首页 > 最新文献

2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)最新文献

英文 中文
Speed Control of DC Motor Using Improved Sine Cosine Algorithm Based PID Controller 基于改进正弦余弦算法的PID控制器的直流电动机速度控制
Serdar Ekinci, B. Hekimoğlu, A. Demirören, Erdal Eker
Direct current (DC) motors that convert electrical energy into mechanical energy are used in almost every field of industry. Therefore, speed control of DC motor is very important and for this purpose generally proportional + integral + derivative (PID) controllers are preferred. In this study, it is aimed to improve the speed response of DC motor by designing a PID controller tuned by improved sine cosine algorithm (ISCA), namely the ISCA-PID controller. Unlike the original SCA and other meta-heuristic algorithms, the ISCA technique has balanced exploration and exploitation processes. The performance of the proposed ISCA-PID controller was compared with two current approaches in the literature in terms of transient response, frequency response and disturbance load response analyzes. The results of these analyzes confirmed the stability of the proposed ISCA-PID controller and its success in suppressing the disturbance loads.
将电能转化为机械能的直流电机几乎应用于工业的各个领域。因此,直流电机的速度控制是非常重要的,为此,通常比例+积分+导数(PID)控制器是首选。本研究旨在通过设计一种采用改进正弦余弦算法(ISCA)调谐的PID控制器,即ISCA-PID控制器,来提高直流电动机的速度响应。与最初的SCA和其他元启发式算法不同,ISCA技术具有平衡的探索和利用过程。在暂态响应、频率响应和干扰负载响应分析方面,将所提出的ISCA-PID控制器的性能与文献中现有的两种方法进行了比较。分析结果证实了所提出的ISCA-PID控制器的稳定性,并成功地抑制了干扰负载。
{"title":"Speed Control of DC Motor Using Improved Sine Cosine Algorithm Based PID Controller","authors":"Serdar Ekinci, B. Hekimoğlu, A. Demirören, Erdal Eker","doi":"10.1109/ISMSIT.2019.8932907","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932907","url":null,"abstract":"Direct current (DC) motors that convert electrical energy into mechanical energy are used in almost every field of industry. Therefore, speed control of DC motor is very important and for this purpose generally proportional + integral + derivative (PID) controllers are preferred. In this study, it is aimed to improve the speed response of DC motor by designing a PID controller tuned by improved sine cosine algorithm (ISCA), namely the ISCA-PID controller. Unlike the original SCA and other meta-heuristic algorithms, the ISCA technique has balanced exploration and exploitation processes. The performance of the proposed ISCA-PID controller was compared with two current approaches in the literature in terms of transient response, frequency response and disturbance load response analyzes. The results of these analyzes confirmed the stability of the proposed ISCA-PID controller and its success in suppressing the disturbance loads.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123923002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Image based guidance for near rendezvous and docking of spacecraft 基于图像的航天器近交会对接制导
Harun Çelik
Autonomous, energy saving and survivable systems are crucial for space related systems in order to achieve sustainable goals. In such systems, instead of a single method, alternative and ancillary methods are required to be used to accomplish space missions successfully, and increase independency of operating systems. In this paper, an image based alternative guidance method is investigated. Hence, independent from radio signaling, spacecraft is able to track the target station as soon as the station is detected by the camera which is mounted on spacecraft. Proposed method can be applied purely at near rendezvous phase and docking since the range of camera is constrained. A camera projection model is derived to estimate relative motion of spacecraft by camera parameters. Smooth approach, collision avoidance and energy saving would be achieved by means of the approaching strategy improved by using this image based method.
自主、节能和可生存的系统对于实现可持续目标的空间相关系统至关重要。在这样的系统中,为了成功完成太空任务,需要使用替代和辅助方法,而不是单一的方法,并增加操作系统的独立性。本文研究了一种基于图像的备选制导方法。因此,独立于无线电信号,航天器能够跟踪目标站,只要站是由安装在航天器上的相机检测到。由于摄像机的距离是有限的,所以该方法可以完全应用于近交会阶段和对接阶段。推导了利用摄像机参数估计航天器相对运动的摄像机投影模型。利用该方法改进的逼近策略可以达到平滑逼近、避免碰撞和节能的目的。
{"title":"Image based guidance for near rendezvous and docking of spacecraft","authors":"Harun Çelik","doi":"10.1109/ISMSIT.2019.8932816","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932816","url":null,"abstract":"Autonomous, energy saving and survivable systems are crucial for space related systems in order to achieve sustainable goals. In such systems, instead of a single method, alternative and ancillary methods are required to be used to accomplish space missions successfully, and increase independency of operating systems. In this paper, an image based alternative guidance method is investigated. Hence, independent from radio signaling, spacecraft is able to track the target station as soon as the station is detected by the camera which is mounted on spacecraft. Proposed method can be applied purely at near rendezvous phase and docking since the range of camera is constrained. A camera projection model is derived to estimate relative motion of spacecraft by camera parameters. Smooth approach, collision avoidance and energy saving would be achieved by means of the approaching strategy improved by using this image based method.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"402 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123199784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open-Source Web-Based Software for Performing Permutation Tests 用于执行排列测试的基于web的开源软件
Z. Tunç, Şeyma Yaşar, C. Colak
In this study, it is aimed to develop a new user-friendly web-based software which can overcome the difficulties of use due to the limitations in the use stages of parametric and non-parametric tests and can easily use the permutation tests which can be used as an alternative to these tests.Shiny, an open-source R package, is used to develop the recommended web software. In the developed software, by selecting "the Specify Sample Number" tab, the number of samples presented as "Single", "Two" and "More than two" options is selected and analyzes are made by selecting the appropriate data set from the file upload menu.In this study, in order to show the way the software works and to evaluate its outputs, a data set containing 1000 observations with the standard normal distribution of variables consisting of two variables was used. "Two Dependent Sample Permutation Tests" were selected to analyze whether there was any difference between the variables. According to the results, no statistically significant difference was found between the variables.The developed software is a new user-friendly web-based software that can be used to perform the permutation tests in an easy way as an alternative to parametric and non-parametric tests.
本研究旨在开发一种新的用户友好的基于web的软件,该软件可以克服由于参数测试和非参数测试在使用阶段的限制而导致的使用困难,并且可以轻松地使用可作为这些测试替代的排列测试。Shiny是一个开源的R包,用于开发推荐的web软件。在开发的软件中,通过选择“指定样本数量”选项卡,可以选择“单个”、“两个”和“两个以上”的样本数量,并在文件上传菜单中选择相应的数据集进行分析。在本研究中,为了展示软件的工作方式并评估其输出,使用了包含1000个观测值的数据集,其中包含由两个变量组成的变量的标准正态分布。选择“两个相关样本排列检验”来分析变量之间是否存在差异。结果显示,各变量间无统计学差异。所开发的软件是一种新的用户友好的基于web的软件,可用于执行排列测试,以一种简单的方式作为参数和非参数测试的替代方案。
{"title":"Open-Source Web-Based Software for Performing Permutation Tests","authors":"Z. Tunç, Şeyma Yaşar, C. Colak","doi":"10.1109/ISMSIT.2019.8932946","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932946","url":null,"abstract":"In this study, it is aimed to develop a new user-friendly web-based software which can overcome the difficulties of use due to the limitations in the use stages of parametric and non-parametric tests and can easily use the permutation tests which can be used as an alternative to these tests.Shiny, an open-source R package, is used to develop the recommended web software. In the developed software, by selecting \"the Specify Sample Number\" tab, the number of samples presented as \"Single\", \"Two\" and \"More than two\" options is selected and analyzes are made by selecting the appropriate data set from the file upload menu.In this study, in order to show the way the software works and to evaluate its outputs, a data set containing 1000 observations with the standard normal distribution of variables consisting of two variables was used. \"Two Dependent Sample Permutation Tests\" were selected to analyze whether there was any difference between the variables. According to the results, no statistically significant difference was found between the variables.The developed software is a new user-friendly web-based software that can be used to perform the permutation tests in an easy way as an alternative to parametric and non-parametric tests.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114067747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perimeter Network Security Solutions: A Survey 周界网络安全解决方案:调查
Goksel Uctu, M. Alkan, I. Dogru, Murat Dörterler
Technically, cyber security requires a combination of various engineering disciplines. Ensuring security also requires a multi-disciplinary and multi-layered structure. Similar to OSI or TCP / IP models, which form the basis of network technologies, security should be provided in each layer that creates cyber space. These are perimeter network security, internal network security, endpoint security, data security, policy management and operations. In this study, current peripheral cyber security solutions are discussed; the use of these technologies, their working methods, their development and their future trends have been demonstrated.
从技术上讲,网络安全需要各种工程学科的结合。确保安全也需要一个多学科、多层次的结构。与构成网络技术基础的OSI或TCP / IP模型类似,应该在创建网络空间的每一层提供安全性。这些是外围网络安全、内部网络安全、端点安全、数据安全、策略管理和操作。在本研究中,讨论了当前的外围网络安全解决方案;介绍了这些技术的使用、工作方法、发展和未来趋势。
{"title":"Perimeter Network Security Solutions: A Survey","authors":"Goksel Uctu, M. Alkan, I. Dogru, Murat Dörterler","doi":"10.1109/ISMSIT.2019.8932821","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932821","url":null,"abstract":"Technically, cyber security requires a combination of various engineering disciplines. Ensuring security also requires a multi-disciplinary and multi-layered structure. Similar to OSI or TCP / IP models, which form the basis of network technologies, security should be provided in each layer that creates cyber space. These are perimeter network security, internal network security, endpoint security, data security, policy management and operations. In this study, current peripheral cyber security solutions are discussed; the use of these technologies, their working methods, their development and their future trends have been demonstrated.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114854139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Comparison of Phase-Shifted Carrier PWM Techniques on Cascaded H-Bridge Multilevel Inverters with Unequal DC Voltages 非等直流电压级联h桥多电平逆变器移相载波PWM技术的性能比较
F. Eroǧlu, M. Kurtoglu, A. O. Arslan, Ahmet Mete Vural
In this paper, a comparison of phase-shifted carrier PWM (PSC-PWM) techniques on a three-phase CHB-MLI is presented. First, principles of three different PSC-PWM techniques are investigated in detail in terms of their PWM generations and frequency spectrums. Then, total harmonic distortion and magnitude of the fundamental frequency component parameters are observed for different PSC-PWM techniques on a three-phase CHB-MLI with equal and unequal DC voltages for all phase and line voltages as well as line current.
本文介绍了三相CHB-MLI上相移载波PWM (PSC-PWM)技术的比较。首先,详细研究了三种不同的PSC-PWM技术的原理,包括它们的PWM产生和频谱。然后,在三相CHB-MLI上观察了不同PSC-PWM技术在所有相位和线路电压以及线路电流相等和不相等直流电压下的总谐波畸变和基频分量参数的幅值。
{"title":"Performance Comparison of Phase-Shifted Carrier PWM Techniques on Cascaded H-Bridge Multilevel Inverters with Unequal DC Voltages","authors":"F. Eroǧlu, M. Kurtoglu, A. O. Arslan, Ahmet Mete Vural","doi":"10.1109/ISMSIT.2019.8932903","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932903","url":null,"abstract":"In this paper, a comparison of phase-shifted carrier PWM (PSC-PWM) techniques on a three-phase CHB-MLI is presented. First, principles of three different PSC-PWM techniques are investigated in detail in terms of their PWM generations and frequency spectrums. Then, total harmonic distortion and magnitude of the fundamental frequency component parameters are observed for different PSC-PWM techniques on a three-phase CHB-MLI with equal and unequal DC voltages for all phase and line voltages as well as line current.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129975820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification and Success Investigation of Biomedical Data Sets Using Supervised Machine Learning Models 使用监督机器学习模型的生物医学数据集分类和成功研究
Sarmad N. Mohammed, Mehmet Serdar Guzel, E. Bostanci
Nowadays, information technologies are used in almost every field of Computer Science and Engineering. One of the most used areas is the health sector. With the use of digital hospital systems, patient data is now stored in a computerized environment, thereby creating biomedical data sets. These datasets, which are very large in size, are very difficult to analyze and interpret by a human. The machine learning algorithms are mainly used to analyze and interpreted these data sets. In this study, the performances of 5 machine learning algorithms have been compared by employing 5 different biomedical data sets and the results obtained were compared statistically. Results reveal that the KNN algorithm performs better for small biomedical data sets, whereas the ANN algorithm performs better for large data sets in terms of classification problem for the health sector.
如今,信息技术几乎应用于计算机科学与工程的各个领域。使用最多的领域之一是卫生部门。随着数字医院系统的使用,患者数据现在存储在计算机化的环境中,从而创建生物医学数据集。这些数据集规模非常大,很难由人类来分析和解释。机器学习算法主要用于分析和解释这些数据集。在本研究中,利用5个不同的生物医学数据集,比较了5种机器学习算法的性能,并对得到的结果进行了统计比较。结果表明,就卫生部门的分类问题而言,KNN算法在小型生物医学数据集上表现更好,而ANN算法在大型数据集上表现更好。
{"title":"Classification and Success Investigation of Biomedical Data Sets Using Supervised Machine Learning Models","authors":"Sarmad N. Mohammed, Mehmet Serdar Guzel, E. Bostanci","doi":"10.1109/ISMSIT.2019.8932734","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932734","url":null,"abstract":"Nowadays, information technologies are used in almost every field of Computer Science and Engineering. One of the most used areas is the health sector. With the use of digital hospital systems, patient data is now stored in a computerized environment, thereby creating biomedical data sets. These datasets, which are very large in size, are very difficult to analyze and interpret by a human. The machine learning algorithms are mainly used to analyze and interpreted these data sets. In this study, the performances of 5 machine learning algorithms have been compared by employing 5 different biomedical data sets and the results obtained were compared statistically. Results reveal that the KNN algorithm performs better for small biomedical data sets, whereas the ANN algorithm performs better for large data sets in terms of classification problem for the health sector.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130261414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sentence Classification with Deep Learning Method For Virtual Assistant Applications 基于深度学习方法的句子分类虚拟助手应用
Gurur Pi̇rana, A. Sertbas, T. Ensari
This paper investigates three different deep learning method performance for virtual assistant applications about sentence classification. The classification is based in Turkish texts. For three different model we demonstrate the performance of each model. We investigate Convolutional Neural Network (CNN), Region Convolutional Neural Network (RCNN) and Long Short Term Memory (LSTM) deep learning methods and compare the accuracy results of the related models. Furthermore, we aim to select the best classification model for our dataset.We have researched effect of the hyper parameters to model accuracy and we used best hyper parameters for each methods and we aimed to gain best performance for our dataset.This resarch helps applications like virtual assistant with classification of the sentence and giving the output of the class. The output of classification could be a text, image or document. Benefit of this comparsion of the methods we realized that instance number increses the model accuracy. The best method for our dataset was the Convolutional Neural Networks (CNN) with the %87.3 accuracy.
本文研究了三种不同的深度学习方法在句子分类虚拟助手应用中的性能。分类是基于土耳其文本。对于三个不同的模型,我们演示了每个模型的性能。我们研究了卷积神经网络(CNN)、区域卷积神经网络(RCNN)和长短期记忆(LSTM)深度学习方法,并比较了相关模型的准确率结果。此外,我们的目标是为我们的数据集选择最佳的分类模型。我们研究了超参数对模型精度的影响,并对每种方法使用最佳的超参数,以获得最佳的数据集性能。这项研究有助于虚拟助手等应用程序对句子进行分类并给出分类的输出。分类的输出可以是文本、图像或文档。通过对这些方法的比较,我们发现实例数增加了模型的精度。对于我们的数据集,最好的方法是卷积神经网络(CNN),准确率为%87.3。
{"title":"Sentence Classification with Deep Learning Method For Virtual Assistant Applications","authors":"Gurur Pi̇rana, A. Sertbas, T. Ensari","doi":"10.1109/ISMSIT.2019.8932888","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932888","url":null,"abstract":"This paper investigates three different deep learning method performance for virtual assistant applications about sentence classification. The classification is based in Turkish texts. For three different model we demonstrate the performance of each model. We investigate Convolutional Neural Network (CNN), Region Convolutional Neural Network (RCNN) and Long Short Term Memory (LSTM) deep learning methods and compare the accuracy results of the related models. Furthermore, we aim to select the best classification model for our dataset.We have researched effect of the hyper parameters to model accuracy and we used best hyper parameters for each methods and we aimed to gain best performance for our dataset.This resarch helps applications like virtual assistant with classification of the sentence and giving the output of the class. The output of classification could be a text, image or document. Benefit of this comparsion of the methods we realized that instance number increses the model accuracy. The best method for our dataset was the Convolutional Neural Networks (CNN) with the %87.3 accuracy.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129406339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network Anomaly Detection System using Genetic Algorithm, Feature Selection and Classification 网络异常检测系统采用遗传算法、特征选择和分类
Elif Uysal, Gülnur Demircioğlu, Gulsade Kale, E. Bostanci, M. Güzel, Sarmad N. Mohammed
Networks are dangerous environments with containing numerous security vulnerabilities and those vulnerabilities are likely to be used while attacking systems with the intent of stealing valuable information or stopping the services. A system should be protected from already-known types of attacks and also have ability to detect unknown types of attacks to prevent abduction of the information. Unknown types of attacks may give harm to the system by stopping the services that runs effective and stable. For that purpose, it has become necessary to develop a flexible and adaptable system which can collect instant data from the network, distinguish between harmless and harmful behaviors and take measures against them. The main goal of this work is to explain a network anomaly detection system that is developed using genetic algorithm and Weka classification features to fulfill the purposes stated above. The Genetic Algorithm is used to generate various individuals with the aim of determining which attributes of the individual are providing a better result about learning the behavioral pattern of the network traffic. Furthermore, Weka classifiers are applied to the train and test datasets to calculate the best fitness value, and to decide on individual's attributes that are more effective about finding the anomaly occurring in a given instant.
网络是包含大量安全漏洞的危险环境,这些漏洞很可能被用来攻击系统,目的是窃取有价值的信息或停止服务。应该保护系统免受已知类型的攻击,并能够检测未知类型的攻击,以防止信息被绑架。未知类型的攻击可能会对系统造成危害,使有效稳定运行的业务中断。为此目的,必须发展一种灵活和适应性强的系统,能够从网络收集即时数据,区分无害和有害的行为,并对其采取措施。本工作的主要目标是解释使用遗传算法和Weka分类特征开发的网络异常检测系统,以实现上述目的。遗传算法用于生成各种个体,目的是确定个体的哪些属性对学习网络流量的行为模式提供更好的结果。此外,Weka分类器被应用于训练和测试数据集,以计算最佳适应度值,并决定个体的属性更有效地发现在给定时刻发生的异常。
{"title":"Network Anomaly Detection System using Genetic Algorithm, Feature Selection and Classification","authors":"Elif Uysal, Gülnur Demircioğlu, Gulsade Kale, E. Bostanci, M. Güzel, Sarmad N. Mohammed","doi":"10.1109/ISMSIT.2019.8932750","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932750","url":null,"abstract":"Networks are dangerous environments with containing numerous security vulnerabilities and those vulnerabilities are likely to be used while attacking systems with the intent of stealing valuable information or stopping the services. A system should be protected from already-known types of attacks and also have ability to detect unknown types of attacks to prevent abduction of the information. Unknown types of attacks may give harm to the system by stopping the services that runs effective and stable. For that purpose, it has become necessary to develop a flexible and adaptable system which can collect instant data from the network, distinguish between harmless and harmful behaviors and take measures against them. The main goal of this work is to explain a network anomaly detection system that is developed using genetic algorithm and Weka classification features to fulfill the purposes stated above. The Genetic Algorithm is used to generate various individuals with the aim of determining which attributes of the individual are providing a better result about learning the behavioral pattern of the network traffic. Furthermore, Weka classifiers are applied to the train and test datasets to calculate the best fitness value, and to decide on individual's attributes that are more effective about finding the anomaly occurring in a given instant.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132814548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey on Keyword and Key Phrase Extraction with Deep Learning 基于深度学习的关键词和关键短语提取研究综述
Özlem Kilic, Aydın Çetin
With the technological developments, a large amount of data has been produced. Tera bytes of data previously recorded by manpower were digitized with the use of personal computers. As a result, rapidly growing data stacks were formed, making it difficult to find information among these unanticipated data. The need to make sense of this data has made predefined statistical methods more important. It is possible to access the required information from a single document or from the document stacks by means of text mining methods. This problem, which was previously solved mostly by statistical methods or Natural Language Processing (NLP) techniques, has been started to be solved by machine learning algorithms and artificial neural networks. In recent years, deep learning, which is a specialized study area of artificial neural networks, gives better results than the current statistical and NLP methods in many problems and has provided the application of these methods in problems such as machine translation, keyword extraction and summarizing. In this study, deep learning methods used in the extraction of keywords and key phrases are examined.
随着技术的发展,产生了大量的数据。使用个人电脑,将以往由人力记录的七千个字节的数据数字化。结果,形成了快速增长的数据堆栈,使得很难在这些未预料到的数据中找到信息。理解这些数据的需要使得预定义的统计方法变得更加重要。通过文本挖掘方法,可以从单个文档或从文档堆栈中访问所需的信息。这个问题以前主要是通过统计方法或自然语言处理(NLP)技术来解决的,现在已经开始通过机器学习算法和人工神经网络来解决。近年来,深度学习作为人工神经网络的一个专门研究领域,在许多问题上取得了比目前的统计和NLP方法更好的结果,并为这些方法在机器翻译、关键词提取和总结等问题上提供了应用。在本研究中,深度学习方法用于提取关键字和关键短语。
{"title":"A Survey on Keyword and Key Phrase Extraction with Deep Learning","authors":"Özlem Kilic, Aydın Çetin","doi":"10.1109/ISMSIT.2019.8932811","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932811","url":null,"abstract":"With the technological developments, a large amount of data has been produced. Tera bytes of data previously recorded by manpower were digitized with the use of personal computers. As a result, rapidly growing data stacks were formed, making it difficult to find information among these unanticipated data. The need to make sense of this data has made predefined statistical methods more important. It is possible to access the required information from a single document or from the document stacks by means of text mining methods. This problem, which was previously solved mostly by statistical methods or Natural Language Processing (NLP) techniques, has been started to be solved by machine learning algorithms and artificial neural networks. In recent years, deep learning, which is a specialized study area of artificial neural networks, gives better results than the current statistical and NLP methods in many problems and has provided the application of these methods in problems such as machine translation, keyword extraction and summarizing. In this study, deep learning methods used in the extraction of keywords and key phrases are examined.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128883830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Keratinocyte Carcinoma Detection via Convolutional Neural Networks 角化细胞癌的卷积神经网络检测
Ali Serener, Sertan Serte
Skin cancer is the most prevalent form of cancer. Melanoma and non-melanoma, also known as keratinocyte carcinoma, skin cancers have frequent occurrence although melanoma skin cancer is known to be more deadly. Still, keratinocyte carcinoma skin cancers are encountered with higher frequency and come with more numerous types than melanoma. In this paper, an automated method is used to detect the frequently occurring keratinocyte carcinoma skin cancer. The method is based on deep learning, where AlexNet, ResNet-18, and ResNet-50 architectures are employed to classify common malignant pigmented skin lesion images as belonging to basal cell carcinoma, squamous cell carcinoma or keratinocyte carcinoma. A public archive of skin images is used to test and validate the success of the deep learning methods employed. The results show that ResNet-50 architecture gives the best detection results where for keratinocyte carcinoma detection the area under the receiver operating characteristic curve performance of it is 0.80.
皮肤癌是最常见的癌症。黑色素瘤和非黑色素瘤,也被称为角化细胞癌,皮肤癌经常发生,尽管黑色素瘤皮肤癌已知更致命。尽管如此,与黑色素瘤相比,角化细胞癌皮肤癌的发病率更高,类型也更多。本文采用一种自动化的方法检测频繁发生的角质细胞癌皮肤癌。该方法基于深度学习,采用AlexNet、ResNet-18和ResNet-50架构对常见的恶性色素皮肤病变图像进行分类,分别属于基底细胞癌、鳞状细胞癌和角化细胞癌。皮肤图像的公共档案用于测试和验证所采用的深度学习方法的成功。结果表明,ResNet-50体系结构的检测效果最好,对于角化细胞癌的检测,其接收机工作特征曲线下的面积性能为0.80。
{"title":"Keratinocyte Carcinoma Detection via Convolutional Neural Networks","authors":"Ali Serener, Sertan Serte","doi":"10.1109/ISMSIT.2019.8932828","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932828","url":null,"abstract":"Skin cancer is the most prevalent form of cancer. Melanoma and non-melanoma, also known as keratinocyte carcinoma, skin cancers have frequent occurrence although melanoma skin cancer is known to be more deadly. Still, keratinocyte carcinoma skin cancers are encountered with higher frequency and come with more numerous types than melanoma. In this paper, an automated method is used to detect the frequently occurring keratinocyte carcinoma skin cancer. The method is based on deep learning, where AlexNet, ResNet-18, and ResNet-50 architectures are employed to classify common malignant pigmented skin lesion images as belonging to basal cell carcinoma, squamous cell carcinoma or keratinocyte carcinoma. A public archive of skin images is used to test and validate the success of the deep learning methods employed. The results show that ResNet-50 architecture gives the best detection results where for keratinocyte carcinoma detection the area under the receiver operating characteristic curve performance of it is 0.80.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114395128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1