Prof. Ahmed Jerraya, MINATEC, France Prof. Jongkun Lee, Changwon National University, Korea Prof. Ville Leppänen, University of Turku and TUCS, Finland Prof. ...

Research paper thumbnail of Canada & South America

ieeexplore.ieee.org

USA Hira Agrawal, Telcordia Applied Research, USA Sheik Iqbal Ahamed, Marquette University, USA C... more USA Hira Agrawal, Telcordia Applied Research, USA Sheik Iqbal Ahamed, Marquette University, USA Christof Budnik, Siemens Corporate Research, USA Bojan Cukic, West Virginia University, USA Ewen Denney, NASA, USA Sudipto Ghosh, Colorado State University, USA Xudong He, Florida International University, USA Murat Kantarcioglu, University of Texas at Dallas, USA Phil Laplante, Penn State University, USA Jenny Li, Avaya Labs Research, USA Yan Liu, Motorola Labs, USA Bruce McMillin, Missouri University of Science and ...

Research paper thumbnail of Local Organising Committee

Robin Bradbeer Department of Electronic Engineering City University of Hong Kong, (Retired,), IEE... more Robin Bradbeer Department of Electronic Engineering City University of Hong Kong, (Retired,), IEEE Consumer Electronics Society (eersbrad@cityu.edu.hk) ... Samad Ahmadi De Montfort University, IEEE Consumer Electronics Society (sahmadi@dmu.ac.uk) ... Larry Zhang Past President of IEEE Consumer Electronics Society and Nominations Chair (lzhang1@ti.com) William Lumpkins Past President of IEEE Consumer Electronics Society and Vice President of Standards (xillia@ieee.org) ... Samad Ahmadi De Montfort University, ...

Research paper thumbnail of Compsac 2011

computer.org

Aaron McDonald Aaron Quigley Abhilasa Bhargav-Spantzel Achilles Kameas Adel Al-Hezmi Aditya K. Gh... more Aaron McDonald Aaron Quigley Abhilasa Bhargav-Spantzel Achilles Kameas Adel Al-Hezmi Aditya K. Ghose Ahmad Kayed Akshaye Dhawan Alex Abramovich Alexander Schmitt Alexander Kosin Alexandre David Alfredo Cuzzocrea Ali Bou Nassif Alia I. Abdelmoty Alvin Chan Amr Youssef Ana Sokolova Anand Desai Anastasius Gavras Anatoly Khomonenko Andrea Ahlemeyer-Stubbe Andreas TOLK Andreas Ulrich Andy Neely Aneesh Krishna Angus FM Huang Ankur Teredesai Anna Perini Anwar Mirza Arilo Claudio Arjan van Gemund Arun Bahulkar Arun ...

Research paper thumbnail of CLOUD 2010 Program Committee

doi.ieeecomputersociety.org

Sandip Agarwala, IBM Almaden Research Center, USA Sheikh Iqbal Ahamed, Marquette University, USA ... more Sandip Agarwala, IBM Almaden Research Center, USA Sheikh Iqbal Ahamed, Marquette University, USA Marco Aiello, University of Groningen, Netherlands Masoom Alam, SERG, IMSciences, Pakistan Mikio Aoyama, Nanzan University, Japan Danilo Ardagna, Politecnico di Milano, Italy Janaka L. Balasooriya, Arizona State University, USA Sujoy Basu, HP Labs���Palo Alto, USA Boualem Benatallah, University of New South Wales, Australia Elisa Bertino, Purdue University, USA Bharat K. Bhargava, Purdue University, USA Kumar Bhaskaran, IBM TJ ...

Research paper thumbnail of Compsac 2010

computer.org

Azma Abdullah Sheikh Iqbal Ahamed Raihan Al-Ekram Mikio Aoyama Keijiro Araki Ravi Arvapally Isik ... more Azma Abdullah Sheikh Iqbal Ahamed Raihan Al-Ekram Mikio Aoyama Keijiro Araki Ravi Arvapally Isik Aybay Hüseyin Aysan Ryan Babbitt Doo-Hwan Bae Jung Ho Bae Xiaoying Bai Jongmoon Baik Pooyan Balouchian Kevin J Barker Paolo Bellavista Fevzi Belli Maarten Boasson Jan Bosch Zachary Bourque Ying Cai Jan Camenisch Sungdeok Cha Heung-Seok Chae Liton Chakrabarty WK Chan Carl K. Chang YC Chen SC Cheung Kyoungmin Cho Byoungju Choi William Chu Ivica Crnkovic James Cross Alan Davis Derek Ditch Bertrand du Castel Eric Dubois Omar ...

Research paper thumbnail of Tıp Bilişiminde Sorunlar ve Yenilikler Panel Sunuşu (Issues and Innovation in Medical Informatics Panel Presentation)

Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı? (... more Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı? (How much and what type of personal data is being collected during medical processes? Are such private data safe? What to do?) Bu sunuşum aynı zamanda benim Anlamsal Etmenler ve Büyük Veri Çözümlemesi projelerimle de ilgilidir. Paneldeki diğer konuşmacılar için bkz. http://ab.org.tr/ab17/ozet/240.html. Resimler için bkz. https://goo.gl/photos/AFjLeR2ofPQeYwBd6 ) (Also relevant for my other projects: Semantic agent systems, Big data & analytics. Other presenters in this panel: see http://ab.org.tr/ab17/ozet/240.html Pictures: see https://goo.gl/photos/AFjLeR2ofPQeYwBd6 )

Research paper thumbnail of Artificial Intelligence Paradigms for Smart Cyber-Physical Systems

Advances in Systems Analysis, Software Engineering, and High Performance Computing, 2021

Engineering Science Reference, [2021] | Includes bibliographical references and index. | Summary:... more Engineering Science Reference, [2021] | Includes bibliographical references and index. | Summary: "This book focuses upon the recent advances in the realization of Artificial Intelligence-based approaches towards affecting secure Cyber-Physical Systems. It features contributions pertaining to this multidisciplinary paradigm, in particular, in its application to building sustainable space by investigating state-of-art research issues, applications and achievements in the field of Computational Intelligence Paradigms for Cyber-Physical Systems"-Provided by publisher.

Research paper thumbnail of Parsekey: Güvenli̇ Ki̇mli̇k Beli̇rleme Hi̇zmeti̇nde Yeni̇ Bi̇r Yaklaşim

emo.org.tr

ÖZET Güvenli olmayan ağlarda kimlik belirleme hizmetini kırmaya yönelik şifre çözümlemesi korunmu... more ÖZET Güvenli olmayan ağlarda kimlik belirleme hizmetini kırmaya yönelik şifre çözümlemesi korunmuş bilgilerin elde edilmesi olasılığına işaret ediyor. Buna göre araştırmacılar daha güvenli temelleri geliştirip uygulamaya çalışmaktadırlar. Gizli yazım (steganography) yoluyla MD5 ve SHA1 algoritmaları uygulanarak anahtarın gizlenmesi temelinde yeni ve güvenli bir yöntem olarak ParseKey önerilmektedir. Bu yöntem aynı zamanda, istemci tarafında giriş bilgilerini tutmak veya sunumcu VT'ndaki anahtarı değiştirme gereği gibi zayıflıkları ...

Research paper thumbnail of Applying ParseKey+ as a New Multi-Way Client and Server Authentication Approach to Resolve Imperfect Counter Utilization in IEEE802. 11i for Impersonation Avoidance

Security of Information and Networks: Proceedings of the First International Conference on Security of Information and Networks (SIN 2007), Jan 17, 2008

Abstract. This paper presents the ParseKey+, an approach to a new highlysecure and safe authentic... more Abstract. This paper presents the ParseKey+, an approach to a new highlysecure and safe authentication service. The scheme includes authentication process for both client and server sides in addition to passwords of each side. ParseKey+ employs transposition to hide the encrypted key in a key file retrievable only by the other side knowing the indices and lengths of sub-keys inside ParseKey+ encrypted file. ParseKey+ avoids client and server impersonations in addition to mutual client/server authentication. Therefore, the ...

Research paper thumbnail of In addition to the Program Committee members, a large number of individuals who belong to review committees for the CIMCA 2008, IAWTIC 2008 and ISE 2008 conferences. The Conference Committee would like to thank them for their assistance in reviewing papers submitted to the above-mentioned confere...

computer.org

In addition to the Program Committee members, a large number of individuals who belong to review ... more In addition to the Program Committee members, a large number of individuals who belong to review committees for the CIMCA 2008, IAWTIC 2008 and ISE 2008 conferences. The Conference Committee would like to thank them for their assistance in reviewing papers submitted to the abovementioned conferences. ... Andreou Andreas, University of Cyprus, Cyprus Anthony Dekker, DSTO, Australia Ardeshir Karami Mohammadi, Shahrood University of Technology, Iran Arshad Ali, National University of Science and Technology, Pakistan Ashutosh Tiwari, ...

Research paper thumbnail of SERVICES 2010 Technical Steering and Program Committees

computer.org

Carl K. Chang, Iowa State University, USA Ephraim Feig, Innovations-to-Market, USA Hemant Jain, U... more Carl K. Chang, Iowa State University, USA Ephraim Feig, Innovations-to-Market, USA Hemant Jain, University of Wisconsin–Milwaukee , USA Frank Leymann, University of Stuttgart, Germany Calton Pu, Georgia Tech, USA Liang-Jie Zhang, IBM TJ Watson Research Center, USA ... Sriram Anand, Accenture, India Ali Bahrami, Boeing Research and Technology, USA Akhilesh Bajaj, University of Tulsa, USA Sujoy Basu, HP Palo Alto Labs, USA Manish A. Bhide, IBM India Research Lab, India Zhixiong Chen, Mercy College, USA Cecil Chua, Nanyang ...

Research paper thumbnail of Proceedings of the 2012 international conference on Pervasive Computing and the Networked World

Research paper thumbnail of An Intelligent Tracking System: Application to Acute Respiratory Tract Infection (TrackARTI)

2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)

This article proposes an Intelligent Tracking System for Acute Respiratory Tract Infection (Track... more This article proposes an Intelligent Tracking System for Acute Respiratory Tract Infection (TrackARTI) via a smart mobile for monitoring disease term of 0-6 age group child patients remotely (e.g. home, clinics). It is possible to maximize the quality of life of the child patients and decrease parental anxiety by keeping the child under control during monitoring stage and achieve a proper distant diagnose by the patient's clinician. This is possible with the designs of intelligent M-Health systems that can be used for diagnosing and monitoring the child patients away from hospitals by presenting the instant medical data to their registered doctors. Intelligent M-Health systems require strong knowledge management technology and ease of extension to provide information from additional medical tools. With the contribution of intelligent M-Health systems, it is possible to infer new facts from the certain gathered medical data during examination from child patients. This article mentions an intelligent and easy medical data gathering system that can be used by pediatricians or parents any time. In addition, the system has its own inferencing mechanism that involves two main steps, inferencing on image processing and Semantic Web rule knowledge base.

Research paper thumbnail of Dynamic Quota Calculation System (DQCS)

Advances in Computer and Electrical Engineering

One of the most important IT sectors that requires big data management is mobile data communicati... more One of the most important IT sectors that requires big data management is mobile data communication systems (MDCS) of GSM companies. In the charging mechanism of current MDCS, a subscriber “surfs” on the internet that creates data traffic and a counter subtracts the amount of data used by the user from the subscriber's quota. In other words, instant constant quota values are assigned to subscribers without concern for their previous amount of internet usage in current MDCS. Moreover, constant quota values cause constant charge calls in control traffic that are repeated for all new quota requests. Thus, performance degradation occurs because of the repetition of quota request calls and allocations. In this chapter, a dynamic quota calculation system (DQCS) is proposed for dynamic quota allocations and charging in MDCS using data mining approaches as two cascaded blocks. The first block is self-organizing map (SOM) clustering based on a sliding window (SW) methodology followed by ...

Research paper thumbnail of Educational

Current approaches to feature selection for text classification aim to reduce the number of terms... more Current approaches to feature selection for text classification aim to reduce the number of terms that are used to describe documents. Thus, documents can be classified and found with greater ease and precision. A key shortcoming of these approaches is that they select the topmost terms to describe documents after ranking all terms using a feature selection measure (scoring function). Lesser high-ranking terms below the topmost terms are discarded to reduce computational costs. Nevertheless, in many cases, they may have considerable discriminative power to enhance the text classification precision. In order to address this issue, we proposed a new feature weighting formalism that ties the topmost terms with lesser high-ranking terms using probabilistic neural networks. In the proposed method, probabilistic neural networks are formed using relative category distribution matrix and topmost terms are re-weighted and passed to Rocchio classifier. This is achieved without increasing the ...

Research paper thumbnail of Ontology-Based Obesity Tracking System for Children and Adolescents

2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), 2018

Obesity is a public health problem that has become widespread worldwide. Obesity may increase the... more Obesity is a public health problem that has become widespread worldwide. Obesity may increase the risk for many health problems such as early puberty, Type 2 diabetes, certain types of cancer, high blood pressure, heart diseases, and sleep apnea. The detection of obesity in children and adolescents at early stages is important and it is crucial to start individual based treatments. Due to the widespread use of smart mobile devices among family members and increasing number of m-Health applications to fight against obesity as well as other diseases, m-Health applications can be a good choice for early detection of obesity in childhood and adolescence stages. Recently, many studies about mobile-based obesity tracking system that mostly for adults have been done. This research study especially emphases obesity management in childhood and adolescence stages with the contribution of Semantic Web technology. Therefore, the system is an ontology-based obesity tracking system for children and adolescents which has its own Obesity Tracking Ontology and medical semantic rule knowledge base with an inference engine.

Research paper thumbnail of Advanced Security Using Blockchain and Distributed Ledger Technology

Blockchain Technology for Data Privacy Management, 2021

Research paper thumbnail of 2 Towards Semantically Intelligent Robots

Approaches are needed for providing advanced autonomous wheeled robots with a sense of self, imme... more Approaches are needed for providing advanced autonomous wheeled robots with a sense of self, immediate ambience, and mission. The following list of abilities would form the desired feature set of such approaches: self-localization, detection and correction of course deviation errors, faster and more reliable identification of friend or foe, simultaneous localization and mapping in uncharted environments without necessarily depending on external assistance, and being able to serve as web services. Situations, where enhanced robots with such rich feature sets come to play, span competitions such as line following, cooperative mini sumo fighting, and cooperative labyrinth discovery. In this chapter we look into how such features may be realized towards creating intelligent robots. Currently through-cell localization in robots mainly relies on availability of shaft-encoders. In this regard, we would like to firstly present a simple-to-implement through-cell localization approach for rob...

Research paper thumbnail of İlçe Beledi̇ye Çalişanlarinin Örgütsel Bağlilik Düzeyleri̇: Aksaray İli̇ Örneği̇

Diger kurumlar gibi belediyelerin de basarilarini yuksek tutmak icin calisanlarinin belediyelere ... more Diger kurumlar gibi belediyelerin de basarilarini yuksek tutmak icin calisanlarinin belediyelere olan bagliliklarini ust seviyede tutmalarina baglidir. Bagliliklarin ust duzeyde olmasi calisanlarin orgute olan katkilarini da yukseltecektir. Calismamizda, belediye calisanlarinin kurumlarina bagliliklari, kurumlarinin gelisimi ve amaclarina ulasilmasinda orgutsel bagliligin onemli oldugu varsayimindan yola cikilarak Aksaray iline bagli ilce belediye calisanlarina Orgutsel Baglilik Olcegi uygulanmis ve belediye calisanlarinin orgutsel baglilik duzeylerini olcmek hedeflenmistir. Oncelikli olarak Allen ve Meyer (1991) tarafindan gelistirilen bu olcek alt boyutlari olan duygusal baglilik, devam bagliligi ve normatif baglilik boyutlari dogrultusunda 147 belediye calisanina uygulanarak baglilik duzeyleri incelenmeye calisilmistir. Calismanin sonucunda personelin kurumlarina bagliliklarinin duygusal baglilik boyutu yuksek gorulmustur.

Research paper thumbnail of SIN2020 CFP

This is the call for paper for the 13th International Conference on Security of Information and N... more This is the call for paper for the 13th International Conference on Security of Information and Networks (SIN 2020) to be held on 4-7 November 2020
fully ONLINE.

Research paper thumbnail of Light Sec 2016 Accepted Papers

List of accepted papers for oral presentation during LightSec 2016, Sept. 21-22 at Aksaray Univer... more List of accepted papers for oral presentation during LightSec 2016, Sept. 21-22 at Aksaray University, Cappadocia, Turkey

Research paper thumbnail of SIN'16 Conference Program

Final draft of SIN'16 program schedule. Final version is accessible at www.sinconf.org

Research paper thumbnail of SIN 2015 CFP

SIN'15 late-breaking paper submission deadline is May 25th. In Technical Cooperation with AC... more SIN'15 late-breaking paper submission deadline is May 25th.

In Technical Cooperation with ACM Special Interest Group on Security, Audit and Control (SIGSAC).
Proceedings by ACM Press; all papers will be inserted into the ACM Digital Library.

Research paper thumbnail of Call for papers

Symposium on Web Technologies & Data Analytics of 39th IEEE COMPSAC 2015, July 1-5, 2015 Tunghai ... more Symposium on Web Technologies & Data Analytics of 39th IEEE COMPSAC 2015, July 1-5, 2015 Tunghai University, Taichung, Taiwan. Call for Papers due Jan 27. CFP @

Research paper thumbnail of SIN'13- The 6th Intl Conf on Security of Information and Networks

"CALL FOR PROPOSALS: Phase 2 deadline: July 31'st. Please refer to the updated CFP file attac... more "CALL FOR PROPOSALS:

Phase 2 deadline: July 31'st. Please refer to the updated CFP file attached below.

Papers, special sessions, tutorials, and workshops addressing all aspects of security in information and networks are being sought.

Keynotes by:
Georges ATAYA, Ali AYDIN, Ludmila BABENKO, Bart PRENEEL, Erkay SAVAŞ, Rudrapatna SHYAMASUNDAR, Edgar WEIPPL.

Topics of Interest:
-------------------
Possible topics include:
• Access control and intrusion detection
• Cyber Physical Systems
• Autonomous and adaptive security
• Security tools and development platforms
• Computational intelligence techniques in security
• Security ontology, models, protocols & policies
• Computer network defense
• Standards, guidelines and certification
• Cryptographic techniques and key management
• Security-aware software engineering
• Industrial applications of security
• Trust and privacy
• Information assurance
• Cyber Warfare (attacks and defenses)
• Next generation network architectures
• Malware analysis
• Network security and protocols
• Security challenges in Mobile/Embedded Systems"

Research paper thumbnail of ESAS'13: The 8th IEEE Intl Workshop on Engineering Semantic Agents - Intelligence & Robotics

Call For Papers: ------------------ We envisage a strong undercurrent of intelligent software ... more Call For Papers:
------------------
We envisage a strong undercurrent of intelligent software
agents, mobile agents, and MAS running through this workshop;
side by side with the use of semantic technologies, there are
several foci of interest:

• Software Agents, Mobile Agents, and MAS,
• Agent, MAS and Semantic Web Technologies,
• Ontologies for Agents and MAS,
• Platforms for semantic agent and MAS implementation,
• Semantic Intelligence and Semantic Robotics,
• Other subjects of relevance in semantic technologies, semantic software agents, mobile agents, agent-based and multi-agent systems.

Research paper thumbnail of A Design for Blockchain-Based Digital Voting System

In: Antipova T., Rocha A. (eds) Digital SciAdvances in Intelligent Systems and Computing, vol 850. Springer, Cham, 2019

In recent years, blockchain technology has affected to a large extent all aspects of life, howeve... more In recent years, blockchain technology has affected to a large extent all aspects of life, however, until now paper-based elections have been practiced. It is time to upgrade the election scenario using modern technology such as blockchain and advanced cryptography methods. Actually, both of Estonia and New South Wales have been using i-voting systems, but after developing an example software of their systems for the purpose of analysis, it is discovered that it has weaknesses against many kinds of attacks, such as malwares, network attacks, and servers attacks. The fact that the blockchain technology has demonstrated infinite immutability and resistance against hacking, so it is possible to use it to secure election results from fraud by saving every single piece of data, record or transaction with unchangeable history. By abandoning the traditional database and compensating it with two blockchains instead of one ensures voter/vote privacy, as well as, safeguards the results from manipulation. Also, using blockchain's distributed network reduces the load on the network. Finally, solutions to problems of impersonation and vote selling are suggested. The technology behind the digital voting system design is explained in terms of the processes involved, such as ID creation, authentication, voting, and vote tallying.

Research paper thumbnail of Enterprise Semantic Information Search System Based on New Music and Audio Ontology Integrating Existing Ontologies.

The proceedings of AOW-07, Jan 1, 2008

Research paper thumbnail of A New Software Architecture for J2EE Enterprise Environments via Semantic Access to Web Sources for Web Mining by Distributed Intelligent Software Agents

IEEE COMPSAC'08. 32nd Annual Conference, Jan 1, 2008

Abstract Web mining treats the World Wide Web as the ultimate data source. This area of research ... more Abstract Web mining treats the World Wide Web as the ultimate data source. This area of research is more interesting than data mining involving extracting data from in-house corporate databases or data warehouses. Gathering information from Web sources via distributed intelligent software agents in enterprise architecture can be implemented securely, platform independent, reusable, and would be better modeled in n-tier or enterprise-tier architecture. The purpose of this paper is to develop a novel distributed ...

Research paper thumbnail of SDISSASA: A multiagent-Based Web Mining via Semantic Access to Web Resources in Enterprise Architecture

IEEE COMPSAC'08. 32nd Annual Conference, Jan 1, 2008

Distributed intelligent software agents (DISA) are software agents that help out users and act on... more Distributed intelligent software agents (DISA) are software agents that help out users and act on their behalf. Such agents might be robots or virtual software systems. They are able to intelligent if they interact with their environment in an approach that would generally be observed as intelligent if that communication were carried out by a human being. As a result,

Research paper thumbnail of Embedding Matrices Ontology into Math Software Engines to Support Reasoning and Mission Oriented Calculation in Developing Semantic Agents

SWWS 2008, Jul 2008

The Semantic Web Technologies (SWTs) are utilized in different areas of research as a tool to rep... more The Semantic Web Technologies (SWTs) are utilized in different areas of research as a tool to represent meaningful and inferable data. Yet researchers try to come up with standardization for usage of SWTs to be able to apply it in various fields. However, the current implementations are very specialized to task and are not flexible for different instances. In this paper, we focus on design and implementation of an interface between matrix data structures utilized in various mathematical software and OWL ontology files. Therefore, ontology files can be embedded into math software for reasoning and calculation purposes. Moreover, the result of math software can be represented in form of ontology files. This issue resolves the lack of math engines to work with semantic web services. In this case a new framework for real-time human interactive communication and semantic software agents are proposed. The representation of traffic network as labyrinth into ontology files helps other information systems to interact much easier. This representation is in terms of an optimized adjacency matrix. As result, the realtime system can detect an ambulance and flow the traffic in such a way that it reaches the nearest hospital much faster. Hence, the labyrinth data should be transformed to an optimized matrix for labyrinth discovery software agents to respond user interactive queries such as finding the best path to an accident for traffic police officers. In this framework, collecting the Drivers' identities and also passengers with use of RFID tags as a part of their ID cards is possible. These data could be used for statistics purposes. The results of the developed system have been tested on cooperative labyrinth discovery agents with great achievements.

Research paper thumbnail of Unavoidable Rise of Blockchain. Yet, How Far?

Keynote Talk at SIN'18 Blockchain of BitCoin caught most by surprise by its recent rise to stardo... more Keynote Talk at SIN'18
Blockchain of BitCoin caught most by surprise by its recent rise to stardom. There is hardly any realm of computing left without its tentacles touching or about to touch soonest. Besides its simple database roots it has been picked up for roles eventually and necessarily combining security, privacy and trust premises in recently evolved information systems.
This talk will survey Blockchain and related technologies, their uses and limits with a view towards how to take advantage of its eminent rise.

Research paper thumbnail of IEEE Big Data Podcasts: An IEEE Future Directions Digital Studio Production- Episode 10

Episode 10: Q&A on Big data, IoT, infrastructure, computing

Research paper thumbnail of Tıp Bilişiminde Sorunlar ve Yenilikler Panel Sunuşu (Issues and Innovation in Medical Informatics Panel Presentation)

Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı? ... more Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı?
(How much and what type of personal data is being collected during medical processes? Are such private data safe? What to do?)
Bu sunuşum aynı zamanda benim Anlamsal Etmenler ve Büyük Veri Çözümlemesi projelerimle de ilgilidir.
Paneldeki diğer konuşmacılar için bkz. http://ab.org.tr/ab17/ozet/240.html.
Resimler için bkz. https://goo.gl/photos/AFjLeR2ofPQeYwBd6 )
(Also relevant for my other projects: Semantic agent systems, Big data & analytics.
Other presenters in this panel: see http://ab.org.tr/ab17/ozet/240.html
Pictures: see https://goo.gl/photos/AFjLeR2ofPQeYwBd6 )

Research paper thumbnail of Semantic Aspects of MetaSystems Learning Design

Invited talk at Theory and Practice of Digital Textbooks, Moscow, Russia. Digital textbook desig... more Invited talk at Theory and Practice of Digital Textbooks, Moscow, Russia.
Digital textbook design, development and utilization; MetaSystems vision; Meta-Era infrastructure and API; my recent related works.

Research paper thumbnail of Big Data and Analytics: What is Ahead?

The part big data and analytics will be playing in our lives, especially security and privacy asp... more The part big data and analytics will be playing in our lives, especially security and privacy aspects, is being highlighted. Projection is made and possible measures to alleviate its effects are considered.

Research paper thumbnail of Call for Chapters: Artificial Intelligence Paradigms for Smart Cyber-Physical Systems

Call for Chapters- AIP-SCPS, 2020

Topics of interest include, but are not limited to: • Data management, knowledge representation ... more Topics of interest include, but are not limited to:

• Data management, knowledge representation and ontology for Cyber-Physical Systems
• Big data and smart computing for Cyber-Physical Systems
• Algorithms, models, and designs for social Cyber-Physical Systems
• Machine learning for/with Cyber-Physical Systems
• Nature-Inspired Algorithms for Cyber-Physical Systems
• Affecting Ubiquitous Intelligence in Cyber-Physical Computing
• Device Virtualization (DV) in pervasive Cyber-Physical Systems
• Issues and implementation of Privacy, Security, and Trust in Cyber-Physical Systems
• Affecting Context-Awareness for Cyber-Physical Systems
• Design, development, and implementation of Smart Cyber-Physical Systems
• Comparison of artificial intelligence-based approaches to Cyber-Physical Systems
• AI-based fraud detection, and mitigation
• Smart IDS and IPS for Cyber-Physical System
• Cyber-attack forecasting, detection, and mitigation
• Innovative applications of Cyber-Physical Systems in various domains

Research paper thumbnail of IEEE ESAS '20 15th International Workshop on e-Health Systems and Web Technologies

IEEE COMPSAC Website, 2020

Papers are sought on the following tracks: - e-Health and Applications - Artificial Intelligence ... more Papers are sought on the following tracks:
- e-Health and Applications
- Artificial Intelligence with Web Technologies and Data
- Recommendation Systems, and
- Web Technologies, Services, and Applications.