Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Atilla Elçi
  • Dept. Electrical & Electronics Engineering,
    Merkez Kampüsü,
    Aksaray 68100
    TURKEY
  • +905323514425

Atilla Elçi

Edited book published by IGI Global
Edited book at IGI Global
Call for papers and proposals due date October 10. Check www.sinconf.org for updates.
TOC of the proceedings of SIN 2019: all papers are open access through SIN 2019 website
Topics of interest include, but are not limited to: • Data management, knowledge representation and ontology for Cyber-Physical Systems • Big data and smart computing for Cyber-Physical Systems • Algorithms, models, and designs for... more
Topics of interest include, but are not limited to:

• Data management, knowledge representation and ontology for Cyber-Physical Systems
• Big data and smart computing for Cyber-Physical Systems
• Algorithms, models, and designs for social Cyber-Physical Systems
• Machine learning for/with Cyber-Physical Systems
• Nature-Inspired Algorithms for Cyber-Physical Systems
• Affecting Ubiquitous Intelligence in Cyber-Physical Computing
• Device Virtualization (DV) in pervasive Cyber-Physical Systems
• Issues and implementation of Privacy, Security, and Trust in Cyber-Physical Systems
• Affecting Context-Awareness for Cyber-Physical Systems
• Design, development, and implementation of Smart Cyber-Physical Systems
• Comparison of artificial intelligence-based approaches to Cyber-Physical Systems
• AI-based fraud detection, and mitigation
• Smart IDS and IPS for Cyber-Physical System
• Cyber-attack forecasting, detection, and mitigation
• Innovative applications of Cyber-Physical Systems in various domains
Research Interests:
Proceedings of ICAGNI 2018
in Advances in Intelligent Systems and Computing Series
Volume 767
By Springer
Proceedings of ICAGNI 2018
in Advances in Intelligent Systems and Computing Series
Volume 766
By Springer
Proceedings of the 11th International Conference on Security of Information and Networks
Research Interests:
Metacognition and Successful Learning Strategies in Higher Education is a detailed resource of scholarly perspectives that discusses current trends in learning assessments. Featuring extensive coverage on topics such as spiritual... more
Metacognition and Successful Learning Strategies in Higher Education is a detailed resource of scholarly perspectives that discusses current trends in learning assessments. Featuring extensive coverage on topics such as spiritual intelligence strategies, literacy development, and ubiquitous learning, this is an ideal reference source for academicians, graduate students, practitioners, and researchers who want to improve their learning strategies using metacognition studies.
Call for Chapter Proposals: New cycle, new deadlines: Upload a chapter proposal of 1,000 to 2,000 words by September 15th. Notification is by September 30th with full chapter submission by November 30th.... more
Call for Chapter Proposals:

New cycle, new deadlines: Upload a chapter proposal of 1,000 to 2,000 words by September 15th. Notification is by September 30th with full chapter submission by November 30th.

http://www.igi-global.com/publish/call-for-papers/call-details/1423
Research Interests:
This is a fast track publication opportunity. This book will be published by IGI Global by end 2012 / early 2013. Recommended topics in theory, tools, and applications of cryptographic solutions for information systems include, but are... more
This is a fast track publication opportunity. This book will be published by IGI Global by end 2012 / early 2013.
Recommended topics in theory, tools, and applications of cryptographic solutions for information systems include, but are not limited to the following:
• Cryptography
• Cryptography and Security
• Cryptography and Data Protection
• Cryptography and Privacy
• Cryptography and Cryptanalysis
• Cryptographic Protocols
• Cryptographic Solutions
• Copyright protection
• Agent & Multi-agent System Security
• Authentication & Authorization
• Engineering Secure Information Systems
• Forensics and Ethical Hacking
• Key Management
• Ontology of Cryptographic Solutions
• Public-key Crypto Systems
• Standards, guidelines and certification

Manuscripts in which cryptographic solutions for IS are not the main focus will not be accepted.
Semantic agent systems are about the integration of the semantic Web, software agents, and multi-agent systems technologies. Like in the past (e.g. biology and informatics yielding bioinformatics) a whole new perspective is emerging with... more
Semantic agent systems are about the integration of the semantic Web, software agents, and multi-agent systems technologies. Like in the past (e.g. biology and informatics yielding bioinformatics) a whole new perspective is emerging with semantic agent systems. In this context, the semantic Web is a Web of semantically linked data which aims to enable man and machine to execute tasks in tandem. Here, software agents in a multi-agent system as delegates of humans are endowed with power to use semantically linked data.
This edited book “Semantic Agent Systems: Foundations and Applications” proposes contributions on a wide range of topics on foundations and applications written by a selection of international experts. It first introduces in an accessible style the nature of semantic agent systems. Then it explores with numerous illustrations new frontiers in software agent technology.
“Semantic Agent Systems: Foundations and Applications” is recommended for scientists, experts, researchers, and learners in the field of artificial intelligence, the semantic Web, software agents, and multi-agent systems technologies.

Dr. Atilla Elçi is a professor of computer science at Toros University, Mersin, Turkey;

Dr. Mamadou Tadiou Kone is a research scientist at International Computing
Research, Boston, MA, USA;

Dr. Mehmet A. Orgun is a professor of computer science at Macquarie University, Sydney, Australia.


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
TOC:

PREFACE

Section 1 INTRODUCTION TO AGENTS AND SEMANTICS

1 Rule Responder Agents - Framework and Instantiations.
Harold Boley (National Research Council); Adrian Paschke (Free University Berlin)

2 Specifying and Monitoring Obligations in Open Multiagent Systems using Semantic Web Technology.
Nicoletta Fornara (University of Lugano)

3 Semantic Agent Model for Distributed Knowledge Management.
Julien Subercaze (LIRIS); Pierre Maret (LaHC )

Section 2 ENGINEERING SEMANTIC AGENT SYSTEMS

4 SBVR-driven Information Governance: a Case Study in the Flemish Public Administration.
Pieter De Leenheer (Vrije Universiteit and Collibra nv/sa et al.

5 Argumentation for reconciling agent ontologies.
Cassia Trojahn (INRIA); Jérôme Euzenat (INRIA); Valentina Tamma
(University of Liverpool); Terry Payne (University of Liverpool)

6 Measuring Complexity for MAS Design in the presence of Ontology Heterogeneity
Maricela Bravo (CINVESTAV)

7 Ontology-based Matchmaking and Composition of Business Processes.
Duygu Celik (EMU); Atilla Elci (METU)

8 Semantic Architecture for Human Robot Interaction.
Sebastien Dourlens Amar Ramdane Cherfi (LISV/UVSQ (Versailles University France));

Section 3. APPLICATIONS OF SEMANTIC AGENT SYSTEMS

9 A Semantic Agent Framework for Cyber-Physical Systems.
Jing Lin; Sahra Sedigh; Ann Miller (Missouri University of Science and Technology)

10 A Layered Manufacturing System Architecture Supported with Semantic Agents Capabilities.
Munir Merdan; Mathieu Vallee; Thomas Moser; Stefan Biffl (Vienna University of Technolog)

11 Semantic Multi-Agent mLearning System.
Stanimir Stojanov (Plovdiv University) et al.

12 Identifying Novel Topics based on User Interests.
Makoto Nakatsuji (NTT)

Section 4. FUTURE LOOK

13 Understanding, Misunderstanding, Multi-understanding, and Switchable Understanding by Agents.
Tuncer Oren (University of Ottawa); Levent Yilmaz (Auburn University)

INDEX

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
This special issue relates to a wide spectrum of both theory and practice in the semantic web, agents, and AI, with due emphasis on practical technologies such as autonomous semantic agents, context-aware intelligent agents, agents as... more
This special issue relates to a wide spectrum of both theory and practice in the semantic web, agents, and AI, with due emphasis on practical technologies such as autonomous semantic agents, context-aware intelligent agents, agents as semantic WS, software agents, mobile agents, agent architectures, multi-agent systems, agent communities, cooperation. Effecting knowledge engineering as a practice and expert systems in general are the primary interests of ESAS. This is where ESAS relates to Expert Systems: The Journal of Knowledge Engineering by Wiley/Blackwell.
Edited proceedings book of SIN 2010 held in Taganrog, Rostov-on-Don, Russia. The third in the SINConf series.
Research Interests:
Proceedings of the SIN 2009 held in Gazimagusa, TRNC, 2nd in the series.
Edited proceedings of SIN 2007 held in Gazimagusa, TRNC; the first in the SINConf series
The proceedings book of IJRCS 2009 has been published as a special issue V.3 N.1 of open-source e-journal International Journal of Technological Sciences.
Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı? (How much and what type of personal data is being collected during medical processes? Are such private data safe? What to do?) Bu sunuşum aynı... more
Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı? (How much and what type of personal data is being collected during medical processes? Are such private data safe? What to do?) Bu sunuşum aynı zamanda benim Anlamsal Etmenler ve Büyük Veri Çözümlemesi projelerimle de ilgilidir. Paneldeki diğer konuşmacılar için bkz. http://ab.org.tr/ab17/ozet/240.html. Resimler için bkz. https://goo.gl/photos/AFjLeR2ofPQeYwBd6 ) (Also relevant for my other projects: Semantic agent systems, Big data & analytics. Other presenters in this panel: see http://ab.org.tr/ab17/ozet/240.html Pictures: see https://goo.gl/photos/AFjLeR2ofPQeYwBd6 )
ÖZET Güvenli olmayan ağlarda kimlik belirleme hizmetini kırmaya yönelik şifre çözümlemesi korunmuş bilgilerin elde edilmesi olasılığına işaret ediyor. Buna göre araştırmacılar daha güvenli temelleri geliştirip uygulamaya çalışmaktadırlar.... more
ÖZET Güvenli olmayan ağlarda kimlik belirleme hizmetini kırmaya yönelik şifre çözümlemesi korunmuş bilgilerin elde edilmesi olasılığına işaret ediyor. Buna göre araştırmacılar daha güvenli temelleri geliştirip uygulamaya çalışmaktadırlar. Gizli yazım (steganography) yoluyla MD5 ve SHA1 algoritmaları uygulanarak anahtarın gizlenmesi temelinde yeni ve güvenli bir yöntem olarak ParseKey önerilmektedir. Bu yöntem aynı zamanda, istemci tarafında giriş bilgilerini tutmak veya sunumcu VT'ndaki anahtarı değiştirme gereği gibi zayıflıkları ...
Abstract. This paper presents the ParseKey+, an approach to a new highlysecure and safe authentication service. The scheme includes authentication process for both client and server sides in addition to passwords of each side. ParseKey+... more
Abstract. This paper presents the ParseKey+, an approach to a new highlysecure and safe authentication service. The scheme includes authentication process for both client and server sides in addition to passwords of each side. ParseKey+ employs transposition to hide the encrypted key in a key file retrievable only by the other side knowing the indices and lengths of sub-keys inside ParseKey+ encrypted file. ParseKey+ avoids client and server impersonations in addition to mutual client/server authentication. Therefore, the ...
In addition to the Program Committee members, a large number of individuals who belong to review committees for the CIMCA 2008, IAWTIC 2008 and ISE 2008 conferences. The Conference Committee would like to thank them for their assistance... more
In addition to the Program Committee members, a large number of individuals who belong to review committees for the CIMCA 2008, IAWTIC 2008 and ISE 2008 conferences. The Conference Committee would like to thank them for their assistance in reviewing papers submitted to the abovementioned conferences. ... Andreou Andreas, University of Cyprus, Cyprus Anthony Dekker, DSTO, Australia Ardeshir Karami Mohammadi, Shahrood University of Technology, Iran Arshad Ali, National University of Science and Technology, Pakistan Ashutosh Tiwari, ...
Carl K. Chang, Iowa State University, USA Ephraim Feig, Innovations-to-Market, USA Hemant Jain, University of Wisconsin–Milwaukee , USA Frank Leymann, University of Stuttgart, Germany Calton Pu, Georgia Tech, USA Liang-Jie Zhang, IBM TJ... more
Carl K. Chang, Iowa State University, USA Ephraim Feig, Innovations-to-Market, USA Hemant Jain, University of Wisconsin–Milwaukee , USA Frank Leymann, University of Stuttgart, Germany Calton Pu, Georgia Tech, USA Liang-Jie Zhang, IBM TJ Watson Research Center, USA ... Sriram Anand, Accenture, India Ali Bahrami, Boeing Research and Technology, USA Akhilesh Bajaj, University of Tulsa, USA Sujoy Basu, HP Palo Alto Labs, USA Manish A. Bhide, IBM India Research Lab, India Zhixiong Chen, Mercy College, USA Cecil Chua, Nanyang ...
This article proposes an Intelligent Tracking System for Acute Respiratory Tract Infection (TrackARTI) via a smart mobile for monitoring disease term of 0-6 age group child patients remotely (e.g. home, clinics). It is possible to... more
This article proposes an Intelligent Tracking System for Acute Respiratory Tract Infection (TrackARTI) via a smart mobile for monitoring disease term of 0-6 age group child patients remotely (e.g. home, clinics). It is possible to maximize the quality of life of the child patients and decrease parental anxiety by keeping the child under control during monitoring stage and achieve a proper distant diagnose by the patient's clinician. This is possible with the designs of intelligent M-Health systems that can be used for diagnosing and monitoring the child patients away from hospitals by presenting the instant medical data to their registered doctors. Intelligent M-Health systems require strong knowledge management technology and ease of extension to provide information from additional medical tools. With the contribution of intelligent M-Health systems, it is possible to infer new facts from the certain gathered medical data during examination from child patients. This article mentions an intelligent and easy medical data gathering system that can be used by pediatricians or parents any time. In addition, the system has its own inferencing mechanism that involves two main steps, inferencing on image processing and Semantic Web rule knowledge base.
One of the most important IT sectors that requires big data management is mobile data communication systems (MDCS) of GSM companies. In the charging mechanism of current MDCS, a subscriber “surfs” on the internet that creates data traffic... more
One of the most important IT sectors that requires big data management is mobile data communication systems (MDCS) of GSM companies. In the charging mechanism of current MDCS, a subscriber “surfs” on the internet that creates data traffic and a counter subtracts the amount of data used by the user from the subscriber's quota. In other words, instant constant quota values are assigned to subscribers without concern for their previous amount of internet usage in current MDCS. Moreover, constant quota values cause constant charge calls in control traffic that are repeated for all new quota requests. Thus, performance degradation occurs because of the repetition of quota request calls and allocations. In this chapter, a dynamic quota calculation system (DQCS) is proposed for dynamic quota allocations and charging in MDCS using data mining approaches as two cascaded blocks. The first block is self-organizing map (SOM) clustering based on a sliding window (SW) methodology followed by ...
Current approaches to feature selection for text classification aim to reduce the number of terms that are used to describe documents. Thus, documents can be classified and found with greater ease and precision. A key shortcoming of these... more
Current approaches to feature selection for text classification aim to reduce the number of terms that are used to describe documents. Thus, documents can be classified and found with greater ease and precision. A key shortcoming of these approaches is that they select the topmost terms to describe documents after ranking all terms using a feature selection measure (scoring function). Lesser high-ranking terms below the topmost terms are discarded to reduce computational costs. Nevertheless, in many cases, they may have considerable discriminative power to enhance the text classification precision. In order to address this issue, we proposed a new feature weighting formalism that ties the topmost terms with lesser high-ranking terms using probabilistic neural networks. In the proposed method, probabilistic neural networks are formed using relative category distribution matrix and topmost terms are re-weighted and passed to Rocchio classifier. This is achieved without increasing the ...
Obesity is a public health problem that has become widespread worldwide. Obesity may increase the risk for many health problems such as early puberty, Type 2 diabetes, certain types of cancer, high blood pressure, heart diseases, and... more
Obesity is a public health problem that has become widespread worldwide. Obesity may increase the risk for many health problems such as early puberty, Type 2 diabetes, certain types of cancer, high blood pressure, heart diseases, and sleep apnea. The detection of obesity in children and adolescents at early stages is important and it is crucial to start individual based treatments. Due to the widespread use of smart mobile devices among family members and increasing number of m-Health applications to fight against obesity as well as other diseases, m-Health applications can be a good choice for early detection of obesity in childhood and adolescence stages. Recently, many studies about mobile-based obesity tracking system that mostly for adults have been done. This research study especially emphases obesity management in childhood and adolescence stages with the contribution of Semantic Web technology. Therefore, the system is an ontology-based obesity tracking system for children and adolescents which has its own Obesity Tracking Ontology and medical semantic rule knowledge base with an inference engine.
Approaches are needed for providing advanced autonomous wheeled robots with a sense of self, immediate ambience, and mission. The following list of abilities would form the desired feature set of such approaches: self-localization,... more
Approaches are needed for providing advanced autonomous wheeled robots with a sense of self, immediate ambience, and mission. The following list of abilities would form the desired feature set of such approaches: self-localization, detection and correction of course deviation errors, faster and more reliable identification of friend or foe, simultaneous localization and mapping in uncharted environments without necessarily depending on external assistance, and being able to serve as web services. Situations, where enhanced robots with such rich feature sets come to play, span competitions such as line following, cooperative mini sumo fighting, and cooperative labyrinth discovery. In this chapter we look into how such features may be realized towards creating intelligent robots. Currently through-cell localization in robots mainly relies on availability of shaft-encoders. In this regard, we would like to firstly present a simple-to-implement through-cell localization approach for rob...
Diger kurumlar gibi belediyelerin de basarilarini yuksek tutmak icin calisanlarinin belediyelere olan bagliliklarini ust seviyede tutmalarina baglidir. Bagliliklarin ust duzeyde olmasi calisanlarin orgute olan katkilarini da... more
Diger kurumlar gibi belediyelerin de basarilarini yuksek tutmak icin calisanlarinin belediyelere olan bagliliklarini ust seviyede tutmalarina baglidir. Bagliliklarin ust duzeyde olmasi calisanlarin orgute olan katkilarini da yukseltecektir. Calismamizda, belediye calisanlarinin kurumlarina bagliliklari, kurumlarinin gelisimi ve amaclarina ulasilmasinda orgutsel bagliligin onemli oldugu varsayimindan yola cikilarak Aksaray iline bagli ilce belediye calisanlarina Orgutsel Baglilik Olcegi uygulanmis ve belediye calisanlarinin orgutsel baglilik duzeylerini olcmek hedeflenmistir. Oncelikli olarak Allen ve Meyer (1991) tarafindan gelistirilen bu olcek alt boyutlari olan duygusal baglilik, devam bagliligi ve normatif baglilik boyutlari dogrultusunda 147 belediye calisanina uygulanarak baglilik duzeyleri incelenmeye calisilmistir. Calismanin sonucunda personelin kurumlarina bagliliklarinin duygusal baglilik boyutu yuksek gorulmustur.
Abstract not availabl
Individuals with pervasive developmental disorders should be supported with special education programs that are planned according to the type and degree of the disorder, age, characteristics, and needs of the individual. Search over... more
Individuals with pervasive developmental disorders should be supported with special education programs that are planned according to the type and degree of the disorder, age, characteristics, and needs of the individual. Search over internet resources may provide suitable educational material and methods (and associated activity/game). However, syntactic search in today's static-based internet is insufficient to offer desired relevant results. An intelligent system able to identify the needed educational methods and material with the help of semantic web-based agents will not only contribute to the development of individuals with disorders, and support education specialists in this process, but also be extremely useful for the families of these individuals in assisting and monitoring their child's developmental progress. In this chapter, an agent-based educational activity suggestion system of children with pervasive developmental disorder for guiding education and training ...
... Atilla ELÇİ Computer Engineering Department Eastern Mediterranean University Magusa, Mersin-10 Email: atilla.elci@emu.edu.tr Duygu ÇELİK Computer Engineering Department Eastern Mediterranean University Magusa, Mersin-10 Email:... more
... Atilla ELÇİ Computer Engineering Department Eastern Mediterranean University Magusa, Mersin-10 Email: atilla.elci@emu.edu.tr Duygu ÇELİK Computer Engineering Department Eastern Mediterranean University Magusa, Mersin-10 Email: duygu.celik@emu.edu.tr ...
During the acquisition of a new digital image, noise may be introduced as a result of the production process. Image enhancement is used to alleviate problems caused by noise. In this work, the purpose is to propose, apply, and evaluate... more
During the acquisition of a new digital image, noise may be introduced as a result of the production process. Image enhancement is used to alleviate problems caused by noise. In this work, the purpose is to propose, apply, and evaluate enhancement approaches to images by selecting suitable filters to produce improved quality and performance results. The new method proposed for image noise reduction as an enhancement process employs threshold and histogram equalization implemented in the wavelet domain. Different types of wavelet filters were tested to obtain the best results for the image noise reduction process. Also, the effect of canceling one or more of the high-frequency bands in the wavelet domain was tested. The mean square error and peak signal to noise ratio are used for measuring the improvement in image noise reduction. A comparison made with two related works shows the superiority of the methods proposed and implemented in this research. The proposed methods of applying ...
This article discusses the impact of human-computer interaction in the pedagogical design of open textbooks affordable into a diversity of learning environments. An exploratory study is conducted, wherein an online questionnaire is... more
This article discusses the impact of human-computer interaction in the pedagogical design of open textbooks affordable into a diversity of learning environments. An exploratory study is conducted, wherein an online questionnaire is administered to the second-year master’s degree students from the Faculty of Psychology and Educational Studies. The results show that students are aware of the importance of metacognition in developing effective learning strategies. Thus, they use metacognitive strategies when taking notes, doing reflections, and employing mnemonics to enhance understanding. However, despite the current practice of using open didactical materials, students feel that the open textbooks approach needs to be relooked and changed to be more effective; it could be equipped with appropriate learning tools to provide more opportunities for immediate feedback and collaborative assessment. Individualization and collaboration are the key factors in developing metacognitive experie...
This article discusses a new approach to Fetal Heart Rate Monitoring System (FHRMS) via a mobile integrated Doppler device (mDoppler) for monitoring Fetal Heart Rate (FHR) remotely (i.e. home). The aim of the system is to provide ease of... more
This article discusses a new approach to Fetal Heart Rate Monitoring System (FHRMS) via a mobile integrated Doppler device (mDoppler) for monitoring Fetal Heart Rate (FHR) remotely (i.e. home). The aim of the system is to provide ease of FHR monitoring and computing current fetus risk conditions especially for high-risk pregnancy cases via a mobile integrated Doppler device. FHRMS has its own inferring mechanism that provides to analyze current fetus conditions by considering FHR values through connecting a hand held mDoppler device to labour's abdomen during observing period at home. The instantly-gathered FHR values as output signal of the mDoppler during observation period are displayed on the labour's mobile device monitor and also input data set to the FHRMS. The inferred current fetus conditions are coded as Green, Yellow, and Red status by the FHRMS signifying the Normal, Atypical/Warning, and Abnormal/Alarm conditions of the fetus respectively. Thus FHRMS informs the responsible parents, physician and the ambulance service if alarm status is observed. In this research, FHRMS considers 10 sets of FHR instance values for the last 10 gestation weeks (started at 30th up to 40th weeks) from a subjects labour's that are traced as a case study to track the inferencing algorithms of the FHRMS. The FHRMS tracing mechanism is developed from visual analysis algorithms of (Electro Fetal Monitoring) EFM task in literature.
Given the critical and difficult nature of discovering Web services in the development process of service oriented architectures, several studies have been proposed to solve this problem. There is a real need to work for matching semantic... more
Given the critical and difficult nature of discovering Web services in the development process of service oriented architectures, several studies have been proposed to solve this problem. There is a real need to work for matching semantic Web services which use different ontologies. In responding to this need, measuring semantic similarity between SWS may be reduced to the calculation of similarity between ontological concepts. This work is a contribution to achieve semantic interoperability for Web services in a multi-ontology environment, for which the authors present a generic framework for Web services discovery. Here their focus is on the semantic similarity measure-based core of their framework and the authors present a novel algorithm for concepts matching between different ontologies. Results of the experiments confirm the viability of the semantic similarity measure.
Abstract This study proposes an ontology-based system which takes the non-structured/semi-structured heterogeneous TV content in heterogeneous Web resources and converts it to the structured form in a semantic data model. The TV content... more
Abstract This study proposes an ontology-based system which takes the non-structured/semi-structured heterogeneous TV content in heterogeneous Web resources and converts it to the structured form in a semantic data model. The TV content is discovered and redefined after aligning in semantic base according to client requirements by a semantic search agent. Through a system that is intuitive and semantic, semantic based matchmaking is applied between the concepts of required TV content information and related heterogeneous Web ...
ABSTRACT While Internet takes up by far the most significant part of our daily lives, finding jobs/employees on the Internet has started to play a crucial role for job seekers and employers. Online recruitment websites and human resources... more
ABSTRACT While Internet takes up by far the most significant part of our daily lives, finding jobs/employees on the Internet has started to play a crucial role for job seekers and employers. Online recruitment websites and human resources consultancy and recruitment companies enable job seekers to create their résumé, a brief written formal document including job seeker's basic information such as personal information, educational information, work experience and qualifications in order to find and apply for desirable jobs, whereas they enable companies to find qualified employees they are looking for. However résumés may be written in many ways that make it difficult for online recruitment companies to keep these data in their relational databases. In this study, a project that Kariyer.net (largest online recruitment website in Turkey) and TUBITAK (The Scientific and Technological Research Council of Turkey) have been jointly working is proposed. In this mentioned project, a system enables free structured format of résumés to transform into an ontological structure model. The produced system based on ontological structure model and called Ontology based Résumé Parser (ORP) will be tested on a number of Turkish and English résumés. The proposed system will be kept in Semantic Web approach that provides companies to find expert finding in an efficient way.
Lack of sufficient semantic description in the content of Web services makes it difficult to find and compose suitable Web services during analysis, search, and matching processes. Semantic Web Services are Web services that have been... more
Lack of sufficient semantic description in the content of Web services makes it difficult to find and compose suitable Web services during analysis, search, and matching processes. Semantic Web Services are Web services that have been enhanced with formal semantic description, which provides well-defined meaning. Due to insertion of semantics, meeting user demands will be made possible through logical deductions achieving resolutions automatically. We have developed an inference-based semantic business process composition agent (SCA) that employs inference techniques. The semantic composition agent system is responsible for the synthesis of new services from existing ones in a semi-automatic fashion. SCA System composes available Web Ontology Language for Web services atomic processes utilizing Revised Armstrong's Axioms (RAAs) in inferring functional dependencies. RAAs are embedded in the knowledge base ontologies of SCA System. Experiments show that the proposed SCA System pro...
Ozet. Anlamsal Web'in en önemli getirisi olan ontolojiler içine gömülen semantik betimlemeler üzerinden, kullanıcı taleplerinin karsılanması ve varolan veriler üzerinden anlamsal ve mantıksal çıkarsamaların otomatik olarak yapılması... more
Ozet. Anlamsal Web'in en önemli getirisi olan ontolojiler içine gömülen semantik betimlemeler üzerinden, kullanıcı taleplerinin karsılanması ve varolan veriler üzerinden anlamsal ve mantıksal çıkarsamaların otomatik olarak yapılması mümkündür. Ayrıca, Web servislerini ontoloji dosyalarına betimlemek mümkün olup, bu gömülü olan semantik betimlemeler üzerinden Web servislerinin kesfi ve birlestirilmesi islemlerinde daha akıllı sistemler gelistirilebilir. Servislerin birlestirilmesinde uygun süreçlerin sorgulanması, ...
Research Interests:
Intelligent Semantic Web Service Finder (ISWSF) is a mechanism that discovers Semantic Web Services satisfying client requirements. The increase in web services and lack of semantic base in search mechanisms of UDDI make it difficult for... more
Intelligent Semantic Web Service Finder (ISWSF) is a mechanism that discovers Semantic Web Services satisfying client requirements. The increase in web services and lack of semantic base in search mechanisms of UDDI make it difficult for clients to find required web services. We developed a system which uses a Semantic Search Agent (SSA) to discover required web services from web and selects them according to the client requirements then presents them as a result page. The system uses Ontology Web ...
Music and Audio Information Search System (MAISS) is a web-based application using ontologies and inference engine to search multimedia documents. In MAISS, users run queries in web pages for retrieving data about albums, artists, audio... more
Music and Audio Information Search System (MAISS) is a web-based application using ontologies and inference engine to search multimedia documents. In MAISS, users run queries in web pages for retrieving data about albums, artists, audio files, audio file formats, encoding audio files, genre, instrument, key, note, official, resource, rhythm, etc. Web Ontology Language (OWL) is the operational base of MAISS, so users can also run queries for retrieving information with constraints about classes, data type properties, ...
... on Elliptic Curve Discrete Logarithm Problem…………… 13 Khaled Suwais, AzmanSamsudin Hardware Implementation ... Watermarking Algorithm for Digital Images………… 38 Mahmoud Hassan, Sarah Alkuhlani, Wasan ...
There are many challenges for a forensic investigator when it comes to digital evidence. These include the constantly changing technology that may store evidence, the vast amounts of data that is stored, and the increasing use of... more
There are many challenges for a forensic investigator when it comes to digital evidence. These include the constantly changing technology that may store evidence, the vast amounts of data that is stored, and the increasing use of cryptography. This last problem can prevent any useful information being retrieved and is encountered in the use of communication protocols, whole-disk encryption, and individual applications. Cryptography is a field of great depth and breadth, encompassing both complex mathematics and cutting-edge technology. A forensics investigator does not need to be aware of all aspects of this field, but there are certain areas that are vital. The knowledge described in this chapter can assist an investigator in obtaining information that may otherwise be obscured, and also prepare them to defend the integrity of any evidence obtained.
We are seeking contributions for an upcoming publication that will focus on the far-reaching and interdisciplinary effects of emerging technologies on various social sectors. Our goal is to delve into how these technologies are shaping... more
We are seeking contributions for an upcoming publication that will focus on the far-reaching and interdisciplinary effects of emerging technologies on various social sectors. Our goal is to delve into how these technologies are shaping and altering the fields of social sciences, education, law & policy, tourism, health, environment, communication, manufacturing, business & management, and security. We encourage submissions that explore the implications and consequences of advancements, as well as the potential opportunities they present for these fields. We believe that this publication will provide valuable insights and perspectives on the impact of emerging technologies in the social sphere. Submissions should help to highlight the effects of emerging technologies, the power of AI, and digital innovations as appropriate in the chosen field.
Research Interests:
Page 1. Defining a Strategy to Select Either of Closed/Open World Assumptions on Semantic Robots Atilla Elçi Department of Computer Engineering Eastern Mediterranean University Gazimagusa, TRNC, Mersin 10, Turkey atilla.elci@emu.edu.tr ...
Abstract This paper presents a design ontology that deals with the hypermedia presentation aspects involved in the development of a semantic Web information system. The ontology is driven by two main design models: the conceptual and the... more
Abstract This paper presents a design ontology that deals with the hypermedia presentation aspects involved in the development of a semantic Web information system. The ontology is driven by two main design models: the conceptual and the application models. The application model extends the conceptual model with presenting data and inferring. During the presentation generation the input data goes through a sequence of transformation steps. Using semantic Web technology we chose to represent the models and their instances in ...
ABSTRACT This research presents design and implementation of the shortest path algorithm for labyrinth discovery application in a multi-agent environment. Robot agents are unaware of the maze at the beginning, they learn as they discover... more
ABSTRACT This research presents design and implementation of the shortest path algorithm for labyrinth discovery application in a multi-agent environment. Robot agents are unaware of the maze at the beginning, they learn as they discover it. Each agent solves a part of the maze and updates the shared memory so that other robots also benefit from each other's' discovery. Finding of the destination cell by an agent helps others to interconnect their discovered paths to the one ending with the destination cell. The proposed shortest path algorithm considers the cost for not only coordinate distance but also number of turns and moves required to traverse the path. The Shortest Path algorithm is compared against various available maze solving algorithms including Flood-Fill, Modified Flood-Fill and ALCKEF. The presented algorithm can be used also as an additional layer to enhance the available methods at second and subsequent runs.
Research Interests:
Abstract This paper presents a design ontology that deals with the hypermedia presentation aspects involved in the development of a semantic Web information system. The ontology is driven by two main design models: the conceptual and the... more
Abstract This paper presents a design ontology that deals with the hypermedia presentation aspects involved in the development of a semantic Web information system. The ontology is driven by two main design models: the conceptual and the application models. The application model extends the conceptual model with presenting data and inferring. During the presentation generation the input data goes through a sequence of transformation steps. Using semantic Web technology we chose to represent the models and their instances in ...
Research Interests:

And 123 more

This is the call for paper for the 13th International Conference on Security of Information and Networks (SIN 2020) to be held on 4-7 November 2020
fully ONLINE.
Research Interests:
List of accepted papers for oral presentation during LightSec 2016, Sept. 21-22 at Aksaray University, Cappadocia, Turkey
Research Interests:
Final draft of SIN'16 program schedule.
Final version is accessible at www.sinconf.org
Research Interests:
SIN'15 late-breaking paper submission deadline is May 25th. In Technical Cooperation with ACM Special Interest Group on Security, Audit and Control (SIGSAC). Proceedings by ACM Press; all papers will be inserted into the ACM Digital... more
SIN'15 late-breaking paper submission deadline is May 25th.

In Technical Cooperation with ACM Special Interest Group on Security, Audit and Control (SIGSAC).
Proceedings by ACM Press; all papers will be inserted into the ACM Digital Library.
Research Interests:
Symposium on Web Technologies & Data Analytics of 39th IEEE COMPSAC 2015, July 1-5, 2015 Tunghai University, Taichung, Taiwan. Call for Papers due Jan 27. CFP @
Research Interests:
"CALL FOR PROPOSALS: Phase 2 deadline: July 31'st. Please refer to the updated CFP file attached below. Papers, special sessions, tutorials, and workshops addressing all aspects of security in information and networks are being... more
"CALL FOR PROPOSALS:

Phase 2 deadline: July 31'st. Please refer to the updated CFP file attached below.

Papers, special sessions, tutorials, and workshops addressing all aspects of security in information and networks are being sought.

Keynotes by:
Georges ATAYA, Ali AYDIN, Ludmila BABENKO, Bart PRENEEL, Erkay SAVAŞ, Rudrapatna SHYAMASUNDAR, Edgar WEIPPL.

Topics of Interest:
-------------------
Possible topics include:
•    Access control and intrusion detection
•    Cyber Physical Systems
•    Autonomous and adaptive security
•    Security tools and development platforms
•    Computational intelligence techniques in security
•    Security ontology, models, protocols & policies
•    Computer network defense
•    Standards, guidelines and certification
•    Cryptographic techniques and key management
•    Security-aware software engineering
•    Industrial applications of security
•    Trust and privacy
•    Information assurance
•    Cyber Warfare (attacks and defenses)
•    Next generation network architectures
•    Malware analysis
•    Network security and protocols
•    Security challenges in Mobile/Embedded Systems"
Call For Papers: ------------------ We envisage a strong undercurrent of intelligent software agents, mobile agents, and MAS running through this workshop; side by side with the use of semantic technologies, there are several foci... more
Call For Papers:
------------------
We envisage a strong undercurrent of intelligent software
agents, mobile agents, and MAS running through this workshop;
side by side with the use of semantic technologies, there are
several foci of interest:

• Software Agents, Mobile Agents, and MAS,
• Agent, MAS and Semantic Web Technologies,
• Ontologies for Agents and MAS,
• Platforms for semantic agent and MAS implementation,
• Semantic Intelligence and Semantic Robotics,
• Other subjects of relevance in semantic technologies, semantic software agents, mobile agents, agent-based and multi-agent systems.
In recent years, blockchain technology has affected to a large extent all aspects of life, however, until now paper-based elections have been practiced. It is time to upgrade the election scenario using modern technology such as... more
In recent years, blockchain technology has affected to a large extent all aspects of life, however, until now paper-based elections have been practiced. It is time to upgrade the election scenario using modern technology such as blockchain and advanced cryptography methods. Actually, both of Estonia and New South Wales have been using i-voting systems, but after developing an example software of their systems for the purpose of analysis, it is discovered that it has weaknesses against many kinds of attacks, such as malwares, network attacks, and servers attacks. The fact that the blockchain technology has demonstrated infinite immutability and resistance against hacking, so it is possible to use it to secure election results from fraud by saving every single piece of data, record or transaction with unchangeable history. By abandoning the traditional database and compensating it with two blockchains instead of one ensures voter/vote privacy, as well as, safeguards the results from manipulation. Also, using blockchain's distributed network reduces the load on the network. Finally, solutions to problems of impersonation and vote selling are suggested. The technology behind the digital voting system design is explained in terms of the processes involved, such as ID creation, authentication, voting, and vote tallying.
Abstract Web mining treats the World Wide Web as the ultimate data source. This area of research is more interesting than data mining involving extracting data from in-house corporate databases or data warehouses. Gathering information... more
Abstract Web mining treats the World Wide Web as the ultimate data source. This area of research is more interesting than data mining involving extracting data from in-house corporate databases or data warehouses. Gathering information from Web sources via distributed intelligent software agents in enterprise architecture can be implemented securely, platform independent, reusable, and would be better modeled in n-tier or enterprise-tier architecture. The purpose of this paper is to develop a novel distributed ...
Distributed intelligent software agents (DISA) are software agents that help out users and act on their behalf. Such agents might be robots or virtual software systems. They are able to intelligent if they interact with their environment... more
Distributed intelligent software agents (DISA) are software agents that help out users and act on their behalf. Such agents might be robots or virtual software systems. They are able to intelligent if they interact with their environment in an approach that would generally be observed as intelligent if that communication were carried out by a human being. As a result,
Keynote Talk at SIN'18 Blockchain of BitCoin caught most by surprise by its recent rise to stardom. There is hardly any realm of computing left without its tentacles touching or about to touch soonest. Besides its simple database roots it... more
Keynote Talk at SIN'18
Blockchain of BitCoin caught most by surprise by its recent rise to stardom. There is hardly any realm of computing left without its tentacles touching or about to touch soonest. Besides its simple database roots it has been picked up for roles eventually and necessarily combining security, privacy and trust premises in recently evolved information systems.
This talk will survey Blockchain and related technologies, their uses and limits with a view towards how to take advantage of its eminent rise.
Research Interests:
Episode 10: Q&A on Big data, IoT, infrastructure, computing
Research Interests:
Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı? (How much and what type of personal data is being collected during medical processes? Are such private data safe? What to do?) Bu sunuşum... more
Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı?
(How much and what type of personal data is being collected during medical processes? Are such private data safe? What to do?)
Bu sunuşum aynı zamanda benim Anlamsal Etmenler ve Büyük Veri Çözümlemesi projelerimle de ilgilidir.
Paneldeki diğer konuşmacılar için bkz. http://ab.org.tr/ab17/ozet/240.html.
Resimler için bkz. https://goo.gl/photos/AFjLeR2ofPQeYwBd6 )
(Also relevant for my other projects: Semantic agent systems, Big data & analytics.
Other presenters in this panel: see http://ab.org.tr/ab17/ozet/240.html
Pictures: see https://goo.gl/photos/AFjLeR2ofPQeYwBd6 )
Research Interests:
Invited talk at Theory and Practice of Digital Textbooks, Moscow, Russia.
Digital textbook design, development and utilization; MetaSystems vision; Meta-Era infrastructure and API; my recent related works.
Research Interests:
The part big data and analytics will be playing in our lives, especially security and privacy aspects, is being highlighted. Projection is made and possible measures to alleviate its effects are considered.
Research Interests:
Topics of interest include, but are not limited to: • Data management, knowledge representation and ontology for Cyber-Physical Systems • Big data and smart computing for Cyber-Physical Systems • Algorithms, models, and designs for... more
Topics of interest include, but are not limited to:

• Data management, knowledge representation and ontology for Cyber-Physical Systems
• Big data and smart computing for Cyber-Physical Systems
• Algorithms, models, and designs for social Cyber-Physical Systems
• Machine learning for/with Cyber-Physical Systems
• Nature-Inspired Algorithms for Cyber-Physical Systems
• Affecting Ubiquitous Intelligence in Cyber-Physical Computing
• Device Virtualization (DV) in pervasive Cyber-Physical Systems
• Issues and implementation of Privacy, Security, and Trust in Cyber-Physical Systems
• Affecting Context-Awareness for Cyber-Physical Systems
• Design, development, and implementation of Smart Cyber-Physical Systems
• Comparison of artificial intelligence-based approaches to Cyber-Physical Systems
• AI-based fraud detection, and mitigation
• Smart IDS and IPS for Cyber-Physical System
• Cyber-attack forecasting, detection, and mitigation
• Innovative applications of Cyber-Physical Systems in various domains
Papers are sought on the following tracks:
- e-Health and Applications
- Artificial Intelligence with Web Technologies and Data
- Recommendation Systems, and
- Web Technologies, Services, and Applications.