Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Atilla Elçi
  • Dept. Electrical & Electronics Engineering,
    Merkez Kampüsü,
    Aksaray 68100
    TURKEY
  • +905323514425

Atilla Elçi

Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı? (How much and what type of personal data is being collected during medical processes? Are such private data safe? What to do?) Bu sunuşum aynı... more
Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı? (How much and what type of personal data is being collected during medical processes? Are such private data safe? What to do?) Bu sunuşum aynı zamanda benim Anlamsal Etmenler ve Büyük Veri Çözümlemesi projelerimle de ilgilidir. Paneldeki diğer konuşmacılar için bkz. http://ab.org.tr/ab17/ozet/240.html. Resimler için bkz. https://goo.gl/photos/AFjLeR2ofPQeYwBd6 ) (Also relevant for my other projects: Semantic agent systems, Big data & analytics. Other presenters in this panel: see http://ab.org.tr/ab17/ozet/240.html Pictures: see https://goo.gl/photos/AFjLeR2ofPQeYwBd6 )
ÖZET Güvenli olmayan ağlarda kimlik belirleme hizmetini kırmaya yönelik şifre çözümlemesi korunmuş bilgilerin elde edilmesi olasılığına işaret ediyor. Buna göre araştırmacılar daha güvenli temelleri geliştirip uygulamaya çalışmaktadırlar.... more
ÖZET Güvenli olmayan ağlarda kimlik belirleme hizmetini kırmaya yönelik şifre çözümlemesi korunmuş bilgilerin elde edilmesi olasılığına işaret ediyor. Buna göre araştırmacılar daha güvenli temelleri geliştirip uygulamaya çalışmaktadırlar. Gizli yazım (steganography) yoluyla MD5 ve SHA1 algoritmaları uygulanarak anahtarın gizlenmesi temelinde yeni ve güvenli bir yöntem olarak ParseKey önerilmektedir. Bu yöntem aynı zamanda, istemci tarafında giriş bilgilerini tutmak veya sunumcu VT'ndaki anahtarı değiştirme gereği gibi zayıflıkları ...
Abstract. This paper presents the ParseKey+, an approach to a new highlysecure and safe authentication service. The scheme includes authentication process for both client and server sides in addition to passwords of each side. ParseKey+... more
Abstract. This paper presents the ParseKey+, an approach to a new highlysecure and safe authentication service. The scheme includes authentication process for both client and server sides in addition to passwords of each side. ParseKey+ employs transposition to hide the encrypted key in a key file retrievable only by the other side knowing the indices and lengths of sub-keys inside ParseKey+ encrypted file. ParseKey+ avoids client and server impersonations in addition to mutual client/server authentication. Therefore, the ...
In addition to the Program Committee members, a large number of individuals who belong to review committees for the CIMCA 2008, IAWTIC 2008 and ISE 2008 conferences. The Conference Committee would like to thank them for their assistance... more
In addition to the Program Committee members, a large number of individuals who belong to review committees for the CIMCA 2008, IAWTIC 2008 and ISE 2008 conferences. The Conference Committee would like to thank them for their assistance in reviewing papers submitted to the abovementioned conferences. ... Andreou Andreas, University of Cyprus, Cyprus Anthony Dekker, DSTO, Australia Ardeshir Karami Mohammadi, Shahrood University of Technology, Iran Arshad Ali, National University of Science and Technology, Pakistan Ashutosh Tiwari, ...
Carl K. Chang, Iowa State University, USA Ephraim Feig, Innovations-to-Market, USA Hemant Jain, University of Wisconsin–Milwaukee , USA Frank Leymann, University of Stuttgart, Germany Calton Pu, Georgia Tech, USA Liang-Jie Zhang, IBM TJ... more
Carl K. Chang, Iowa State University, USA Ephraim Feig, Innovations-to-Market, USA Hemant Jain, University of Wisconsin–Milwaukee , USA Frank Leymann, University of Stuttgart, Germany Calton Pu, Georgia Tech, USA Liang-Jie Zhang, IBM TJ Watson Research Center, USA ... Sriram Anand, Accenture, India Ali Bahrami, Boeing Research and Technology, USA Akhilesh Bajaj, University of Tulsa, USA Sujoy Basu, HP Palo Alto Labs, USA Manish A. Bhide, IBM India Research Lab, India Zhixiong Chen, Mercy College, USA Cecil Chua, Nanyang ...
This article proposes an Intelligent Tracking System for Acute Respiratory Tract Infection (TrackARTI) via a smart mobile for monitoring disease term of 0-6 age group child patients remotely (e.g. home, clinics). It is possible to... more
This article proposes an Intelligent Tracking System for Acute Respiratory Tract Infection (TrackARTI) via a smart mobile for monitoring disease term of 0-6 age group child patients remotely (e.g. home, clinics). It is possible to maximize the quality of life of the child patients and decrease parental anxiety by keeping the child under control during monitoring stage and achieve a proper distant diagnose by the patient's clinician. This is possible with the designs of intelligent M-Health systems that can be used for diagnosing and monitoring the child patients away from hospitals by presenting the instant medical data to their registered doctors. Intelligent M-Health systems require strong knowledge management technology and ease of extension to provide information from additional medical tools. With the contribution of intelligent M-Health systems, it is possible to infer new facts from the certain gathered medical data during examination from child patients. This article mentions an intelligent and easy medical data gathering system that can be used by pediatricians or parents any time. In addition, the system has its own inferencing mechanism that involves two main steps, inferencing on image processing and Semantic Web rule knowledge base.
One of the most important IT sectors that requires big data management is mobile data communication systems (MDCS) of GSM companies. In the charging mechanism of current MDCS, a subscriber “surfs” on the internet that creates data traffic... more
One of the most important IT sectors that requires big data management is mobile data communication systems (MDCS) of GSM companies. In the charging mechanism of current MDCS, a subscriber “surfs” on the internet that creates data traffic and a counter subtracts the amount of data used by the user from the subscriber's quota. In other words, instant constant quota values are assigned to subscribers without concern for their previous amount of internet usage in current MDCS. Moreover, constant quota values cause constant charge calls in control traffic that are repeated for all new quota requests. Thus, performance degradation occurs because of the repetition of quota request calls and allocations. In this chapter, a dynamic quota calculation system (DQCS) is proposed for dynamic quota allocations and charging in MDCS using data mining approaches as two cascaded blocks. The first block is self-organizing map (SOM) clustering based on a sliding window (SW) methodology followed by ...
Current approaches to feature selection for text classification aim to reduce the number of terms that are used to describe documents. Thus, documents can be classified and found with greater ease and precision. A key shortcoming of these... more
Current approaches to feature selection for text classification aim to reduce the number of terms that are used to describe documents. Thus, documents can be classified and found with greater ease and precision. A key shortcoming of these approaches is that they select the topmost terms to describe documents after ranking all terms using a feature selection measure (scoring function). Lesser high-ranking terms below the topmost terms are discarded to reduce computational costs. Nevertheless, in many cases, they may have considerable discriminative power to enhance the text classification precision. In order to address this issue, we proposed a new feature weighting formalism that ties the topmost terms with lesser high-ranking terms using probabilistic neural networks. In the proposed method, probabilistic neural networks are formed using relative category distribution matrix and topmost terms are re-weighted and passed to Rocchio classifier. This is achieved without increasing the ...
Obesity is a public health problem that has become widespread worldwide. Obesity may increase the risk for many health problems such as early puberty, Type 2 diabetes, certain types of cancer, high blood pressure, heart diseases, and... more
Obesity is a public health problem that has become widespread worldwide. Obesity may increase the risk for many health problems such as early puberty, Type 2 diabetes, certain types of cancer, high blood pressure, heart diseases, and sleep apnea. The detection of obesity in children and adolescents at early stages is important and it is crucial to start individual based treatments. Due to the widespread use of smart mobile devices among family members and increasing number of m-Health applications to fight against obesity as well as other diseases, m-Health applications can be a good choice for early detection of obesity in childhood and adolescence stages. Recently, many studies about mobile-based obesity tracking system that mostly for adults have been done. This research study especially emphases obesity management in childhood and adolescence stages with the contribution of Semantic Web technology. Therefore, the system is an ontology-based obesity tracking system for children and adolescents which has its own Obesity Tracking Ontology and medical semantic rule knowledge base with an inference engine.
Approaches are needed for providing advanced autonomous wheeled robots with a sense of self, immediate ambience, and mission. The following list of abilities would form the desired feature set of such approaches: self-localization,... more
Approaches are needed for providing advanced autonomous wheeled robots with a sense of self, immediate ambience, and mission. The following list of abilities would form the desired feature set of such approaches: self-localization, detection and correction of course deviation errors, faster and more reliable identification of friend or foe, simultaneous localization and mapping in uncharted environments without necessarily depending on external assistance, and being able to serve as web services. Situations, where enhanced robots with such rich feature sets come to play, span competitions such as line following, cooperative mini sumo fighting, and cooperative labyrinth discovery. In this chapter we look into how such features may be realized towards creating intelligent robots. Currently through-cell localization in robots mainly relies on availability of shaft-encoders. In this regard, we would like to firstly present a simple-to-implement through-cell localization approach for rob...
Diger kurumlar gibi belediyelerin de basarilarini yuksek tutmak icin calisanlarinin belediyelere olan bagliliklarini ust seviyede tutmalarina baglidir. Bagliliklarin ust duzeyde olmasi calisanlarin orgute olan katkilarini da... more
Diger kurumlar gibi belediyelerin de basarilarini yuksek tutmak icin calisanlarinin belediyelere olan bagliliklarini ust seviyede tutmalarina baglidir. Bagliliklarin ust duzeyde olmasi calisanlarin orgute olan katkilarini da yukseltecektir. Calismamizda, belediye calisanlarinin kurumlarina bagliliklari, kurumlarinin gelisimi ve amaclarina ulasilmasinda orgutsel bagliligin onemli oldugu varsayimindan yola cikilarak Aksaray iline bagli ilce belediye calisanlarina Orgutsel Baglilik Olcegi uygulanmis ve belediye calisanlarinin orgutsel baglilik duzeylerini olcmek hedeflenmistir. Oncelikli olarak Allen ve Meyer (1991) tarafindan gelistirilen bu olcek alt boyutlari olan duygusal baglilik, devam bagliligi ve normatif baglilik boyutlari dogrultusunda 147 belediye calisanina uygulanarak baglilik duzeyleri incelenmeye calisilmistir. Calismanin sonucunda personelin kurumlarina bagliliklarinin duygusal baglilik boyutu yuksek gorulmustur.
Abstract not availabl
Individuals with pervasive developmental disorders should be supported with special education programs that are planned according to the type and degree of the disorder, age, characteristics, and needs of the individual. Search over... more
Individuals with pervasive developmental disorders should be supported with special education programs that are planned according to the type and degree of the disorder, age, characteristics, and needs of the individual. Search over internet resources may provide suitable educational material and methods (and associated activity/game). However, syntactic search in today's static-based internet is insufficient to offer desired relevant results. An intelligent system able to identify the needed educational methods and material with the help of semantic web-based agents will not only contribute to the development of individuals with disorders, and support education specialists in this process, but also be extremely useful for the families of these individuals in assisting and monitoring their child's developmental progress. In this chapter, an agent-based educational activity suggestion system of children with pervasive developmental disorder for guiding education and training ...
... Atilla ELÇİ Computer Engineering Department Eastern Mediterranean University Magusa, Mersin-10 Email: atilla.elci@emu.edu.tr Duygu ÇELİK Computer Engineering Department Eastern Mediterranean University Magusa, Mersin-10 Email:... more
... Atilla ELÇİ Computer Engineering Department Eastern Mediterranean University Magusa, Mersin-10 Email: atilla.elci@emu.edu.tr Duygu ÇELİK Computer Engineering Department Eastern Mediterranean University Magusa, Mersin-10 Email: duygu.celik@emu.edu.tr ...
During the acquisition of a new digital image, noise may be introduced as a result of the production process. Image enhancement is used to alleviate problems caused by noise. In this work, the purpose is to propose, apply, and evaluate... more
During the acquisition of a new digital image, noise may be introduced as a result of the production process. Image enhancement is used to alleviate problems caused by noise. In this work, the purpose is to propose, apply, and evaluate enhancement approaches to images by selecting suitable filters to produce improved quality and performance results. The new method proposed for image noise reduction as an enhancement process employs threshold and histogram equalization implemented in the wavelet domain. Different types of wavelet filters were tested to obtain the best results for the image noise reduction process. Also, the effect of canceling one or more of the high-frequency bands in the wavelet domain was tested. The mean square error and peak signal to noise ratio are used for measuring the improvement in image noise reduction. A comparison made with two related works shows the superiority of the methods proposed and implemented in this research. The proposed methods of applying ...
This article discusses the impact of human-computer interaction in the pedagogical design of open textbooks affordable into a diversity of learning environments. An exploratory study is conducted, wherein an online questionnaire is... more
This article discusses the impact of human-computer interaction in the pedagogical design of open textbooks affordable into a diversity of learning environments. An exploratory study is conducted, wherein an online questionnaire is administered to the second-year master’s degree students from the Faculty of Psychology and Educational Studies. The results show that students are aware of the importance of metacognition in developing effective learning strategies. Thus, they use metacognitive strategies when taking notes, doing reflections, and employing mnemonics to enhance understanding. However, despite the current practice of using open didactical materials, students feel that the open textbooks approach needs to be relooked and changed to be more effective; it could be equipped with appropriate learning tools to provide more opportunities for immediate feedback and collaborative assessment. Individualization and collaboration are the key factors in developing metacognitive experie...
This article discusses a new approach to Fetal Heart Rate Monitoring System (FHRMS) via a mobile integrated Doppler device (mDoppler) for monitoring Fetal Heart Rate (FHR) remotely (i.e. home). The aim of the system is to provide ease of... more
This article discusses a new approach to Fetal Heart Rate Monitoring System (FHRMS) via a mobile integrated Doppler device (mDoppler) for monitoring Fetal Heart Rate (FHR) remotely (i.e. home). The aim of the system is to provide ease of FHR monitoring and computing current fetus risk conditions especially for high-risk pregnancy cases via a mobile integrated Doppler device. FHRMS has its own inferring mechanism that provides to analyze current fetus conditions by considering FHR values through connecting a hand held mDoppler device to labour's abdomen during observing period at home. The instantly-gathered FHR values as output signal of the mDoppler during observation period are displayed on the labour's mobile device monitor and also input data set to the FHRMS. The inferred current fetus conditions are coded as Green, Yellow, and Red status by the FHRMS signifying the Normal, Atypical/Warning, and Abnormal/Alarm conditions of the fetus respectively. Thus FHRMS informs the responsible parents, physician and the ambulance service if alarm status is observed. In this research, FHRMS considers 10 sets of FHR instance values for the last 10 gestation weeks (started at 30th up to 40th weeks) from a subjects labour's that are traced as a case study to track the inferencing algorithms of the FHRMS. The FHRMS tracing mechanism is developed from visual analysis algorithms of (Electro Fetal Monitoring) EFM task in literature.
Given the critical and difficult nature of discovering Web services in the development process of service oriented architectures, several studies have been proposed to solve this problem. There is a real need to work for matching semantic... more
Given the critical and difficult nature of discovering Web services in the development process of service oriented architectures, several studies have been proposed to solve this problem. There is a real need to work for matching semantic Web services which use different ontologies. In responding to this need, measuring semantic similarity between SWS may be reduced to the calculation of similarity between ontological concepts. This work is a contribution to achieve semantic interoperability for Web services in a multi-ontology environment, for which the authors present a generic framework for Web services discovery. Here their focus is on the semantic similarity measure-based core of their framework and the authors present a novel algorithm for concepts matching between different ontologies. Results of the experiments confirm the viability of the semantic similarity measure.
Abstract This study proposes an ontology-based system which takes the non-structured/semi-structured heterogeneous TV content in heterogeneous Web resources and converts it to the structured form in a semantic data model. The TV content... more
Abstract This study proposes an ontology-based system which takes the non-structured/semi-structured heterogeneous TV content in heterogeneous Web resources and converts it to the structured form in a semantic data model. The TV content is discovered and redefined after aligning in semantic base according to client requirements by a semantic search agent. Through a system that is intuitive and semantic, semantic based matchmaking is applied between the concepts of required TV content information and related heterogeneous Web ...
ABSTRACT While Internet takes up by far the most significant part of our daily lives, finding jobs/employees on the Internet has started to play a crucial role for job seekers and employers. Online recruitment websites and human resources... more
ABSTRACT While Internet takes up by far the most significant part of our daily lives, finding jobs/employees on the Internet has started to play a crucial role for job seekers and employers. Online recruitment websites and human resources consultancy and recruitment companies enable job seekers to create their résumé, a brief written formal document including job seeker's basic information such as personal information, educational information, work experience and qualifications in order to find and apply for desirable jobs, whereas they enable companies to find qualified employees they are looking for. However résumés may be written in many ways that make it difficult for online recruitment companies to keep these data in their relational databases. In this study, a project that Kariyer.net (largest online recruitment website in Turkey) and TUBITAK (The Scientific and Technological Research Council of Turkey) have been jointly working is proposed. In this mentioned project, a system enables free structured format of résumés to transform into an ontological structure model. The produced system based on ontological structure model and called Ontology based Résumé Parser (ORP) will be tested on a number of Turkish and English résumés. The proposed system will be kept in Semantic Web approach that provides companies to find expert finding in an efficient way.
Lack of sufficient semantic description in the content of Web services makes it difficult to find and compose suitable Web services during analysis, search, and matching processes. Semantic Web Services are Web services that have been... more
Lack of sufficient semantic description in the content of Web services makes it difficult to find and compose suitable Web services during analysis, search, and matching processes. Semantic Web Services are Web services that have been enhanced with formal semantic description, which provides well-defined meaning. Due to insertion of semantics, meeting user demands will be made possible through logical deductions achieving resolutions automatically. We have developed an inference-based semantic business process composition agent (SCA) that employs inference techniques. The semantic composition agent system is responsible for the synthesis of new services from existing ones in a semi-automatic fashion. SCA System composes available Web Ontology Language for Web services atomic processes utilizing Revised Armstrong's Axioms (RAAs) in inferring functional dependencies. RAAs are embedded in the knowledge base ontologies of SCA System. Experiments show that the proposed SCA System pro...
Ozet. Anlamsal Web'in en önemli getirisi olan ontolojiler içine gömülen semantik betimlemeler üzerinden, kullanıcı taleplerinin karsılanması ve varolan veriler üzerinden anlamsal ve mantıksal çıkarsamaların otomatik olarak yapılması... more
Ozet. Anlamsal Web'in en önemli getirisi olan ontolojiler içine gömülen semantik betimlemeler üzerinden, kullanıcı taleplerinin karsılanması ve varolan veriler üzerinden anlamsal ve mantıksal çıkarsamaların otomatik olarak yapılması mümkündür. Ayrıca, Web servislerini ontoloji dosyalarına betimlemek mümkün olup, bu gömülü olan semantik betimlemeler üzerinden Web servislerinin kesfi ve birlestirilmesi islemlerinde daha akıllı sistemler gelistirilebilir. Servislerin birlestirilmesinde uygun süreçlerin sorgulanması, ...
Research Interests:
Intelligent Semantic Web Service Finder (ISWSF) is a mechanism that discovers Semantic Web Services satisfying client requirements. The increase in web services and lack of semantic base in search mechanisms of UDDI make it difficult for... more
Intelligent Semantic Web Service Finder (ISWSF) is a mechanism that discovers Semantic Web Services satisfying client requirements. The increase in web services and lack of semantic base in search mechanisms of UDDI make it difficult for clients to find required web services. We developed a system which uses a Semantic Search Agent (SSA) to discover required web services from web and selects them according to the client requirements then presents them as a result page. The system uses Ontology Web ...
Music and Audio Information Search System (MAISS) is a web-based application using ontologies and inference engine to search multimedia documents. In MAISS, users run queries in web pages for retrieving data about albums, artists, audio... more
Music and Audio Information Search System (MAISS) is a web-based application using ontologies and inference engine to search multimedia documents. In MAISS, users run queries in web pages for retrieving data about albums, artists, audio files, audio file formats, encoding audio files, genre, instrument, key, note, official, resource, rhythm, etc. Web Ontology Language (OWL) is the operational base of MAISS, so users can also run queries for retrieving information with constraints about classes, data type properties, ...
... on Elliptic Curve Discrete Logarithm Problem…………… 13 Khaled Suwais, AzmanSamsudin Hardware Implementation ... Watermarking Algorithm for Digital Images………… 38 Mahmoud Hassan, Sarah Alkuhlani, Wasan ...
There are many challenges for a forensic investigator when it comes to digital evidence. These include the constantly changing technology that may store evidence, the vast amounts of data that is stored, and the increasing use of... more
There are many challenges for a forensic investigator when it comes to digital evidence. These include the constantly changing technology that may store evidence, the vast amounts of data that is stored, and the increasing use of cryptography. This last problem can prevent any useful information being retrieved and is encountered in the use of communication protocols, whole-disk encryption, and individual applications. Cryptography is a field of great depth and breadth, encompassing both complex mathematics and cutting-edge technology. A forensics investigator does not need to be aware of all aspects of this field, but there are certain areas that are vital. The knowledge described in this chapter can assist an investigator in obtaining information that may otherwise be obscured, and also prepare them to defend the integrity of any evidence obtained.
We are seeking contributions for an upcoming publication that will focus on the far-reaching and interdisciplinary effects of emerging technologies on various social sectors. Our goal is to delve into how these technologies are shaping... more
We are seeking contributions for an upcoming publication that will focus on the far-reaching and interdisciplinary effects of emerging technologies on various social sectors. Our goal is to delve into how these technologies are shaping and altering the fields of social sciences, education, law & policy, tourism, health, environment, communication, manufacturing, business & management, and security. We encourage submissions that explore the implications and consequences of advancements, as well as the potential opportunities they present for these fields. We believe that this publication will provide valuable insights and perspectives on the impact of emerging technologies in the social sphere. Submissions should help to highlight the effects of emerging technologies, the power of AI, and digital innovations as appropriate in the chosen field.
Research Interests:
Page 1. Defining a Strategy to Select Either of Closed/Open World Assumptions on Semantic Robots Atilla Elçi Department of Computer Engineering Eastern Mediterranean University Gazimagusa, TRNC, Mersin 10, Turkey atilla.elci@emu.edu.tr ...
Abstract This paper presents a design ontology that deals with the hypermedia presentation aspects involved in the development of a semantic Web information system. The ontology is driven by two main design models: the conceptual and the... more
Abstract This paper presents a design ontology that deals with the hypermedia presentation aspects involved in the development of a semantic Web information system. The ontology is driven by two main design models: the conceptual and the application models. The application model extends the conceptual model with presenting data and inferring. During the presentation generation the input data goes through a sequence of transformation steps. Using semantic Web technology we chose to represent the models and their instances in ...
ABSTRACT This research presents design and implementation of the shortest path algorithm for labyrinth discovery application in a multi-agent environment. Robot agents are unaware of the maze at the beginning, they learn as they discover... more
ABSTRACT This research presents design and implementation of the shortest path algorithm for labyrinth discovery application in a multi-agent environment. Robot agents are unaware of the maze at the beginning, they learn as they discover it. Each agent solves a part of the maze and updates the shared memory so that other robots also benefit from each other's' discovery. Finding of the destination cell by an agent helps others to interconnect their discovered paths to the one ending with the destination cell. The proposed shortest path algorithm considers the cost for not only coordinate distance but also number of turns and moves required to traverse the path. The Shortest Path algorithm is compared against various available maze solving algorithms including Flood-Fill, Modified Flood-Fill and ALCKEF. The presented algorithm can be used also as an additional layer to enhance the available methods at second and subsequent runs.
Research Interests:
Abstract This paper presents a design ontology that deals with the hypermedia presentation aspects involved in the development of a semantic Web information system. The ontology is driven by two main design models: the conceptual and the... more
Abstract This paper presents a design ontology that deals with the hypermedia presentation aspects involved in the development of a semantic Web information system. The ontology is driven by two main design models: the conceptual and the application models. The application model extends the conceptual model with presenting data and inferring. During the presentation generation the input data goes through a sequence of transformation steps. Using semantic Web technology we chose to represent the models and their instances in ...
Research Interests:
Kablosuz sistemlerdeki ilerlemeler dusuk maliyetli, tasarruflu, cok islevli, minyatur algilama aygitlarinin uretilmesine imkân saglamistir. Bu aygitlardan yuzlercesi, hatta binlercesi yardimiyla kablosuz algilayici aglari... more
Kablosuz sistemlerdeki ilerlemeler dusuk maliyetli, tasarruflu, cok islevli, minyatur algilama aygitlarinin uretilmesine imkân saglamistir. Bu aygitlardan yuzlercesi, hatta binlercesi yardimiyla kablosuz algilayici aglari olusturulmaktadir. Kablosuz algilayici aglarda algilanan verilerin toplanmasi, analiz edilmesi ve bir baz istasyonuna gonderilmesi gibi asamalar beraberinde bazi sorunlari getirmektedir. Bu sorunlardan bazilari, algilayicilarin kisitlari, verinin dogru toplanmasi, gereksiz ve benzer veri sorunu, verinin guvenligi ile kablosuz algilayici ag topolojisinde meydana gelen sorunlardir. Bunlarin en onemlisi ise algilayicilarin kisitli enerji sorunudur. Geleneksel yontemler boylesi sorunlarla basa cikamadigindan, bu durum goz onunde bulundurularak, kablosuz algilayici aglarin Yapay Zekâ ile daha islevsel hale getirilmesinin gerekliligi uzerinde calisildi. Bu calismada, kablosuz aglarin islevselligi ve hayatta kalma ozelliklerinin iyilestirilmesi icin yapay zekâ yoluyla agd...
Welcome to the 10 IEEE International Workshop on Engineering Semantic Agents – E-Health Systems and Semantic Web (ESAS 2015), this time taking place in the Taichung, Taiwan, 5 July 2015. The IEEE International Workshop Series on... more
Welcome to the 10 IEEE International Workshop on Engineering Semantic Agents – E-Health Systems and Semantic Web (ESAS 2015), this time taking place in the Taichung, Taiwan, 5 July 2015. The IEEE International Workshop Series on Engineering Semantic Agent Systems (ESAS) has been held since 2006 in conjunction with Annual IEEE International Computer Software and Applications Conferences (COMPSAC). The ESAS Workshops Series focus on concepts, foundations and applications of semantic agent systems and intend to bring forward better practices of engineering them.
Over 3,000 compounds are being added to processed food. These compounds have numerous effects on food: add color, stabilize, texturize, preserve, sweeten, thicken, add flavor, soften, emulsify, and so on. According to a recent report by... more
Over 3,000 compounds are being added to processed food. These compounds have numerous effects on food: add color, stabilize, texturize, preserve, sweeten, thicken, add flavor, soften, emulsify, and so on. According to a recent report by the World Health Organization, governments have lately focused on legislation to reduce such ingredients or compounds in manufactured foods for they might have side effects causing health risks such as the heart disease, cancer, diabetes, allergens, obesity, etc. Safety in food consumption especially by patients of risk groups have become crucial for such health problems are in the top ten ranked health risks around the world. By supervising what and how much to eat as well as what not to eat, we can maximize a patient's life quality by avoiding unhealthy ingredients or compounds. In helping patients take control of their safe food consumption, we need smart personal e-health systems. Smart personal e-health systems with advanced knowledge management technology can provide suggestions of food appropriate for consumption by individuals. Accessing annotations in the ontology knowledgebase of food appropriate to their personal health condition can be provided. This article discusses one such software application, namely the Safety Food Consumption Mobile System, employing Semantic Web Technology.
Due to tremendous reception on digital learning platforms, many online users tend to register for online courses in MOOC offered by many prestigious universities all over the world and gain a lot on cutting edge technologies in niche... more
Due to tremendous reception on digital learning platforms, many online users tend to register for online courses in MOOC offered by many prestigious universities all over the world and gain a lot on cutting edge technologies in niche courses. As the reception of online courses is increasing on one side, there have been huge dropouts of participants in the online courses causing serious problems for the course owners and other MOOC administrators. Hence, it is deemed necessary to find out the root causes of course dropouts and need to prepare a workable solution to prevent that outcome in the future. In this connection, the authors made use of three machine learning algorithms such as support vector machine, random forest, and conditional random fields. The huge samples of datasets were downloaded from the Open University of China, that is, almost 7K student profiles were extracted for the empirical analysis. The datasets were loaded into a confusion matrix and analyzed for the accur...
This study highlights a security scenario involving vehicles in a Traffic Management and Information System (TMIS) network. TMIS and its nodal architecture, nicknamed Intelligent Junction (IJ), are summarized from our recent work. System... more
This study highlights a security scenario involving vehicles in a Traffic Management and Information System (TMIS) network. TMIS and its nodal architecture, nicknamed Intelligent Junction (IJ), are summarized from our recent work. System design sets an example to a software architecture implementing autonomous semantic agents through semantic web services, junction-based sensor networks, local- and wide-area networking through wire/wireless integrated communication infrastructure. It is so construed as to provide (near-) real-time services throughout the network. This introduction is with reference to the SOA of Cooperative Labyrinth Discovery Robotics and Traffic Management and Information System Projects. This also takes up several issues including realtime goal-oriented coordination of semantic web services. Especially described are its essential functions crucial to aid security applications. A security scenario concerning tracking and routing reported, say missing, vehicles is ...
In recent years, blockchain technology has affected to a large extent all aspects of life, however, until now paper-based elections have been practiced. It is time to upgrade the election scenario using modern technology such as... more
In recent years, blockchain technology has affected to a large extent all aspects of life, however, until now paper-based elections have been practiced. It is time to upgrade the election scenario using modern technology such as blockchain and advanced cryptography methods. Actually, both of Estonia and New South Wales have been using i-voting systems, but after developing an example software of their systems for the purpose of analysis, it is discovered that it has weaknesses against many kinds of attacks, such as malwares, network attacks, and servers attacks. The fact that the blockchain technology has demonstrated infinite immutability and resistance against hacking, so it is possible to use it to secure election results from fraud by saving every single piece of data, record or transaction with unchangeable history. By abandoning the traditional database and compensating it with two blockchains instead of one ensures voter/vote privacy, as well as, safeguards the results from manipulation. Also, using blockchain’s distributed network reduces the load on the network. Finally, solutions to problems of impersonation and vote selling are suggested. The technology behind the digital voting system design is explained in terms of the processes involved, such as ID creation, authentication, voting, and vote tallying.
In the last four years, blockchain technology affected largely all aspects of our lives. Blockchain started to launch a new technological revolution of storing digital transactions over the Internet, verifying the authenticity, licensing... more
In the last four years, blockchain technology affected largely all aspects of our lives. Blockchain started to launch a new technological revolution of storing digital transactions over the Internet, verifying the authenticity, licensing and providing the highest degree of security and encryption. Blockchain usage started with digital currency then its implementation extended to many industries such as voting, health records, copywriters, real estates and so on. However, it is time to upgrade the election scenario from practicing paper-based elections to use modern technologies in order to facilitate our lives. The fact that the blockchain technology has demonstrated almost infinite immutability and high resistance against hacking, lends credit to employ it in securing election data from fraud by saving every single piece of data, record or transaction with unchangeable history. In this paper, we propose and test implement a robust online voting system based on blockchain in order t...
Aim/Purpose: Vis-à-vis management of crisis and disaster situations, this paper focuses on important use cases of social media functions, such as information collection & dissemination, disaster event identification & monitoring,... more
Aim/Purpose: Vis-à-vis management of crisis and disaster situations, this paper focuses on important use cases of social media functions, such as information collection & dissemination, disaster event identification & monitoring, collaborative problem-solving mechanism, and decision-making process. With the prolific utilization of disaster-based ontological framework, a strong disambiguation system is realized, which further enhances the searching capabilities of the user request and provides a solution of unambiguous in nature. Background: Even though social media is information-rich, it has created a challenge for deriving a decision in critical crisis-related cases. In order to make the whole process effective and avail quality decision making, sufficiently clear semantics of such information is necessary, which can be supplemented through employing semantic web technologies. Methodology: This paper evolves a disaster ontology-based system availing a framework model for monitorin...
Metacognition and Successful Learning Strategies in Higher Education is a detailed resource of scholarly perspectives that discusses current trends in learning assessments. Featuring extensive coverage on topics such as spiritual... more
Metacognition and Successful Learning Strategies in Higher Education is a detailed resource of scholarly perspectives that discusses current trends in learning assessments. Featuring extensive coverage on topics such as spiritual intelligence strategies, literacy development, and ubiquitous learning, this is an ideal reference source for academicians, graduate students, practitioners, and researchers who want to improve their learning strategies using metacognition studies.
A usable functional interface between ontology and security integrating related information is needed for security engineering as well as creating secure systems. That in turn necessitates ontologizing security of information and networks... more
A usable functional interface between ontology and security integrating related information is needed for security engineering as well as creating secure systems. That in turn necessitates ontologizing security of information and networks to start with and then standardization. Having involved in the fields of semantic technology and information assurance, I have strived to facilitate establishing an interface between them and for this reason SIN Conference Series I created included all interest areas of semantics, metadata and ontology aspects. In a keynote talk and its proceedings paper in SIN 2014, I took up this subject and drove to the point that generic ontology for security of information and networks is timely, and it should better be standardized. In the present paper I investigate through examples where available to drive the point that the standard upper ontology for security may be developed through community sourcing and then standardized through competent agencies.
Distributed intelligent software agents (DISA) are software agents that help out users and act on their behalf. Such agents might be robots or virtual software systems. They are able to intelligent if they interact with their environment... more
Distributed intelligent software agents (DISA) are software agents that help out users and act on their behalf. Such agents might be robots or virtual software systems. They are able to intelligent if they interact with their environment in an approach that would generally be observed as intelligent if that communication were carried out by a human being. As a result,
Abstract Web mining treats the World Wide Web as the ultimate data source. This area of research is more interesting than data mining involving extracting data from in-house corporate databases or data warehouses. Gathering information... more
Abstract Web mining treats the World Wide Web as the ultimate data source. This area of research is more interesting than data mining involving extracting data from in-house corporate databases or data warehouses. Gathering information from Web sources via distributed intelligent software agents in enterprise architecture can be implemented securely, platform independent, reusable, and would be better modeled in n-tier or enterprise-tier architecture. The purpose of this paper is to develop a novel distributed ...
ABSTRACT Children with pervasive developmental disorders have special needs so they should be supported with special education programs. These programs are planned according to the type and degree of the disorder, age, characteristics,... more
ABSTRACT Children with pervasive developmental disorders have special needs so they should be supported with special education programs. These programs are planned according to the type and degree of the disorder, age, characteristics, and needs of the children. Families prefer Internet to search resources about related educational methods (and associated activity/game) and materials. However, syntactic search in today's Internet is insufficient because of its static base and the search results are not sufficient enough to offer desired relevant results corresponding to a child's needs. With the help of Semantic Web-based agents an intelligent system able to identify the suitable educational methods and material, will contribute to the development of children with disorders, and support education specialists in this process. In addition it will be extremely useful for the families of these children in need of assisting and monitoring their child's development. In this article, an Educational Activity Finder (EAF) is being proposed. The architecture of EAF is structured after semantic Web technology so that it can find and propose semantically relevant suitable educational methods (i.e., activities to carry out) and material for use by children with disorders. The knowledge base of EAF keeps educational methods using the OWL language. All related concepts, attributes, and relations between these concepts and features about pervasive developmental disorders are defined through ontology. EAF is structured to recognize a pervasive developmental disorder, sort out symptoms and anomalies, suggest activities, compile performance scores, and decide on new activity based on user preferences by utilizing the semantic descriptions of available methods and activities. Strength of EAF is demonstrated through sample scenarios. EAF may be used by parents, pre-school educators, primary schools, special educational institutions and experts working for these institutions, university stude- ts studying in related fields, and individuals interested in pervasive developmental disorders.
ABSTRACT Currently RFID authentication systems rely only on matching tag ID with the one kept in database. Additionally, an alphanumerical password might be matched as extra security. However, tag ID and information inside can be... more
ABSTRACT Currently RFID authentication systems rely only on matching tag ID with the one kept in database. Additionally, an alphanumerical password might be matched as extra security. However, tag ID and information inside can be compromised. Therefore, a more secure scheme is required in order to enhance safety of access control through RFID tags in particularly highly secure environments such as secure virtual meetings or authentication and access control to access high security locals. We wish to present attendance control ...
Abstract Maze solving using multiple algorithms is one of the important problems in the last years, maze solving problem is to determine the path of a mobile robot from its source position to a destination position through a workspace... more
Abstract Maze solving using multiple algorithms is one of the important problems in the last years, maze solving problem is to determine the path of a mobile robot from its source position to a destination position through a workspace populated with obstacles, in addition to finding the shortest path among the solutions. Autonomous robotics is a field with wide-reaching applications, from bomb-sniffing robots to autonomous devices for finding humans in wreckage to home automation; many people are interested in low-power, high speed, ...
Health is a popular aspect of eHealth applications that is starting to explode exponentially. The use of technology offering solutions with a potential of making patients' lives easier in the health sector has gradually increased with... more
Health is a popular aspect of eHealth applications that is starting to explode exponentially. The use of technology offering solutions with a potential of making patients' lives easier in the health sector has gradually increased with mHealth. Technology has great bearing in the health sector in order to increase the efficiency to serve patients by helping to diagnose ailments reliably. Mobile systems help observation of child patients in their treatment process and the collection of health data on the course. Therefore, people will be more aware of their children's health problems and preventive measures in accordance with those health problems. This article is on Mobile Pediatric Consultation and Monitoring System (mPCMS). Details of design and operation are given in this article. Mpcms not only will assist doctors but also help patients in decision making process of the medical treatment due to the information's ease use. Accordingly, with mPCMS, there will be a contribution to distant consultation by the doctor and the family by collecting the health data before and after the treatment of child patients.
Lack of sufficient semantic description makes it difficult to find and compose suitable Web services during analysis, search, and matching processes. As Semantic Web Services provide well-defined meaning, composition of new services is... more
Lack of sufficient semantic description makes it difficult to find and compose suitable Web services during analysis, search, and matching processes. As Semantic Web Services provide well-defined meaning, composition of new services is possible through logical deductions achieving resolutions automatically. This book develops an Inference-based Semantic Business Process Composition Agent (SCA). Utilizing Revised Armstrongs Axioms (RAAs) in inferring functional dependencies, SCA System composes available OWL-S ...
Abstract-Representing XML data in terms of the rows and columns of a relational table is quite inefficient. Similarly, object-oriented databases cater for storage of objects but lack fast access. In these cases, a better technique is... more
Abstract-Representing XML data in terms of the rows and columns of a relational table is quite inefficient. Similarly, object-oriented databases cater for storage of objects but lack fast access. In these cases, a better technique is required to speedup representation and retrieval of hierarchical data in relational databases. This paper presents XMLEase, a new access-and store-efficient technique to keep XML data in relational databases. XMLEase keeps data node together with its successors down to a pre-defined level of hierarchy. ...
Many mobile applications on safe food consumption and e-health have been developed recently. Health conscious users highly regard such applications for safe food consumption, especially for avoiding offending foods and additives. However,... more
Many mobile applications on safe food consumption and e-health have been developed recently. Health conscious users highly regard such applications for safe food consumption, especially for avoiding offending foods and additives. However, there is the lack of a comprehensive database containing structured or unstructured data to support such applications. In this paper we propose the MSS, a healthy food consumption search service for mobile applications utilizing Hadoop 1 and MapReduce 2 (MR). The MSS may work as a process behind a mobile application to provide a search service for information on food and food additives. MSS works by the same logic as a search engine (SE); it crawls over Web sources cataloguing relevant information for eventual use in responding to queries from mobile applications. MSS design and development are highlighted in this paper through its system architecture, query understanding, its use of the Hadoop/MapReduce Environment, and action scripts. A case study helps displaying the virtues of MSS.
Many mobile applications on safe food consumption and e-health have been developed recently. Health conscious users highly regard such applications for safe food consumption, especially for avoiding offending foods and additives. However,... more
Many mobile applications on safe food consumption and e-health have been developed recently. Health conscious users highly regard such applications for safe food consumption, especially for avoiding offending foods and additives. However, there is the lack of a comprehensive database containing structured or unstructured data to support such applications. In this paper we propose the MSS, a healthy food consumption search service for mobile applications utilizing Hadoop 1 and MapReduce 2 (MR). The MSS may work as a process behind a mobile application to provide a search service for information on food and food additives. MSS works by the same logic as a search engine (SE); it crawls over Web sources cataloguing relevant information for eventual use in responding to queries from mobile applications. MSS design and development are highlighted in this paper through its system architecture, query understanding, its use of the Hadoop/MapReduce Environment, and action scripts. A case stud...
Research Interests:
Google, Inc. (search). ...
ABSTRACT This research focuses on design and implementation of cooperative labyrinth discovery algorithms, specifically, discovering an unexplored maze with multiple robots working collaboratively. Solving a known maze using a single... more
ABSTRACT This research focuses on design and implementation of cooperative labyrinth discovery algorithms, specifically, discovering an unexplored maze with multiple robots working collaboratively. Solving a known maze using a single robot is straightforward. The robot looks around and memorizes the structure of the maze and it generates the solution track as a stack of consequent positions from the starting cell to the destination cell. The labyrinth discovery is known as a method of solving the maze when the wall structure is not known. There are various labyrinth discovery algorithms already implemented for a single agent but their extension to cooperating multiple agents is not straight forward and may not produce optimal solutions either. We designed and implemented single agent algorithms, namely Flood Fill (FF) and Modified Flood Fill (MFF), for multi-agent environment. In addition, a cooperative labyrinth discovery algorithm has been implemented based on the ALCKEF semantic logic. Then we compared their efficiency in theory and practice against the ideal case where agents are aware of the full maze structure. The theoretical comparison is done based on examining the time and space complexity. On the other hand, the experimental comparison examines the total cost for each of those algorithms to solve and discover the maze.
This chapter shows how it is possible to use agents and Semantic Web technologies to deal with dynamic composition of business processes via an agent-based workflow system. The aim of the system is to discover composable processes at... more
This chapter shows how it is possible to use agents and Semantic Web technologies to deal with dynamic composition of business processes via an agent-based workflow system. The aim of the system is to discover composable processes at first among heterogeneous business processes that are running possibly under different Web servers and then execute them in the order specified by a planner to reach a complex requested goal. We proposed a framework of an Inference-based Semantic Composition Agent (SCA) of atomic business ...
ABSTRACT Security policy helps to ensure that system always takes the desired input action sequence and works in a proper manner. Formal verification of finite state transactional security policy is necessary to check whether the given... more
ABSTRACT Security policy helps to ensure that system always takes the desired input action sequence and works in a proper manner. Formal verification of finite state transactional security policy is necessary to check whether the given policy conforms to the specification. One way to specify finite state transactional security policy is by using a filter automaton. A filter automaton is an action sequence transformer that maps an input action sequence into another, so that the output action sequence obeys the specified policy. A method for verification of finite state transactional security policy enforced by filter automata is being proposed. The observable actions finite security automaton and the observable actions finite truncation automaton are used to verify a finite state transactional security policy.
Abstract The development of semantic-based multiagent information systems is a promising field hinting at a new dimension of capability in interaction of semantic web technologies and agent systems. ESAS Workshops series aims at garnering... more
Abstract The development of semantic-based multiagent information systems is a promising field hinting at a new dimension of capability in interaction of semantic web technologies and agent systems. ESAS Workshops series aims at garnering the synergy of both worlds by taking up the common research issue. Topics of interest range from both theory and practice of agent systems, to semantic web technologies and their interaction, say in software agents, autonomous semantic agents, context-aware intelligent agents, agents as semantic web ...
The development of semantic-based multiagent information systems is a promising field hinting at a new dimension of capability in interaction of semantic web technologies and agent systems. ESAS Workshops series aims at garnering the... more
The development of semantic-based multiagent information systems is a promising field hinting at a new dimension of capability in interaction of semantic web technologies and agent systems. ESAS Workshops series aims at garnering the synergy of both worlds by taking up the common research issue. Topics of interest range from both theory and practice of agent systems, to semantic web technologies and their interaction, say in software agents, autonomous semantic agents, context-aware intelligent agents, agents as semantic web ...
Macquarie University ResearchOnline.
Google, Inc. (search). ...
This chapter shows how it is possible to use agents and Semantic Web technologies to deal with dynamic composition of business processes via an agent-based workflow system. The aim of the system is to discover composable processes at... more
This chapter shows how it is possible to use agents and Semantic Web technologies to deal with dynamic composition of business processes via an agent-based workflow system. The aim of the system is to discover composable processes at first among heterogeneous business processes that are running possibly under different Web servers and then execute them in the order specified by a planner to reach a complex requested goal. We proposed a framework of an Inference-based Semantic Composition Agent (SCA) of atomic business ...
The table of contents of the SIN'15 special issue in IGI Global's International Journal of Information Security and Privacy (IJISP), volume 10, issue 3
Research Interests:
The lack of semantic descriptions for “web service properties” makes it difficult to find suitable web services. Current solutions are mostly based on broker/mediator agent systems. However, these techniques are syntactical, rather than... more
The lack of semantic descriptions for “web service properties” makes it difficult to find suitable web
services. Current solutions are mostly based on broker/mediator agent systems. However, these techniques are
syntactical, rather than semantics oriented. This article presents a semantic matching approach for discovering
Semantic Web services through a broker-based semantic agent (BSA). The BSA includes knowledge-bases and
several processing steps. The BSA’s knowledge-bases are concept, task, and process ontologies built to describe
both functional and non-functional parameters of services. The BSA executes semantic-based matching algorithms
to discover similar services through the semantic matching step, process equivalence task, and matching
of quality of service parameters. Relevant services are ranked by client preferences utilizing the semantic descriptions
of available services. Other matchmaker studies are reviewed and compared with the BSA. Performance
of the BSA algorithm is compared with SAM using published data and an experimental setup. The results
indicate that our approach is better and more effective in some respects.
Research Interests:
Öz Günümüzde, yaygın gelişimsel bozukluğa sahip bireylerin topluma kazandırılmasıyla ilgilenen kurumlar veya uzman eğitim kadrosu, uzun araştırmalar sonunda titizlikle seçtikleri eğitsel metotlarla yaşanılan sıkıntıları aza indirgemeye... more
Öz Günümüzde, yaygın gelişimsel bozukluğa sahip bireylerin topluma kazandırılmasıyla ilgilenen kurumlar veya uzman eğitim kadrosu, uzun araştırmalar sonunda titizlikle seçtikleri eğitsel metotlarla yaşanılan sıkıntıları aza indirgemeye çalışmaktadırlar. Ancak, pek çok nedenden ötürü, bu kuruluşlara gidemeyen birey yakınları, uygun eğitimi evde vermeye çalışmaktadır. Bu eğitimler sırasında, kullanabilecekleri eğitsel metodu seçerken, internet veya ilgili yazılımlar en sık başvurdukları yöntemlerdendir. Ne var ki şu an statik tabanda sözdizimsel arama yapabilen günümüz internet veya ilgili yazılımları, bireyin ihtiyacına yönelik anlamsal tabanda hizmet/eğitsel aktivite taramalarında istenilen sonucu vermekte yetersiz kalabilmektedir. Bu makalede, anlamsal tabanda çalışabilen ve anne-babaların, okul öncesi eğitimcilerin, uzman eğitmenlerin veya ilgili alanlarda öğrenim gören üniversite öğrencilerinin ya da konuyla ilgilenen tüm bireylerin yararlanmaları için tasarlanmış eğitsel metot önermesi yapabilen, yaygın gelişimsel bozukluğu olan bireylerin gelişimine uygun Etmen-tabanlı Eğitsel Etkinlik Keşif Sistemi mimarisi sunulmaktadır. Bu sistemin bilgi tabanı OWL (Web Ontology Language) dili kullanılarak geliştirilmiş, yaygın gelişimsel bozukluklar alanına yönelik tüm kavramlar, özellikler ve bunlar arasındaki anlamsal bağlamdaki ilişkileri ontoloji yoluyla tanımlandırılmıştır. Abstract Today, experts and organizations dealing with pervasive developmental disorder are trying to minimize the experienced problems of the individuals with educational methods chosen carefully after extensive research. However, because of various reasons the relatives of the individuals who cannot reach these organizations are trying to give proper education at home. During these trainings while selecting the educational methods they prefer internet and related software. However, today's static based internet and related software can be insufficient to supple desired result for the individual's needs. In this article, the architecture of Agent-based Educational Activity Discovery System which can operate on semantic base and propose educational methods for parents, preschool educators, experts that are working for these institutions, university students studying in related fields or individuals interested in pervasive developmental disorder is presented. The ontology knowledgebase of this system is developed by using the OWL (Web Ontology Language) while creating its entire concepts, features, and relations between these concepts about pervasive developmental disorders are defined in ontology.
Research Interests:
Abstract Population explosion in larger cities and increase in vehicle density cause traffic problems in these areas. Intersections are the places where traffic is mostly blocked and most of the accidents occur. Signalization lights at... more
Abstract Population explosion in larger cities and increase in vehicle density cause traffic problems in these areas. Intersections are the places where traffic is mostly blocked and most of the accidents occur. Signalization lights at the intersections aim to arrange the traffic flow and to avoid accidents. If not located properly or have bad timing, not only they fail to avoid accidents but also they cause disobeying, time loss and wearyness. Traffic assignment and management deal with those problems to minimize personal and social ...
Due to the insertion of semantics to the Web services,meeting user demands will be possible through logicaldeductions and achieving resolutions automatically. Withthe application of semantic description in content of Webservices it is... more
Due to the insertion of semantics to the Web services,meeting user demands will be possible through logicaldeductions and achieving resolutions automatically. Withthe application of semantic description in content of Webservices it is easier to discover and compose suitableWeb ...
Abstract ParseKey+ is an approach to a new highly secure and safe authentication service. The scheme provides secure authentication process for both server and client sides. It employs hash to hide the encrypted key in a key file... more
Abstract ParseKey+ is an approach to a new highly secure and safe authentication service. The scheme provides secure authentication process for both server and client sides. It employs hash to hide the encrypted key in a key file retrievable only by the other side knowing the indices and lengths of the sub-keys hidden inside ParseKey+ file. The ParseKey+ file itself is also encrypted by the password of the other party in authentication service using a symmetric encryption method. We wish to implement the ParseKey+ ...
Abstract This paper shows a searching mechanism to discover semantic Web services satisfying client requirements. The increase in Web services and lack of semantic base in search mechanisms of UDDI make it difficult for clients to find a... more
Abstract This paper shows a searching mechanism to discover semantic Web services satisfying client requirements. The increase in Web services and lack of semantic base in search mechanisms of UDDI make it difficult for clients to find a required Web service. We developed a system which uses a semantic search agent (SSA) to discover required Web services from Web and selects them according to the client requirements then presents them as a result page. The system uses Ontology Web Language for services (OWL-S), which ...
Today, social networks are for much more than just having fun with friends. Millions of dollars are being spent to extract valuable information out of social networks for marketing purposes. Attaching machine readable semantics to social... more
Today, social networks are for much more than just having fun with friends. Millions of dollars are being spent to extract valuable information out of social networks for marketing purposes. Attaching machine readable semantics to social networks, that is absent at present, will lead to a better degree of information extraction. To achieve this goal, user input is required. From users' point of view, providing the same data to different social networks creates a drawback. This is due to the centralized one-of-a-kind nature of social networks. ...
Abstract Traditional Websites no longer meet the needs of todaypsilas software agents because of their unstructured nature in terms of the semantics they convey. One of the primary objectives of semantic Web is to enable software agents... more
Abstract Traditional Websites no longer meet the needs of todaypsilas software agents because of their unstructured nature in terms of the semantics they convey. One of the primary objectives of semantic Web is to enable software agents infer facts and knowledge out of different Websites. The primary aim of this project is to develop an application to manipulate OWL files, browse ontologies and enable software agents infer information semantically. Needless to say such inference is not feasible in current conventional ...
Abstract We consider recovery techniques for packet-loss in the multimedia streams at both sender-and receiver-sides. We investigate recovery techniques as bases of useless packet transmission avoidance in order to release bandwidth by... more
Abstract We consider recovery techniques for packet-loss in the multimedia streams at both sender-and receiver-sides. We investigate recovery techniques as bases of useless packet transmission avoidance in order to release bandwidth by avoiding sending unintelligible packets. At times, packet-loss exceeds a given threshold such that recovery techniques are not able to cope with packet-losses. Therefore, algorithms supplying lower latency and higher degree of recovery are needed. Moreover, faster algorithms for generating packets, ...
This paper reports on a study aiming to develop a metadata model for e-learning coordination based on semantic web languages. A survey of e-learning modes are done initially in order to identify content such as phases, activities, data... more
This paper reports on a study aiming to develop a metadata model for e-learning coordination based on semantic web languages. A survey of e-learning modes are done initially in order to identify content such as phases, activities, data schema, rules and relations, etc. relevant for a coordination model. In this respect, the study looks into the mechanism of e-learning environment and the question of how e-learning can be classified in terms of activity coordination. A metadata model for coordination of e-learning is being sought which may be expressed using semantic web languages such as OWL + RDF. This is part of a project involving studies on several fronts regarding the application of semantic web initiative into e-learning; i.e. design and development of markup and annotation tools, relevant ontologies, intelligent agents, etc. The objective is eventually to build capability to semantically integrate and selectively retrieve e-content in implementing e-learning environments.
ESAS Workshops Series aims at garnering the synergy of semantic web technologies and agent systems by taking up development of semantic-based multi-agent information systems. Topics of interest span a wide spectrum of both theory and... more
ESAS Workshops Series aims at garnering the synergy of semantic web technologies and agent systems by taking up development of semantic-based multi-agent information systems. Topics of interest span a wide spectrum of both theory and practice of agent architectures, software agents, mobile agents, autonomous semantic agents, context-aware intelligent agents, agents as semantic web services, multi-agent systems, agent communities, cooperation and goal seeking through shared policy and ontology, safety & ...
This paper shows a searching mechanism to discover Semantic Web Services satisfying client requirements. The increase in web services and lack of semantic base in search mechanisms of UDDI make it difficult for clients to find a required... more
This paper shows a searching mechanism to discover Semantic Web Services satisfying client requirements. The increase in web services and lack of semantic base in search mechanisms of UDDI make it difficult for clients to find a required web service. We developed a system which uses a Semantic Search Agent (SSA) to discover suitable web services according to client requirements then presents them as a result page. The system uses Ontology Web Language for Services (OWL-S), which allows semantic description of ...
In this article we focus on the essential requirements of a robot for semantically dealing with cooperative problem solving in a natural setting such as discovery of exit from a labyrinth. A very common application area for such robots... more
In this article we focus on the essential requirements of a robot for semantically dealing with cooperative problem solving in a natural setting such as discovery of exit from a labyrinth. A very common application area for such robots are used as set of multi-agents at junctions in Traffic Management and Information Systems (TMIS) to manage the traffic and interact with ambulance or fire fighters to traverse the shortest possible path [18]. In order to present the above mentioned goal, a new modular architecture for design and ...
... Alex Abramovich, Tibor Bosse, Stijn Christiaens, Asuman Dogac, Atilla Elci, Vadim Ermolayev, M. Adeep Ghonaimy, Ibrahim Gokcen, Angus Huang, Ahmed Kayed, Mamadou Kone, Alexander Kostin, Pieter de Leenheer, Jiming Liu, Vitaliy Mezhuev,... more
... Alex Abramovich, Tibor Bosse, Stijn Christiaens, Asuman Dogac, Atilla Elci, Vadim Ermolayev, M. Adeep Ghonaimy, Ibrahim Gokcen, Angus Huang, Ahmed Kayed, Mamadou Kone, Alexander Kostin, Pieter de Leenheer, Jiming Liu, Vitaliy Mezhuev, Michal Pechoucek, Mustafa ...
- Semantic technologies, such as RDF (Resource Description Framework) and OWL (Web Ontology Language), are being widely used to store information. Ontology is mostly used in semantic platforms or embedded in other applications as a... more
- Semantic technologies, such as RDF (Resource Description Framework) and OWL (Web Ontology Language), are being widely used to store information. Ontology is mostly used in semantic platforms or embedded in other applications as a repository system. Data is ...
Abstract Lack of sufficient semantic description in the content of Web services makes it difficult to find and compose suitable Web services during analysis, search, and matching processes. Semantic Web Services are Web services that... more
Abstract
Lack of sufficient semantic description in the content of Web services makes it difficult to find
and compose suitable Web services during analysis, search, and matching processes. Semantic
Web Services are Web services that have been enhanced with formal semantic description which
provides well-defined meaning. Due to insertion of semantics, meeting user demands will be
made possible through logical deductions achieving resolutions automatically. We have developed
an inference-based semantic business process composition agent (SCA) that employs inference
techniques. The semantic composition agent system is responsible for the synthesis of new services
from existing ones in a semi-automatic fashion. SCA System composes available OWL-S atomic
processes utilizing Revised Armstrong’s Axioms (RAAs) in inferring functional dependencies.
RAAs are embedded in the knowledge base ontologies of SCA System. Experiments show that
the proposed SCA System produces process sequences as a composition plan that satisfies user’s
requirement for a complex task. The novelty of the SCA System is that for the first time
Armstrong’s Axioms are revised and used for semantic based planning and inferencing of Web
services.
Description of the call for papers and the important dates.
Research Interests:
Semantic agent systems are about the integration of the semantic Web, software agents, and multi-agent systems technologies. Like in the past (eg biology and informatics yielding bioinformatics) a whole new perspective is emerging with... more
Semantic agent systems are about the integration of the semantic Web, software agents, and multi-agent systems technologies. Like in the past (eg biology and informatics yielding bioinformatics) a whole new perspective is emerging with semantic agent systems. In this context, the semantic Web is a Web of semantically linked data which aims to enable man and machine to execute tasks in tandem. Here, software agents in a multi-agent system as delegates of humans are endowed with power to use semantically linked data. This edited ...
mHealth is a popular aspect of eHealth applications that is starting to explode exponentially. The use of technology offering solutions with a potential of making patients’ lives easier in the health sector has gradually increased with... more
mHealth is a popular aspect of eHealth applications that is starting to explode exponentially. The use of technology offering solutions with a potential of making patients’ lives easier in the health sector has gradually increased with mHealth. Technology has great bearing in the health sector in order to increase the efficiency to serve patients by helping to diagnose ailments reliably. Mobile systems help observation of child patients in their treatment process and the collection of health data on the course. Therefore, people will be more aware of their children’s health problems and preventive measures in accordance with those health problems. This article is on Mobile Pediatric Consultation and Monitoring System (mPCMS). Details of design and operation are given in this article. mPCMS not only will assist doctors but also help patients in decision making process of the medical treatment due to the information’s ease use. Accordingly, with mPCMS, there will be a contribution to distant consultation by the doctor and the family by collecting the health data before and after the treatment of child patients.
Research Interests:
While Internet takes up by far the most significant part of our daily lives, finding jobs/employees on the Internet has started to play a crucial role for job seekers and employers. Online recruitment websites and human resources... more
While Internet takes up by far the most significant part of our daily lives, finding jobs/employees on the Internet has started to play a crucial role for job seekers and employers. Online recruitment websites and human resources consultancy and recruitment companies enable job seekers to create their résumé, a brief written formal document including job seeker’s basic information such as personal information, educational information, work experience and qualifications in order to find and apply for desirable jobs, whereas they enable companies to find qualified employees they are looking for. However résumés may be written in many ways that make it difficult for online recruitment companies to keep these data in their relational databases. In this study, a project that Kariyer.net (largest online recruitment website in Turkey) and TUBITAK (The Scientific and Technological Research Council of Turkey) have been jointly working is proposed. In this mentioned project, a system enables free structured format of résumés to transform into an ontological structure model. The produced system based on ontological structure model and called Ontology based Résumé Parser (ORP) will be tested on a number of Turkish and English résumés. The proposed system will be kept in Semantic Web approach that provides companies to find expert finding in an efficient way.
Research Interests:
Abstract—Children with pervasive developmental disorders have special needs so they should be supported with special education programs. These programs are planned according to the type and degree of the disorder, age, characteristics,... more
Abstract—Children with pervasive developmental disorders have special needs so they should be supported with special education programs. These programs are planned according to the type and degree of the disorder, age, characteristics, and needs of the children. Families prefer Internet to search resources about related educational methods (and associated activity/game) and materials. However, syntactic search in today’s Internet is insufficient because of its static base and the search results are not sufficient enough to offer desired relevant results corresponding to a child’s needs. With the help of Semantic Web-based agents an intelligent system able to identify the suitable educational methods and material, will contribute to the development of children with disorders, and support education specialists in this process. In addition it will be extremely useful for the families of these children in need of assisting and monitoring their child’s development.
In this article, an Educational Activity Finder (EAF) is being proposed. The architecture of EAF is structured after semantic Web technology so that it can find and propose semantically relevant suitable educational methods (i.e., activities to carry out) and material for use by children with disorders. The knowledge base of EAF keeps educational methods using the OWL language. All related concepts, attributes, and relations between these concepts and features about pervasive developmental disorders are defined through ontology. EAF is structured to recognize a pervasive developmental disorder, sort out symptoms and anomalies, suggest activities, compile performance scores, and decide on new activity based on user preferences by utilizing the semantic descriptions of available methods and activities. Strength of EAF is demonstrated through sample scenarios. EAF may be used by parents, pre-school educators, primary schools, special educational institutions and experts working for these institutions, university students studying in related fields, and individuals interested in pervasive developmental disorders.
Research Interests:
The lack of semantic descriptions for “web service properties” makes it difficult to find suitable web services. Current solutions are mostly based on broker/mediator agent systems. However, these techniques are syntactical, rather than... more
The lack of semantic descriptions for “web service properties” makes it difficult to find suitable web
services. Current solutions are mostly based on broker/mediator agent systems. However, these techniques are
syntactical, rather than semantics oriented. This article presents a semantic matching approach for discovering
Semantic Web services through a broker-based semantic agent (BSA). The BSA includes knowledge-bases and
several processing steps. The BSA’s knowledge-bases are concept, task, and process ontologies built to describe
both functional and non-functional parameters of services. The BSA executes semantic-based matching algorithms
to discover similar services through the semantic matching step, process equivalence task, and matching
of quality of service parameters. Relevant services are ranked by client preferences utilizing the semantic descriptions
of available services. Other matchmaker studies are reviewed and compared with the BSA. Performance
of the BSA algorithm is compared with SAM using published data and an experimental setup. The results
indicate that our approach is better and more effective in some respects.
Research Interests:
Lack of sufficient semantic description in the content of Web services makes it difficult to find and compose suitable Web services during analysis, search, and matching processes. Semantic Web Services are Web services that have been... more
Lack of sufficient semantic description in the content of Web services makes it difficult to find
and compose suitable Web services during analysis, search, and matching processes. Semantic
Web Services are Web services that have been enhanced with formal semantic description which
provides well-defined meaning. Due to insertion of semantics, meeting user demands will be
made possible through logical deductions achieving resolutions automatically. We have developed
an inference-based semantic business process composition agent (SCA) that employs inference
techniques. The semantic composition agent system is responsible for the synthesis of new services
from existing ones in a semi-automatic fashion. SCA System composes available OWL-S atomic
processes utilizing Revised Armstrong’s Axioms (RAAs) in inferring functional dependencies.
RAAs are embedded in the knowledge base ontologies of SCA System. Experiments show that
the proposed SCA System produces process sequences as a composition plan that satisfies user’s
requirement for a complex task. The novelty of the SCA System is that for the first time
Armstrong’s Axioms are revised and used for semantic based planning and inferencing of Web
services.
Research Interests:
Günümüzde, yaygın gelişimsel bozukluğa sahip bireylerin topluma kazandırılmasıyla ilgilenen kurumlar veya uzman eğitim kadrosu, uzun araştırmalar sonunda titizlikle seçtikleri eğitsel metotlarla yaşanılan sıkıntıları aza indirgemeye... more
Günümüzde, yaygın gelişimsel bozukluğa sahip bireylerin topluma kazandırılmasıyla ilgilenen kurumlar veya uzman eğitim kadrosu, uzun araştırmalar sonunda titizlikle seçtikleri eğitsel metotlarla yaşanılan sıkıntıları aza indirgemeye çalışmaktadırlar. Ancak, pek çok nedenden ötürü, bu kuruluşlara gidemeyen birey yakınları, uygun eğitimi evde vermeye çalışmaktadır. Bu eğitimler sırasında, kullanabilecekleri eğitsel metodu seçerken, internet veya ilgili yazılımlar en sık başvurdukları yöntemlerdendir. Ne var ki şu an statik tabanda sözdizimsel arama yapabilen günümüz internet veya ilgili yazılımları, bireyin ihtiyacına yönelik anlamsal tabanda hizmet/eğitsel aktivite taramalarında istenilen sonucu vermekte yetersiz kalabilmektedir.
Bu makalede, anlamsal tabanda çalışabilen ve anne-babaların, okul öncesi eğitimcilerin, uzman eğitmenlerin veya ilgili alanlarda öğrenim gören üniversite öğrencilerinin ya da konuyla ilgilenen tüm bireylerin yararlanmaları için tasarlanmış eğitsel metot önermesi yapabilen, yaygın gelişimsel bozukluğu olan bireylerin gelişimine uygun Etmen-tabanlı Eğitsel Etkinlik Keşif Sistemi mimarisi sunulmaktadır. Bu sistemin bilgi tabanı OWL (Web Ontology Language) dili kullanılarak geliştirilmiş, yaygın gelişimsel bozukluklar alanına yönelik tüm kavramlar, özellikler ve bunlar arasındaki anlamsal bağlamdaki ilişkileri ontoloji yoluyla tanımlandırılmıştır.

Anahtar kelimeler: Yaygın Gelişimsel Bozukluk, Otizm, Rett Sendromu, Atipik Otizm, Asperger, Dezintegratif, Ontoloji, Anlamsal Web, Anlamsal Arama Sistemleri.
Research Interests:
Over 3,000 compounds are being added to processed food. These compounds have numerous effects on food: add color, stabilize, texturize, preserve, sweeten, thicken, add flavor, soften, emulsify, and so on. According to a recent report by... more
Over 3,000 compounds are being added to processed food. These compounds have numerous effects on food: add color, stabilize, texturize, preserve, sweeten, thicken, add flavor, soften, emulsify, and so on. According to a recent report by the World Health Organization, governments have lately focused on legislation to reduce such ingredients or compounds in manufactured foods for they might have side effects causing health risks such as the heart disease, cancer, diabetes, allergens, obesity, etc. Safety in food consumption especially by patients of risk groups have become crucial for such health problems are in the top ten ranked health risks around the world. By supervising what and how much to eat as well as what not to eat, we can maximize a patient’s life quality by avoiding unhealthy ingredients or compounds. In helping patients take control of their safe food consumption, we need smart personal e-health systems. Smart personal e-health systems with advanced knowledge management technology can provide suggestions of food appropriate for consumption by individuals. Accessing annotations in the ontology knowledge base of food appropriate to their personal health condition can be provided. This article discusses one such software application, namely the Safety Food Consumption Mobile System, employing Semantic Web Technology.
Research Interests:
mHealth, giderek büyüyen e-sağlık uygulamalarının bir yönüdür. Sağlık sektöründe hastaların hayatlarını kolaylaştıran bir potansiyeli olan ve teknoloji sunan çözümlerin kullanımı giderek artmıştır. Teknoloji güvenilir rahatsızlıkların... more
mHealth, giderek büyüyen e-sağlık uygulamalarının bir yönüdür. Sağlık sektöründe hastaların hayatlarını kolaylaştıran bir potansiyeli olan ve teknoloji sunan çözümlerin kullanımı giderek artmıştır. Teknoloji güvenilir rahatsızlıkların teşhisine yardımcı olmakla birlikte hastalara olan hizmet verimliliğini artırmak amacıyla, sağlık sektöründe büyük bir etkiye sahiptir. Mobil sistemler tedavi sürecinde çocuk hastaların gözlemlenmesine ve sağlık verilerinin toplanmasına yardımcı olabilmektedir. Bu nedenle, insanlar bu sağlık sorunları çerçevesinde çocuklarının sağlık sorunlarının ve koruyucu tedbirlerin daha fazla farkında olacaktır. Bu makale Mobil Pediatrik Danışma ve İzleme Sistemi (mPCMS) üzerinedir. Tasarım ve işletme ayrıntıları bu makalede verilmektedir. mPCMS doktorlara uzaktan bağlantı ile dolaylı olarak yardımcı olmaktadır, bu nedenle de hastardan ev ortamında toplanan verilerin kullanımı ve hastane ortamına mobil ortamdan aktarılması tıbbi tedavi, karar verme sürecinde hastalara yardımcı olmaktadır. Buna göre, mPCMS ile, çocuk hastaların tedavi öncesi ve sonrası sağlık verilerini toplayarak doktor ve ailesi tarafından uzak konferans için bir katkı olacaktır.
Research Interests:
Besinlere 3.000 'den fazla bileşik, işlenmiş gıda ilave ediliyor. Bu bileşiklerin, renklendirmek, stabilize etmek, korumak, tatlandırmak, kalınlaştırmak, lezzet eklemek, yumuşatmak, emülsiyon attırmak gibi gıda üzerinde sayısız etkisi... more
Besinlere 3.000 'den fazla bileşik, işlenmiş gıda ilave ediliyor. Bu bileşiklerin, renklendirmek, stabilize etmek, korumak, tatlandırmak, kalınlaştırmak, lezzet eklemek, yumuşatmak, emülsiyon attırmak gibi gıda üzerinde sayısız etkisi vardır. Dünya Sağlık Örgütü tarafından yayınlanan son rapora göre, hükümetler son zamanlarda kalp hastalığı, kanser, diyabet, alerji, obezite, vb. hastalık risk gruplarının yan etkilerini azaltmak için, üretilen gıdalarda böyle maddeler veya bileşikleri azaltmak için mevzuata odaklanmıştır. Dünyada ilk on sırada yer alan bu tür sağlık sorunları olan, özellikle de risk grubundaki hastaların gıda tüketimi güvenliği önemli bir konu haline gelmiştir. Ne yemediğimizin yanı sıra neyi nasıl yediğimizi denetleyerek, sağlıksız maddeler veya bileşiklerden kaçınarak bir hastanın yaşam kalitesini en üst düzeye çıkarabiliriz. Hastaların güvenli gıda tüketiminin kontrolünü ele almasına yardımcı olmak amacıyla akıllı kişisel e-sağlık sistemlerine ihtiyaç duyulmaktadır. Gelişmiş bilgi yönetimi teknolojisi ile akıllı ve kişiye özgü e-sağlık sistemlerinin gıda tüketimi için uygun öneriler sunmasını sağlayabiliriz. Semantik Web Teknolojisi ve Ontoloji Bilgi Tabanı sayesinde kişiler kendi kişisel sağlık durumuna göre kişinin sağlık durumuna uygun gıda ürününün farkına varabilir. Bu makalede. Semantik Web Teknolojisi ile geliştirilmiş, kişinin mevcut hastalığına göre Bireylere Özgün Güvenli Gıda Tüketim Mobil Sistemi (SFCMS) önerisi sunulmaktadır.
Research Interests:
ABSTRACT Cipher analysis on the authentication services through insecure network shows possibility of illegal capture of protected information, researchers try to develop and implement safer foundations.
Abstract Intelligent Semantic Web Service Finder (ISWSF) is a mechanism that discovers Semantic Web Services satisfying client requirements. The increase in web services and lack of semantic base in search mechanisms of UDDI make it... more
Abstract Intelligent Semantic Web Service Finder (ISWSF) is a mechanism that discovers Semantic Web Services satisfying client requirements. The increase in web services and lack of semantic base in search mechanisms of UDDI make it difficult for clients to find required web services. We developed a system which uses a Semantic Search Agent (SSA) to discover required web services from web and selects them according to the client requirements then presents them as a result page.
Abstract-Annotation gives more meaning to the content, explanation or annotation is sometims a necessity for multimedia content but during data transaction annotations can be lost if it is not combined with the data. For different people... more
Abstract-Annotation gives more meaning to the content, explanation or annotation is sometims a necessity for multimedia content but during data transaction annotations can be lost if it is not combined with the data. For different people from different cultures, different languages and different ideas sometimes describing the same thing would be completely different.
Abstract-Representing XML data in terms of the rows and columns of a relational table is quite inefficient. Similarly, object-oriented databases cater for storage of objects but lack fast access. In these cases, a better technique is... more
Abstract-Representing XML data in terms of the rows and columns of a relational table is quite inefficient. Similarly, object-oriented databases cater for storage of objects but lack fast access. In these cases, a better technique is required to speedup representation and retrieval of hierarchical data in relational databases. This paper presents XMLEase, a new access-and store-efficient technique to keep XML data in relational databases.
Approaches are needed for providing advanced autonomous wheeled robots with a sense of self, immediate ambience, and mission. The following list of abilities would form the desired feature set of such approaches: self-localization,... more
Approaches are needed for providing advanced autonomous wheeled robots with a sense of self, immediate ambience, and mission. The following list of abilities would form the desired feature set of such approaches: self-localization, detection and correction of course deviation errors, faster and more reliable identification of friend or foe, simultaneous localization and mapping in uncharted environments without necessarily depending on external assistance, and being able to serve as web services.
Ozet. Anlamsal Web'in en önemli getirisi olan ontolojiler içine gömülen semantik betimlemeler üzerinden, kullanıcı taleplerinin karsılanması ve varolan veriler üzerinden anlamsal ve mantıksal çıkarsamaların otomatik olarak yapılması... more
Ozet. Anlamsal Web'in en önemli getirisi olan ontolojiler içine gömülen semantik betimlemeler üzerinden, kullanıcı taleplerinin karsılanması ve varolan veriler üzerinden anlamsal ve mantıksal çıkarsamaların otomatik olarak yapılması mümkündür. Ayrıca, Web servislerini ontoloji dosyalarına betimlemek mümkün olup, bu gömülü olan semantik betimlemeler üzerinden Web servislerinin kesfi ve birlestirilmesi islemlerinde daha akıllı sistemler gelistirilebilir.
This study highlights a security scenario involving vehicles in a Traffic Management and Information System (TMIS) network. TMIS and its nodal architecture, nicknamed Intelligent Junction (IJ), are summarized from our recent work. System... more
This study highlights a security scenario involving vehicles in a Traffic Management and Information System (TMIS) network. TMIS and its nodal architecture, nicknamed Intelligent Junction (IJ), are summarized from our recent work. System design sets an example to a software architecture implementing autonomous semantic agents through semantic web services, junction-based sensor networks, local-and wide-area networking through wire/wireless integrated communication infrastructure.
Abstract Music and Audio Information Search System (MAISS) is a web-based application using ontologies and inference engine to search multimedia documents. In MAISS, users run queries in web pages for retrieving data about albums,... more
Abstract Music and Audio Information Search System (MAISS) is a web-based application using ontologies and inference engine to search multimedia documents. In MAISS, users run queries in web pages for retrieving data about albums, artists, audio files, audio file formats, encoding audio files, genre, instrument, key, note, official, resource, rhythm, etc.
Abstract Distributed processing environments such as that of a traffic management network system (TMS) can be implemented easier, faster, and secure and perform better through use of autonomous semantic agents (ASAs). For an ASA can then... more
Abstract Distributed processing environments such as that of a traffic management network system (TMS) can be implemented easier, faster, and secure and perform better through use of autonomous semantic agents (ASAs). For an ASA can then be realized as a semantic Web service, a whole TMS is easily implemented through a collection of semantic Web services agents arranged according to the topology of the traffic network.
Abstract This paper proposes a smart mechanism to discover semantic Web services satisfying client requirements. The increase in Web services and lack of semantic base in search mechanisms of UDDI make it difficult for clients to find a... more
Abstract This paper proposes a smart mechanism to discover semantic Web services satisfying client requirements. The increase in Web services and lack of semantic base in search mechanisms of UDDI make it difficult for clients to find a required Web service. It is proposed to develop an intelligent agent to discover required Web services from Web. The system uses OWL-S for describing semantics of Web services and discovers appropriate semantic Web services through these semantic descriptions.
Through experiments on datasets from Reuters news collection RCV1, we show that the proposed method is a significant supplement to the statistical feature selection measures for better text classification at extreme term filtering ranges.
Increasing numbers of people use social networks for keeping consistent contact with social life and acquaintances; sharing experiences became one of the most important requirement driving social networks. Users mostly use the media... more
Increasing numbers of people use social networks for keeping consistent contact with social life and acquaintances; sharing experiences became one of the most important requirement driving social networks. Users mostly use the media gathered during events, while sharing them socially. In this paper, we propose a semantic based model that involves several domain-based shared ontologies and use them to investigate image relationships among experiences. The proposed model is called Semantic Image Retrieval Model (SIRM) for sharing knowledge in social networks. In addition, we concentrate on a “Visit to zoo” scenario as a case study to show suitability and usability of the ontology based model for meeting requirements of sharing experiences among users of a social network. SIRM can also be used for different environments and scenarios in order to share experiences in a social network, build a knowledge-base of annotated media gathered during experiences by the people who visited the same site, or simply store the gathered media intelligently for future reference....
In this paper, design and implementation of through-cell self localization in Client Cooperative Labyrinth Discovery Robots (CCLDRs) were presented especially addressing severe restriction or lack of resources. Decision making is... more
In this paper, design and implementation of through-cell self localization in Client Cooperative Labyrinth Discovery Robots (CCLDRs) were presented especially addressing severe restriction or lack of resources. Decision making is performed through a semantic intelligence approach incorporating Open / Locally Closed / Closed World Assumptions in its algorithm. The algorithm was retrofitted from earlier research in order to fit into limited capacities of CCLDRs. On the other hand, decision making algorithm is optimized to perform autonomously leaving only more complicated calculation to Server CLDRs (SCLDRs). SCDLRs are more advanced CLDRs with ability of processing ontology files, and providing Semantic Web Services (SWS) over internet using System on Chip (SoC) embedded boards, etc. CCLDR hardware architecture was enhanced by inserting an extension board accommodating modulated IR receivers for Friend or Foe determination, 433MHz wireless communication capability, and allowing multiplexing of two sets of 6 sensors dedicated for line tracing and side sensor boards through 6 lines of ADCs on primitive maze solver robots. CCLDRs are able to localize themselves based on the mathematical formulations relying on distance measurements by side sensors but without needing shaft-encoders. Within this environment, each agent is autonomous complex system acting based on its sensory input, information retrieved from other agents, and suitable form of converted ontology files from SCLDR.
Finding an appropriate Web service is the best chance due to lack of semantics in the protocols used to specify and publish them. UDDI and WSDL do not provide grounds to find appropriate web services at the required accuracy and Quality... more
Finding an appropriate Web service is the best chance due to lack of semantics in the protocols used to specify and publish them. UDDI and WSDL do not provide grounds to find appropriate web services at the required accuracy and Quality of Service (QoS). This article discusses a Semantic Search Agent (SSA) approach that discovers appropriate web services according to their semantic description. QoS requirements and input/output information of the fetched Web services are compared against client requirements. A QoS broker-based scheme is considered as basis of a broker/dispatcher model which incorporates a multi-class queuing model. We augmented the model with semantic technologies, discussed implementation, and exemplified its use. Performance of the system in terms of throughput and response times was analyzed and simulated. Both set of values for a sample system configuration was found almost identical, also identifying request levels causing saturation....
This paper draws a beginning to end framework for Friend or Foe (FOF) identification for multi-robot battlefield. Mini-sumo robots are well-known example case while absolute positioning of each teammate is not practical. Our... more
This paper draws a beginning to end framework for Friend or Foe (FOF) identification for multi-robot battlefield. Mini-sumo robots are well-known example case while absolute positioning of each teammate is not practical. Our simple-to-implement FOF identification does not require two-way communication as it only relies on decryption of payload in one direction. It is shown that the replay attack is not feasible time wise as the communication is encrypted and timestamp is inserted in the messages. The hardware implementation of cooperative robots is equipped with rotary robot able to detect direction and distance to detected object in addition to gyroscope chipset. Studying dynamics of robots allows finding solutions to attack enemies which are more powerful than friends from sides so they will not be able to resist. Besides, there are certain situations that robots must escape instead of fighting. Experimental part of this research attempts to illustrate results of real competitions of cooperative mini-sumo battlefield as an example of localization and mapping besides collaborative problem solving in uncharted environments.
UDDI and WSDL do not provide sufficient grounds to find appropriate Web services at the required accuracy and quality of service (QoS) level by the consumer. This article discusses a semantic search agent (SSA) approach that discovers... more
UDDI and WSDL do not provide sufficient grounds to find appropriate Web services at the required accuracy and quality of service (QoS) level by the consumer. This article discusses a semantic search agent (SSA) approach that discovers appropriate Web services according to semantic description. The descriptions comprise QoS requirements and input/output information of fetched Web services according to consumer requirements. This study considers a broker or dispatcher model which consists of a QoS broker-based scheme by a multi-class queuing model. We depicted a new system that is an extension of the SSA to find appropriate Web services according to consumer request based on matching of input/output and QoS information of Web services; then compose them according to consumer requirements through semantic Web and ontology...
This paper presents a design ontology that deals with the hypermedia presentation aspects involved in the development of a semantic Web information system. The ontology is driven by two main design models: the conceptual and the... more
This paper presents a design ontology that deals with the hypermedia presentation aspects involved in the development of a semantic Web information system. The ontology is driven by two main design models: the conceptual and the application models. The application model extends the conceptual model with presenting data and inferring. During the presentation generation the input data goes through a sequence of transformation steps. Using semantic Web technology we chose to represent the models and their instances in OWL DL. Protege 3.2 (2007) and some of its plug-ins are used to develop this experiment. In this study we'll implement an ontology based information system in web environment and query this ontology through Web interface
Distributed intelligent software agents (DISA) are software agents that help out users and act on their behalf. Such agents might be robots or virtual software systems. They are able to intelligent if they interact with their environment... more
Distributed intelligent software agents (DISA) are software agents that help out users and act on their behalf. Such agents might be robots or virtual software systems. They are able to intelligent if they interact with their environment in an approach that would generally be observed as intelligent if that communication were carried out by a human being. As a result, gathering information from Web sources via distributed intelligent software agents in enterprise architecture can be implemented platform independent, reusable, and would be better modeled in n-tier or enterprise-tier architecture. The purpose of this paper is to develop a novel distributed intelligent software agent architecture capable of manually and automatically locating and extracting user specified data from the Web, and to dynamically populate semantic databases with the data for later access and retrieval. Implementation of this project not only enables the software to access the semantic information which has been created by a typical Web source, but also it is equipped producing a meta database for executing the queries in semantic database. On the other hand, agents of this system have been enabled for the creation of customized knowledge-based ontology files over enterprise model for future usage of users...
Currently RFID authentication systems rely only on matching tag ID with the one kept in database. Additionally, an alphanumerical password might be matched as extra security. However, tag ID and information inside can be compromised.... more
Currently RFID authentication systems rely only on matching tag ID with the one kept in database. Additionally, an alphanumerical password might be matched as extra security. However, tag ID and information inside can be compromised. Therefore, a more secure scheme is required in order to enhance safety of access control through RFID tags in particularly highly secure environments such as secure virtual meetings or authentication and access control to access high security locals. We wish to present attendance control system which is more like access control in general as an application of our novel security enhancement on RFID based access control systems. The security enhancement utilizes partial ParseKey+ multi-way authentication scheme. ParseKey+ scatters randomly divided sub-keys into uniformly distributed noise. Generated file is encrypted using AES256 and then it is written into RFID device. Each successful login changes the key and its trace kept in DB in addition to updating the device for future login.
Keywords: Authentication, RFID based Access Control, ParseKey+, Attendance Control
Abstract. This chapter focuses on design, implementation, and utilization of semantic robots dealing with cooperative problem solving in a natural setting such as discovery of exit from a labyrinth. In our approach to realize this goal, a... more
Abstract. This chapter focuses on design, implementation, and utilization of semantic robots dealing with cooperative problem solving in a natural setting such as discovery of exit from a labyrinth. In our approach to realize this goal, a new modular architecture for designing ...
Page 1. Defining a Strategy to Select Either of Closed/Open World Assumptions on Semantic Robots Atilla Elçi Department of Computer Engineering Eastern Mediterranean University Gazimagusa, TRNC, Mersin 10, Turkey atilla.elci@emu.edu.tr ...
Abstract. The growth of interest in Semantic Web has increased the number of ontologies. Necessity of dealing with different ontologies at the same time has enhanced the research on ontology integration. This paper is focused on... more
Abstract. The growth of interest in Semantic Web has increased the number of ontologies. Necessity of dealing with different ontologies at the same time has enhanced the research on ontology integration. This paper is focused on inte-grating ontologies covering the same domain. ...
Abstract—This article presents semantic-based composition of processes of Semantic Web Services using predetermined semantic descriptions of the services. Currently most proposed techniques are syntactically, rather than semantically,... more
Abstract—This article presents semantic-based composition of processes of Semantic Web Services using predetermined semantic descriptions of the services. Currently most proposed techniques are syntactically, rather than semantically, oriented. Our proposed method involves a ...
This research presents an enhancement in the ParseKey+ authentication scheme presented in an earlier research. Basically, ParseKey+ relies on scattering sub-keys in a block of uniformly created random noise. The sequence of noise is... more
This research presents an enhancement in the ParseKey+ authentication scheme presented in an earlier research. Basically, ParseKey+ relies on scattering sub-keys in a block of uniformly created random noise. The sequence of noise is created using the same hash function ...
Abstract. This chapter focuses on design, implementation, and utilization of semantic robots dealing with cooperative problem solving in a natural setting such as discovery of exit from a labyrinth. In our approach to realize this goal, a... more
Abstract. This chapter focuses on design, implementation, and utilization of semantic robots dealing with cooperative problem solving in a natural setting such as discovery of exit from a labyrinth. In our approach to realize this goal, a new modular architecture for designing ...
Security is vital in web services. Most of security algorithms relay on uniformity of random numbers required for generation of seeds. Timestamp is not a very reliable seed for generating random numbers as it follows a known sequence. In... more
Security is vital in web services. Most of security algorithms relay on uniformity of random numbers required for generation of seeds. Timestamp is not a very reliable seed for generating random numbers as it follows a known sequence. In other words, white noise with Gaussian ...
UDDI and WSDL do not provide sufficient grounds to find appropriate web services at the required accuracy and quality of service (QoS) level by the consumer. This article discusses a Semantic Search Agent (SSA) approach that discovers... more
UDDI and WSDL do not provide sufficient grounds to find appropriate web services at the required accuracy and quality of service (QoS) level by the consumer. This article discusses a Semantic Search Agent (SSA) approach that discovers appropriate web services according to ...
In this paper, a microcontroller-based Additive White Gaussian Noise Generator (AWGNG) for security enhancement of embedded real-time web services running on embedded boards is presented. The scheme utilizes combination of Windows... more
In this paper, a microcontroller-based Additive White Gaussian Noise Generator (AWGNG) for security enhancement of embedded real-time web services running on embedded boards is presented. The scheme utilizes combination of Windows Embedded Standard based ...