Computer Engineering / Bilgisayar Mühendisliği

Permanent URI for this collectionhttps://hdl.handle.net/11147/10

Browse

Search Results

Now showing 1 - 10 of 10
  • Conference Object
    A News Chain Evaluation Methodology Along With a Lattice-Based Approach for News Chain Construction
    (Association for Computational Linguistics (ACL), 2017) Toprak, Mustafa; Özkahraman,Ö.; Tekir, Selma
    Chain construction is an important requirement for understanding news and establishing the context. A news chain can be defined as a coherent set of articles that explains an event or a story. There's a lack of well-established methods in this area. In this work, we propose a methodology to evaluate the "goodness" of a given news chain and implement a concept latticebased news chain construction method by Hossain et al. The methodology part is vital as it directly affects the growth of research in this area. Our proposed methodology consists of collected news chains from different studies and two "goodness" metrics, minedge and dispersion coefficient respectively. We assess the utility of the lattice-based news chain construction method by our proposed methodology. © EMNLP 2017.All right reserved.
  • Research Project
    Haber Zincirlerinde Tutarlılık ve Güvenilirlik Değerlendirmesi
    (2017) Tekir, Selma
    Çok hızlı ve büyük miktarda haber akısının oldugu günümüzde haber analizi büyük bir gereksinimdir. Haberi takip etmek, dogrulugunu denetlemek, yorumlamak özellikle kurumsal bazda çok önemlidir. Bunun yapılabilmesi bir bilgi isleyis döngüsünün çalıstırılması ile mümkündür. Bilginin toplanması, hedefler dogrultusunda islenip analiz edilerek ise yarar bilgiye dönüstürülmesi beklenmektedir. Projenin amacı haber güvenilirliginin ölçülüp degerlendirilmesine yönelik bir yaklasım gelistirmektir. Haber güvenilirligi haberalma faaliyetinin olmazsa olmazları arasındadır. Kurumsallasmıs medya kurulusları (BBC, The New York Times vb.) hâlihazırda çok büyük miktarda yapısal veri sunmaktadır. Haberi dogrulama, kaynak geçerligini denetleme gereksinimi had safhadadır. Projede bir haber zinciri üzerinde güvenilirlik ölçümü ve degerlendirmesi yapılacaktır. Projede haber zinciri, noktaları birlestirelim (connecting the dots) yaklasımı ile karsılanmaktadır. Noktaları birlestirelim yaklasımı, haber zincirini biri baslangıç digeri bitis noktası olarak tanımlanabilecek iki haber belgesini tutarlı bir sekilde birlestiren haber belgeleri dizisi olarak tanımlamaktadır. Güvenilirlik degerlendirmesi ele alınacak haber zincirinin tutarlılık degerlendirmesi ile birlikte gerçeklestirilecektir. Haber güvenilirligi; haberin dogrulugu, fikirlerden ziyade somut gerçeklere dayanmasıdır. Haber kaynagının güvenilirligi ise iki temel boyutta ele alınmaktadır: Haber kaynagına duyulan güven ve kaynagın o konudaki uzmanlıgı [21]. Haber güvenilirliginin ölçümünde ?Gerçegi fikirden ayırıyor mu? ve ?Fikirlere mi gerçeklere mi dayanmakta? faktörleri baz alınacaktır. Fikir madenciligi kullanılarak gerçekler fikirlerden ayırdedilmeye çalısılacaktır. Haber zincirini olusturan belgelerin gerçegi fikirden ayırıp ayırmadıkları, belge yapısındaki gerçek/fikir tümcelerinin organizasyonu irdelenecektir. Belgelerdeki gerçek/fikir yapılanmasına ek olarak gerçek/fikir oranı da tespit edilip haber zincirini olusturan dokümanların bu açıdan bütünsellik tasıyıp tasımadıgı sınanacaktır. Ayrıca ardısık dokümanlar arasındaki geçisin gerçek/fikir bilgisine dayalı bir degerlendirme mekanizması kurulacaktır. Güvenilirlik kavramının ölçümüne iliskin benzer bir yaklasım mevcut olmadıgından proje oldukça yenilikçidir. Haber zincirinin güvenilirlik degerlendirmesi tutarlılık degerlendirmesinden bagımsız degildir. Haber zinciri baglamında tutarlılıgı karsılamak üzere yöntemler mevcuttur ancak yeni arayıslara gereksinim vardır. Proje kapsamında tutarlı haber zinciri elde etmeyi saglayacak yeni bir yöntem gelistirilecektir. Gelistirilecek yöntem tutarlı haber zincirinin kafes (lattice) yapısı ile iyi temsil edilecegi sezgisine dayanmaktadır. Kafes yapısının dügümleri, haber belgelerinde geçen sözcükler ve bu sözcüklerin geçtigi haber belgeleri ikilileri ile temsil edilecektir. Tutarlı haber zincirlerine ait kafeslerin tam kafes niteligine sahip olması beklenmektedir. Zaki ve Ramakrishnan [17]?ın kapalı tanım kümesi kafesi (closed description set lattice) olusturma algoritması bu amaçla kullanılarak iyi haber zincirleri elde edilip edilmeyecegi sınanacaktır. Önerilen yöntem güvenilirlik degerlendirmesi yapılacak haber zincirlerini üretmesi açısından önemli ve aynı ölçüde özgündür. Proje tamamlandıgında elde edilecek çıktıların bilgi kesfi ve veri madenciligi alanında bilimsel katkı sunması beklenmektedir. Önerilen tekniklerin olgunlasması bunların yeni teknolojilerde kullanılmasını mümkün hale getirecektir. Ayrıca haberalma toplumun sosyo-ekonomik yapısında etkili olan bir islevdir. Özellikle sosyal medya bu alanı yeniden sekillendirmektedir. Bu alanda, alınan haberlerin dogru sekilde islenmesi ve haber güvenilirligi konusunda farkındalıgın artırılması büyük önem arz etmektedir.
  • Article
    Gender Bias in Occupation Classification From the New York Times Obituaries
    (Dokuz Eylül Üniversitesi, 2022) Atik, Ceren; Tekir, Selma
    Technological developments such as artificial intelligence can strengthen social prejudices prevailing in society, regardless of the developer's intention. Therefore, researchers should be aware of the ethical issues that may arise from a developed product/solution. In this study, we investigate the effect of gender bias on occupational classification. For this purpose, a new dataset was created by collecting obituaries from the New York Times website and is provided in two different versions: With and without gender indicators. Category distributions from this dataset show that gender and occupation variables have dependence. Thus, gender affects occupation classification. To test the effect, we perform occupation classification using SVM (Support Vector Machine), HAN (Hierarchical Attention Network), and DistilBERT-based classifiers. Moreover, to get further insights into the relationship of gender and occupation in classification problems, a multi-tasking model in which occupation and gender are learned together is evaluated. Experimental results reveal that there is a gender bias in job classification.
  • Article
    Sales History-Based Demand Prediction Using Generalized Linear Models
    (Süleyman Demirel Üniversitesi, 2019) Özenboy, Başar; Tekir, Selma
    It’s vital for commercial enterprises to accurately predict demand by utilizing the existing sales data. Such predictive analytics is a crucial part of their decision support systems to increase the profitability of the company.In predictive data analytics, the branch of regression modeling is used to predict a numerical response variable like sale amount. In this category, linear models are simple and easy to interpret yet they permit generalization to very powerful and flexible families of models which are called Generalized linear models (GLM). The generalization potential over simple linear regression can be explained twofold: First, GLM relax the assumption of normally distributed error terms. Moreover, the relationship of the set of predictor variables and the response variable could be represented by a set of link functions rather than the sole choice of the identity function. This work models the sales amount prediction problem through the use of GLM. Unique company sales data are explored and the response variable, sale amount is fitted to the Gamma distribution. Then, inverse link function, which is the canonical one in the case of gamma-distributed response variable is used. The experimental results are compared with the other regression models and the classification algorithms. The model selection is performed via the use of MSE and AIC metrics respectively. The results show that GLM is better than the linear regression. As for the classification algorithms, Random Forest and GLM are the top performers. Moreover, categorization on the predictor variables improves model fitting results significantly.
  • Conference Object
    13. Ulusal Yazılım Mühendisliği Sempozyumu
    (Izmir Institute of Technology, 2019) Ayav, Tolga; Tekir, Selma; Erten, Murat
    The 13th National Software Engineering Symposium (UYMS) of Turkey was held Izmir Institute of Technology on 23-25 September 2019. There has been a great interest in this year’s symposium, as in previous years. UYMS is a platform which helps bring together the software industry and the academicians working in this area. It is being organized since 2003 and it plays an important role in shaping the future of the software industry in Turkey. We would like to thank all the participants whose contributions led to the successful realization of this symposium. We would also like to express our belief that these contributions will lead to a better and more productive efforts in the field of software engineering. Along with the main area of UYMS, in the thematic areas of Software Test Engineering, Software Engineering for Health, Software Modeling, and Graduate Theses, a total of 77 papers were accepted this year. At least three referees reviewed each paper and the papers were evaluated based on these reviews. We thank all the program committee members who served as referees.
  • Article
    Gender Prediction From Tweets: Improving Neural Representations With Hand-Crafted Features
    (Cornell University, 2019) Tekir, Selma; Sezerer, Erhan; Polatbilek, Ozan
    Author profiling is the characterization of an author through some key attributes such as gender, age, and language. In this paper, a RNN model with Attention (RNNwA) is proposed to predict the gender of a twitter user using their tweets. Both word level and tweet level attentions are utilized to learn ’where to look’. This model1 is improved by concatenating LSA-reduced n-gram features with the learned neural representation of a user. Both models are tested on three languages: English, Spanish, Arabic. The improved version of the proposed model (RNNwA + n-gram) achieves state-of-the-art performance on English and has competitive results on Spanish and Arabic.
  • Conference Object
    Overt information operations during peacetime
    (Curran Associates, 2012) Tekir, Selma
    Information superiority is the most critical asset in war making. It directly addresses the perception of the opponent and in the long term the will of him to act. Sun Tzu's classical text states this fact by the concept of deception as the basis of all warfare. The success in warfare then is dependent on being aware of what's happening, accurately realizing the context. This is the intelligence function in broad terms and mostly open source intelligence as it provides the context. Competitive intelligence is based mainly on open sources and day by day the open source share in the intelligence product is increasing. Present diversified open sources & services represent a methodology shift in war. The two preceding ways have been overt physical acts against military targets in wartime and covert information operations conducted throughout peacetime against even nonmilitary targets respectively. The present methodology must be overt (open) information operations during peacetime. This coincides with a metaphor change as well. It proposes a transformation from a war metaphor into a game metaphor in which there are some playing rules. In fact, the existence of such rules helps in drawing the boundary of the field of competitive intelligence and thus making it a profession. Game metaphor is safer to adopt than war as it's easier to take responsibility in public disclosure scenarios in this case. By following this metaphor, you continue to stay in the boundary of legitimate competition. In other terms, you make a conscious preference in terms of war intensities by choosing to avoid the more intense war forms limited conflict, and actual warfare respectively. Finally, this preference is in accordance with the fundamental point of the Sun Tzu's entire argument: The vision of victory without fighting. To summarize, open source domination in the competitive intelligence lays the ground for the game metaphor that represents a transformation in warfare. The apparent outcome is overt information operations during peacetime. It emerges as the most important tool to fight against deception, thus success in information warfare in the contemporary world.
  • Conference Object
    Citation - WoS: 3
    Citation - Scopus: 4
    Recent Cyberwar Spectrum and Its Analysis
    (Curran Associates, 2012) Aslanoğlu, Rabia; Tekir, Selma
    War is an organized, armed, and often prolonged conflict that is carried on between states, nations or other parties. Every war instance includes some basic components like rising conditions, battlespace, weapons, strategy, tactics, and consequences. Recent developments in the information and communication technologies have brought about changes on the nature of war. As a consequence of this change, cyberwar became the new form of war. In this new form, the new battlespace is cyber space and the contemporary weapons are constantly being renovated viruses, worms, trojans, denial-of-service, botnets, and advanced persistent threat. In this work, we present recent cyberwar spectrum along with its analysis. The spectrum is composed of the Estonia Attack, Georgia Attack, Operation Aurora, and Stuxnet Worm cases. The methodology for analysis is to identify reasons, timeline, effects, responses, and evaluation of each individual case. Moreover, we try to enumerate the fundamental war components for each incident. The analysis results put evidences to the evolution of the weapons into some new forms such as advanced persistent threat. Another outcome of the analysis is that when approaching to the end, confidentiality and integrity attributes of information are being compromised in addition to the availability. Another important observation is that in the last two cases, the responsive actions were not possible due to the lack of the identities of the offending parties. Thus, attribution appears as a significant concern for the modern warfare. The current sophistication level of the cyber weapons poses critical threats to society. Particularly developed countries that have high dependence on information and communication technologies are potential targets since the safety of the critical infrastructures like; healthcare, oil and gas production, water supply, transportation and telecommunication count on the safety of the computer networks. Being aware of this fact, every nation should attach high priorities to cyber security in his agenda and thus behave proactively.
  • Conference Object
    Citation - Scopus: 6
    Geodesic Distances for Web Document Clustering
    (Institute of Electrical and Electronics Engineers Inc., 2011) Tekir, Selma; Mansmann, Florian; Keim, Daniel
    While traditional distance measures are often capable of properly describing similarity between objects, in some application areas there is still potential to fine-tune these measures with additional information provided in the data sets. In this work we combine such traditional distance measures for document analysis with link information between documents to improve clustering results. In particular, we test the effectiveness of geodesic distances as similarity measures under the space assumption of spherical geometry in a 0-sphere. Our proposed distance measure is thus a combination of the cosine distance of the term-document matrix and some curvature values in the geodesic distance formula. To estimate these curvature values, we calculate clustering coefficient values for every document from the link graph of the data set and increase their distinctiveness by means of a heuristic as these clustering coefficient values are rough estimates of the curvatures. To evaluate our work, we perform clustering tests with the k-means algorithm on the English Wikipedia hyperlinked data set with both traditional cosine distance and our proposed geodesic distance. The effectiveness of our approach is measured by computing micro-precision values of the clusters based on the provided categorical information of each article. © 2011 IEEE.
  • Conference Object
    Citation - WoS: 1
    Citation - Scopus: 7
    Intelligence analysis modeling
    (Institute of Electrical and Electronics Engineers Inc., 2006) Koltuksuz, Ahmet; Tekir, Selma
    Intelligence is the process of supporting the policymakers in making their decisions by providing them with the specific information they need. Intelligence analysis is the effort of extracting the nature of intelligence issue with the policy goal in mind. It is performed by intelligence analysts who form judgments that add value to the collected material. With the increased open source collection capabilities, there has emerged a need for a model of intelligence analysis that covers the basic elements of valuable information: relevancy, accuracy, and timeliness. There exist models such as vector space model of information retrieval which only addresses the relevancy aspect of information and cannot cope with nonlinear document spaces. In this paper, we discuss the requirements of an integrated model of intelligence analysis along with its peculiar characteristics.