Pub Date : 2022-11-30DOI: 10.35377/saucis...1200151
Doğangün Kocaoğlu, Korhan Turgut, M. Z. Konyar
Stock price prediction is an important topic for investors and companies. The increasing effect of machine learning methods in every field also applies to stock forecasting. In this study, it is aimed to predict the future prices of the stocks of companies in different sectors traded on the Borsa Istanbul (BIST) 30 Index. For the study, the data of two companies selected as examples from each of the holding, white goods, petrochemical, iron and steel, transportation and communication sectors were analyzed. In the study, in addition to the share analysis of the sectors, the price prediction performances of the machine learning algorithm on a sectoral basis were examined. For these tests, XGBoost, Support Vector Machines (SVM), K-nearest neighbors (KNN) and Random Forest (RF) algorithms were used. The obtained results were analyzed with mean absolute error (MAE), mean absolute percent error (MAPE), mean squared error (MSE), and R2 correlation metrics. The best estimations on a sectoral basis were made for companies in the Iron and Steel and Petroleum field. One of the most important innovations in the study is the examination of the effect of current macro changes on the forecasting model. As an example, the effect of the changes in the Central Bank Governors, which took place three times in the 5-year period, on the forecast was investigated. The results showed that the unpredictable effects on the policies after the change of Governors also negatively affected the forecast performance
{"title":"Sector-Based Stock Price Prediction with Machine Learning Models","authors":"Doğangün Kocaoğlu, Korhan Turgut, M. Z. Konyar","doi":"10.35377/saucis...1200151","DOIUrl":"https://doi.org/10.35377/saucis...1200151","url":null,"abstract":"Stock price prediction is an important topic for investors and companies. The increasing effect of machine learning methods in every field also applies to stock forecasting. In this study, it is aimed to predict the future prices of the stocks of companies in different sectors traded on the Borsa Istanbul (BIST) 30 Index. For the study, the data of two companies selected as examples from each of the holding, white goods, petrochemical, iron and steel, transportation and communication sectors were analyzed. In the study, in addition to the share analysis of the sectors, the price prediction performances of the machine learning algorithm on a sectoral basis were examined. For these tests, XGBoost, Support Vector Machines (SVM), K-nearest neighbors (KNN) and Random Forest (RF) algorithms were used. The obtained results were analyzed with mean absolute error (MAE), mean absolute percent error (MAPE), mean squared error (MSE), and R2 correlation metrics. The best estimations on a sectoral basis were made for companies in the Iron and Steel and Petroleum field. One of the most important innovations in the study is the examination of the effect of current macro changes on the forecasting model. As an example, the effect of the changes in the Central Bank Governors, which took place three times in the 5-year period, on the forecast was investigated. The results showed that the unpredictable effects on the policies after the change of Governors also negatively affected the forecast performance","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115121788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-30DOI: 10.35377/saucis...1197119
Emel Soylu
Malaria is a disease caused by a parasite. The parasite is transmitted to humans through the bite of infected mosquitoes. Thousands of people die every year due to malaria. When this disease is diagnosed early, it can be fully treated with medication. Diagnosis of malaria can be made according to the presence of parasites in the blood taken from the patient. In this study, malaria detection and diagnosis study were performed using The Malaria dataset containing a total of 27,558 cell images with samples of equally parasitized and uninfected cells from thin blood smear slide images of segmented cells. It is possible to detect malaria from microscopic blood smear images via modern deep learning techniques. In this study, 5 of the popular convolutional neural network architectures for malaria detection from cell images were retrained to find the best combination of architecture and learning algorithm. AlexNet, GoogLeNet, ResNet-50, MobileNet-v2, VGG-16 architectures from pre-trained networks were used, their hyperparameters were adjusted and their performances were compared. In this study, a maximum 96.53% accuracy rate was achieved with MobileNet-v2 architecture using the adam learning algorithm
{"title":"A Deep Transfer Learning-Based Comparative Study for Detection of Malaria Disease","authors":"Emel Soylu","doi":"10.35377/saucis...1197119","DOIUrl":"https://doi.org/10.35377/saucis...1197119","url":null,"abstract":"Malaria is a disease caused by a parasite. The parasite is transmitted to humans through the bite of infected mosquitoes. Thousands of people die every year due to malaria. When this disease is diagnosed early, it can be fully treated with medication. Diagnosis of malaria can be made according to the presence of parasites in the blood taken from the patient. In this study, malaria detection and diagnosis study were performed using The Malaria dataset containing a total of 27,558 cell images with samples of equally parasitized and uninfected cells from thin blood smear slide images of segmented cells. It is possible to detect malaria from microscopic blood smear images via modern deep learning techniques. In this study, 5 of the popular convolutional neural network architectures for malaria detection from cell images were retrained to find the best combination of architecture and learning algorithm. AlexNet, GoogLeNet, ResNet-50, MobileNet-v2, VGG-16 architectures from pre-trained networks were used, their hyperparameters were adjusted and their performances were compared. In this study, a maximum 96.53% accuracy rate was achieved with MobileNet-v2 architecture using the adam learning algorithm","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130565519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-22DOI: 10.35377/saucis...1173791
A. Zengin, Waseem Hamdoon
For studying operational and organizational systems, modeling and simulation tools are becoming increasingly relevant. It is possible to build a lot of systems and study their behavior, which saves a lot of effort, time, and cost, where it cannot or difficult to study its behavior in the real world. There are many frameworks to implement modeling and simulation using a computer. in this paper DEVS-Suite for discrete events is used to implement a simulation of cargo unloading problem which represents a study on estimating the optimal number of trucks and cranes required in process of unloading goods and according to some determinants. The duration of the simulation is one month which is equivalent to 43,200 minutes. Based on the performance measures that were adopted in this study, the optimal number of trucks and cranes is 5 out of three assumptions of 3, 5, and 10, where the work will be in a permanent state of work and high productivity.
{"title":"Simulation of Cargo Unloading Problem: A Case study on estimating the optimal number of trucks and cranes","authors":"A. Zengin, Waseem Hamdoon","doi":"10.35377/saucis...1173791","DOIUrl":"https://doi.org/10.35377/saucis...1173791","url":null,"abstract":"For studying operational and organizational systems, modeling and simulation tools are becoming increasingly relevant. It is possible to build a lot of systems and study their behavior, which saves a lot of effort, time, and cost, where it cannot or difficult to study its behavior in the real world. There are many frameworks to implement modeling and simulation using a computer. in this paper DEVS-Suite for discrete events is used to implement a simulation of cargo unloading problem which represents a study on estimating the optimal number of trucks and cranes required in process of unloading goods and according to some determinants. The duration of the simulation is one month which is equivalent to 43,200 minutes. Based on the performance measures that were adopted in this study, the optimal number of trucks and cranes is 5 out of three assumptions of 3, 5, and 10, where the work will be in a permanent state of work and high productivity.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133732546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-22DOI: 10.35377/saucis...1196381
Mahmut Nedim Alpdemi̇r
Robust Autoencoders separate the input image into a Signal(L) and a Noise(S) part which, intuitively speaking, roughly corresponds to a more stable background scene (L) and an undesired anomaly (or defect) (S). This property of the method provides a convenient theoretical basis for divorcing intermittent anomalies that happen to clutter a relatively consistent background image. In this paper, we illustrate the use of Robust Deep Convolutional Autoencoders (RDCAE) for defect detection, via a pseudo-supervised training process. Our method introduces synthetic simulated defects (or structured noise) to the training process, that alleviates the scarcity of true (real-life) anomalous samples. As such, we offer a pseudo-supervised training process to devise a well-defined mechanism for deciding that the defect-normal discrimination capability of the autoencoders has reached to an acceptable point at training time. The experiment results illustrate that pseudo supervised Robust Deep Convolutional Autoencoders are very effective in identifying surface defects in an efficient way, compared to state of the art anomaly detection methods.
{"title":"Pseudo-Supervised Defect Detection Using Robust Deep Convolutional Autoencoders","authors":"Mahmut Nedim Alpdemi̇r","doi":"10.35377/saucis...1196381","DOIUrl":"https://doi.org/10.35377/saucis...1196381","url":null,"abstract":"Robust Autoencoders separate the input image into a Signal(L) and a Noise(S) part which, intuitively speaking, roughly corresponds to a more stable background scene (L) and an undesired anomaly (or defect) (S). This property of the method provides a convenient theoretical basis for divorcing intermittent anomalies that happen to clutter a relatively consistent background image. In this paper, we illustrate the use of Robust Deep Convolutional Autoencoders (RDCAE) for defect detection, via a pseudo-supervised training process. Our method introduces synthetic simulated defects (or structured noise) to the training process, that alleviates the scarcity of true (real-life) anomalous samples. As such, we offer a pseudo-supervised training process to devise a well-defined mechanism for deciding that the defect-normal discrimination capability of the autoencoders has reached to an acceptable point at training time. The experiment results illustrate that pseudo supervised Robust Deep Convolutional Autoencoders are very effective in identifying surface defects in an efficient way, compared to state of the art anomaly detection methods.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116817552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-21DOI: 10.35377/saucis...1121830
Tolga Kuyucuk, Levent Çallı
This study investigates how cargo companies, with a significant market share in Turkey's service sector, managed their last-mile activities during the Covid-19 outbreak and suggests the solution to the adverse outcomes. The data used in the study included complaints made for cargo companies from an online complaint management website called sikayetvar.com from the start of the pandemic to the date of the research, which contained words related to the pandemic and was collected using Python language and the Scrapy module web scraping methods. Multilabel classification algorithms were used to categorize complaints based on assessments of training data obtained according to the topics. Results showed that parcel delivery-related themes were the most often complained about, and a considerable portion were delay issues.
{"title":"Using Multi-Label Classification Methods to Analyze Complaints Against Cargo Services During the COVID-19 Outbreak: Comparing Survey-Based and Word-Based Labeling","authors":"Tolga Kuyucuk, Levent Çallı","doi":"10.35377/saucis...1121830","DOIUrl":"https://doi.org/10.35377/saucis...1121830","url":null,"abstract":"This study investigates how cargo companies, with a significant market share in Turkey's service sector, managed their last-mile activities during the Covid-19 outbreak and suggests the solution to the adverse outcomes. The data used in the study included complaints made for cargo companies from an online complaint management website called sikayetvar.com from the start of the pandemic to the date of the research, which contained words related to the pandemic and was collected using Python language and the Scrapy module web scraping methods. Multilabel classification algorithms were used to categorize complaints based on assessments of training data obtained according to the topics. Results showed that parcel delivery-related themes were the most often complained about, and a considerable portion were delay issues.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133381506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-18DOI: 10.35377/saucis...1122506
Hakan Üstünel
Parabolic blending (PB) is one of the important topics in applied mathematics and computer graphics. The use of generalized parabolic blending (GPB) for different scenarios adds flexibility to the polynomial. Overhauser (OVR) elements is a special case in GPB (r=0.5, s=0.5). GPB can also be used in estimation. In this study, data obtained from thickness distribution of a 3mm thick high impact polystyrene product after thermoforming using a mold was used for data estimation. For this purpose, software has been developed. The software development steps and formula usages are explained. Using the developed software, polynomials for GPB and default PB (OVR) were created. The data set was compared with the y values produced by the polynomials for certain x values. At the end of the research, it was determined that the results obtained from the GPB were 0.1728 percent more accurate than the data obtained from the PB for the default values.
{"title":"Software Development for the Use of Generalized Parabolic Blending in Data Prediction Processes","authors":"Hakan Üstünel","doi":"10.35377/saucis...1122506","DOIUrl":"https://doi.org/10.35377/saucis...1122506","url":null,"abstract":"Parabolic blending (PB) is one of the important topics in applied mathematics and computer graphics. The use of generalized parabolic blending (GPB) for different scenarios adds flexibility to the polynomial. Overhauser (OVR) elements is a special case in GPB (r=0.5, s=0.5). GPB can also be used in estimation. In this study, data obtained from thickness distribution of a 3mm thick high impact polystyrene product after thermoforming using a mold was used for data estimation. For this purpose, software has been developed. The software development steps and formula usages are explained. Using the developed software, polynomials for GPB and default PB (OVR) were created. The data set was compared with the y values produced by the polynomials for certain x values. At the end of the research, it was determined that the results obtained from the GPB were 0.1728 percent more accurate than the data obtained from the PB for the default values.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114226824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-17DOI: 10.35377/saucis...1134293
Yuksel Yurtay
Process mining in manufacturing is a newly expanding field of research in the application of data mining and machine learning techniques and the focus of business processes. Although it is an exciting subject of the recent past and business processes, sufficient research has not been done. Decision support systems such as enterprise resource planning, customer relationship management, and management information systems store the most valuable resource data of process details and event logs. In the advanced information systems of tomorrow, the process management, analysis, and modelling functions of modern enterprises will take their place as a necessity. As a requirement, the fundamental purpose of process mining in production is to refine data from event logs, automatically create process models, compare models with event logs, and improve and make development continuous. Our work is to contribute to application and research studies by drawing attention to process mining in the context of production. It is based on the literature review and primary stages of business process mining publications in the last decade with a production focus. An overview is discussed as a roadmap for future research with meaningful results.
{"title":"Process Mining in Manufacturing: A Literature Review","authors":"Yuksel Yurtay","doi":"10.35377/saucis...1134293","DOIUrl":"https://doi.org/10.35377/saucis...1134293","url":null,"abstract":"Process mining in manufacturing is a newly expanding field of research in the application of data mining and machine learning techniques and the focus of business processes. Although it is an exciting subject of the recent past and business processes, sufficient research has not been done. Decision support systems such as enterprise resource planning, customer relationship management, and management information systems store the most valuable resource data of process details and event logs. In the advanced information systems of tomorrow, the process management, analysis, and modelling functions of modern enterprises will take their place as a necessity. As a requirement, the fundamental purpose of process mining in production is to refine data from event logs, automatically create process models, compare models with event logs, and improve and make development continuous. Our work is to contribute to application and research studies by drawing attention to process mining in the context of production. It is based on the literature review and primary stages of business process mining publications in the last decade with a production focus. An overview is discussed as a roadmap for future research with meaningful results.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128210443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.35377/saucis...1191850
Seda Nur Gülocak, Bihter Das
In genomic signal processing applications, digitization of these signals is needed to process and analyze DNA signals. In the digitization process, the mapping technique to be chosen greatly affects the performance of the system for the genomic domain to be studied. The purpose of this review is to analyze how numerical mapping techniques used in digitizing DNA sequences affect performance in genomic studies. For this purpose, all digital coding techniques presented in the literature in the studies conducted in the last 10 years have been examined, and the numerical representations of these techniques are given in a sample DNA sequence. In addition, the frequency of use of these coding techniques in four popular genomic areas such as exon region identification, exon-intron classification, phylogenetic analysis, gene detection, and the min-max range of the performances obtained by using these techniques in that area are also given. This study is thought to be a guide for researchers who want to work in the field of bioinformatics.
{"title":"The Effect of Numerical Mapping Techniques on Performance in Genomic Research","authors":"Seda Nur Gülocak, Bihter Das","doi":"10.35377/saucis...1191850","DOIUrl":"https://doi.org/10.35377/saucis...1191850","url":null,"abstract":"In genomic signal processing applications, digitization of these signals is needed to process and analyze DNA signals. In the digitization process, the mapping technique to be chosen greatly affects the performance of the system for the genomic domain to be studied. The purpose of this review is to analyze how numerical mapping techniques used in digitizing DNA sequences affect performance in genomic studies. For this purpose, all digital coding techniques presented in the literature in the studies conducted in the last 10 years have been examined, and the numerical representations of these techniques are given in a sample DNA sequence. In addition, the frequency of use of these coding techniques in four popular genomic areas such as exon region identification, exon-intron classification, phylogenetic analysis, gene detection, and the min-max range of the performances obtained by using these techniques in that area are also given. This study is thought to be a guide for researchers who want to work in the field of bioinformatics.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121718316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-24DOI: 10.35377/saucis...1175613
B. A. Tosunoglu, C. Koçak
Vehicular Ad-Hoc Networks (VANET) is anticipated to be the most effective way of increasing performance and safety in transportation in the near future. VANETs are the sub-branch of Ad-Hoc Networks which provide safety and comfort features together with related services for the vehicle operators. RREQ flood attack mostly encountered in the literature for security of VANET. Due to the nature of the reactive protocols, the AODV routing protocol is quite open to attack types such as flood attack. Flood attacks occur in the network layer. The impact of flood attacks is not about victim nodes, it can be also affect the whole network. A malicious attack that could be carried out in VANET could cause accidents that would cause a serious disaster. A malicious node could penetrate into the IP addresses on a Flood Attack based User Datagram Protocol (UDP) to breakdown the data communication between two vehicles. The main purpose of this paper is to detect and prevent the flood attack, during the operation of the routing protocol and to decrease the end-to-end delay on the network.
{"title":"FA-AODV: Flooding Attacks Detection Based Ad Hoc On-Demand Distance Vector Routing Protocol for VANET","authors":"B. A. Tosunoglu, C. Koçak","doi":"10.35377/saucis...1175613","DOIUrl":"https://doi.org/10.35377/saucis...1175613","url":null,"abstract":"Vehicular Ad-Hoc Networks (VANET) is anticipated to be the most effective way of increasing performance and safety in transportation in the near future. VANETs are the sub-branch of Ad-Hoc Networks which provide safety and comfort features together with related services for the vehicle operators. RREQ flood attack mostly encountered in the literature for security of VANET. Due to the nature of the reactive protocols, the AODV routing protocol is quite open to attack types such as flood attack. Flood attacks occur in the network layer. The impact of flood attacks is not about victim nodes, it can be also affect the whole network. A malicious attack that could be carried out in VANET could cause accidents that would cause a serious disaster. A malicious node could penetrate into the IP addresses on a Flood Attack based User Datagram Protocol (UDP) to breakdown the data communication between two vehicles. The main purpose of this paper is to detect and prevent the flood attack, during the operation of the routing protocol and to decrease the end-to-end delay on the network.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130490707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-11DOI: 10.35377/saucis...1084024
Huseyin Parmaksiz, C. Karakuzu
The Internet of Things (IoT) concept is widely used today. As IoT becomes more widely adopted, the number of devices communicating wirelessly (using various communication standards) grows. Due to resource constraints, customized security measures are not possible on IoT devices. As a result, security is becoming increasingly important in IoT. It is proposed in this study to use the physical layer properties of wireless signals as an effective method of increasing IoT security. According to the literature, radio frequency (RF) fingerprinting (RFF) techniques are used as an additional layer of security for wireless devices. To prevent spoofing or spoofing attacks, unique fingerprints appear to be used to identify wireless devices for security purposes (due to manufacturing defects in the devices' analog components). To overcome the difficulties in RFF, different parts of the transmitted signals (transient/preamble/steady-state) are used. This review provides an overview of the most recent RFF technique developments. It discusses various solution methods as well as the challenges that researchers face when developing effective RFFs. It takes a step towards the discovery of the wireless world in this context by drawing attention to the existence of software-defined radios (SDR) for signal capture. It also demonstrates how and what features can be extracted from captured RF signals from various wireless communication devices. All of these approaches' methodologies, classification algorithms, and feature classification are explained. In addition, this study discusses how deep learning, neural networks, and machine learning algorithms, in addition to traditional classifiers, can be used. Furthermore, the review gives researchers easy access to sample datasets in this field.
{"title":"A Review of Recent Developments on Secure Authentication Using RF Fingerprints Techniques","authors":"Huseyin Parmaksiz, C. Karakuzu","doi":"10.35377/saucis...1084024","DOIUrl":"https://doi.org/10.35377/saucis...1084024","url":null,"abstract":"The Internet of Things (IoT) concept is widely used today. As IoT becomes more widely adopted, the number of devices communicating wirelessly (using various communication standards) grows. Due to resource constraints, customized security measures are not possible on IoT devices. As a result, security is becoming increasingly important in IoT. It is proposed in this study to use the physical layer properties of wireless signals as an effective method of increasing IoT security. According to the literature, radio frequency (RF) fingerprinting (RFF) techniques are used as an additional layer of security for wireless devices. To prevent spoofing or spoofing attacks, unique fingerprints appear to be used to identify wireless devices for security purposes (due to manufacturing defects in the devices' analog components). To overcome the difficulties in RFF, different parts of the transmitted signals (transient/preamble/steady-state) are used. \u0000This review provides an overview of the most recent RFF technique developments. It discusses various solution methods as well as the challenges that researchers face when developing effective RFFs. It takes a step towards the discovery of the wireless world in this context by drawing attention to the existence of software-defined radios (SDR) for signal capture. It also demonstrates how and what features can be extracted from captured RF signals from various wireless communication devices. All of these approaches' methodologies, classification algorithms, and feature classification are explained. \u0000In addition, this study discusses how deep learning, neural networks, and machine learning algorithms, in addition to traditional classifiers, can be used. Furthermore, the review gives researchers easy access to sample datasets in this field.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130785361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}