首页 > 最新文献

2021 6th International Conference on Computer Science and Engineering (UBMK)最新文献

英文 中文
Solving Channel Assignment Problem in Cognitive Radio Networks with Immune Plasma Algorithm 用免疫等离子体算法求解认知无线网络中的信道分配问题
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558950
Murta Kısa, Sercan Demirci, Sibel Arslan, Selçuk Aslan
The new coronavirus or COVID-19 pandemic has focused researchers from various disciplines including computer sciences on existing diagnosis and treatment methods. As a result of this increasing interest, Immune Plasma algorithm (IP algorithm or IPA) that is a new meta-heuristic referencing a treatment method called immune or convalescent plasma has been introduced recently. In this study, IP algorithm was modified by considering the channel assignment problem on cognitive networks and its performance was investigated on solving mentioned problem. Moreover, the results of the IPA based technique were compared with the results of the Brute force search. Comparative studies showed that IP algorithm is capable of obtaining better solutions than the Brute force search.
新型冠状病毒或COVID-19大流行使包括计算机科学在内的各个学科的研究人员集中在现有的诊断和治疗方法上。免疫血浆算法(Immune Plasma algorithm, IP algorithm或IPA)是一种新的元启发式算法,它参考了一种叫做免疫或恢复期血浆的治疗方法。本文考虑了认知网络中的信道分配问题,对IP算法进行了改进,并研究了IP算法在解决信道分配问题时的性能。此外,将基于IPA的搜索结果与蛮力搜索结果进行了比较。比较研究表明,IP算法比蛮力搜索能得到更好的解。
{"title":"Solving Channel Assignment Problem in Cognitive Radio Networks with Immune Plasma Algorithm","authors":"Murta Kısa, Sercan Demirci, Sibel Arslan, Selçuk Aslan","doi":"10.1109/UBMK52708.2021.9558950","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558950","url":null,"abstract":"The new coronavirus or COVID-19 pandemic has focused researchers from various disciplines including computer sciences on existing diagnosis and treatment methods. As a result of this increasing interest, Immune Plasma algorithm (IP algorithm or IPA) that is a new meta-heuristic referencing a treatment method called immune or convalescent plasma has been introduced recently. In this study, IP algorithm was modified by considering the channel assignment problem on cognitive networks and its performance was investigated on solving mentioned problem. Moreover, the results of the IPA based technique were compared with the results of the Brute force search. Comparative studies showed that IP algorithm is capable of obtaining better solutions than the Brute force search.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129767062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Topic Modeling Using LDA and BERT Techniques: Teknofest Example 使用LDA和BERT技术的主题建模:Teknofest示例
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558988
Ercan Atagün, Bengisu Hartoka, A. Albayrak
This paper is a natural language processing study and includes models used in natural language processing. In this paper, topic modeling, which is one of the sub-fields of natural language processing, has been studied. In order to make topic modeling, the data set was obtained by using the data scraping method, which has been very popular in recent years, over social media. The dataset is related to Teknofest competitions. The dataset was created by utilizing the Selenium library, one of the popular libraries used for the data scraping method. In order to be able to analyze on the prepared data set and to ensure the consistency of the clustering process, the text to be used before the analysis was preprocessed. After text preprocessing, clustering was performed on the data set with natural language processing techniques such as BERT and LDA.
本文是一项自然语言处理研究,包括自然语言处理中使用的模型。主题建模是自然语言处理的一个分支领域。为了进行主题建模,使用近年来非常流行的数据抓取方法在社交媒体上获取数据集。该数据集与Teknofest竞赛有关。数据集是利用Selenium库创建的,Selenium库是用于数据抓取方法的流行库之一。为了能够对准备好的数据集进行分析,并保证聚类过程的一致性,对分析前要使用的文本进行预处理。文本预处理后,采用BERT、LDA等自然语言处理技术对数据集进行聚类。
{"title":"Topic Modeling Using LDA and BERT Techniques: Teknofest Example","authors":"Ercan Atagün, Bengisu Hartoka, A. Albayrak","doi":"10.1109/UBMK52708.2021.9558988","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558988","url":null,"abstract":"This paper is a natural language processing study and includes models used in natural language processing. In this paper, topic modeling, which is one of the sub-fields of natural language processing, has been studied. In order to make topic modeling, the data set was obtained by using the data scraping method, which has been very popular in recent years, over social media. The dataset is related to Teknofest competitions. The dataset was created by utilizing the Selenium library, one of the popular libraries used for the data scraping method. In order to be able to analyze on the prepared data set and to ensure the consistency of the clustering process, the text to be used before the analysis was preprocessed. After text preprocessing, clustering was performed on the data set with natural language processing techniques such as BERT and LDA.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127638842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Topic-Controlled Text Generation 主题控制文本生成
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558910
Cansen Çağlayan, M. Karakaya
Today, the text generation subject in the field of Natural Language Processing (NLP) has gained a lot of importance. In particular, the quality of the text generated with the emergence of new transformer-based models has reached high levels. In this way, controllable text generation has become an important research area. There are various methods applied for controllable text generation, but since these methods are mostly applied on Recurrent Neural Network (RNN) based encoder decoder models, which were used frequently, studies using transformer-based models are few. Transformer-based models are very successful in long sequences thanks to their parallel working ability. This study aimed to generate Turkish reviews on the desired topics by using a transformer-based language model. We used the method of adding the topic information to the sequential input. We concatenated input token embedding and topic embedding (control) at each time step during the training. As a result, we were able to create Turkish reviews on the specified topics.
目前,自然语言处理(NLP)领域的文本生成课题已经得到了广泛的重视。特别是,随着新的基于转换器的模型的出现,生成的文本的质量已经达到了很高的水平。这样,可控文本生成就成为一个重要的研究领域。可控文本生成的方法多种多样,但由于这些方法大多应用于频繁使用的基于循环神经网络(RNN)的编码器/解码器模型,因此对基于变压器的模型的研究很少。基于变压器的模型由于其并行工作能力,在长序列中非常成功。本研究旨在通过使用基于转换器的语言模型生成所需主题的土耳其语评论。我们使用了将主题信息添加到顺序输入的方法。在训练的每个时间步,我们将输入标记嵌入和主题嵌入(控制)连接起来。因此,我们能够在指定的主题上创建土耳其语评论。
{"title":"Topic-Controlled Text Generation","authors":"Cansen Çağlayan, M. Karakaya","doi":"10.1109/UBMK52708.2021.9558910","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558910","url":null,"abstract":"Today, the text generation subject in the field of Natural Language Processing (NLP) has gained a lot of importance. In particular, the quality of the text generated with the emergence of new transformer-based models has reached high levels. In this way, controllable text generation has become an important research area. There are various methods applied for controllable text generation, but since these methods are mostly applied on Recurrent Neural Network (RNN) based encoder decoder models, which were used frequently, studies using transformer-based models are few. Transformer-based models are very successful in long sequences thanks to their parallel working ability. This study aimed to generate Turkish reviews on the desired topics by using a transformer-based language model. We used the method of adding the topic information to the sequential input. We concatenated input token embedding and topic embedding (control) at each time step during the training. As a result, we were able to create Turkish reviews on the specified topics.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127882394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hybrid Job and Resume Matcher 混合工作和简历匹配器
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558932
Nimet Tülümen, Gökhan Akgün, Ali Nohutçu, Günnur Sevgi Aktoros Genç, S. Genç
Information extraction from text data has always been a tricky and difficult task. This work follows a previous work regarding a designed system that matches job ads with resumes, then assigns them a scoring point. In this system, there are two main parts: information extraction and scoring. For the information extraction part, rule-based methods are efficient when the format of the resumes and job ads are known. In this paper, powerful and efficient methods for information extraction from the mixed resume format and job ads using machine learning and deep learning methods are proposed.
从文本数据中提取信息一直是一项棘手而困难的任务。这项工作遵循了之前的一项工作,该工作设计了一个系统,将招聘广告与简历相匹配,然后为它们分配一个计分点。在这个系统中,主要有两个部分:信息提取和评分。对于信息提取部分,当简历和招聘广告的格式已知时,基于规则的方法是有效的。本文提出了一种利用机器学习和深度学习方法从混合简历格式和招聘广告中提取信息的强大而高效的方法。
{"title":"Hybrid Job and Resume Matcher","authors":"Nimet Tülümen, Gökhan Akgün, Ali Nohutçu, Günnur Sevgi Aktoros Genç, S. Genç","doi":"10.1109/UBMK52708.2021.9558932","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558932","url":null,"abstract":"Information extraction from text data has always been a tricky and difficult task. This work follows a previous work regarding a designed system that matches job ads with resumes, then assigns them a scoring point. In this system, there are two main parts: information extraction and scoring. For the information extraction part, rule-based methods are efficient when the format of the resumes and job ads are known. In this paper, powerful and efficient methods for information extraction from the mixed resume format and job ads using machine learning and deep learning methods are proposed.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115625029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collaborative Path Prediction in Cache Pre-fetching for Distributed State Machines 分布式状态机缓存预取中的协同路径预测
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558962
Onur Göksel, T. Ovatman
Modeling distributed processes using state machines is gaining importance as the serverless computing becomes more widespread. One of the important issues in distributed state machine execution is to perform better caching approaches. Due to the nature of state machines, the amount of different paths that can be executed by a state machine is limited. This property can be utilized to perform better caching by predicting which path is going to be taken. In this paper, we analyze former execution history of distributed state machines to perform better predictions. We also run experiments to find out if collaboratively using the history of the state machine instances makes any significant improvements on pre-fetching decision. Our results show that pre-fetching significantly decrease the number of cache misses while history sharing between instances provides improvements in a more limited fashion.
随着无服务器计算变得越来越普遍,使用状态机对分布式流程进行建模变得越来越重要。分布式状态机执行中的一个重要问题是执行更好的缓存方法。由于状态机的性质,一个状态机可以执行的不同路径的数量是有限的。通过预测将要采用的路径,可以利用此属性来执行更好的缓存。在本文中,我们分析了分布式状态机以前的执行历史,以进行更好的预测。我们还运行实验,以了解协作使用状态机实例的历史是否对预取决策有任何显著的改进。我们的结果表明,预取显著减少了缓存丢失的数量,而实例之间的历史共享以一种更有限的方式提供了改进。
{"title":"Collaborative Path Prediction in Cache Pre-fetching for Distributed State Machines","authors":"Onur Göksel, T. Ovatman","doi":"10.1109/UBMK52708.2021.9558962","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558962","url":null,"abstract":"Modeling distributed processes using state machines is gaining importance as the serverless computing becomes more widespread. One of the important issues in distributed state machine execution is to perform better caching approaches. Due to the nature of state machines, the amount of different paths that can be executed by a state machine is limited. This property can be utilized to perform better caching by predicting which path is going to be taken. In this paper, we analyze former execution history of distributed state machines to perform better predictions. We also run experiments to find out if collaboratively using the history of the state machine instances makes any significant improvements on pre-fetching decision. Our results show that pre-fetching significantly decrease the number of cache misses while history sharing between instances provides improvements in a more limited fashion.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124245613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DCT and Optimum Parameter Bilateral Filtering-Based Copy-Move Forgery Detection 基于DCT和最优参数双边滤波的Copy-Move伪造检测
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558898
Ugur Kilic, Nur Hüseym Kaplan, I. Aksakallı, I. Erer
A digital image can be easily manipulated in today’s rapidly boosting technology. Among different types of image forgery methods, Copy-move forgery (CMF) is one of the most popular forgery methods in which a part of the image is copied and pasted into the same image or a different image. Therefore, the development of forgery detection methods has become a hot topic for both researchers and practitioners. In this study, a new CMF method combined with Discrete Cosine Transform (DCT) and optimum parameter Bilateral Filtering (OBF) is proposed to detect copied areas in a digital image. The visual and quantitative comparisons of the proposed hybrid method (DCT-OBF) have been made with traditional DCT based methods. The proposed method outperformed the former bilateral based method as well as the DCT based methods in terms of visual and quantitative analysis. Moreover, comparisons with conventional block-based methods have been carried out for different post-processing attacks such as image blurring and contrast adjustment. Quantitative comparisons demonstrate that the proposed method is better than the conventional block based methods, especially for post-processed images. For blurring post-processed images, the proposed method have provided higher Precision (18% improvement), F1 score (13% improvement), and Recall (5% improvement) rates than the former block based methods.
在当今快速发展的技术中,数字图像可以很容易地进行处理。在不同类型的图像伪造方法中,复制-移动伪造(CMF)是最流行的一种伪造方法,它将图像的一部分复制粘贴到同一图像或不同的图像中。因此,伪造检测方法的发展已成为研究人员和从业人员关注的热点。本文提出了一种结合离散余弦变换(DCT)和最优参数双边滤波(OBF)的CMF方法来检测数字图像中的复制区域。将所提出的混合方法(DCT- obf)与传统的基于DCT的方法进行了视觉和定量比较。该方法在视觉和定量分析方面优于以往基于双边的方法和基于DCT的方法。此外,针对图像模糊和对比度调整等不同的后处理攻击,与传统的基于块的方法进行了比较。定量比较表明,该方法优于传统的基于块的方法,特别是对于后处理图像。对于模糊后处理图像,该方法比先前基于块的方法提供了更高的精度(提高18%),F1分数(提高13%)和召回率(提高5%)。
{"title":"DCT and Optimum Parameter Bilateral Filtering-Based Copy-Move Forgery Detection","authors":"Ugur Kilic, Nur Hüseym Kaplan, I. Aksakallı, I. Erer","doi":"10.1109/UBMK52708.2021.9558898","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558898","url":null,"abstract":"A digital image can be easily manipulated in today’s rapidly boosting technology. Among different types of image forgery methods, Copy-move forgery (CMF) is one of the most popular forgery methods in which a part of the image is copied and pasted into the same image or a different image. Therefore, the development of forgery detection methods has become a hot topic for both researchers and practitioners. In this study, a new CMF method combined with Discrete Cosine Transform (DCT) and optimum parameter Bilateral Filtering (OBF) is proposed to detect copied areas in a digital image. The visual and quantitative comparisons of the proposed hybrid method (DCT-OBF) have been made with traditional DCT based methods. The proposed method outperformed the former bilateral based method as well as the DCT based methods in terms of visual and quantitative analysis. Moreover, comparisons with conventional block-based methods have been carried out for different post-processing attacks such as image blurring and contrast adjustment. Quantitative comparisons demonstrate that the proposed method is better than the conventional block based methods, especially for post-processed images. For blurring post-processed images, the proposed method have provided higher Precision (18% improvement), F1 score (13% improvement), and Recall (5% improvement) rates than the former block based methods.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115669696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning Steganography with a Strip Transform 用条带变换学习隐写
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558892
Elmira Daiyrbayeva, A. Yerimbetova, Zhanbolat Maratov, A. Toigozhinova, M. Sambetbayeva
This article is devoted to the issues of steganography, i.e., secure data transmission using an image. The introductory part of the article gives a definition of the concept of steganography, and also describes the use of steganography in graphic images. In this paper, the aim of the researchers is to transfer textual data using an image object using a strip transformation method. The main part of the article shows the results obtained during the experimental work and describes the process of obtaining the results.
本文专门讨论隐写术的问题,即使用图像进行安全数据传输。文章的引言部分给出了隐写术概念的定义,并描述了隐写术在图形图像中的应用。在本文中,研究人员的目的是使用条带变换方法对图像对象进行文本数据的传输。文章的主体部分展示了实验工作中得到的结果,并描述了得到结果的过程。
{"title":"Learning Steganography with a Strip Transform","authors":"Elmira Daiyrbayeva, A. Yerimbetova, Zhanbolat Maratov, A. Toigozhinova, M. Sambetbayeva","doi":"10.1109/UBMK52708.2021.9558892","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558892","url":null,"abstract":"This article is devoted to the issues of steganography, i.e., secure data transmission using an image. The introductory part of the article gives a definition of the concept of steganography, and also describes the use of steganography in graphic images. In this paper, the aim of the researchers is to transfer textual data using an image object using a strip transformation method. The main part of the article shows the results obtained during the experimental work and describes the process of obtaining the results.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115873171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of the Social Media Impact on the Popularity of Crypto-currencies 社交媒体对加密货币普及的影响分析
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558921
Serkan Savaş
The use of social media, which is among the most basic purposes of internet use, has also begun to shape people’s investment tools and investment styles. As a result of increasing interest in recent years, thousands of crypto-currencies have been put into use. Investors invest in these currencies through personal research and referrals. Social media sites, on the other hand, have taken their place among the most effective tools in directing people’s investments in this regard. For this reason, in this study, 10 crypto-currencies with a high market value were determined and people’s reactions on social media were examined. More than 1 million Tweet data were obtained from Twitter with the determined keywords and these data were analyzed by frequency analysis method. In the study, the guidance and manipulation findings of crypto-currencies over social media were also mentioned and the results of the study were explained. Suggestions for areas where the study could be expanded were also made.
社交媒体的使用是互联网使用的最基本目的之一,它也开始塑造人们的投资工具和投资风格。近年来,由于人们对加密货币的兴趣日益浓厚,数千种加密货币已经投入使用。投资者通过个人研究和推荐来投资这些货币。另一方面,社交媒体网站已经成为指导人们在这方面投资的最有效工具之一。因此,在本研究中,我们确定了10种具有较高市场价值的加密货币,并研究了人们在社交媒体上的反应。利用所确定的关键词从Twitter上获取了100多万条Tweet数据,并对这些数据进行了频率分析法分析。在研究中还提到了加密货币在社交媒体上的引导和操纵发现,并对研究结果进行了解释。还就可以扩大这项研究的领域提出了建议。
{"title":"Analysis of the Social Media Impact on the Popularity of Crypto-currencies","authors":"Serkan Savaş","doi":"10.1109/UBMK52708.2021.9558921","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558921","url":null,"abstract":"The use of social media, which is among the most basic purposes of internet use, has also begun to shape people’s investment tools and investment styles. As a result of increasing interest in recent years, thousands of crypto-currencies have been put into use. Investors invest in these currencies through personal research and referrals. Social media sites, on the other hand, have taken their place among the most effective tools in directing people’s investments in this regard. For this reason, in this study, 10 crypto-currencies with a high market value were determined and people’s reactions on social media were examined. More than 1 million Tweet data were obtained from Twitter with the determined keywords and these data were analyzed by frequency analysis method. In the study, the guidance and manipulation findings of crypto-currencies over social media were also mentioned and the results of the study were explained. Suggestions for areas where the study could be expanded were also made.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131044531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mevzuat Verisetinde Soru Cevaplama Uygulamasi Question Answering Application on Legalisation Dataset 基于规范化数据集的维吾尔语问答技术研究
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558981
Meltem Çetiner, Ahmet Yıldırım, Cüneyt Öksüz, Bahadir Onay
Question Answering is a widely studied sub-field of Natural Language Processing (NLP). It studies information retrieval techniques that locate the answer in a corpus for a given query. Recently, deep learning techniques are widely employed in this field. This work uses a transfer learning method on Turkish Tax legislation documents. Experts in Tax-Law domain created 355 question-answer pairs in SQuAD 1.1 (Stanford Question Answering Dataset) format using law documents in UYAP (National Judiciary Informatics System). BERT (Bidirectional Encoder Representations from Transformers) contextual word embedding vectors are used to create a representation that can capture different meanings in word representations. Using both these embeddings and the model obtained from SQuAD 1.1 dataset, a system was deployed. Also, using the failing answers retrieved from the application of this model, a SQuAD 2.0 dataset were created that includes impossible-to-answer questions. New models were obtained by training with this dataset. Our observation is that the most successful model of SQuAD 2.0 dataset outperforms that of SQuAD 1.1 by 11% in exact matching measure and by 5% in F1.
问答是自然语言处理(NLP)中一个被广泛研究的分支领域。它研究了在语料库中定位给定查询的答案的信息检索技术。近年来,深度学习技术在该领域得到了广泛的应用。本研究采用迁移学习方法对土耳其税收立法文件进行研究。税法领域专家利用UYAP(国家司法信息系统)中的法律文件,创建了SQuAD 1.1(斯坦福问答数据集)格式的355对问答。BERT(来自变形器的双向编码器表示)上下文词嵌入向量用于创建可以捕获词表示中不同含义的表示。利用这些嵌入和从SQuAD 1.1数据集获得的模型,部署了一个系统。此外,使用从该模型的应用程序中检索到的失败答案,创建了SQuAD 2.0数据集,其中包括不可能回答的问题。利用该数据集进行训练,得到新的模型。我们的观察是,SQuAD 2.0数据集最成功的模型在精确匹配度量上优于SQuAD 1.1模型11%,在F1中优于5%。
{"title":"Mevzuat Verisetinde Soru Cevaplama Uygulamasi Question Answering Application on Legalisation Dataset","authors":"Meltem Çetiner, Ahmet Yıldırım, Cüneyt Öksüz, Bahadir Onay","doi":"10.1109/UBMK52708.2021.9558981","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558981","url":null,"abstract":"Question Answering is a widely studied sub-field of Natural Language Processing (NLP). It studies information retrieval techniques that locate the answer in a corpus for a given query. Recently, deep learning techniques are widely employed in this field. This work uses a transfer learning method on Turkish Tax legislation documents. Experts in Tax-Law domain created 355 question-answer pairs in SQuAD 1.1 (Stanford Question Answering Dataset) format using law documents in UYAP (National Judiciary Informatics System). BERT (Bidirectional Encoder Representations from Transformers) contextual word embedding vectors are used to create a representation that can capture different meanings in word representations. Using both these embeddings and the model obtained from SQuAD 1.1 dataset, a system was deployed. Also, using the failing answers retrieved from the application of this model, a SQuAD 2.0 dataset were created that includes impossible-to-answer questions. New models were obtained by training with this dataset. Our observation is that the most successful model of SQuAD 2.0 dataset outperforms that of SQuAD 1.1 by 11% in exact matching measure and by 5% in F1.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131609684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting TCP Flood DDoS Attack by Anomaly Detection based on Machine Learning Algorithms 基于机器学习算法的异常检测检测TCP Flood DDoS攻击
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558989
Berkay Özçam, H. Kilinç, A. Zaim
The comfort area created by the fact that people can access everything via the internet has led to an increase in the rate of internet use in recent years. The rise of concepts such as 5G, Internet of Things(IoT), Cloud/Edge/Fog Computing shows that this usage will increase day by day. While this increase brings convenience to humanity, it also increases the appetite of malicious people. Cyber attacks are increasing day by day and many individual or corporate users are harmed. In this study, it is aimed to detect Distributed Denial of Service(DDoS) attacks, which are the most common and most harmful of the bullying we mentioned. We focused on detecting TCP-Flood attacks, which is one of the most preferred DDoS attack types, using various machine learning algorithms. The part that made this job difficult and different was the targeting of real-time detection.
人们可以通过互联网访问一切,这一事实创造了舒适区,导致近年来互联网使用率的增加。5G、物联网(IoT)、云/边缘/雾计算等概念的兴起表明,这种使用将日益增加。这种增长在给人类带来便利的同时,也增加了恶意之人的胃口。网络攻击日益增多,许多个人或企业用户受到了伤害。在本研究中,它旨在检测分布式拒绝服务(DDoS)攻击,这是我们提到的欺凌中最常见和最有害的攻击。我们专注于检测TCP-Flood攻击,这是最受欢迎的DDoS攻击类型之一,使用各种机器学习算法。使这项工作变得困难和不同的部分是实时检测的目标。
{"title":"Detecting TCP Flood DDoS Attack by Anomaly Detection based on Machine Learning Algorithms","authors":"Berkay Özçam, H. Kilinç, A. Zaim","doi":"10.1109/UBMK52708.2021.9558989","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558989","url":null,"abstract":"The comfort area created by the fact that people can access everything via the internet has led to an increase in the rate of internet use in recent years. The rise of concepts such as 5G, Internet of Things(IoT), Cloud/Edge/Fog Computing shows that this usage will increase day by day. While this increase brings convenience to humanity, it also increases the appetite of malicious people. Cyber attacks are increasing day by day and many individual or corporate users are harmed. In this study, it is aimed to detect Distributed Denial of Service(DDoS) attacks, which are the most common and most harmful of the bullying we mentioned. We focused on detecting TCP-Flood attacks, which is one of the most preferred DDoS attack types, using various machine learning algorithms. The part that made this job difficult and different was the targeting of real-time detection.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124280288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2021 6th International Conference on Computer Science and Engineering (UBMK)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1