BIOAtilla Elçi is emeritus full professor and chairman of the Department of Electrical and Electronics Engineering at Aksaray University, Aksaray, Turkey, August 2012 - September 2017. He served as full professor and chairman of computer and educational technology at Süleyman Demirel University, Isparta, Turkey (May 2011- Jun e 2012) Phone: +905323514425 Address: Dept. Electrical & Electronics Engineering, Merkez Kampüsü, Aksaray 68100 TURKEY
Topics of interest include, but are not limited to:
• Data management, knowledge representation ... more Topics of interest include, but are not limited to:
• Data management, knowledge representation and ontology for Cyber-Physical Systems • Big data and smart computing for Cyber-Physical Systems • Algorithms, models, and designs for social Cyber-Physical Systems • Machine learning for/with Cyber-Physical Systems • Nature-Inspired Algorithms for Cyber-Physical Systems • Affecting Ubiquitous Intelligence in Cyber-Physical Computing • Device Virtualization (DV) in pervasive Cyber-Physical Systems • Issues and implementation of Privacy, Security, and Trust in Cyber-Physical Systems • Affecting Context-Awareness for Cyber-Physical Systems • Design, development, and implementation of Smart Cyber-Physical Systems • Comparison of artificial intelligence-based approaches to Cyber-Physical Systems • AI-based fraud detection, and mitigation • Smart IDS and IPS for Cyber-Physical System • Cyber-attack forecasting, detection, and mitigation • Innovative applications of Cyber-Physical Systems in various domains
Proceedings of ICAGNI 2018
in Advances in Intelligent Systems and Computing Series
Volume 767
By ... more Proceedings of ICAGNI 2018 in Advances in Intelligent Systems and Computing Series Volume 767 By Springer
Proceedings of ICAGNI 2018
in Advances in Intelligent Systems and Computing Series
Volume 766
By... more Proceedings of ICAGNI 2018 in Advances in Intelligent Systems and Computing Series Volume 766 By Springer
Metacognition and Successful Learning Strategies in Higher Education is a detailed resource of sc... more Metacognition and Successful Learning Strategies in Higher Education is a detailed resource of scholarly perspectives that discusses current trends in learning assessments. Featuring extensive coverage on topics such as spiritual intelligence strategies, literacy development, and ubiquitous learning, this is an ideal reference source for academicians, graduate students, practitioners, and researchers who want to improve their learning strategies using metacognition studies.
Call for Chapter Proposals:
New cycle, new deadlines: Upload a chapter proposal of 1,000 to 2,... more Call for Chapter Proposals:
New cycle, new deadlines: Upload a chapter proposal of 1,000 to 2,000 words by September 15th. Notification is by September 30th with full chapter submission by November 30th.
This is a fast track publication opportunity. This book will be published by IGI Global by end 20... more This is a fast track publication opportunity. This book will be published by IGI Global by end 2012 / early 2013.
Recommended topics in theory, tools, and applications of cryptographic solutions for information systems include, but are not limited to the following:
• Cryptography
• Cryptography and Security
• Cryptography and Data Protection
• Cryptography and Privacy
• Cryptography and Cryptanalysis
• Cryptographic Protocols
• Cryptographic Solutions
• Copyright protection
• Agent & Multi-agent System Security
• Authentication & Authorization
• Engineering Secure Information Systems
• Forensics and Ethical Hacking
• Key Management
• Ontology of Cryptographic Solutions
• Public-key Crypto Systems
• Standards, guidelines and certification
Manuscripts in which cryptographic solutions for IS are not the main focus will not be accepted.
Semantic agent systems are about the integration of the semantic Web, software agents, and multi-... more Semantic agent systems are about the integration of the semantic Web, software agents, and multi-agent systems technologies. Like in the past (e.g. biology and informatics yielding bioinformatics) a whole new perspective is emerging with semantic agent systems. In this context, the semantic Web is a Web of semantically linked data which aims to enable man and machine to execute tasks in tandem. Here, software agents in a multi-agent system as delegates of humans are endowed with power to use semantically linked data.
This edited book “Semantic Agent Systems: Foundations and Applications” proposes contributions on a wide range of topics on foundations and applications written by a selection of international experts. It first introduces in an accessible style the nature of semantic agent systems. Then it explores with numerous illustrations new frontiers in software agent technology.
“Semantic Agent Systems: Foundations and Applications” is recommended for scientists, experts, researchers, and learners in the field of artificial intelligence, the semantic Web, software agents, and multi-agent systems technologies.
Dr. Atilla Elçi is a professor of computer science at Toros University, Mersin, Turkey;
Dr. Mamadou Tadiou Kone is a research scientist at International Computing
Research, Boston, MA, USA;
Dr. Mehmet A. Orgun is a professor of computer science at Macquarie University, Sydney, Australia.
1 Rule Responder Agents - Framework and Instantiations.
Harold Boley (National Research Council); Adrian Paschke (Free University Berlin)
2 Specifying and Monitoring Obligations in Open Multiagent Systems using Semantic Web Technology.
Nicoletta Fornara (University of Lugano)
3 Semantic Agent Model for Distributed Knowledge Management.
Julien Subercaze (LIRIS); Pierre Maret (LaHC )
Section 2 ENGINEERING SEMANTIC AGENT SYSTEMS
4 SBVR-driven Information Governance: a Case Study in the Flemish Public Administration.
Pieter De Leenheer (Vrije Universiteit and Collibra nv/sa et al.
5 Argumentation for reconciling agent ontologies.
Cassia Trojahn (INRIA); Jérôme Euzenat (INRIA); Valentina Tamma
(University of Liverpool); Terry Payne (University of Liverpool)
6 Measuring Complexity for MAS Design in the presence of Ontology Heterogeneity
Maricela Bravo (CINVESTAV)
7 Ontology-based Matchmaking and Composition of Business Processes.
Duygu Celik (EMU); Atilla Elci (METU)
8 Semantic Architecture for Human Robot Interaction.
Sebastien Dourlens Amar Ramdane Cherfi (LISV/UVSQ (Versailles University France));
Section 3. APPLICATIONS OF SEMANTIC AGENT SYSTEMS
9 A Semantic Agent Framework for Cyber-Physical Systems.
Jing Lin; Sahra Sedigh; Ann Miller (Missouri University of Science and Technology)
10 A Layered Manufacturing System Architecture Supported with Semantic Agents Capabilities.
Munir Merdan; Mathieu Vallee; Thomas Moser; Stefan Biffl (Vienna University of Technolog)
Topics of interest include, but are not limited to:
• Data management, knowledge representation ... more Topics of interest include, but are not limited to:
• Data management, knowledge representation and ontology for Cyber-Physical Systems • Big data and smart computing for Cyber-Physical Systems • Algorithms, models, and designs for social Cyber-Physical Systems • Machine learning for/with Cyber-Physical Systems • Nature-Inspired Algorithms for Cyber-Physical Systems • Affecting Ubiquitous Intelligence in Cyber-Physical Computing • Device Virtualization (DV) in pervasive Cyber-Physical Systems • Issues and implementation of Privacy, Security, and Trust in Cyber-Physical Systems • Affecting Context-Awareness for Cyber-Physical Systems • Design, development, and implementation of Smart Cyber-Physical Systems • Comparison of artificial intelligence-based approaches to Cyber-Physical Systems • AI-based fraud detection, and mitigation • Smart IDS and IPS for Cyber-Physical System • Cyber-attack forecasting, detection, and mitigation • Innovative applications of Cyber-Physical Systems in various domains
Proceedings of ICAGNI 2018
in Advances in Intelligent Systems and Computing Series
Volume 767
By ... more Proceedings of ICAGNI 2018 in Advances in Intelligent Systems and Computing Series Volume 767 By Springer
Proceedings of ICAGNI 2018
in Advances in Intelligent Systems and Computing Series
Volume 766
By... more Proceedings of ICAGNI 2018 in Advances in Intelligent Systems and Computing Series Volume 766 By Springer
Metacognition and Successful Learning Strategies in Higher Education is a detailed resource of sc... more Metacognition and Successful Learning Strategies in Higher Education is a detailed resource of scholarly perspectives that discusses current trends in learning assessments. Featuring extensive coverage on topics such as spiritual intelligence strategies, literacy development, and ubiquitous learning, this is an ideal reference source for academicians, graduate students, practitioners, and researchers who want to improve their learning strategies using metacognition studies.
Call for Chapter Proposals:
New cycle, new deadlines: Upload a chapter proposal of 1,000 to 2,... more Call for Chapter Proposals:
New cycle, new deadlines: Upload a chapter proposal of 1,000 to 2,000 words by September 15th. Notification is by September 30th with full chapter submission by November 30th.
This is a fast track publication opportunity. This book will be published by IGI Global by end 20... more This is a fast track publication opportunity. This book will be published by IGI Global by end 2012 / early 2013.
Recommended topics in theory, tools, and applications of cryptographic solutions for information systems include, but are not limited to the following:
• Cryptography
• Cryptography and Security
• Cryptography and Data Protection
• Cryptography and Privacy
• Cryptography and Cryptanalysis
• Cryptographic Protocols
• Cryptographic Solutions
• Copyright protection
• Agent & Multi-agent System Security
• Authentication & Authorization
• Engineering Secure Information Systems
• Forensics and Ethical Hacking
• Key Management
• Ontology of Cryptographic Solutions
• Public-key Crypto Systems
• Standards, guidelines and certification
Manuscripts in which cryptographic solutions for IS are not the main focus will not be accepted.
Semantic agent systems are about the integration of the semantic Web, software agents, and multi-... more Semantic agent systems are about the integration of the semantic Web, software agents, and multi-agent systems technologies. Like in the past (e.g. biology and informatics yielding bioinformatics) a whole new perspective is emerging with semantic agent systems. In this context, the semantic Web is a Web of semantically linked data which aims to enable man and machine to execute tasks in tandem. Here, software agents in a multi-agent system as delegates of humans are endowed with power to use semantically linked data.
This edited book “Semantic Agent Systems: Foundations and Applications” proposes contributions on a wide range of topics on foundations and applications written by a selection of international experts. It first introduces in an accessible style the nature of semantic agent systems. Then it explores with numerous illustrations new frontiers in software agent technology.
“Semantic Agent Systems: Foundations and Applications” is recommended for scientists, experts, researchers, and learners in the field of artificial intelligence, the semantic Web, software agents, and multi-agent systems technologies.
Dr. Atilla Elçi is a professor of computer science at Toros University, Mersin, Turkey;
Dr. Mamadou Tadiou Kone is a research scientist at International Computing
Research, Boston, MA, USA;
Dr. Mehmet A. Orgun is a professor of computer science at Macquarie University, Sydney, Australia.
1 Rule Responder Agents - Framework and Instantiations.
Harold Boley (National Research Council); Adrian Paschke (Free University Berlin)
2 Specifying and Monitoring Obligations in Open Multiagent Systems using Semantic Web Technology.
Nicoletta Fornara (University of Lugano)
3 Semantic Agent Model for Distributed Knowledge Management.
Julien Subercaze (LIRIS); Pierre Maret (LaHC )
Section 2 ENGINEERING SEMANTIC AGENT SYSTEMS
4 SBVR-driven Information Governance: a Case Study in the Flemish Public Administration.
Pieter De Leenheer (Vrije Universiteit and Collibra nv/sa et al.
5 Argumentation for reconciling agent ontologies.
Cassia Trojahn (INRIA); Jérôme Euzenat (INRIA); Valentina Tamma
(University of Liverpool); Terry Payne (University of Liverpool)
6 Measuring Complexity for MAS Design in the presence of Ontology Heterogeneity
Maricela Bravo (CINVESTAV)
7 Ontology-based Matchmaking and Composition of Business Processes.
Duygu Celik (EMU); Atilla Elci (METU)
8 Semantic Architecture for Human Robot Interaction.
Sebastien Dourlens Amar Ramdane Cherfi (LISV/UVSQ (Versailles University France));
Section 3. APPLICATIONS OF SEMANTIC AGENT SYSTEMS
9 A Semantic Agent Framework for Cyber-Physical Systems.
Jing Lin; Sahra Sedigh; Ann Miller (Missouri University of Science and Technology)
10 A Layered Manufacturing System Architecture Supported with Semantic Agents Capabilities.
Munir Merdan; Mathieu Vallee; Thomas Moser; Stefan Biffl (Vienna University of Technolog)
Azma Abdullah Sheikh Iqbal Ahamed Raihan Al-Ekram Mikio Aoyama Keijiro Araki Ravi Arvapally Isik ... more Azma Abdullah Sheikh Iqbal Ahamed Raihan Al-Ekram Mikio Aoyama Keijiro Araki Ravi Arvapally Isik Aybay Hüseyin Aysan Ryan Babbitt Doo-Hwan Bae Jung Ho Bae Xiaoying Bai Jongmoon Baik Pooyan Balouchian Kevin J Barker Paolo Bellavista Fevzi Belli Maarten Boasson Jan Bosch Zachary Bourque Ying Cai Jan Camenisch Sungdeok Cha Heung-Seok Chae Liton Chakrabarty WK Chan Carl K. Chang YC Chen SC Cheung Kyoungmin Cho Byoungju Choi William Chu Ivica Crnkovic James Cross Alan Davis Derek Ditch Bertrand du Castel Eric Dubois Omar ...
Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı? (... more Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı? (How much and what type of personal data is being collected during medical processes? Are such private data safe? What to do?) Bu sunuşum aynı zamanda benim Anlamsal Etmenler ve Büyük Veri Çözümlemesi projelerimle de ilgilidir. Paneldeki diğer konuşmacılar için bkz. http://ab.org.tr/ab17/ozet/240.html. Resimler için bkz. https://goo.gl/photos/AFjLeR2ofPQeYwBd6 ) (Also relevant for my other projects: Semantic agent systems, Big data & analytics. Other presenters in this panel: see http://ab.org.tr/ab17/ozet/240.html Pictures: see https://goo.gl/photos/AFjLeR2ofPQeYwBd6 )
ÖZET Güvenli olmayan ağlarda kimlik belirleme hizmetini kırmaya yönelik şifre çözümlemesi korunmu... more ÖZET Güvenli olmayan ağlarda kimlik belirleme hizmetini kırmaya yönelik şifre çözümlemesi korunmuş bilgilerin elde edilmesi olasılığına işaret ediyor. Buna göre araştırmacılar daha güvenli temelleri geliştirip uygulamaya çalışmaktadırlar. Gizli yazım (steganography) yoluyla MD5 ve SHA1 algoritmaları uygulanarak anahtarın gizlenmesi temelinde yeni ve güvenli bir yöntem olarak ParseKey önerilmektedir. Bu yöntem aynı zamanda, istemci tarafında giriş bilgilerini tutmak veya sunumcu VT'ndaki anahtarı değiştirme gereği gibi zayıflıkları ...
Security of Information and Networks: Proceedings of the First International Conference on Security of Information and Networks (SIN 2007), Jan 17, 2008
Abstract. This paper presents the ParseKey+, an approach to a new highlysecure and safe authentic... more Abstract. This paper presents the ParseKey+, an approach to a new highlysecure and safe authentication service. The scheme includes authentication process for both client and server sides in addition to passwords of each side. ParseKey+ employs transposition to hide the encrypted key in a key file retrievable only by the other side knowing the indices and lengths of sub-keys inside ParseKey+ encrypted file. ParseKey+ avoids client and server impersonations in addition to mutual client/server authentication. Therefore, the ...
In addition to the Program Committee members, a large number of individuals who belong to review ... more In addition to the Program Committee members, a large number of individuals who belong to review committees for the CIMCA 2008, IAWTIC 2008 and ISE 2008 conferences. The Conference Committee would like to thank them for their assistance in reviewing papers submitted to the abovementioned conferences. ... Andreou Andreas, University of Cyprus, Cyprus Anthony Dekker, DSTO, Australia Ardeshir Karami Mohammadi, Shahrood University of Technology, Iran Arshad Ali, National University of Science and Technology, Pakistan Ashutosh Tiwari, ...
Carl K. Chang, Iowa State University, USA Ephraim Feig, Innovations-to-Market, USA Hemant Jain, U... more Carl K. Chang, Iowa State University, USA Ephraim Feig, Innovations-to-Market, USA Hemant Jain, University of Wisconsin–Milwaukee , USA Frank Leymann, University of Stuttgart, Germany Calton Pu, Georgia Tech, USA Liang-Jie Zhang, IBM TJ Watson Research Center, USA ... Sriram Anand, Accenture, India Ali Bahrami, Boeing Research and Technology, USA Akhilesh Bajaj, University of Tulsa, USA Sujoy Basu, HP Palo Alto Labs, USA Manish A. Bhide, IBM India Research Lab, India Zhixiong Chen, Mercy College, USA Cecil Chua, Nanyang ...
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)
This article proposes an Intelligent Tracking System for Acute Respiratory Tract Infection (Track... more This article proposes an Intelligent Tracking System for Acute Respiratory Tract Infection (TrackARTI) via a smart mobile for monitoring disease term of 0-6 age group child patients remotely (e.g. home, clinics). It is possible to maximize the quality of life of the child patients and decrease parental anxiety by keeping the child under control during monitoring stage and achieve a proper distant diagnose by the patient's clinician. This is possible with the designs of intelligent M-Health systems that can be used for diagnosing and monitoring the child patients away from hospitals by presenting the instant medical data to their registered doctors. Intelligent M-Health systems require strong knowledge management technology and ease of extension to provide information from additional medical tools. With the contribution of intelligent M-Health systems, it is possible to infer new facts from the certain gathered medical data during examination from child patients. This article mentions an intelligent and easy medical data gathering system that can be used by pediatricians or parents any time. In addition, the system has its own inferencing mechanism that involves two main steps, inferencing on image processing and Semantic Web rule knowledge base.
One of the most important IT sectors that requires big data management is mobile data communicati... more One of the most important IT sectors that requires big data management is mobile data communication systems (MDCS) of GSM companies. In the charging mechanism of current MDCS, a subscriber “surfs” on the internet that creates data traffic and a counter subtracts the amount of data used by the user from the subscriber's quota. In other words, instant constant quota values are assigned to subscribers without concern for their previous amount of internet usage in current MDCS. Moreover, constant quota values cause constant charge calls in control traffic that are repeated for all new quota requests. Thus, performance degradation occurs because of the repetition of quota request calls and allocations. In this chapter, a dynamic quota calculation system (DQCS) is proposed for dynamic quota allocations and charging in MDCS using data mining approaches as two cascaded blocks. The first block is self-organizing map (SOM) clustering based on a sliding window (SW) methodology followed by ...
Current approaches to feature selection for text classification aim to reduce the number of terms... more Current approaches to feature selection for text classification aim to reduce the number of terms that are used to describe documents. Thus, documents can be classified and found with greater ease and precision. A key shortcoming of these approaches is that they select the topmost terms to describe documents after ranking all terms using a feature selection measure (scoring function). Lesser high-ranking terms below the topmost terms are discarded to reduce computational costs. Nevertheless, in many cases, they may have considerable discriminative power to enhance the text classification precision. In order to address this issue, we proposed a new feature weighting formalism that ties the topmost terms with lesser high-ranking terms using probabilistic neural networks. In the proposed method, probabilistic neural networks are formed using relative category distribution matrix and topmost terms are re-weighted and passed to Rocchio classifier. This is achieved without increasing the ...
Obesity is a public health problem that has become widespread worldwide. Obesity may increase the... more Obesity is a public health problem that has become widespread worldwide. Obesity may increase the risk for many health problems such as early puberty, Type 2 diabetes, certain types of cancer, high blood pressure, heart diseases, and sleep apnea. The detection of obesity in children and adolescents at early stages is important and it is crucial to start individual based treatments. Due to the widespread use of smart mobile devices among family members and increasing number of m-Health applications to fight against obesity as well as other diseases, m-Health applications can be a good choice for early detection of obesity in childhood and adolescence stages. Recently, many studies about mobile-based obesity tracking system that mostly for adults have been done. This research study especially emphases obesity management in childhood and adolescence stages with the contribution of Semantic Web technology. Therefore, the system is an ontology-based obesity tracking system for children and adolescents which has its own Obesity Tracking Ontology and medical semantic rule knowledge base with an inference engine.
Approaches are needed for providing advanced autonomous wheeled robots with a sense of self, imme... more Approaches are needed for providing advanced autonomous wheeled robots with a sense of self, immediate ambience, and mission. The following list of abilities would form the desired feature set of such approaches: self-localization, detection and correction of course deviation errors, faster and more reliable identification of friend or foe, simultaneous localization and mapping in uncharted environments without necessarily depending on external assistance, and being able to serve as web services. Situations, where enhanced robots with such rich feature sets come to play, span competitions such as line following, cooperative mini sumo fighting, and cooperative labyrinth discovery. In this chapter we look into how such features may be realized towards creating intelligent robots. Currently through-cell localization in robots mainly relies on availability of shaft-encoders. In this regard, we would like to firstly present a simple-to-implement through-cell localization approach for rob...
Diger kurumlar gibi belediyelerin de basarilarini yuksek tutmak icin calisanlarinin belediyelere ... more Diger kurumlar gibi belediyelerin de basarilarini yuksek tutmak icin calisanlarinin belediyelere olan bagliliklarini ust seviyede tutmalarina baglidir. Bagliliklarin ust duzeyde olmasi calisanlarin orgute olan katkilarini da yukseltecektir. Calismamizda, belediye calisanlarinin kurumlarina bagliliklari, kurumlarinin gelisimi ve amaclarina ulasilmasinda orgutsel bagliligin onemli oldugu varsayimindan yola cikilarak Aksaray iline bagli ilce belediye calisanlarina Orgutsel Baglilik Olcegi uygulanmis ve belediye calisanlarinin orgutsel baglilik duzeylerini olcmek hedeflenmistir. Oncelikli olarak Allen ve Meyer (1991) tarafindan gelistirilen bu olcek alt boyutlari olan duygusal baglilik, devam bagliligi ve normatif baglilik boyutlari dogrultusunda 147 belediye calisanina uygulanarak baglilik duzeyleri incelenmeye calisilmistir. Calismanin sonucunda personelin kurumlarina bagliliklarinin duygusal baglilik boyutu yuksek gorulmustur.
Research Anthology on Inclusive Practices for Educators and Administrators in Special Education, 2022
Individuals with pervasive developmental disorders should be supported with special education pro... more Individuals with pervasive developmental disorders should be supported with special education programs that are planned according to the type and degree of the disorder, age, characteristics, and needs of the individual. Search over internet resources may provide suitable educational material and methods (and associated activity/game). However, syntactic search in today's static-based internet is insufficient to offer desired relevant results. An intelligent system able to identify the needed educational methods and material with the help of semantic web-based agents will not only contribute to the development of individuals with disorders, and support education specialists in this process, but also be extremely useful for the families of these individuals in assisting and monitoring their child's developmental progress. In this chapter, an agent-based educational activity suggestion system of children with pervasive developmental disorder for guiding education and training ...
International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06)
... Atilla ELÇİ Computer Engineering Department Eastern Mediterranean University Magusa, Mersin-1... more ... Atilla ELÇİ Computer Engineering Department Eastern Mediterranean University Magusa, Mersin-10 Email: atilla.elci@emu.edu.tr Duygu ÇELİK Computer Engineering Department Eastern Mediterranean University Magusa, Mersin-10 Email: duygu.celik@emu.edu.tr ...
During the acquisition of a new digital image, noise may be introduced as a result of the product... more During the acquisition of a new digital image, noise may be introduced as a result of the production process. Image enhancement is used to alleviate problems caused by noise. In this work, the purpose is to propose, apply, and evaluate enhancement approaches to images by selecting suitable filters to produce improved quality and performance results. The new method proposed for image noise reduction as an enhancement process employs threshold and histogram equalization implemented in the wavelet domain. Different types of wavelet filters were tested to obtain the best results for the image noise reduction process. Also, the effect of canceling one or more of the high-frequency bands in the wavelet domain was tested. The mean square error and peak signal to noise ratio are used for measuring the improvement in image noise reduction. A comparison made with two related works shows the superiority of the methods proposed and implemented in this research. The proposed methods of applying ...
This article discusses the impact of human-computer interaction in the pedagogical design of open... more This article discusses the impact of human-computer interaction in the pedagogical design of open textbooks affordable into a diversity of learning environments. An exploratory study is conducted, wherein an online questionnaire is administered to the second-year master’s degree students from the Faculty of Psychology and Educational Studies. The results show that students are aware of the importance of metacognition in developing effective learning strategies. Thus, they use metacognitive strategies when taking notes, doing reflections, and employing mnemonics to enhance understanding. However, despite the current practice of using open didactical materials, students feel that the open textbooks approach needs to be relooked and changed to be more effective; it could be equipped with appropriate learning tools to provide more opportunities for immediate feedback and collaborative assessment. Individualization and collaboration are the key factors in developing metacognitive experie...
This is the call for paper for the 13th International Conference on Security of Information and N... more This is the call for paper for the 13th International Conference on Security of Information and Networks (SIN 2020) to be held on 4-7 November 2020 fully ONLINE.
List of accepted papers for oral presentation during LightSec 2016, Sept. 21-22 at Aksaray Univer... more List of accepted papers for oral presentation during LightSec 2016, Sept. 21-22 at Aksaray University, Cappadocia, Turkey
SIN'15 late-breaking paper submission deadline is May 25th.
In Technical Cooperation with AC... more SIN'15 late-breaking paper submission deadline is May 25th.
In Technical Cooperation with ACM Special Interest Group on Security, Audit and Control (SIGSAC).
Proceedings by ACM Press; all papers will be inserted into the ACM Digital Library.
Symposium on Web Technologies & Data Analytics of 39th IEEE COMPSAC 2015, July 1-5, 2015 Tunghai ... more Symposium on Web Technologies & Data Analytics of 39th IEEE COMPSAC 2015, July 1-5, 2015 Tunghai University, Taichung, Taiwan. Call for Papers due Jan 27. CFP @
Call For Papers:
------------------
We envisage a strong undercurrent of intelligent software
... more Call For Papers:
------------------
We envisage a strong undercurrent of intelligent software
agents, mobile agents, and MAS running through this workshop;
side by side with the use of semantic technologies, there are
several foci of interest:
• Software Agents, Mobile Agents, and MAS,
• Agent, MAS and Semantic Web Technologies,
• Ontologies for Agents and MAS,
• Platforms for semantic agent and MAS implementation,
• Semantic Intelligence and Semantic Robotics,
• Other subjects of relevance in semantic technologies, semantic software agents, mobile agents, agent-based and multi-agent systems.
In: Antipova T., Rocha A. (eds) Digital SciAdvances in Intelligent Systems and Computing, vol 850. Springer, Cham, 2019
In recent years, blockchain technology has affected to a large extent all aspects of life, howeve... more In recent years, blockchain technology has affected to a large extent all aspects of life, however, until now paper-based elections have been practiced. It is time to upgrade the election scenario using modern technology such as blockchain and advanced cryptography methods. Actually, both of Estonia and New South Wales have been using i-voting systems, but after developing an example software of their systems for the purpose of analysis, it is discovered that it has weaknesses against many kinds of attacks, such as malwares, network attacks, and servers attacks. The fact that the blockchain technology has demonstrated infinite immutability and resistance against hacking, so it is possible to use it to secure election results from fraud by saving every single piece of data, record or transaction with unchangeable history. By abandoning the traditional database and compensating it with two blockchains instead of one ensures voter/vote privacy, as well as, safeguards the results from manipulation. Also, using blockchain's distributed network reduces the load on the network. Finally, solutions to problems of impersonation and vote selling are suggested. The technology behind the digital voting system design is explained in terms of the processes involved, such as ID creation, authentication, voting, and vote tallying.
IEEE COMPSAC'08. 32nd Annual Conference, Jan 1, 2008
Abstract Web mining treats the World Wide Web as the ultimate data source. This area of research ... more Abstract Web mining treats the World Wide Web as the ultimate data source. This area of research is more interesting than data mining involving extracting data from in-house corporate databases or data warehouses. Gathering information from Web sources via distributed intelligent software agents in enterprise architecture can be implemented securely, platform independent, reusable, and would be better modeled in n-tier or enterprise-tier architecture. The purpose of this paper is to develop a novel distributed ...
IEEE COMPSAC'08. 32nd Annual Conference, Jan 1, 2008
Distributed intelligent software agents (DISA) are software agents that help out users and act on... more Distributed intelligent software agents (DISA) are software agents that help out users and act on their behalf. Such agents might be robots or virtual software systems. They are able to intelligent if they interact with their environment in an approach that would generally be observed as intelligent if that communication were carried out by a human being. As a result,
Keynote Talk at SIN'18
Blockchain of BitCoin caught most by surprise by its recent rise to stardo... more Keynote Talk at SIN'18 Blockchain of BitCoin caught most by surprise by its recent rise to stardom. There is hardly any realm of computing left without its tentacles touching or about to touch soonest. Besides its simple database roots it has been picked up for roles eventually and necessarily combining security, privacy and trust premises in recently evolved information systems. This talk will survey Blockchain and related technologies, their uses and limits with a view towards how to take advantage of its eminent rise.
Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı?
... more Tıp etkinlikleri sırasında kişilerin ne kadar verisi toplanıyor? Bunlar güvende mi? Ne yapmalı? (How much and what type of personal data is being collected during medical processes? Are such private data safe? What to do?) Bu sunuşum aynı zamanda benim Anlamsal Etmenler ve Büyük Veri Çözümlemesi projelerimle de ilgilidir. Paneldeki diğer konuşmacılar için bkz. http://ab.org.tr/ab17/ozet/240.html. Resimler için bkz. https://goo.gl/photos/AFjLeR2ofPQeYwBd6 ) (Also relevant for my other projects: Semantic agent systems, Big data & analytics. Other presenters in this panel: see http://ab.org.tr/ab17/ozet/240.html Pictures: see https://goo.gl/photos/AFjLeR2ofPQeYwBd6 )
Invited talk at Theory and Practice of Digital Textbooks, Moscow, Russia.
Digital textbook desig... more Invited talk at Theory and Practice of Digital Textbooks, Moscow, Russia. Digital textbook design, development and utilization; MetaSystems vision; Meta-Era infrastructure and API; my recent related works.
The part big data and analytics will be playing in our lives, especially security and privacy asp... more The part big data and analytics will be playing in our lives, especially security and privacy aspects, is being highlighted. Projection is made and possible measures to alleviate its effects are considered.
Topics of interest include, but are not limited to:
• Data management, knowledge representation ... more Topics of interest include, but are not limited to:
• Data management, knowledge representation and ontology for Cyber-Physical Systems • Big data and smart computing for Cyber-Physical Systems • Algorithms, models, and designs for social Cyber-Physical Systems • Machine learning for/with Cyber-Physical Systems • Nature-Inspired Algorithms for Cyber-Physical Systems • Affecting Ubiquitous Intelligence in Cyber-Physical Computing • Device Virtualization (DV) in pervasive Cyber-Physical Systems • Issues and implementation of Privacy, Security, and Trust in Cyber-Physical Systems • Affecting Context-Awareness for Cyber-Physical Systems • Design, development, and implementation of Smart Cyber-Physical Systems • Comparison of artificial intelligence-based approaches to Cyber-Physical Systems • AI-based fraud detection, and mitigation • Smart IDS and IPS for Cyber-Physical System • Cyber-attack forecasting, detection, and mitigation • Innovative applications of Cyber-Physical Systems in various domains
Papers are sought on the following tracks:
- e-Health and Applications
- Artificial Intelligence ... more Papers are sought on the following tracks: - e-Health and Applications - Artificial Intelligence with Web Technologies and Data - Recommendation Systems, and - Web Technologies, Services, and Applications.
Uploads
Books by Atilla Elçi
• Data management, knowledge representation and ontology for Cyber-Physical Systems
• Big data and smart computing for Cyber-Physical Systems
• Algorithms, models, and designs for social Cyber-Physical Systems
• Machine learning for/with Cyber-Physical Systems
• Nature-Inspired Algorithms for Cyber-Physical Systems
• Affecting Ubiquitous Intelligence in Cyber-Physical Computing
• Device Virtualization (DV) in pervasive Cyber-Physical Systems
• Issues and implementation of Privacy, Security, and Trust in Cyber-Physical Systems
• Affecting Context-Awareness for Cyber-Physical Systems
• Design, development, and implementation of Smart Cyber-Physical Systems
• Comparison of artificial intelligence-based approaches to Cyber-Physical Systems
• AI-based fraud detection, and mitigation
• Smart IDS and IPS for Cyber-Physical System
• Cyber-attack forecasting, detection, and mitigation
• Innovative applications of Cyber-Physical Systems in various domains
in Advances in Intelligent Systems and Computing Series
Volume 767
By Springer
in Advances in Intelligent Systems and Computing Series
Volume 766
By Springer
New cycle, new deadlines: Upload a chapter proposal of 1,000 to 2,000 words by September 15th. Notification is by September 30th with full chapter submission by November 30th.
http://www.igi-global.com/publish/call-for-papers/call-details/1423
Recommended topics in theory, tools, and applications of cryptographic solutions for information systems include, but are not limited to the following:
• Cryptography
• Cryptography and Security
• Cryptography and Data Protection
• Cryptography and Privacy
• Cryptography and Cryptanalysis
• Cryptographic Protocols
• Cryptographic Solutions
• Copyright protection
• Agent & Multi-agent System Security
• Authentication & Authorization
• Engineering Secure Information Systems
• Forensics and Ethical Hacking
• Key Management
• Ontology of Cryptographic Solutions
• Public-key Crypto Systems
• Standards, guidelines and certification
Manuscripts in which cryptographic solutions for IS are not the main focus will not be accepted.
This edited book “Semantic Agent Systems: Foundations and Applications” proposes contributions on a wide range of topics on foundations and applications written by a selection of international experts. It first introduces in an accessible style the nature of semantic agent systems. Then it explores with numerous illustrations new frontiers in software agent technology.
“Semantic Agent Systems: Foundations and Applications” is recommended for scientists, experts, researchers, and learners in the field of artificial intelligence, the semantic Web, software agents, and multi-agent systems technologies.
Dr. Atilla Elçi is a professor of computer science at Toros University, Mersin, Turkey;
Dr. Mamadou Tadiou Kone is a research scientist at International Computing
Research, Boston, MA, USA;
Dr. Mehmet A. Orgun is a professor of computer science at Macquarie University, Sydney, Australia.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
TOC:
PREFACE
Section 1 INTRODUCTION TO AGENTS AND SEMANTICS
1 Rule Responder Agents - Framework and Instantiations.
Harold Boley (National Research Council); Adrian Paschke (Free University Berlin)
2 Specifying and Monitoring Obligations in Open Multiagent Systems using Semantic Web Technology.
Nicoletta Fornara (University of Lugano)
3 Semantic Agent Model for Distributed Knowledge Management.
Julien Subercaze (LIRIS); Pierre Maret (LaHC )
Section 2 ENGINEERING SEMANTIC AGENT SYSTEMS
4 SBVR-driven Information Governance: a Case Study in the Flemish Public Administration.
Pieter De Leenheer (Vrije Universiteit and Collibra nv/sa et al.
5 Argumentation for reconciling agent ontologies.
Cassia Trojahn (INRIA); Jérôme Euzenat (INRIA); Valentina Tamma
(University of Liverpool); Terry Payne (University of Liverpool)
6 Measuring Complexity for MAS Design in the presence of Ontology Heterogeneity
Maricela Bravo (CINVESTAV)
7 Ontology-based Matchmaking and Composition of Business Processes.
Duygu Celik (EMU); Atilla Elci (METU)
8 Semantic Architecture for Human Robot Interaction.
Sebastien Dourlens Amar Ramdane Cherfi (LISV/UVSQ (Versailles University France));
Section 3. APPLICATIONS OF SEMANTIC AGENT SYSTEMS
9 A Semantic Agent Framework for Cyber-Physical Systems.
Jing Lin; Sahra Sedigh; Ann Miller (Missouri University of Science and Technology)
10 A Layered Manufacturing System Architecture Supported with Semantic Agents Capabilities.
Munir Merdan; Mathieu Vallee; Thomas Moser; Stefan Biffl (Vienna University of Technolog)
11 Semantic Multi-Agent mLearning System.
Stanimir Stojanov (Plovdiv University) et al.
12 Identifying Novel Topics based on User Interests.
Makoto Nakatsuji (NTT)
Section 4. FUTURE LOOK
13 Understanding, Misunderstanding, Multi-understanding, and Switchable Understanding by Agents.
Tuncer Oren (University of Ottawa); Levent Yilmaz (Auburn University)
INDEX
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
• Data management, knowledge representation and ontology for Cyber-Physical Systems
• Big data and smart computing for Cyber-Physical Systems
• Algorithms, models, and designs for social Cyber-Physical Systems
• Machine learning for/with Cyber-Physical Systems
• Nature-Inspired Algorithms for Cyber-Physical Systems
• Affecting Ubiquitous Intelligence in Cyber-Physical Computing
• Device Virtualization (DV) in pervasive Cyber-Physical Systems
• Issues and implementation of Privacy, Security, and Trust in Cyber-Physical Systems
• Affecting Context-Awareness for Cyber-Physical Systems
• Design, development, and implementation of Smart Cyber-Physical Systems
• Comparison of artificial intelligence-based approaches to Cyber-Physical Systems
• AI-based fraud detection, and mitigation
• Smart IDS and IPS for Cyber-Physical System
• Cyber-attack forecasting, detection, and mitigation
• Innovative applications of Cyber-Physical Systems in various domains
in Advances in Intelligent Systems and Computing Series
Volume 767
By Springer
in Advances in Intelligent Systems and Computing Series
Volume 766
By Springer
New cycle, new deadlines: Upload a chapter proposal of 1,000 to 2,000 words by September 15th. Notification is by September 30th with full chapter submission by November 30th.
http://www.igi-global.com/publish/call-for-papers/call-details/1423
Recommended topics in theory, tools, and applications of cryptographic solutions for information systems include, but are not limited to the following:
• Cryptography
• Cryptography and Security
• Cryptography and Data Protection
• Cryptography and Privacy
• Cryptography and Cryptanalysis
• Cryptographic Protocols
• Cryptographic Solutions
• Copyright protection
• Agent & Multi-agent System Security
• Authentication & Authorization
• Engineering Secure Information Systems
• Forensics and Ethical Hacking
• Key Management
• Ontology of Cryptographic Solutions
• Public-key Crypto Systems
• Standards, guidelines and certification
Manuscripts in which cryptographic solutions for IS are not the main focus will not be accepted.
This edited book “Semantic Agent Systems: Foundations and Applications” proposes contributions on a wide range of topics on foundations and applications written by a selection of international experts. It first introduces in an accessible style the nature of semantic agent systems. Then it explores with numerous illustrations new frontiers in software agent technology.
“Semantic Agent Systems: Foundations and Applications” is recommended for scientists, experts, researchers, and learners in the field of artificial intelligence, the semantic Web, software agents, and multi-agent systems technologies.
Dr. Atilla Elçi is a professor of computer science at Toros University, Mersin, Turkey;
Dr. Mamadou Tadiou Kone is a research scientist at International Computing
Research, Boston, MA, USA;
Dr. Mehmet A. Orgun is a professor of computer science at Macquarie University, Sydney, Australia.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
TOC:
PREFACE
Section 1 INTRODUCTION TO AGENTS AND SEMANTICS
1 Rule Responder Agents - Framework and Instantiations.
Harold Boley (National Research Council); Adrian Paschke (Free University Berlin)
2 Specifying and Monitoring Obligations in Open Multiagent Systems using Semantic Web Technology.
Nicoletta Fornara (University of Lugano)
3 Semantic Agent Model for Distributed Knowledge Management.
Julien Subercaze (LIRIS); Pierre Maret (LaHC )
Section 2 ENGINEERING SEMANTIC AGENT SYSTEMS
4 SBVR-driven Information Governance: a Case Study in the Flemish Public Administration.
Pieter De Leenheer (Vrije Universiteit and Collibra nv/sa et al.
5 Argumentation for reconciling agent ontologies.
Cassia Trojahn (INRIA); Jérôme Euzenat (INRIA); Valentina Tamma
(University of Liverpool); Terry Payne (University of Liverpool)
6 Measuring Complexity for MAS Design in the presence of Ontology Heterogeneity
Maricela Bravo (CINVESTAV)
7 Ontology-based Matchmaking and Composition of Business Processes.
Duygu Celik (EMU); Atilla Elci (METU)
8 Semantic Architecture for Human Robot Interaction.
Sebastien Dourlens Amar Ramdane Cherfi (LISV/UVSQ (Versailles University France));
Section 3. APPLICATIONS OF SEMANTIC AGENT SYSTEMS
9 A Semantic Agent Framework for Cyber-Physical Systems.
Jing Lin; Sahra Sedigh; Ann Miller (Missouri University of Science and Technology)
10 A Layered Manufacturing System Architecture Supported with Semantic Agents Capabilities.
Munir Merdan; Mathieu Vallee; Thomas Moser; Stefan Biffl (Vienna University of Technolog)
11 Semantic Multi-Agent mLearning System.
Stanimir Stojanov (Plovdiv University) et al.
12 Identifying Novel Topics based on User Interests.
Makoto Nakatsuji (NTT)
Section 4. FUTURE LOOK
13 Understanding, Misunderstanding, Multi-understanding, and Switchable Understanding by Agents.
Tuncer Oren (University of Ottawa); Levent Yilmaz (Auburn University)
INDEX
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
fully ONLINE.
In Technical Cooperation with ACM Special Interest Group on Security, Audit and Control (SIGSAC).
Proceedings by ACM Press; all papers will be inserted into the ACM Digital Library.
Phase 2 deadline: July 31'st. Please refer to the updated CFP file attached below.
Papers, special sessions, tutorials, and workshops addressing all aspects of security in information and networks are being sought.
Keynotes by:
Georges ATAYA, Ali AYDIN, Ludmila BABENKO, Bart PRENEEL, Erkay SAVAŞ, Rudrapatna SHYAMASUNDAR, Edgar WEIPPL.
Topics of Interest:
-------------------
Possible topics include:
• Access control and intrusion detection
• Cyber Physical Systems
• Autonomous and adaptive security
• Security tools and development platforms
• Computational intelligence techniques in security
• Security ontology, models, protocols & policies
• Computer network defense
• Standards, guidelines and certification
• Cryptographic techniques and key management
• Security-aware software engineering
• Industrial applications of security
• Trust and privacy
• Information assurance
• Cyber Warfare (attacks and defenses)
• Next generation network architectures
• Malware analysis
• Network security and protocols
• Security challenges in Mobile/Embedded Systems"
------------------
We envisage a strong undercurrent of intelligent software
agents, mobile agents, and MAS running through this workshop;
side by side with the use of semantic technologies, there are
several foci of interest:
• Software Agents, Mobile Agents, and MAS,
• Agent, MAS and Semantic Web Technologies,
• Ontologies for Agents and MAS,
• Platforms for semantic agent and MAS implementation,
• Semantic Intelligence and Semantic Robotics,
• Other subjects of relevance in semantic technologies, semantic software agents, mobile agents, agent-based and multi-agent systems.
Blockchain of BitCoin caught most by surprise by its recent rise to stardom. There is hardly any realm of computing left without its tentacles touching or about to touch soonest. Besides its simple database roots it has been picked up for roles eventually and necessarily combining security, privacy and trust premises in recently evolved information systems.
This talk will survey Blockchain and related technologies, their uses and limits with a view towards how to take advantage of its eminent rise.
(How much and what type of personal data is being collected during medical processes? Are such private data safe? What to do?)
Bu sunuşum aynı zamanda benim Anlamsal Etmenler ve Büyük Veri Çözümlemesi projelerimle de ilgilidir.
Paneldeki diğer konuşmacılar için bkz. http://ab.org.tr/ab17/ozet/240.html.
Resimler için bkz. https://goo.gl/photos/AFjLeR2ofPQeYwBd6 )
(Also relevant for my other projects: Semantic agent systems, Big data & analytics.
Other presenters in this panel: see http://ab.org.tr/ab17/ozet/240.html
Pictures: see https://goo.gl/photos/AFjLeR2ofPQeYwBd6 )
Digital textbook design, development and utilization; MetaSystems vision; Meta-Era infrastructure and API; my recent related works.
• Data management, knowledge representation and ontology for Cyber-Physical Systems
• Big data and smart computing for Cyber-Physical Systems
• Algorithms, models, and designs for social Cyber-Physical Systems
• Machine learning for/with Cyber-Physical Systems
• Nature-Inspired Algorithms for Cyber-Physical Systems
• Affecting Ubiquitous Intelligence in Cyber-Physical Computing
• Device Virtualization (DV) in pervasive Cyber-Physical Systems
• Issues and implementation of Privacy, Security, and Trust in Cyber-Physical Systems
• Affecting Context-Awareness for Cyber-Physical Systems
• Design, development, and implementation of Smart Cyber-Physical Systems
• Comparison of artificial intelligence-based approaches to Cyber-Physical Systems
• AI-based fraud detection, and mitigation
• Smart IDS and IPS for Cyber-Physical System
• Cyber-attack forecasting, detection, and mitigation
• Innovative applications of Cyber-Physical Systems in various domains
- e-Health and Applications
- Artificial Intelligence with Web Technologies and Data
- Recommendation Systems, and
- Web Technologies, Services, and Applications.