Computer Engineering / Bilgisayar Mühendisliği
Permanent URI for this collectionhttps://hdl.handle.net/11147/10
Browse
15 results
Search Results
Now showing 1 - 10 of 15
Data Paper Citation - WoS: 15Citation - Scopus: 20Database Covering the Prayer Movements Which Were Not Available Previously(Nature Publishing Group, 2023) Mihçin, Şenay; Şahin, Ahmet Mert; Yılmaz, Mehmet; Alpkaya, Alican Tuncay; Tuna, Merve; Akdeniz, Sevinç; Can, Nuray Korkmaz; Tosun, Aliye; Şahin, SerapLower body implants are designed according to the boundary conditions of gait data and tested against. However, due to diversity in cultural backgrounds, religious rituals might cause different ranges of motion and different loading patterns. Especially in the Eastern part of the world, diverse Activities of Daily Living (ADL) consist of salat, yoga rituals, and different style sitting postures. A database covering these diverse activities of the Eastern world is non-existent. This study focuses on data collection protocol and the creation of an online database of previously excluded ADL activities, targeting 200 healthy subjects via Qualisys and IMU motion capture systems, and force plates, from West and Middle East Asian populations with a special focus on the lower body joints. The current version of the database covers 50 volunteers for 13 different activities. The tasks are defined and listed in a table to create a database to search based on age, gender, BMI, type of activity, and motion capture system. The collected data is to be used for designing implants to allow these sorts of activities to be performed.Data Paper Database Covering the Previously Excluded Daily Life Activities(2023) Mihçin, Şenay; Şahin, Ahmet Mert; Yılmaz, Mehmet; Alpkaya, Alican Tuncay; Tuna, Merve; Can, Nuray Korkmaz; Şahin, Serap; Akdeniz, Sevinç; Tosun, AliyeIn biomedical engineering, implants are designed according to the boundary conditions of gait data and tested against. However, due to diversity in cultural backgrounds, religious rituals might cause different ranges of motion and different loading patterns. Especially in the Eastern part of the world, diverse Activities of Daily Living (ADL) consist of salat, yoga rituals, and different style sitting postures. Although databases cover ADL for the Western population, a database covering these diverse activities of the Eastern world, specific to these populations is non-existent. To include previously excluded ADL is a key step in understanding the kinematics and kinetics of these activities. By means of developments in motion capture technologies, excluded ADL data are captured to obtain the coordinate values to calculate the range of motion and the joint reaction forces. This study focuses on data collection protocol and the creation of an online database of previously excluded ADL activities, targeting 200 healthy subjects via Qualisys and IMU motion capture systems, and force plates, from West and Middle East Asian populations. Anthropometrics are known to affect kinematics and kinetics which are also included in the collected data. The current version of the database covers 50 volunteers for 12 different activities, the database aims for 100- male and 100- female healthy volunteers as the final target including C3D and BVH file types. The tasks are defined and listed in a table to create a database to make a query based on age, gender, BMI, type of activity and motion capture system. The data is collected only from a healthy population to understand healthy motion patterns during these previously excluded ADLs. The collected data is to be used for designing implants to allow these sorts of activities to be performed without compromising the quality of life of patients performing these activities in the future.Conference Object A Review on Predicting Evolution of Communities(Selçuk Üniversitesi, 2021) Karataş, Arzum; Şahin, SerapIn recent years, research on dynamic networks has increased as the availability of data has grown tremendously. Understanding the dynamic behavior of networks can be studied at the mezzo-scale (e.g., at the community level), as communities are the most informative structure in nonrandom networks and also evolve over time. Tracking the evolution of communities can provide evolution patterns to predict their future development. For example, a community may either grow into a larger community, remain stable, shrink into a smaller community, split into several smaller communities, or merge with another community. Predicting these evolutions is one of the most difficult problems in social networks. Better predictions of community evolution can provide useful information for decision support systems, especially for group-level tasks. So far, this problem has been studied by some researchers. However, there is a lack of a survey/review of existing work. This has prompted us to conduct this study. In this paper, we first categorize the existing works according to their methodological principles. Then, we focus on the works that use machine learning classifiers for prediction in this decade as they are in majority. We then highlight open problems for future research. In this way, this paper provides an up-to-date overview and a quick start for researchers and developers in the field of community evolution prediction.Conference Object Forensic Analysis of Persistent Data Storages Analyzing Ntfs Formatted Drives(Karabük Üniversitesi, 2018) Özgür, Hüseyin Güven; Şahin, SerapComputational forensic is a far-reaching field for criminal and civil laws in this age. Aim of this project is to develop an educational tool to analyze persistent storage devices to find possible evidences. Evidences are found as metadata information on these drives. These metadata information are collected in a comma separated value-CSV format document. This CSV file can be imported to a database and can be easily analyzed. By the classical forensic investigator tools mostly can analyze only one media at a time, but by this way more than one digital evidence can be comparatively analyzed. Also, deleted files may hold evidences, so recovering of deleted files is an additional topic for this study. The structured codes and related documents have shared on github as an open project; to give a chance to extension of this study by new projects and we hope that the product of this study can be useful tool for computational forensic courses.Conference Object Blockchain : a Decentralized Approach To Big Data(Karabük Üniversitesi, 2018) Pehlivan Kaplan, Senem; Şahin, SerapThe blockchain technology is a hot topic and a new technology in recent years. It is not only an underlying technology for many applications like Bitcoin application, but also it is a kind of thinking including cognitive and mental processing and understanding for artificial intelligence and human enhancement. All data or services are digitized. So, this leads to deal with big data. It is a challenge to deal with big data from the perspective of performance, scalability, availability and privacy in centralized systems. Blockchain is applicable to big data and brings different perspective how to process, store, read and write data. Also, the aim of this paper is to show that better solutions are possible in a decentralized way. Even the technology is in its early stages, the blockchain technology will be in future due to its superior features. Therefore, it is better to adopt this technology as soon as possible to place in future. This paper gives a brief about how the blockchain could approach to big data and analyzes existing information regarding the challenges of big data from the side of the blockchain.Conference Object An Analysis of Rumor Spreading Fundamentals With a Case Study on Facebook(Karabük Üniversitesi, 2018) Sayin, Burcu; Şahin, SerapNowadays, the effect of social networks on people's lives is quite high. This situation gives rise to the density of information exist over social networks. That is why, analyzing the spreading pattern of information on social networks is an important issue today. The aim of this study is to technically review the background of information spreading, especially the fundamentals of rumor spreading and analyze the well-known methods on SNs. As a result, this article provides an important background for those, who works on the information spreading over SNs.Conference Object Edu-Voting: an Educational Homomorphic E-Voting System(Karabük Üniversitesi, 2018) Tekin, Leyla; Özgür, Hüseyin Güven; Sayin, Burcu; Karataş, Arzum; Şenkula, Pelin; İrtem, Emre; Şahin, SerapAs an instrument of democracy, voting is a critical issue. Although paper-based voting systems are still used commonly, e-voting systems have started to substitute under favor of improvements in the technology. This situation gives rise to need for secure, reliable, and transparent e-voting systems to make people trust. To do this, there are some security requirements that should be concerned and satisfied such as privacy, fairness, verifiability etc. This study has an educational intuition that analyzes those requirements, theoretical background information related to cryptographic schemes behind them and creates a place-based e-voting design which was implemented for kiosk voting. As a contribution, Paillier homomorphic cryptosystem is used in our system. Moreover, our study includes a detailed criticism for the implemented system in terms of chosen cryptosystems and design modules with security and e-voting requirements.Conference Object A Novel Approach To Information Spreading Models for Social Networks(International Academy, Research, and Industry Association (IARIA), 2017) Sayın, Burcu; Şahin, SerapAnalyzing and modelling the spreading of any information through a social network (SN) is an important issue in social network analysis. Proposed solutions for this issue do not only help observing the information diffusion but also serve as a valuable resource for predicting the characteristics of the network, developing network-specific advertising etc. Up-to-date approaches include probabilistic analysis of information spreading and the information cascade models. In this paper, we propose a hybrid model which considers an information spreading model, combines it with cascades and social behavior analysis. We propose a new hybrid usage approach to represent a real-world modelling for information spreading process.Article Implementation and Evaluation of Improved Secure Index Scheme Using Standard and Counting Bloom Filters(Gazi Üniversitesi, 2017) Tekin, Leyla; Şahin, SerapThis paper presents an improved Secure Index scheme as a searchable symmetric encryption technique and provides a solution that enables a secure and efficient data storage and retrieval system. Secure Index scheme, conceived by Goh, is based on standard Bloom filters (SBFs). Knowledge of the limitations of SBFs, such as handling insertions but not deletions, helps in understanding the advantages of counting Bloom filters (CBFs). Thus, we have extended this scheme by adding a new algorithm so that CBFs can also be applicable. Unlike the old scheme, our scheme can handle dynamic update of a document by updating the existing index without rebuilding it. Moreover, we give a complementary comparison of both filters in our scheme. Finally, a detailed performance evaluation shows that our scheme exhibits similar performance with regard to the query overhead and the false positive probability and is quite efficient than the old scheme with regard to the update overhead by allocating more space.Article Sosyal Bot Algılama Teknikleri ve Araştırma Yönleri Üzerine Bir İnceleme(Gazi Üniversitesi, 2018) Karataş, Arzum; Şahin, SerapFacebook, Twitter, LinkedIn gibi çevrimiçi sosyal ağların (OSN) popülerliği ve web servislerinin yaygınlığı, bu alanlarda sosyal bot olarak nitelendirdiğimiz yazılımsal sosyal aktörlerin ortaya çıkmasına ve yaygınlaşmasına neden oldu. Ancak çoğunlukla bu aktörler kötü rollerde karşımıza çıkmaktadırlar. Örneğin, sosyal botlar insanmış gibi sohbetlere katılma, başka hesapları çalarak üzerinden dolandırıcılık yapma, yanlış bilgi yayma, borsayı manipüle etme, sahte halk tabakası oluşturarak propaganda yapma gibi ciddi problemlerde karşımıza çıkmaktadırlar. Bununla beraber, istenmeyen postaları ve zararlı yazılımları yaymanınetkin araçları haline gelmişlerdir. Dahası, botlar gerçek hesapları ele geçirerek “zombi bilgisayar ağı” (botnet attack) saldırıları düzenlemekte de kullanılabiliyorlar. Öte yandan, sosyal botların sosyal paylaşım ağları üzerindeki yaygınlığı ve önemi inkâr edilemez bir gerçektir. Bu çalışmada, kötü niyetli sosyal botların potansiyel tehlikeleri vurgulanmıştır. Sonrasında, metodolojik bir sınıflandırma içerisinde literatürdeki bot tespit yaklaşımları, bu yaklaşımların sınırları ve açık problemleri gözden geçirilmiştir. Makalenin son bölümünde, problemi çözmeye yönelik iki yeni yaklaşım önerilmiştir.
