Atilla Elçi
Hasan Kalyoncu University, Software Engineering, Faculty Member
Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı? (How much and what type of personal data is being collected during medical processes? Are such private data safe? What to do?) Bu sunuşum aynı... more
Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı? (How much and what type of personal data is being collected during medical processes? Are such private data safe? What to do?) Bu sunuşum aynı zamanda benim Anlamsal Etmenler ve Büyük Veri Çözümlemesi projelerimle de ilgilidir. Paneldeki diğer konuşmacılar için bkz. http://ab.org.tr/ab17/ozet/240.html. Resimler için bkz. https://goo.gl/photos/AFjLeR2ofPQeYwBd6 ) (Also relevant for my other projects: Semantic agent systems, Big data & analytics. Other presenters in this panel: see http://ab.org.tr/ab17/ozet/240.html Pictures: see https://goo.gl/photos/AFjLeR2ofPQeYwBd6 )
Research Interests:
Research Interests:
ÖZET Güvenli olmayan ağlarda kimlik belirleme hizmetini kırmaya yönelik şifre çözümlemesi korunmuş bilgilerin elde edilmesi olasılığına işaret ediyor. Buna göre araştırmacılar daha güvenli temelleri geliştirip uygulamaya çalışmaktadırlar.... more
ÖZET Güvenli olmayan ağlarda kimlik belirleme hizmetini kırmaya yönelik şifre çözümlemesi korunmuş bilgilerin elde edilmesi olasılığına işaret ediyor. Buna göre araştırmacılar daha güvenli temelleri geliştirip uygulamaya çalışmaktadırlar. Gizli yazım (steganography) yoluyla MD5 ve SHA1 algoritmaları uygulanarak anahtarın gizlenmesi temelinde yeni ve güvenli bir yöntem olarak ParseKey önerilmektedir. Bu yöntem aynı zamanda, istemci tarafında giriş bilgilerini tutmak veya sunumcu VT'ndaki anahtarı değiştirme gereği gibi zayıflıkları ...
Abstract. This paper presents the ParseKey+, an approach to a new highlysecure and safe authentication service. The scheme includes authentication process for both client and server sides in addition to passwords of each side. ParseKey+... more
Abstract. This paper presents the ParseKey+, an approach to a new highlysecure and safe authentication service. The scheme includes authentication process for both client and server sides in addition to passwords of each side. ParseKey+ employs transposition to hide the encrypted key in a key file retrievable only by the other side knowing the indices and lengths of sub-keys inside ParseKey+ encrypted file. ParseKey+ avoids client and server impersonations in addition to mutual client/server authentication. Therefore, the ...
In addition to the Program Committee members, a large number of individuals who belong to review committees for the CIMCA 2008, IAWTIC 2008 and ISE 2008 conferences. The Conference Committee would like to thank them for their assistance in reviewing papers submitted to the above-mentioned confere...more
In addition to the Program Committee members, a large number of individuals who belong to review committees for the CIMCA 2008, IAWTIC 2008 and ISE 2008 conferences. The Conference Committee would like to thank them for their assistance... more
In addition to the Program Committee members, a large number of individuals who belong to review committees for the CIMCA 2008, IAWTIC 2008 and ISE 2008 conferences. The Conference Committee would like to thank them for their assistance in reviewing papers submitted to the abovementioned conferences. ... Andreou Andreas, University of Cyprus, Cyprus Anthony Dekker, DSTO, Australia Ardeshir Karami Mohammadi, Shahrood University of Technology, Iran Arshad Ali, National University of Science and Technology, Pakistan Ashutosh Tiwari, ...
Carl K. Chang, Iowa State University, USA Ephraim Feig, Innovations-to-Market, USA Hemant Jain, University of Wisconsin–Milwaukee , USA Frank Leymann, University of Stuttgart, Germany Calton Pu, Georgia Tech, USA Liang-Jie Zhang, IBM TJ... more
Carl K. Chang, Iowa State University, USA Ephraim Feig, Innovations-to-Market, USA Hemant Jain, University of Wisconsin–Milwaukee , USA Frank Leymann, University of Stuttgart, Germany Calton Pu, Georgia Tech, USA Liang-Jie Zhang, IBM TJ Watson Research Center, USA ... Sriram Anand, Accenture, India Ali Bahrami, Boeing Research and Technology, USA Akhilesh Bajaj, University of Tulsa, USA Sujoy Basu, HP Palo Alto Labs, USA Manish A. Bhide, IBM India Research Lab, India Zhixiong Chen, Mercy College, USA Cecil Chua, Nanyang ...
This article proposes an Intelligent Tracking System for Acute Respiratory Tract Infection (TrackARTI) via a smart mobile for monitoring disease term of 0-6 age group child patients remotely (e.g. home, clinics). It is possible to... more
This article proposes an Intelligent Tracking System for Acute Respiratory Tract Infection (TrackARTI) via a smart mobile for monitoring disease term of 0-6 age group child patients remotely (e.g. home, clinics). It is possible to maximize the quality of life of the child patients and decrease parental anxiety by keeping the child under control during monitoring stage and achieve a proper distant diagnose by the patient's clinician. This is possible with the designs of intelligent M-Health systems that can be used for diagnosing and monitoring the child patients away from hospitals by presenting the instant medical data to their registered doctors. Intelligent M-Health systems require strong knowledge management technology and ease of extension to provide information from additional medical tools. With the contribution of intelligent M-Health systems, it is possible to infer new facts from the certain gathered medical data during examination from child patients. This article mentions an intelligent and easy medical data gathering system that can be used by pediatricians or parents any time. In addition, the system has its own inferencing mechanism that involves two main steps, inferencing on image processing and Semantic Web rule knowledge base.
Research Interests:
One of the most important IT sectors that requires big data management is mobile data communication systems (MDCS) of GSM companies. In the charging mechanism of current MDCS, a subscriber “surfs” on the internet that creates data traffic... more
One of the most important IT sectors that requires big data management is mobile data communication systems (MDCS) of GSM companies. In the charging mechanism of current MDCS, a subscriber “surfs” on the internet that creates data traffic and a counter subtracts the amount of data used by the user from the subscriber's quota. In other words, instant constant quota values are assigned to subscribers without concern for their previous amount of internet usage in current MDCS. Moreover, constant quota values cause constant charge calls in control traffic that are repeated for all new quota requests. Thus, performance degradation occurs because of the repetition of quota request calls and allocations. In this chapter, a dynamic quota calculation system (DQCS) is proposed for dynamic quota allocations and charging in MDCS using data mining approaches as two cascaded blocks. The first block is self-organizing map (SOM) clustering based on a sliding window (SW) methodology followed by ...
Research Interests:
Current approaches to feature selection for text classification aim to reduce the number of terms that are used to describe documents. Thus, documents can be classified and found with greater ease and precision. A key shortcoming of these... more
Current approaches to feature selection for text classification aim to reduce the number of terms that are used to describe documents. Thus, documents can be classified and found with greater ease and precision. A key shortcoming of these approaches is that they select the topmost terms to describe documents after ranking all terms using a feature selection measure (scoring function). Lesser high-ranking terms below the topmost terms are discarded to reduce computational costs. Nevertheless, in many cases, they may have considerable discriminative power to enhance the text classification precision. In order to address this issue, we proposed a new feature weighting formalism that ties the topmost terms with lesser high-ranking terms using probabilistic neural networks. In the proposed method, probabilistic neural networks are formed using relative category distribution matrix and topmost terms are re-weighted and passed to Rocchio classifier. This is achieved without increasing the ...
Research Interests:
Obesity is a public health problem that has become widespread worldwide. Obesity may increase the risk for many health problems such as early puberty, Type 2 diabetes, certain types of cancer, high blood pressure, heart diseases, and... more
Obesity is a public health problem that has become widespread worldwide. Obesity may increase the risk for many health problems such as early puberty, Type 2 diabetes, certain types of cancer, high blood pressure, heart diseases, and sleep apnea. The detection of obesity in children and adolescents at early stages is important and it is crucial to start individual based treatments. Due to the widespread use of smart mobile devices among family members and increasing number of m-Health applications to fight against obesity as well as other diseases, m-Health applications can be a good choice for early detection of obesity in childhood and adolescence stages. Recently, many studies about mobile-based obesity tracking system that mostly for adults have been done. This research study especially emphases obesity management in childhood and adolescence stages with the contribution of Semantic Web technology. Therefore, the system is an ontology-based obesity tracking system for children and adolescents which has its own Obesity Tracking Ontology and medical semantic rule knowledge base with an inference engine.
Research Interests:
Research Interests:
Approaches are needed for providing advanced autonomous wheeled robots with a sense of self, immediate ambience, and mission. The following list of abilities would form the desired feature set of such approaches: self-localization,... more
Approaches are needed for providing advanced autonomous wheeled robots with a sense of self, immediate ambience, and mission. The following list of abilities would form the desired feature set of such approaches: self-localization, detection and correction of course deviation errors, faster and more reliable identification of friend or foe, simultaneous localization and mapping in uncharted environments without necessarily depending on external assistance, and being able to serve as web services. Situations, where enhanced robots with such rich feature sets come to play, span competitions such as line following, cooperative mini sumo fighting, and cooperative labyrinth discovery. In this chapter we look into how such features may be realized towards creating intelligent robots. Currently through-cell localization in robots mainly relies on availability of shaft-encoders. In this regard, we would like to firstly present a simple-to-implement through-cell localization approach for rob...
Diger kurumlar gibi belediyelerin de basarilarini yuksek tutmak icin calisanlarinin belediyelere olan bagliliklarini ust seviyede tutmalarina baglidir. Bagliliklarin ust duzeyde olmasi calisanlarin orgute olan katkilarini da... more
Diger kurumlar gibi belediyelerin de basarilarini yuksek tutmak icin calisanlarinin belediyelere olan bagliliklarini ust seviyede tutmalarina baglidir. Bagliliklarin ust duzeyde olmasi calisanlarin orgute olan katkilarini da yukseltecektir. Calismamizda, belediye calisanlarinin kurumlarina bagliliklari, kurumlarinin gelisimi ve amaclarina ulasilmasinda orgutsel bagliligin onemli oldugu varsayimindan yola cikilarak Aksaray iline bagli ilce belediye calisanlarina Orgutsel Baglilik Olcegi uygulanmis ve belediye calisanlarinin orgutsel baglilik duzeylerini olcmek hedeflenmistir. Oncelikli olarak Allen ve Meyer (1991) tarafindan gelistirilen bu olcek alt boyutlari olan duygusal baglilik, devam bagliligi ve normatif baglilik boyutlari dogrultusunda 147 belediye calisanina uygulanarak baglilik duzeyleri incelenmeye calisilmistir. Calismanin sonucunda personelin kurumlarina bagliliklarinin duygusal baglilik boyutu yuksek gorulmustur.
Abstract not availabl
Research Interests:
Individuals with pervasive developmental disorders should be supported with special education programs that are planned according to the type and degree of the disorder, age, characteristics, and needs of the individual. Search over... more
Individuals with pervasive developmental disorders should be supported with special education programs that are planned according to the type and degree of the disorder, age, characteristics, and needs of the individual. Search over internet resources may provide suitable educational material and methods (and associated activity/game). However, syntactic search in today's static-based internet is insufficient to offer desired relevant results. An intelligent system able to identify the needed educational methods and material with the help of semantic web-based agents will not only contribute to the development of individuals with disorders, and support education specialists in this process, but also be extremely useful for the families of these individuals in assisting and monitoring their child's developmental progress. In this chapter, an agent-based educational activity suggestion system of children with pervasive developmental disorder for guiding education and training ...
Research Interests:
... Atilla ELÇİ Computer Engineering Department Eastern Mediterranean University Magusa, Mersin-10 Email: atilla.elci@emu.edu.tr Duygu ÇELİK Computer Engineering Department Eastern Mediterranean University Magusa, Mersin-10 Email:... more
... Atilla ELÇİ Computer Engineering Department Eastern Mediterranean University Magusa, Mersin-10 Email: atilla.elci@emu.edu.tr Duygu ÇELİK Computer Engineering Department Eastern Mediterranean University Magusa, Mersin-10 Email: duygu.celik@emu.edu.tr ...
Research Interests:
During the acquisition of a new digital image, noise may be introduced as a result of the production process. Image enhancement is used to alleviate problems caused by noise. In this work, the purpose is to propose, apply, and evaluate... more
During the acquisition of a new digital image, noise may be introduced as a result of the production process. Image enhancement is used to alleviate problems caused by noise. In this work, the purpose is to propose, apply, and evaluate enhancement approaches to images by selecting suitable filters to produce improved quality and performance results. The new method proposed for image noise reduction as an enhancement process employs threshold and histogram equalization implemented in the wavelet domain. Different types of wavelet filters were tested to obtain the best results for the image noise reduction process. Also, the effect of canceling one or more of the high-frequency bands in the wavelet domain was tested. The mean square error and peak signal to noise ratio are used for measuring the improvement in image noise reduction. A comparison made with two related works shows the superiority of the methods proposed and implemented in this research. The proposed methods of applying ...
Research Interests:
This article discusses the impact of human-computer interaction in the pedagogical design of open textbooks affordable into a diversity of learning environments. An exploratory study is conducted, wherein an online questionnaire is... more
This article discusses the impact of human-computer interaction in the pedagogical design of open textbooks affordable into a diversity of learning environments. An exploratory study is conducted, wherein an online questionnaire is administered to the second-year master’s degree students from the Faculty of Psychology and Educational Studies. The results show that students are aware of the importance of metacognition in developing effective learning strategies. Thus, they use metacognitive strategies when taking notes, doing reflections, and employing mnemonics to enhance understanding. However, despite the current practice of using open didactical materials, students feel that the open textbooks approach needs to be relooked and changed to be more effective; it could be equipped with appropriate learning tools to provide more opportunities for immediate feedback and collaborative assessment. Individualization and collaboration are the key factors in developing metacognitive experie...
Research Interests:
Research Interests:
Research Interests:
Research Interests:
This article discusses a new approach to Fetal Heart Rate Monitoring System (FHRMS) via a mobile integrated Doppler device (mDoppler) for monitoring Fetal Heart Rate (FHR) remotely (i.e. home). The aim of the system is to provide ease of... more
This article discusses a new approach to Fetal Heart Rate Monitoring System (FHRMS) via a mobile integrated Doppler device (mDoppler) for monitoring Fetal Heart Rate (FHR) remotely (i.e. home). The aim of the system is to provide ease of FHR monitoring and computing current fetus risk conditions especially for high-risk pregnancy cases via a mobile integrated Doppler device. FHRMS has its own inferring mechanism that provides to analyze current fetus conditions by considering FHR values through connecting a hand held mDoppler device to labour's abdomen during observing period at home. The instantly-gathered FHR values as output signal of the mDoppler during observation period are displayed on the labour's mobile device monitor and also input data set to the FHRMS. The inferred current fetus conditions are coded as Green, Yellow, and Red status by the FHRMS signifying the Normal, Atypical/Warning, and Abnormal/Alarm conditions of the fetus respectively. Thus FHRMS informs the responsible parents, physician and the ambulance service if alarm status is observed. In this research, FHRMS considers 10 sets of FHR instance values for the last 10 gestation weeks (started at 30th up to 40th weeks) from a subjects labour's that are traced as a case study to track the inferencing algorithms of the FHRMS. The FHRMS tracing mechanism is developed from visual analysis algorithms of (Electro Fetal Monitoring) EFM task in literature.
Research Interests: Engineering, Computer Science, Medicine, IEEE, Tracing, and 3 moreAlarm, Fetus, and Fetal Heart Rate
Given the critical and difficult nature of discovering Web services in the development process of service oriented architectures, several studies have been proposed to solve this problem. There is a real need to work for matching semantic... more
Given the critical and difficult nature of discovering Web services in the development process of service oriented architectures, several studies have been proposed to solve this problem. There is a real need to work for matching semantic Web services which use different ontologies. In responding to this need, measuring semantic similarity between SWS may be reduced to the calculation of similarity between ontological concepts. This work is a contribution to achieve semantic interoperability for Web services in a multi-ontology environment, for which the authors present a generic framework for Web services discovery. Here their focus is on the semantic similarity measure-based core of their framework and the authors present a novel algorithm for concepts matching between different ontologies. Results of the experiments confirm the viability of the semantic similarity measure.
Research Interests:
Research Interests:
Abstract This study proposes an ontology-based system which takes the non-structured/semi-structured heterogeneous TV content in heterogeneous Web resources and converts it to the structured form in a semantic data model. The TV content... more
Abstract This study proposes an ontology-based system which takes the non-structured/semi-structured heterogeneous TV content in heterogeneous Web resources and converts it to the structured form in a semantic data model. The TV content is discovered and redefined after aligning in semantic base according to client requirements by a semantic search agent. Through a system that is intuitive and semantic, semantic based matchmaking is applied between the concepts of required TV content information and related heterogeneous Web ...
Research Interests:
ABSTRACT While Internet takes up by far the most significant part of our daily lives, finding jobs/employees on the Internet has started to play a crucial role for job seekers and employers. Online recruitment websites and human resources... more
ABSTRACT While Internet takes up by far the most significant part of our daily lives, finding jobs/employees on the Internet has started to play a crucial role for job seekers and employers. Online recruitment websites and human resources consultancy and recruitment companies enable job seekers to create their résumé, a brief written formal document including job seeker's basic information such as personal information, educational information, work experience and qualifications in order to find and apply for desirable jobs, whereas they enable companies to find qualified employees they are looking for. However résumés may be written in many ways that make it difficult for online recruitment companies to keep these data in their relational databases. In this study, a project that Kariyer.net (largest online recruitment website in Turkey) and TUBITAK (The Scientific and Technological Research Council of Turkey) have been jointly working is proposed. In this mentioned project, a system enables free structured format of résumés to transform into an ontological structure model. The produced system based on ontological structure model and called Ontology based Résumé Parser (ORP) will be tested on a number of Turkish and English résumés. The proposed system will be kept in Semantic Web approach that provides companies to find expert finding in an efficient way.
Research Interests: Computer Science, Information Retrieval, Ontology, Semantic Web Technologies, Natural Language Processing, and 15 moreInformation Extraction, Parsing, Semantic Web, Semantic Search Engine, The Internet, Ontologies, OWL, World Wide Web, Android Development, Personal Information, Resume Writing, Relational databases, Internet, Seekers, and Orp
Research Interests:
Lack of sufficient semantic description in the content of Web services makes it difficult to find and compose suitable Web services during analysis, search, and matching processes. Semantic Web Services are Web services that have been... more
Lack of sufficient semantic description in the content of Web services makes it difficult to find and compose suitable Web services during analysis, search, and matching processes. Semantic Web Services are Web services that have been enhanced with formal semantic description, which provides well-defined meaning. Due to insertion of semantics, meeting user demands will be made possible through logical deductions achieving resolutions automatically. We have developed an inference-based semantic business process composition agent (SCA) that employs inference techniques. The semantic composition agent system is responsible for the synthesis of new services from existing ones in a semi-automatic fashion. SCA System composes available Web Ontology Language for Web services atomic processes utilizing Revised Armstrong's Axioms (RAAs) in inferring functional dependencies. RAAs are embedded in the knowledge base ontologies of SCA System. Experiments show that the proposed SCA System pro...
Research Interests:
Ozet. Anlamsal Web'in en önemli getirisi olan ontolojiler içine gömülen semantik betimlemeler üzerinden, kullanıcı taleplerinin karsılanması ve varolan veriler üzerinden anlamsal ve mantıksal çıkarsamaların otomatik olarak yapılması... more
Ozet. Anlamsal Web'in en önemli getirisi olan ontolojiler içine gömülen semantik betimlemeler üzerinden, kullanıcı taleplerinin karsılanması ve varolan veriler üzerinden anlamsal ve mantıksal çıkarsamaların otomatik olarak yapılması mümkündür. Ayrıca, Web servislerini ontoloji dosyalarına betimlemek mümkün olup, bu gömülü olan semantik betimlemeler üzerinden Web servislerinin kesfi ve birlestirilmesi islemlerinde daha akıllı sistemler gelistirilebilir. Servislerin birlestirilmesinde uygun süreçlerin sorgulanması, ...
Research Interests:
Intelligent Semantic Web Service Finder (ISWSF) is a mechanism that discovers Semantic Web Services satisfying client requirements. The increase in web services and lack of semantic base in search mechanisms of UDDI make it difficult for... more
Intelligent Semantic Web Service Finder (ISWSF) is a mechanism that discovers Semantic Web Services satisfying client requirements. The increase in web services and lack of semantic base in search mechanisms of UDDI make it difficult for clients to find required web services. We developed a system which uses a Semantic Search Agent (SSA) to discover required web services from web and selects them according to the client requirements then presents them as a result page. The system uses Ontology Web ...
Music and Audio Information Search System (MAISS) is a web-based application using ontologies and inference engine to search multimedia documents. In MAISS, users run queries in web pages for retrieving data about albums, artists, audio... more
Music and Audio Information Search System (MAISS) is a web-based application using ontologies and inference engine to search multimedia documents. In MAISS, users run queries in web pages for retrieving data about albums, artists, audio files, audio file formats, encoding audio files, genre, instrument, key, note, official, resource, rhythm, etc. Web Ontology Language (OWL) is the operational base of MAISS, so users can also run queries for retrieving information with constraints about classes, data type properties, ...
Research Interests:
... on Elliptic Curve Discrete Logarithm Problem
13 Khaled Suwais, AzmanSamsudin Hardware Implementation ... Watermarking Algorithm for Digital Images
38 Mahmoud Hassan, Sarah Alkuhlani, Wasan ...
There are many challenges for a forensic investigator when it comes to digital evidence. These include the constantly changing technology that may store evidence, the vast amounts of data that is stored, and the increasing use of... more
There are many challenges for a forensic investigator when it comes to digital evidence. These include the constantly changing technology that may store evidence, the vast amounts of data that is stored, and the increasing use of cryptography. This last problem can prevent any useful information being retrieved and is encountered in the use of communication protocols, whole-disk encryption, and individual applications. Cryptography is a field of great depth and breadth, encompassing both complex mathematics and cutting-edge technology. A forensics investigator does not need to be aware of all aspects of this field, but there are certain areas that are vital. The knowledge described in this chapter can assist an investigator in obtaining information that may otherwise be obscured, and also prepare them to defend the integrity of any evidence obtained.
Research Interests: Mathematics of Cryptography, Computer Science, Ontology, Information Security, Multiagent Systems, and 15 moreNetwork Security, Fuzzy Logic, Hybrid Systems, Applied Cryptography, Intelligent Systems, Environmental Informatics, Computer Security, Cryptography, Anonymity, Information Security and Privacy, Fuzzy Control, Information System Security, Artificial Neural Networks, Multi Agent Systems and Technologies, and Information Systems Security
We are seeking contributions for an upcoming publication that will focus on the far-reaching and interdisciplinary effects of emerging technologies on various social sectors. Our goal is to delve into how these technologies are shaping... more
We are seeking contributions for an upcoming publication that will focus on the far-reaching and interdisciplinary effects of emerging technologies on various social sectors. Our goal is to delve into how these technologies are shaping and altering the fields of social sciences, education, law & policy, tourism, health, environment, communication, manufacturing, business & management, and security. We encourage submissions that explore the implications and consequences of advancements, as well as the potential opportunities they present for these fields. We believe that this publication will provide valuable insights and perspectives on the impact of emerging technologies in the social sphere. Submissions should help to highlight the effects of emerging technologies, the power of AI, and digital innovations as appropriate in the chosen field.
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Page 1. Defining a Strategy to Select Either of Closed/Open World Assumptions on Semantic Robots Atilla Elçi Department of Computer Engineering Eastern Mediterranean University Gazimagusa, TRNC, Mersin 10, Turkey atilla.elci@emu.edu.tr ...
Research Interests:
Research Interests:
Research Interests:
Abstract This paper presents a design ontology that deals with the hypermedia presentation aspects involved in the development of a semantic Web information system. The ontology is driven by two main design models: the conceptual and the... more
Abstract This paper presents a design ontology that deals with the hypermedia presentation aspects involved in the development of a semantic Web information system. The ontology is driven by two main design models: the conceptual and the application models. The application model extends the conceptual model with presenting data and inferring. During the presentation generation the input data goes through a sequence of transformation steps. Using semantic Web technology we chose to represent the models and their instances in ...
Research Interests: Information Systems, Computer Science, Information Retrieval, Ontology, Ontology (Computer Science), and 14 moreCompetitive Intelligence, Semantic Web, Ontologies, Graphics, Process Ontology, OWL, Conceptual Model, Upper Ontology, Knowledge Representation and Reasoning, Internet, Protégé, Central Processing Unit, Web Interface, and Information System
Research Interests:
Research Interests:
ABSTRACT This research presents design and implementation of the shortest path algorithm for labyrinth discovery application in a multi-agent environment. Robot agents are unaware of the maze at the beginning, they learn as they discover... more
ABSTRACT This research presents design and implementation of the shortest path algorithm for labyrinth discovery application in a multi-agent environment. Robot agents are unaware of the maze at the beginning, they learn as they discover it. Each agent solves a part of the maze and updates the shared memory so that other robots also benefit from each other's' discovery. Finding of the destination cell by an agent helps others to interconnect their discovered paths to the one ending with the destination cell. The proposed shortest path algorithm considers the cost for not only coordinate distance but also number of turns and moves required to traverse the path. The Shortest Path algorithm is compared against various available maze solving algorithms including Flood-Fill, Modified Flood-Fill and ALCKEF. The presented algorithm can be used also as an additional layer to enhance the available methods at second and subsequent runs.
Research Interests:
Research Interests:
Abstract This paper presents a design ontology that deals with the hypermedia presentation aspects involved in the development of a semantic Web information system. The ontology is driven by two main design models: the conceptual and the... more
Abstract This paper presents a design ontology that deals with the hypermedia presentation aspects involved in the development of a semantic Web information system. The ontology is driven by two main design models: the conceptual and the application models. The application model extends the conceptual model with presenting data and inferring. During the presentation generation the input data goes through a sequence of transformation steps. Using semantic Web technology we chose to represent the models and their instances in ...
Research Interests: Information Systems, Computer Science, Information Retrieval, Ontology, Ontology (Computer Science), and 14 moreCompetitive Intelligence, Semantic Web, Ontologies, Graphics, Process Ontology, OWL, Conceptual Model, Upper Ontology, Knowledge Representation and Reasoning, Internet, Protégé, Central Processing Unit, Web Interface, and Information System
Research Interests:
Research Interests:
Research Interests:
Kablosuz sistemlerdeki ilerlemeler dusuk maliyetli, tasarruflu, cok islevli, minyatur algilama aygitlarinin uretilmesine imkân saglamistir. Bu aygitlardan yuzlercesi, hatta binlercesi yardimiyla kablosuz algilayici aglari... more
Kablosuz sistemlerdeki ilerlemeler dusuk maliyetli, tasarruflu, cok islevli, minyatur algilama aygitlarinin uretilmesine imkân saglamistir. Bu aygitlardan yuzlercesi, hatta binlercesi yardimiyla kablosuz algilayici aglari olusturulmaktadir. Kablosuz algilayici aglarda algilanan verilerin toplanmasi, analiz edilmesi ve bir baz istasyonuna gonderilmesi gibi asamalar beraberinde bazi sorunlari getirmektedir. Bu sorunlardan bazilari, algilayicilarin kisitlari, verinin dogru toplanmasi, gereksiz ve benzer veri sorunu, verinin guvenligi ile kablosuz algilayici ag topolojisinde meydana gelen sorunlardir. Bunlarin en onemlisi ise algilayicilarin kisitli enerji sorunudur. Geleneksel yontemler boylesi sorunlarla basa cikamadigindan, bu durum goz onunde bulundurularak, kablosuz algilayici aglarin Yapay Zekâ ile daha islevsel hale getirilmesinin gerekliligi uzerinde calisildi. Bu calismada, kablosuz aglarin islevselligi ve hayatta kalma ozelliklerinin iyilestirilmesi icin yapay zekâ yoluyla agd...
Welcome to the 10 IEEE International Workshop on Engineering Semantic Agents – E-Health Systems and Semantic Web (ESAS 2015), this time taking place in the Taichung, Taiwan, 5 July 2015. The IEEE International Workshop Series on... more
Welcome to the 10 IEEE International Workshop on Engineering Semantic Agents – E-Health Systems and Semantic Web (ESAS 2015), this time taking place in the Taichung, Taiwan, 5 July 2015. The IEEE International Workshop Series on Engineering Semantic Agent Systems (ESAS) has been held since 2006 in conjunction with Annual IEEE International Computer Software and Applications Conferences (COMPSAC). The ESAS Workshops Series focus on concepts, foundations and applications of semantic agent systems and intend to bring forward better practices of engineering them.
Research Interests:
Over 3,000 compounds are being added to processed food. These compounds have numerous effects on food: add color, stabilize, texturize, preserve, sweeten, thicken, add flavor, soften, emulsify, and so on. According to a recent report by... more
Over 3,000 compounds are being added to processed food. These compounds have numerous effects on food: add color, stabilize, texturize, preserve, sweeten, thicken, add flavor, soften, emulsify, and so on. According to a recent report by the World Health Organization, governments have lately focused on legislation to reduce such ingredients or compounds in manufactured foods for they might have side effects causing health risks such as the heart disease, cancer, diabetes, allergens, obesity, etc. Safety in food consumption especially by patients of risk groups have become crucial for such health problems are in the top ten ranked health risks around the world. By supervising what and how much to eat as well as what not to eat, we can maximize a patient's life quality by avoiding unhealthy ingredients or compounds. In helping patients take control of their safe food consumption, we need smart personal e-health systems. Smart personal e-health systems with advanced knowledge management technology can provide suggestions of food appropriate for consumption by individuals. Accessing annotations in the ontology knowledgebase of food appropriate to their personal health condition can be provided. This article discusses one such software application, namely the Safety Food Consumption Mobile System, employing Semantic Web Technology.
Research Interests:
Research Interests: Computer Science, Environmental Management, Software Architecture, Web Services, Semantic Web, and 15 moreIntelligent Agent, Traffic Management, Software Agents, Semantic Networks, Distributed Processing, Semantic Web Service Composition, Application development, High performance, Web Service, Load distribution, Network Topology, Facilitator, service Business, Networked Systems, and Distributed Environment
Research Interests:
Due to tremendous reception on digital learning platforms, many online users tend to register for online courses in MOOC offered by many prestigious universities all over the world and gain a lot on cutting edge technologies in niche... more
Due to tremendous reception on digital learning platforms, many online users tend to register for online courses in MOOC offered by many prestigious universities all over the world and gain a lot on cutting edge technologies in niche courses. As the reception of online courses is increasing on one side, there have been huge dropouts of participants in the online courses causing serious problems for the course owners and other MOOC administrators. Hence, it is deemed necessary to find out the root causes of course dropouts and need to prepare a workable solution to prevent that outcome in the future. In this connection, the authors made use of three machine learning algorithms such as support vector machine, random forest, and conditional random fields. The huge samples of datasets were downloaded from the Open University of China, that is, almost 7K student profiles were extracted for the empirical analysis. The datasets were loaded into a confusion matrix and analyzed for the accur...
Research Interests:
Research Interests:
This study highlights a security scenario involving vehicles in a Traffic Management and Information System (TMIS) network. TMIS and its nodal architecture, nicknamed Intelligent Junction (IJ), are summarized from our recent work. System... more
This study highlights a security scenario involving vehicles in a Traffic Management and Information System (TMIS) network. TMIS and its nodal architecture, nicknamed Intelligent Junction (IJ), are summarized from our recent work. System design sets an example to a software architecture implementing autonomous semantic agents through semantic web services, junction-based sensor networks, local- and wide-area networking through wire/wireless integrated communication infrastructure. It is so construed as to provide (near-) real-time services throughout the network. This introduction is with reference to the SOA of Cooperative Labyrinth Discovery Robotics and Traffic Management and Information System Projects. This also takes up several issues including realtime goal-oriented coordination of semantic web services. Especially described are its essential functions crucial to aid security applications. A security scenario concerning tracking and routing reported, say missing, vehicles is ...
Research Interests:
In recent years, blockchain technology has affected to a large extent all aspects of life, however, until now paper-based elections have been practiced. It is time to upgrade the election scenario using modern technology such as... more
In recent years, blockchain technology has affected to a large extent all aspects of life, however, until now paper-based elections have been practiced. It is time to upgrade the election scenario using modern technology such as blockchain and advanced cryptography methods. Actually, both of Estonia and New South Wales have been using i-voting systems, but after developing an example software of their systems for the purpose of analysis, it is discovered that it has weaknesses against many kinds of attacks, such as malwares, network attacks, and servers attacks. The fact that the blockchain technology has demonstrated infinite immutability and resistance against hacking, so it is possible to use it to secure election results from fraud by saving every single piece of data, record or transaction with unchangeable history. By abandoning the traditional database and compensating it with two blockchains instead of one ensures voter/vote privacy, as well as, safeguards the results from manipulation. Also, using blockchain’s distributed network reduces the load on the network. Finally, solutions to problems of impersonation and vote selling are suggested. The technology behind the digital voting system design is explained in terms of the processes involved, such as ID creation, authentication, voting, and vote tallying.
Research Interests:
In the last four years, blockchain technology affected largely all aspects of our lives. Blockchain started to launch a new technological revolution of storing digital transactions over the Internet, verifying the authenticity, licensing... more
In the last four years, blockchain technology affected largely all aspects of our lives. Blockchain started to launch a new technological revolution of storing digital transactions over the Internet, verifying the authenticity, licensing and providing the highest degree of security and encryption. Blockchain usage started with digital currency then its implementation extended to many industries such as voting, health records, copywriters, real estates and so on. However, it is time to upgrade the election scenario from practicing paper-based elections to use modern technologies in order to facilitate our lives. The fact that the blockchain technology has demonstrated almost infinite immutability and high resistance against hacking, lends credit to employ it in securing election data from fraud by saving every single piece of data, record or transaction with unchangeable history. In this paper, we propose and test implement a robust online voting system based on blockchain in order t...
Research Interests:
Research Interests:
Aim/Purpose: Vis-à-vis management of crisis and disaster situations, this paper focuses on important use cases of social media functions, such as information collection & dissemination, disaster event identification & monitoring,... more
Aim/Purpose: Vis-à-vis management of crisis and disaster situations, this paper focuses on important use cases of social media functions, such as information collection & dissemination, disaster event identification & monitoring, collaborative problem-solving mechanism, and decision-making process. With the prolific utilization of disaster-based ontological framework, a strong disambiguation system is realized, which further enhances the searching capabilities of the user request and provides a solution of unambiguous in nature. Background: Even though social media is information-rich, it has created a challenge for deriving a decision in critical crisis-related cases. In order to make the whole process effective and avail quality decision making, sufficiently clear semantics of such information is necessary, which can be supplemented through employing semantic web technologies. Methodology: This paper evolves a disaster ontology-based system availing a framework model for monitorin...
Research Interests:
Research Interests:
Metacognition and Successful Learning Strategies in Higher Education is a detailed resource of scholarly perspectives that discusses current trends in learning assessments. Featuring extensive coverage on topics such as spiritual... more
Metacognition and Successful Learning Strategies in Higher Education is a detailed resource of scholarly perspectives that discusses current trends in learning assessments. Featuring extensive coverage on topics such as spiritual intelligence strategies, literacy development, and ubiquitous learning, this is an ideal reference source for academicians, graduate students, practitioners, and researchers who want to improve their learning strategies using metacognition studies.
Research Interests:
Research Interests: Computer Science and IEEE
A usable functional interface between ontology and security integrating related information is needed for security engineering as well as creating secure systems. That in turn necessitates ontologizing security of information and networks... more
A usable functional interface between ontology and security integrating related information is needed for security engineering as well as creating secure systems. That in turn necessitates ontologizing security of information and networks to start with and then standardization. Having involved in the fields of semantic technology and information assurance, I have strived to facilitate establishing an interface between them and for this reason SIN Conference Series I created included all interest areas of semantics, metadata and ontology aspects. In a keynote talk and its proceedings paper in SIN 2014, I took up this subject and drove to the point that generic ontology for security of information and networks is timely, and it should better be standardized. In the present paper I investigate through examples where available to drive the point that the standard upper ontology for security may be developed through community sourcing and then standardized through competent agencies.
Research Interests:
Research Interests:
Research Interests:
Distributed intelligent software agents (DISA) are software agents that help out users and act on their behalf. Such agents might be robots or virtual software systems. They are able to intelligent if they interact with their environment... more
Distributed intelligent software agents (DISA) are software agents that help out users and act on their behalf. Such agents might be robots or virtual software systems. They are able to intelligent if they interact with their environment in an approach that would generally be observed as intelligent if that communication were carried out by a human being. As a result,
Research Interests: Computer Science, Ontology, Enterprise Architecture, Image Processing, Machine Learning, and 15 moreData Mining, Computational Intelligence, Data Management, Software Architecture, Semantic Web, Database Management Systems, Intelligent Agent, Software Agents, Enterprise Modeling, Multi Agent Systems, Semantic Information, Knowledge base, Knowledge Representation and Reasoning, Software Agent, and Software Systems
Abstract Web mining treats the World Wide Web as the ultimate data source. This area of research is more interesting than data mining involving extracting data from in-house corporate databases or data warehouses. Gathering information... more
Abstract Web mining treats the World Wide Web as the ultimate data source. This area of research is more interesting than data mining involving extracting data from in-house corporate databases or data warehouses. Gathering information from Web sources via distributed intelligent software agents in enterprise architecture can be implemented securely, platform independent, reusable, and would be better modeled in n-tier or enterprise-tier architecture. The purpose of this paper is to develop a novel distributed ...
Research Interests:
ABSTRACT Children with pervasive developmental disorders have special needs so they should be supported with special education programs. These programs are planned according to the type and degree of the disorder, age, characteristics,... more
ABSTRACT Children with pervasive developmental disorders have special needs so they should be supported with special education programs. These programs are planned according to the type and degree of the disorder, age, characteristics, and needs of the children. Families prefer Internet to search resources about related educational methods (and associated activity/game) and materials. However, syntactic search in today's Internet is insufficient because of its static base and the search results are not sufficient enough to offer desired relevant results corresponding to a child's needs. With the help of Semantic Web-based agents an intelligent system able to identify the suitable educational methods and material, will contribute to the development of children with disorders, and support education specialists in this process. In addition it will be extremely useful for the families of these children in need of assisting and monitoring their child's development. In this article, an Educational Activity Finder (EAF) is being proposed. The architecture of EAF is structured after semantic Web technology so that it can find and propose semantically relevant suitable educational methods (i.e., activities to carry out) and material for use by children with disorders. The knowledge base of EAF keeps educational methods using the OWL language. All related concepts, attributes, and relations between these concepts and features about pervasive developmental disorders are defined through ontology. EAF is structured to recognize a pervasive developmental disorder, sort out symptoms and anomalies, suggest activities, compile performance scores, and decide on new activity based on user preferences by utilizing the semantic descriptions of available methods and activities. Strength of EAF is demonstrated through sample scenarios. EAF may be used by parents, pre-school educators, primary schools, special educational institutions and experts working for these institutions, university stude- ts studying in related fields, and individuals interested in pervasive developmental disorders.
Research Interests:
ABSTRACT Currently RFID authentication systems rely only on matching tag ID with the one kept in database. Additionally, an alphanumerical password might be matched as extra security. However, tag ID and information inside can be... more
ABSTRACT Currently RFID authentication systems rely only on matching tag ID with the one kept in database. Additionally, an alphanumerical password might be matched as extra security. However, tag ID and information inside can be compromised. Therefore, a more secure scheme is required in order to enhance safety of access control through RFID tags in particularly highly secure environments such as secure virtual meetings or authentication and access control to access high security locals. We wish to present attendance control ...
Research Interests:
Research Interests:
Abstract Maze solving using multiple algorithms is one of the important problems in the last years, maze solving problem is to determine the path of a mobile robot from its source position to a destination position through a workspace... more
Abstract Maze solving using multiple algorithms is one of the important problems in the last years, maze solving problem is to determine the path of a mobile robot from its source position to a destination position through a workspace populated with obstacles, in addition to finding the shortest path among the solutions. Autonomous robotics is a field with wide-reaching applications, from bomb-sniffing robots to autonomous devices for finding humans in wreckage to home automation; many people are interested in low-power, high speed, ...
Research Interests:
Health is a popular aspect of eHealth applications that is starting to explode exponentially. The use of technology offering solutions with a potential of making patients' lives easier in the health sector has gradually increased with... more
Health is a popular aspect of eHealth applications that is starting to explode exponentially. The use of technology offering solutions with a potential of making patients' lives easier in the health sector has gradually increased with mHealth. Technology has great bearing in the health sector in order to increase the efficiency to serve patients by helping to diagnose ailments reliably. Mobile systems help observation of child patients in their treatment process and the collection of health data on the course. Therefore, people will be more aware of their children's health problems and preventive measures in accordance with those health problems. This article is on Mobile Pediatric Consultation and Monitoring System (mPCMS). Details of design and operation are given in this article. Mpcms not only will assist doctors but also help patients in decision making process of the medical treatment due to the information's ease use. Accordingly, with mPCMS, there will be a contribution to distant consultation by the doctor and the family by collecting the health data before and after the treatment of child patients.
Research Interests:
Research Interests:
Research Interests:
Research Interests: Computer Science, Artificial Intelligence, Human Computer Interaction, Semantic Web Technologies, Machine Learning, and 15 moreMultiagent Systems, Computational Intelligence, Affective Computing, Semantic Web, Social Semantic Web, Emotional Computing, Semantic Technology, Multi Agent Systems, Semantic Computing, Recherche, Kansei Engineering, Knowledge Representation and Reasoning, Software Agent, Semantic Analytics, and Month
Research Interests:
Lack of sufficient semantic description makes it difficult to find and compose suitable Web services during analysis, search, and matching processes. As Semantic Web Services provide well-defined meaning, composition of new services is... more
Lack of sufficient semantic description makes it difficult to find and compose suitable Web services during analysis, search, and matching processes. As Semantic Web Services provide well-defined meaning, composition of new services is possible through logical deductions achieving resolutions automatically. This book develops an Inference-based Semantic Business Process Composition Agent (SCA). Utilizing Revised Armstrongs Axioms (RAAs) in inferring functional dependencies, SCA System composes available OWL-S ...
Research Interests:
Abstract-Representing XML data in terms of the rows and columns of a relational table is quite inefficient. Similarly, object-oriented databases cater for storage of objects but lack fast access. In these cases, a better technique is... more
Abstract-Representing XML data in terms of the rows and columns of a relational table is quite inefficient. Similarly, object-oriented databases cater for storage of objects but lack fast access. In these cases, a better technique is required to speedup representation and retrieval of hierarchical data in relational databases. This paper presents XMLEase, a new access-and store-efficient technique to keep XML data in relational databases. XMLEase keeps data node together with its successors down to a pre-defined level of hierarchy. ...
Research Interests:
Research Interests:
Research Interests:
Many mobile applications on safe food consumption and e-health have been developed recently. Health conscious users highly regard such applications for safe food consumption, especially for avoiding offending foods and additives. However,... more
Many mobile applications on safe food consumption and e-health have been developed recently. Health conscious users highly regard such applications for safe food consumption, especially for avoiding offending foods and additives. However, there is the lack of a comprehensive database containing structured or unstructured data to support such applications. In this paper we propose the MSS, a healthy food consumption search service for mobile applications utilizing Hadoop 1 and MapReduce 2 (MR). The MSS may work as a process behind a mobile application to provide a search service for information on food and food additives. MSS works by the same logic as a search engine (SE); it crawls over Web sources cataloguing relevant information for eventual use in responding to queries from mobile applications. MSS design and development are highlighted in this paper through its system architecture, query understanding, its use of the Hadoop/MapReduce Environment, and action scripts. A case study helps displaying the virtues of MSS.
Research Interests:
Many mobile applications on safe food consumption and e-health have been developed recently. Health conscious users highly regard such applications for safe food consumption, especially for avoiding offending foods and additives. However,... more
Many mobile applications on safe food consumption and e-health have been developed recently. Health conscious users highly regard such applications for safe food consumption, especially for avoiding offending foods and additives. However, there is the lack of a comprehensive database containing structured or unstructured data to support such applications. In this paper we propose the MSS, a healthy food consumption search service for mobile applications utilizing Hadoop 1 and MapReduce 2 (MR). The MSS may work as a process behind a mobile application to provide a search service for information on food and food additives. MSS works by the same logic as a search engine (SE); it crawls over Web sources cataloguing relevant information for eventual use in responding to queries from mobile applications. MSS design and development are highlighted in this paper through its system architecture, query understanding, its use of the Hadoop/MapReduce Environment, and action scripts. A case stud...
Research Interests:
Research Interests:
Research Interests:
Google, Inc. (search). ...
Research Interests:
ABSTRACT This research focuses on design and implementation of cooperative labyrinth discovery algorithms, specifically, discovering an unexplored maze with multiple robots working collaboratively. Solving a known maze using a single... more
ABSTRACT This research focuses on design and implementation of cooperative labyrinth discovery algorithms, specifically, discovering an unexplored maze with multiple robots working collaboratively. Solving a known maze using a single robot is straightforward. The robot looks around and memorizes the structure of the maze and it generates the solution track as a stack of consequent positions from the starting cell to the destination cell. The labyrinth discovery is known as a method of solving the maze when the wall structure is not known. There are various labyrinth discovery algorithms already implemented for a single agent but their extension to cooperating multiple agents is not straight forward and may not produce optimal solutions either. We designed and implemented single agent algorithms, namely Flood Fill (FF) and Modified Flood Fill (MFF), for multi-agent environment. In addition, a cooperative labyrinth discovery algorithm has been implemented based on the ALCKEF semantic logic. Then we compared their efficiency in theory and practice against the ideal case where agents are aware of the full maze structure. The theoretical comparison is done based on examining the time and space complexity. On the other hand, the experimental comparison examines the total cost for each of those algorithms to solve and discover the maze.
Research Interests:
This chapter shows how it is possible to use agents and Semantic Web technologies to deal with dynamic composition of business processes via an agent-based workflow system. The aim of the system is to discover composable processes at... more
This chapter shows how it is possible to use agents and Semantic Web technologies to deal with dynamic composition of business processes via an agent-based workflow system. The aim of the system is to discover composable processes at first among heterogeneous business processes that are running possibly under different Web servers and then execute them in the order specified by a planner to reach a complex requested goal. We proposed a framework of an Inference-based Semantic Composition Agent (SCA) of atomic business ...
Research Interests:
ABSTRACT Security policy helps to ensure that system always takes the desired input action sequence and works in a proper manner. Formal verification of finite state transactional security policy is necessary to check whether the given... more
ABSTRACT Security policy helps to ensure that system always takes the desired input action sequence and works in a proper manner. Formal verification of finite state transactional security policy is necessary to check whether the given policy conforms to the specification. One way to specify finite state transactional security policy is by using a filter automaton. A filter automaton is an action sequence transformer that maps an input action sequence into another, so that the output action sequence obeys the specified policy. A method for verification of finite state transactional security policy enforced by filter automata is being proposed. The observable actions finite security automaton and the observable actions finite truncation automaton are used to verify a finite state transactional security policy.
Abstract The development of semantic-based multiagent information systems is a promising field hinting at a new dimension of capability in interaction of semantic web technologies and agent systems. ESAS Workshops series aims at garnering... more
Abstract The development of semantic-based multiagent information systems is a promising field hinting at a new dimension of capability in interaction of semantic web technologies and agent systems. ESAS Workshops series aims at garnering the synergy of both worlds by taking up the common research issue. Topics of interest range from both theory and practice of agent systems, to semantic web technologies and their interaction, say in software agents, autonomous semantic agents, context-aware intelligent agents, agents as semantic web ...
Research Interests:
Research Interests:
The development of semantic-based multiagent information systems is a promising field hinting at a new dimension of capability in interaction of semantic web technologies and agent systems. ESAS Workshops series aims at garnering the... more
The development of semantic-based multiagent information systems is a promising field hinting at a new dimension of capability in interaction of semantic web technologies and agent systems. ESAS Workshops series aims at garnering the synergy of both worlds by taking up the common research issue. Topics of interest range from both theory and practice of agent systems, to semantic web technologies and their interaction, say in software agents, autonomous semantic agents, context-aware intelligent agents, agents as semantic web ...
Research Interests:
Macquarie University ResearchOnline.
Google, Inc. (search). ...
Research Interests:
This chapter shows how it is possible to use agents and Semantic Web technologies to deal with dynamic composition of business processes via an agent-based workflow system. The aim of the system is to discover composable processes at... more
This chapter shows how it is possible to use agents and Semantic Web technologies to deal with dynamic composition of business processes via an agent-based workflow system. The aim of the system is to discover composable processes at first among heterogeneous business processes that are running possibly under different Web servers and then execute them in the order specified by a planner to reach a complex requested goal. We proposed a framework of an Inference-based Semantic Composition Agent (SCA) of atomic business ...
Research Interests:
Research Interests:
The table of contents of the SIN'15 special issue in IGI Global's International Journal of Information Security and Privacy (IJISP), volume 10, issue 3
Research Interests:
Research Interests:
Abstract Population explosion in larger cities and increase in vehicle density cause traffic problems in these areas. Intersections are the places where traffic is mostly blocked and most of the accidents occur. Signalization lights at... more
Abstract Population explosion in larger cities and increase in vehicle density cause traffic problems in these areas. Intersections are the places where traffic is mostly blocked and most of the accidents occur. Signalization lights at the intersections aim to arrange the traffic flow and to avoid accidents. If not located properly or have bad timing, not only they fail to avoid accidents but also they cause disobeying, time loss and wearyness. Traffic assignment and management deal with those problems to minimize personal and social ...
Research Interests:
Due to the insertion of semantics to the Web services,meeting user demands will be possible through logicaldeductions and achieving resolutions automatically. Withthe application of semantic description in content of Webservices it is... more
Due to the insertion of semantics to the Web services,meeting user demands will be possible through logicaldeductions and achieving resolutions automatically. Withthe application of semantic description in content of Webservices it is easier to discover and compose suitableWeb ...
Research Interests:
Abstract ParseKey+ is an approach to a new highly secure and safe authentication service. The scheme provides secure authentication process for both server and client sides. It employs hash to hide the encrypted key in a key file... more
Abstract ParseKey+ is an approach to a new highly secure and safe authentication service. The scheme provides secure authentication process for both server and client sides. It employs hash to hide the encrypted key in a key file retrievable only by the other side knowing the indices and lengths of the sub-keys hidden inside ParseKey+ file. The ParseKey+ file itself is also encrypted by the password of the other party in authentication service using a symmetric encryption method. We wish to implement the ParseKey+ ...
Research Interests:
Abstract This paper shows a searching mechanism to discover semantic Web services satisfying client requirements. The increase in Web services and lack of semantic base in search mechanisms of UDDI make it difficult for clients to find a... more
Abstract This paper shows a searching mechanism to discover semantic Web services satisfying client requirements. The increase in Web services and lack of semantic base in search mechanisms of UDDI make it difficult for clients to find a required Web service. We developed a system which uses a semantic search agent (SSA) to discover required Web services from Web and selects them according to the client requirements then presents them as a result page. The system uses Ontology Web Language for services (OWL-S), which ...
Research Interests:
Research Interests:
Research Interests:
Today, social networks are for much more than just having fun with friends. Millions of dollars are being spent to extract valuable information out of social networks for marketing purposes. Attaching machine readable semantics to social... more
Today, social networks are for much more than just having fun with friends. Millions of dollars are being spent to extract valuable information out of social networks for marketing purposes. Attaching machine readable semantics to social networks, that is absent at present, will lead to a better degree of information extraction. To achieve this goal, user input is required. From users' point of view, providing the same data to different social networks creates a drawback. This is due to the centralized one-of-a-kind nature of social networks. ...
Research Interests:
Abstract Traditional Websites no longer meet the needs of todaypsilas software agents because of their unstructured nature in terms of the semantics they convey. One of the primary objectives of semantic Web is to enable software agents... more
Abstract Traditional Websites no longer meet the needs of todaypsilas software agents because of their unstructured nature in terms of the semantics they convey. One of the primary objectives of semantic Web is to enable software agents infer facts and knowledge out of different Websites. The primary aim of this project is to develop an application to manipulate OWL files, browse ontologies and enable software agents infer information semantically. Needless to say such inference is not feasible in current conventional ...
Research Interests:
Abstract We consider recovery techniques for packet-loss in the multimedia streams at both sender-and receiver-sides. We investigate recovery techniques as bases of useless packet transmission avoidance in order to release bandwidth by... more
Abstract We consider recovery techniques for packet-loss in the multimedia streams at both sender-and receiver-sides. We investigate recovery techniques as bases of useless packet transmission avoidance in order to release bandwidth by avoiding sending unintelligible packets. At times, packet-loss exceeds a given threshold such that recovery techniques are not able to cope with packet-losses. Therefore, algorithms supplying lower latency and higher degree of recovery are needed. Moreover, faster algorithms for generating packets, ...
Research Interests:
This paper reports on a study aiming to develop a metadata model for e-learning coordination based on semantic web languages. A survey of e-learning modes are done initially in order to identify content such as phases, activities, data... more
This paper reports on a study aiming to develop a metadata model for e-learning coordination based on semantic web languages. A survey of e-learning modes are done initially in order to identify content such as phases, activities, data schema, rules and relations, etc. relevant for a coordination model. In this respect, the study looks into the mechanism of e-learning environment and the question of how e-learning can be classified in terms of activity coordination. A metadata model for coordination of e-learning is being sought which may be expressed using semantic web languages such as OWL + RDF. This is part of a project involving studies on several fronts regarding the application of semantic web initiative into e-learning; i.e. design and development of markup and annotation tools, relevant ontologies, intelligent agents, etc. The objective is eventually to build capability to semantically integrate and selectively retrieve e-content in implementing e-learning environments.
Research Interests:
ESAS Workshops Series aims at garnering the synergy of semantic web technologies and agent systems by taking up development of semantic-based multi-agent information systems. Topics of interest span a wide spectrum of both theory and... more
ESAS Workshops Series aims at garnering the synergy of semantic web technologies and agent systems by taking up development of semantic-based multi-agent information systems. Topics of interest span a wide spectrum of both theory and practice of agent architectures, software agents, mobile agents, autonomous semantic agents, context-aware intelligent agents, agents as semantic web services, multi-agent systems, agent communities, cooperation and goal seeking through shared policy and ontology, safety & ...
This paper shows a searching mechanism to discover Semantic Web Services satisfying client requirements. The increase in web services and lack of semantic base in search mechanisms of UDDI make it difficult for clients to find a required... more
This paper shows a searching mechanism to discover Semantic Web Services satisfying client requirements. The increase in web services and lack of semantic base in search mechanisms of UDDI make it difficult for clients to find a required web service. We developed a system which uses a Semantic Search Agent (SSA) to discover suitable web services according to client requirements then presents them as a result page. The system uses Ontology Web Language for Services (OWL-S), which allows semantic description of ...
Research Interests:
In this article we focus on the essential requirements of a robot for semantically dealing with cooperative problem solving in a natural setting such as discovery of exit from a labyrinth. A very common application area for such robots... more
In this article we focus on the essential requirements of a robot for semantically dealing with cooperative problem solving in a natural setting such as discovery of exit from a labyrinth. A very common application area for such robots are used as set of multi-agents at junctions in Traffic Management and Information Systems (TMIS) to manage the traffic and interact with ambulance or fire fighters to traverse the shortest possible path [18]. In order to present the above mentioned goal, a new modular architecture for design and ...
Research Interests: Information Retrieval, Agent Based, Semantic Web, Modular Systems (Architecture), Traffic Management, and 12 moreData Structure, Distributed Control, Human Robot Interaction, Decision Support, Collaborative Work, Semantic Web Service Composition, Financial Market, Autonomic System, Context Aware, Data Processing, Design and Implementation, and Information System
- Semantic technologies, such as RDF (Resource Description Framework) and OWL (Web Ontology Language), are being widely used to store information. Ontology is mostly used in semantic platforms or embedded in other applications as a... more
- Semantic technologies, such as RDF (Resource Description Framework) and OWL (Web Ontology Language), are being widely used to store information. Ontology is mostly used in semantic platforms or embedded in other applications as a repository system. Data is ...
ABSTRACT Cipher analysis on the authentication services through insecure network shows possibility of illegal capture of protected information, researchers try to develop and implement safer foundations.
Abstract Intelligent Semantic Web Service Finder (ISWSF) is a mechanism that discovers Semantic Web Services satisfying client requirements. The increase in web services and lack of semantic base in search mechanisms of UDDI make it... more
Abstract Intelligent Semantic Web Service Finder (ISWSF) is a mechanism that discovers Semantic Web Services satisfying client requirements. The increase in web services and lack of semantic base in search mechanisms of UDDI make it difficult for clients to find required web services. We developed a system which uses a Semantic Search Agent (SSA) to discover required web services from web and selects them according to the client requirements then presents them as a result page.
Abstract-Annotation gives more meaning to the content, explanation or annotation is sometims a necessity for multimedia content but during data transaction annotations can be lost if it is not combined with the data. For different people... more
Abstract-Annotation gives more meaning to the content, explanation or annotation is sometims a necessity for multimedia content but during data transaction annotations can be lost if it is not combined with the data. For different people from different cultures, different languages and different ideas sometimes describing the same thing would be completely different.
Abstract-Representing XML data in terms of the rows and columns of a relational table is quite inefficient. Similarly, object-oriented databases cater for storage of objects but lack fast access. In these cases, a better technique is... more
Abstract-Representing XML data in terms of the rows and columns of a relational table is quite inefficient. Similarly, object-oriented databases cater for storage of objects but lack fast access. In these cases, a better technique is required to speedup representation and retrieval of hierarchical data in relational databases. This paper presents XMLEase, a new access-and store-efficient technique to keep XML data in relational databases.
Approaches are needed for providing advanced autonomous wheeled robots with a sense of self, immediate ambience, and mission. The following list of abilities would form the desired feature set of such approaches: self-localization,... more
Approaches are needed for providing advanced autonomous wheeled robots with a sense of self, immediate ambience, and mission. The following list of abilities would form the desired feature set of such approaches: self-localization, detection and correction of course deviation errors, faster and more reliable identification of friend or foe, simultaneous localization and mapping in uncharted environments without necessarily depending on external assistance, and being able to serve as web services.
Ozet. Anlamsal Web'in en önemli getirisi olan ontolojiler içine gömülen semantik betimlemeler üzerinden, kullanıcı taleplerinin karsılanması ve varolan veriler üzerinden anlamsal ve mantıksal çıkarsamaların otomatik olarak yapılması... more
Ozet. Anlamsal Web'in en önemli getirisi olan ontolojiler içine gömülen semantik betimlemeler üzerinden, kullanıcı taleplerinin karsılanması ve varolan veriler üzerinden anlamsal ve mantıksal çıkarsamaların otomatik olarak yapılması mümkündür. Ayrıca, Web servislerini ontoloji dosyalarına betimlemek mümkün olup, bu gömülü olan semantik betimlemeler üzerinden Web servislerinin kesfi ve birlestirilmesi islemlerinde daha akıllı sistemler gelistirilebilir.
This study highlights a security scenario involving vehicles in a Traffic Management and Information System (TMIS) network. TMIS and its nodal architecture, nicknamed Intelligent Junction (IJ), are summarized from our recent work. System... more
This study highlights a security scenario involving vehicles in a Traffic Management and Information System (TMIS) network. TMIS and its nodal architecture, nicknamed Intelligent Junction (IJ), are summarized from our recent work. System design sets an example to a software architecture implementing autonomous semantic agents through semantic web services, junction-based sensor networks, local-and wide-area networking through wire/wireless integrated communication infrastructure.
Abstract Distributed processing environments such as that of a traffic management network system (TMS) can be implemented easier, faster, and secure and perform better through use of autonomous semantic agents (ASAs). For an ASA can then... more
Abstract Distributed processing environments such as that of a traffic management network system (TMS) can be implemented easier, faster, and secure and perform better through use of autonomous semantic agents (ASAs). For an ASA can then be realized as a semantic Web service, a whole TMS is easily implemented through a collection of semantic Web services agents arranged according to the topology of the traffic network.
Through experiments on datasets from Reuters news collection RCV1, we show that the proposed method is a significant supplement to the statistical feature selection measures for better text classification at extreme term filtering ranges.
Research Interests:
In this paper, design and implementation of through-cell self localization in Client Cooperative Labyrinth Discovery Robots (CCLDRs) were presented especially addressing severe restriction or lack of resources. Decision making is... more
In this paper, design and implementation of through-cell self localization in Client Cooperative Labyrinth Discovery Robots (CCLDRs) were presented especially addressing severe restriction or lack of resources. Decision making is performed through a semantic intelligence approach incorporating Open / Locally Closed / Closed World Assumptions in its algorithm. The algorithm was retrofitted from earlier research in order to fit into limited capacities of CCLDRs. On the other hand, decision making algorithm is optimized to perform autonomously leaving only more complicated calculation to Server CLDRs (SCLDRs). SCDLRs are more advanced CLDRs with ability of processing ontology files, and providing Semantic Web Services (SWS) over internet using System on Chip (SoC) embedded boards, etc. CCLDR hardware architecture was enhanced by inserting an extension board accommodating modulated IR receivers for Friend or Foe determination, 433MHz wireless communication capability, and allowing multiplexing of two sets of 6 sensors dedicated for line tracing and side sensor boards through 6 lines of ADCs on primitive maze solver robots. CCLDRs are able to localize themselves based on the mathematical formulations relying on distance measurements by side sensors but without needing shaft-encoders. Within this environment, each agent is autonomous complex system acting based on its sensory input, information retrieved from other agents, and suitable form of converted ontology files from SCLDR.
Research Interests:
This paper draws a beginning to end framework for Friend or Foe (FOF) identification for multi-robot battlefield. Mini-sumo robots are well-known example case while absolute positioning of each teammate is not practical. Our... more
This paper draws a beginning to end framework for Friend or Foe (FOF) identification for multi-robot battlefield. Mini-sumo robots are well-known example case while absolute positioning of each teammate is not practical. Our simple-to-implement FOF identification does not require two-way communication as it only relies on decryption of payload in one direction. It is shown that the replay attack is not feasible time wise as the communication is encrypted and timestamp is inserted in the messages. The hardware implementation of cooperative robots is equipped with rotary robot able to detect direction and distance to detected object in addition to gyroscope chipset. Studying dynamics of robots allows finding solutions to attack enemies which are more powerful than friends from sides so they will not be able to resist. Besides, there are certain situations that robots must escape instead of fighting. Experimental part of this research attempts to illustrate results of real competitions of cooperative mini-sumo battlefield as an example of localization and mapping besides collaborative problem solving in uncharted environments.
Research Interests:
This paper presents a design ontology that deals with the hypermedia presentation aspects involved in the development of a semantic Web information system. The ontology is driven by two main design models: the conceptual and the... more
This paper presents a design ontology that deals with the hypermedia presentation aspects involved in the development of a semantic Web information system. The ontology is driven by two main design models: the conceptual and the application models. The application model extends the conceptual model with presenting data and inferring. During the presentation generation the input data goes through a sequence of transformation steps. Using semantic Web technology we chose to represent the models and their instances in OWL DL. Protege 3.2 (2007) and some of its plug-ins are used to develop this experiment. In this study we'll implement an ontology based information system in web environment and query this ontology through Web interface
Research Interests:
Currently RFID authentication systems rely only on matching tag ID with the one kept in database. Additionally, an alphanumerical password might be matched as extra security. However, tag ID and information inside can be compromised.... more
Currently RFID authentication systems rely only on matching tag ID with the one kept in database. Additionally, an alphanumerical password might be matched as extra security. However, tag ID and information inside can be compromised. Therefore, a more secure scheme is required in order to enhance safety of access control through RFID tags in particularly highly secure environments such as secure virtual meetings or authentication and access control to access high security locals. We wish to present attendance control system which is more like access control in general as an application of our novel security enhancement on RFID based access control systems. The security enhancement utilizes partial ParseKey+ multi-way authentication scheme. ParseKey+ scatters randomly divided sub-keys into uniformly distributed noise. Generated file is encrypted using AES256 and then it is written into RFID device. Each successful login changes the key and its trace kept in DB in addition to updating the device for future login.
Keywords: Authentication, RFID based Access Control, ParseKey+, Attendance Control
Keywords: Authentication, RFID based Access Control, ParseKey+, Attendance Control
Abstract. This chapter focuses on design, implementation, and utilization of semantic robots dealing with cooperative problem solving in a natural setting such as discovery of exit from a labyrinth. In our approach to realize this goal, a... more
Abstract. This chapter focuses on design, implementation, and utilization of semantic robots dealing with cooperative problem solving in a natural setting such as discovery of exit from a labyrinth. In our approach to realize this goal, a new modular architecture for designing ...
Research Interests: Information Retrieval, Decision Making, Homeland Security, Agent Based, Modular Systems (Architecture), and 10 moreTraffic Management, Data Structure, Complex System, SEMANTIC WEB TECHNOLOGY, Semantic Web Service Composition, Information Dissemination, Data Processing, Design and Implementation, Closed-World Assumption, and Intelligent Environment
Abstract. The growth of interest in Semantic Web has increased the number of ontologies. Necessity of dealing with different ontologies at the same time has enhanced the research on ontology integration. This paper is focused on... more
Abstract. The growth of interest in Semantic Web has increased the number of ontologies. Necessity of dealing with different ontologies at the same time has enhanced the research on ontology integration. This paper is focused on inte-grating ontologies covering the same domain. ...
Research Interests:
This research presents an enhancement in the ParseKey+ authentication scheme presented in an earlier research. Basically, ParseKey+ relies on scattering sub-keys in a block of uniformly created random noise. The sequence of noise is... more
This research presents an enhancement in the ParseKey+ authentication scheme presented in an earlier research. Basically, ParseKey+ relies on scattering sub-keys in a block of uniformly created random noise. The sequence of noise is created using the same hash function ...
Research Interests:
Abstract. This chapter focuses on design, implementation, and utilization of semantic robots dealing with cooperative problem solving in a natural setting such as discovery of exit from a labyrinth. In our approach to realize this goal, a... more
Abstract. This chapter focuses on design, implementation, and utilization of semantic robots dealing with cooperative problem solving in a natural setting such as discovery of exit from a labyrinth. In our approach to realize this goal, a new modular architecture for designing ...
Research Interests: Information Retrieval, Decision Making, Homeland Security, Agent Based, Modular Systems (Architecture), and 10 moreTraffic Management, Data Structure, Complex System, SEMANTIC WEB TECHNOLOGY, Semantic Web Service Composition, Information Dissemination, Data Processing, Design and Implementation, Closed-World Assumption, and Intelligent Environment
Security is vital in web services. Most of security algorithms relay on uniformity of random numbers required for generation of seeds. Timestamp is not a very reliable seed for generating random numbers as it follows a known sequence. In... more
Security is vital in web services. Most of security algorithms relay on uniformity of random numbers required for generation of seeds. Timestamp is not a very reliable seed for generating random numbers as it follows a known sequence. In other words, white noise with Gaussian ...
Research Interests: Robotics, Service Oriented Architecture, Embedded Systems, Web Services, Microcontrollers, and 12 moreHardware, Data Security, Real Time, Web Service, Random Number Generation, Embedded Computing, RANDOM NUMBER GENERATOR, Embedded System, Application Software, Awgn, Random Numbers, and Additive White Gaussian Noise
UDDI and WSDL do not provide sufficient grounds to find appropriate web services at the required accuracy and quality of service (QoS) level by the consumer. This article discusses a Semantic Search Agent (SSA) approach that discovers... more
UDDI and WSDL do not provide sufficient grounds to find appropriate web services at the required accuracy and quality of service (QoS) level by the consumer. This article discusses a Semantic Search Agent (SSA) approach that discovers appropriate web services according to ...
Research Interests:
In this paper, a microcontroller-based Additive White Gaussian Noise Generator (AWGNG) for security enhancement of embedded real-time web services running on embedded boards is presented. The scheme utilizes combination of Windows... more
In this paper, a microcontroller-based Additive White Gaussian Noise Generator (AWGNG) for security enhancement of embedded real-time web services running on embedded boards is presented. The scheme utilizes combination of Windows Embedded Standard based ...