首页 > 最新文献

Sakarya University Journal of Computer and Information Sciences最新文献

英文 中文
A Curve Fitting Modelling Approach to Forecast Long-Term Electrical Energy Consumption: Case Study of Turkey 预测长期电能消耗的曲线拟合建模方法:以土耳其为例
Pub Date : 2021-08-31 DOI: 10.35377/saucis.04.02.953902
K. Ayan, Selim Seker, Abdal Kasule
{"title":"A Curve Fitting Modelling Approach to Forecast Long-Term Electrical Energy Consumption: Case Study of Turkey","authors":"K. Ayan, Selim Seker, Abdal Kasule","doi":"10.35377/saucis.04.02.953902","DOIUrl":"https://doi.org/10.35377/saucis.04.02.953902","url":null,"abstract":"","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133211381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experimental Analysis of Energy Efficient and QoS Aware Objective Functions for RPL Algorithm in IoT Networks 物联网网络中RPL算法节能与QoS感知目标函数实验分析
Pub Date : 2021-08-31 DOI: 10.35377/saucis.04.02.874860
Ferhat Arat, Sercan Demirci
The Internet of Things (IoT) refers to smart devices with limited resources that connect to the Internet and transmit data. Routing is an important process in this structure, which can be described as the general frame of wireless sensor networks (WSNs). The Routing Protocol for Low-Power and Lossy Networks (RPL) is recommended by the Internet Engineering Task Force (IETF) to provide communication in resource-constrained networks and is designed for routing in IoT. Basically, it is the Internet Protocol Version 6 (IPv6) protocol developed based on the energy consumed by devices. The algorithm has an important place in the performance of the IoT network. In this paper, the performance of the RPL under different objective functions (OFs) is examined. OFs are symbolized and defined by detailed equations. This study provides an experimental analysis of the RPL algorithm. An overview of the RPL algorithm is also included. Finally, the RPL algorithm is simulated by a custom simulator which is performing on the application layer, created using the Python programming language. The algorithm’s behaviour in terms of different OFs such as throughput maximization, energy efficiency maximization and energy consumption minimization was observed and the results were evaluated under different parameters such as packet size, number of nodes and different signal-to-noise ratio (SNR) values. Our experimental results may be useful for both researchers and practitioners working in related fields.
物联网(IoT)是指资源有限的智能设备连接到互联网并传输数据。路由是该结构中的一个重要过程,可以将其描述为无线传感器网络(WSNs)的总框架。低功耗和有损网络路由协议(RPL)是由互联网工程任务组(IETF)推荐的,用于在资源受限的网络中提供通信,并为物联网中的路由设计。基本上,它是根据设备消耗的能量开发的互联网协议版本6 (IPv6)协议。该算法在物联网网络的性能中占有重要地位。本文研究了在不同目标函数(OFs)下RPL的性能。OFs用详细的方程来表示和定义。本文对RPL算法进行了实验分析。还包括RPL算法的概述。最后,使用Python编程语言创建的自定义模拟器对RPL算法进行模拟,该模拟器在应用层上执行。观察了该算法在吞吐量最大化、能效最大化和能耗最小化等不同OFs下的行为,并在数据包大小、节点数量和不同信噪比(SNR)值等不同参数下对结果进行了评价。我们的实验结果对相关领域的研究人员和从业人员都有一定的参考价值。
{"title":"Experimental Analysis of Energy Efficient and QoS Aware Objective Functions for RPL Algorithm in IoT Networks","authors":"Ferhat Arat, Sercan Demirci","doi":"10.35377/saucis.04.02.874860","DOIUrl":"https://doi.org/10.35377/saucis.04.02.874860","url":null,"abstract":"The Internet of Things (IoT) refers to smart devices with limited resources that connect to the Internet and transmit data. Routing is an important process in this structure, which can be described as the general frame of wireless sensor networks (WSNs). The Routing Protocol for Low-Power and Lossy Networks (RPL) is recommended by the Internet Engineering Task Force (IETF) to provide communication in resource-constrained networks and is designed for routing in IoT. Basically, it is the Internet Protocol Version 6 (IPv6) protocol developed based on the energy consumed by devices. The algorithm has an important place in the performance of the IoT network. In this paper, the performance of the RPL under different objective functions (OFs) is examined. OFs are symbolized and defined by detailed equations. This study provides an experimental analysis of the RPL algorithm. An overview of the RPL algorithm is also included. Finally, the RPL algorithm is simulated by a custom simulator which is performing on the application layer, created using the Python programming language. The algorithm’s behaviour in terms of different OFs such as throughput maximization, energy efficiency maximization and energy consumption minimization was observed and the results were evaluated under different parameters such as packet size, number of nodes and different signal-to-noise ratio (SNR) values. Our experimental results may be useful for both researchers and practitioners working in related fields.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131730073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Secure Credit Card Storage System for E-Commerce 基于区块链的电子商务信用卡安全存储系统
Pub Date : 2021-08-31 DOI: 10.35377/saucis.04.02.895764
Ahmet Ali Süzen, Burhan Duman
Recently, serious damages have occurred in e-commerce applications due to rapidly increasing data leaks and end-user vulnerabilities. Although the source of the vulnerabilities is different, attacks result in the theft of unsafe data. In particular, the theft of credit card information reveals a financial loss. In this study, a blockchain-based secure storage model has been developed in order to prevent the theft of credit card information in e-commerce applications as a result of a possible data leak. In the sample e-commerce application developed with ASP.NET, data other than credit cards are stored. Credit card data is transmitted to the blockchain over the API with SSL protection in the e-commerce application. The blockchain model was developed using MongoDB with the BigchainDB framework. The data in each block of the blockchain is encrypted with Advanced Encryption Standard (AES) 256 bits. The data integrity of the block is provided by the SHA256 algorithm. it is aimed to protect credit card data from a possible data leak with the proposed BigchainDB-based blockchain model.
近年来,由于数据泄露和终端用户漏洞的迅速增加,电子商务应用遭受了严重的损害。虽然漏洞的来源不同,但攻击的结果都是窃取不安全的数据。特别是,信用卡信息被盗表明了经济损失。在这项研究中,开发了一种基于区块链的安全存储模型,以防止由于可能的数据泄露而导致电子商务应用中信用卡信息被盗。在使用ASP开发的示例电子商务应用程序中。NET存储信用卡以外的数据。信用卡数据在电子商务应用程序中通过带有SSL保护的API传输到区块链。区块链模型是使用MongoDB和BigchainDB框架开发的。每个区块链中的数据都采用256位AES (Advanced Encryption Standard)加密。该块的数据完整性由SHA256算法提供。它旨在保护信用卡数据免受基于bigchaindb的区块链模型可能出现的数据泄露。
{"title":"Blockchain-Based Secure Credit Card Storage System for E-Commerce","authors":"Ahmet Ali Süzen, Burhan Duman","doi":"10.35377/saucis.04.02.895764","DOIUrl":"https://doi.org/10.35377/saucis.04.02.895764","url":null,"abstract":"Recently, serious damages have occurred in e-commerce applications due to rapidly increasing data leaks and end-user vulnerabilities. Although the source of the vulnerabilities is different, attacks result in the theft of unsafe data. In particular, the theft of credit card information reveals a financial loss. In this study, a blockchain-based secure storage model has been developed in order to prevent the theft of credit card information in e-commerce applications as a result of a possible data leak. In the sample e-commerce application developed with ASP.NET, data other than credit cards are stored. Credit card data is transmitted to the blockchain over the API with SSL protection in the e-commerce application. The blockchain model was developed using MongoDB with the BigchainDB framework. The data in each block of the blockchain is encrypted with Advanced Encryption Standard (AES) 256 bits. The data integrity of the block is provided by the SHA256 algorithm. it is aimed to protect credit card data from a possible data leak with the proposed BigchainDB-based blockchain model.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128520274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deep Gated Recurrent Unit for Smartphone-Based Image Captioning 基于智能手机图像字幕的深门控循环单元
Pub Date : 2021-08-31 DOI: 10.35377/saucis.04.02.866409
V. Kılıç
{"title":"Deep Gated Recurrent Unit for Smartphone-Based Image Captioning","authors":"V. Kılıç","doi":"10.35377/saucis.04.02.866409","DOIUrl":"https://doi.org/10.35377/saucis.04.02.866409","url":null,"abstract":"","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116457640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Base Station Power Optimization for Green Networks Using Reinforcement Learning 基于强化学习的绿色网络基站功率优化
Pub Date : 2021-08-02 DOI: 10.35377/saucis.04.02.932709
Semih Aktaş, Hande Alemdar
The next generation mobile networks have to provide high data rates, extremely low latency, and support high connection density. To meet these requirements, the number of base stations will have to increase and this increase will lead to an energy consumption issue. Therefore “green” approaches to the network operation will gain importance. Reducing the energy consumption of base stations is essential for going green and also it helps service providers to reduce operational expenses. However, achieving energy savings without degrading the quality of service is a huge challenge. In order to address this issue, we propose a machine learning based intelligent solution that also incorporates a network simulator. We develop a reinforcement-based learning model by using deep deterministic policy gradient algorithm. Our model update frequently the policy of network switches in a way that, packet be forwarded to base stations with an optimized power level. The policies taken by the network controller are evaluated with a network simulator to ensure the energy consumption reduction and quality of service balance. The reinforcement learning model allows us to constantly learn and adapt to the changing situations in the dynamic network environment, hence having a more robust and realistic intelligent network management policy set. Our results demonstrate that energy efficiency can be enhanced by 32% and 67% in dense and sparse scenarios, respectively.
下一代移动网络必须提供高数据速率、极低延迟和支持高连接密度。为了满足这些要求,必须增加基站的数量,而这种增加将导致能源消耗问题。因此,“绿色”的网络运营方式将变得越来越重要。减少基站的能源消耗对于实现绿色环保至关重要,也有助于服务提供商减少运营费用。然而,在不降低服务质量的情况下实现节能是一个巨大的挑战。为了解决这个问题,我们提出了一个基于机器学习的智能解决方案,该解决方案还包含一个网络模拟器。我们利用深度确定性策略梯度算法建立了基于强化的学习模型。我们的模型经常更新网络交换机的策略,使数据包以优化的功率水平转发到基站。通过网络模拟器对网络控制器所采取的策略进行评估,以保证降低能耗和平衡服务质量。强化学习模型使我们能够在动态网络环境中不断学习和适应不断变化的情况,从而拥有更加鲁棒和现实的智能网络管理策略集。我们的研究结果表明,在密集和稀疏的场景下,能源效率可以分别提高32%和67%。
{"title":"Base Station Power Optimization for Green Networks Using Reinforcement Learning","authors":"Semih Aktaş, Hande Alemdar","doi":"10.35377/saucis.04.02.932709","DOIUrl":"https://doi.org/10.35377/saucis.04.02.932709","url":null,"abstract":"The next generation mobile networks have to provide high data rates, extremely low latency, and support high connection density. To meet these requirements, the number of base stations will have to increase and this increase will lead to an energy consumption issue. Therefore “green” approaches to the network operation will gain importance. Reducing the energy consumption of base stations is essential for going green and also it helps service providers to reduce operational expenses. However, achieving energy savings without degrading the quality of service is a huge challenge. In order to address this issue, we propose a machine learning based intelligent solution that also incorporates a network simulator. We develop a reinforcement-based learning model by using deep deterministic policy gradient algorithm. Our model update frequently the policy of network switches in a way that, packet be forwarded to base stations with an optimized power level. The policies taken by the network controller are evaluated with a network simulator to ensure the energy consumption reduction and quality of service balance. The reinforcement learning model allows us to constantly learn and adapt to the changing situations in the dynamic network environment, hence having a more robust and realistic intelligent network management policy set. Our results demonstrate that energy efficiency can be enhanced by 32% and 67% in dense and sparse scenarios, respectively.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126922278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electrical-Thermal-Mechanical Analysis of Cable Connection with Screw-Connected Terminal Strips Using Finite Element Method 用有限元法分析螺纹连接端子带电缆连接的电-热-力学特性
Pub Date : 2021-02-25 DOI: 10.35377/SAUCIS.04.01.763070
M. Tosun, H. Aksoy
Electric energy passes through many stages from production to usage, and many electrical connections take place at these stages. Electrical connections are quite important for system safety and electrical energy quality. In this study, current-temperature relationship in the cable was investigated in cable joints made with screw connection terminals, depending on torque applied to screw. In numerical solution of the problem, Comsol Multiphysics program based on Finite Element Method was used first, the screw-conductor interface was investigated based on applied torque, and then electrical-thermal analysis was performed on this geometry. Experimental studies were carried out to demonstrate accuracy of digital model, and conductors and terminals used in household installations were taken into account in these studies. Amount of deformation of conductors depending on torque applied to screw and its effect to current carrying capacity of these terminals having screw connection were investigated. In this study, the appropriate torque value is 0.4 Nm, and the maximum temperature value is 45 oC on contact surface. Also, it has been shown that the optimum torque value to be applied in the copper conductor cable joint with 1.5 mm2 cross section area is 0.4 Nm.
电能从生产到使用要经过许多阶段,在这些阶段发生许多电气连接。电气连接对系统安全和电能质量至关重要。在本研究中,研究了用螺钉连接端子制成的电缆接头中电流-温度随施加在螺钉上的扭矩的变化关系。在数值求解中,首先使用基于有限元的Comsol Multiphysics程序,基于外加扭矩对螺杆-导体界面进行了研究,然后对该几何形状进行了电-热分析。为了证明数字模型的准确性,进行了实验研究,并考虑了家用设备中使用的导体和端子。研究了螺纹上施加的转矩对导线变形量的影响及其对螺纹连接端子载流能力的影响。在本研究中,合适的扭矩值为0.4 Nm,接触面最高温度为45℃。结果表明,截面面积为1.5 mm2的铜导体电缆接头的最佳转矩值为0.4 Nm。
{"title":"Electrical-Thermal-Mechanical Analysis of Cable Connection with Screw-Connected Terminal Strips Using Finite Element Method","authors":"M. Tosun, H. Aksoy","doi":"10.35377/SAUCIS.04.01.763070","DOIUrl":"https://doi.org/10.35377/SAUCIS.04.01.763070","url":null,"abstract":"Electric energy passes through many stages from production to usage, and many electrical connections take place at these stages. Electrical connections are quite important for system safety and electrical energy quality. In this study, current-temperature relationship in the cable was investigated in cable joints made with screw connection terminals, depending on torque applied to screw. In numerical solution of the problem, Comsol Multiphysics program based on Finite Element Method was used first, the screw-conductor interface was investigated based on applied torque, and then electrical-thermal analysis was performed on this geometry. Experimental studies were carried out to demonstrate accuracy of digital model, and conductors and terminals used in household installations were taken into account in these studies. Amount of deformation of conductors depending on torque applied to screw and its effect to current carrying capacity of these terminals having screw connection were investigated. In this study, the appropriate torque value is 0.4 Nm, and the maximum temperature value is 45 oC on contact surface. Also, it has been shown that the optimum torque value to be applied in the copper conductor cable joint with 1.5 mm2 cross section area is 0.4 Nm.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133231301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determination Of The Critical Success Factors In Disaster Management Through The Text Mining Assisted Ahp Approach 通过文本挖掘辅助Ahp方法确定灾害管理中的关键成功因素
Pub Date : 2021-02-05 DOI: 10.35377/SAUCIS.04.01.863190
H. Cebeci, Y. Korkut
In the academic field and as well as the application field, substantial attention has been drawn to coping with disasters. Since natural dangers causing a large proportion of disasters cannot be avoided, attempts to combat disasters have centered on preventing hazards from evolving into disasters through measures and restructuring works taken before, during, and after the disaster. There are many players involved in the disaster management process and many factors are influential in the effectiveness of this process. Among these factors, deciding the critical ones offers significant advantages, particularly in terms of practical studies. Concentrating on a single stakeholder in deciding the factors crucial to the success of this management structure, which has many stakeholders, can cause to ignoring the significant viewpoints of other stakeholder groups. Accordingly, for the evaluation of several success factors achieved as a result of a thorough and systematic literature review, the purpose of our study is to develop a common critical success factor model that will represent both the viewpoints of operational experts and academic experts, who constitute the stakeholders of this domain. Analytical Hierarchy Process (AHP) is utilized to determine the opinions of field experts while the text mining method was used to determine the perspectives of academics. In the study, therefore, a new AHP model assisted by text mining is introduced. Socio-cultural factors were brought to light by the analysis results of the suggested model. It has been determined by the results of the study that these two perspectives are overlapped largely in the organizational field and relatively in socio-cultural, environmental, and legal fields.
无论是在学术领域还是在应用领域,应对灾害都受到了极大的关注。由于造成很大比例灾害的自然危险是无法避免的,因此抗灾努力的重点是通过在灾害发生之前、期间和之后采取的措施和改组工作,防止灾害演变为灾害。灾害管理过程涉及许多参与者,许多因素对这一过程的有效性有影响。在这些因素中,确定关键因素具有显著的优势,特别是在实际研究方面。在决定对这种管理结构(它有许多利益相关者)的成功至关重要的因素时,将注意力集中在单个利益相关者身上,可能会导致忽视其他利益相关者群体的重要观点。因此,为了评估通过全面和系统的文献综述而获得的几个成功因素,我们研究的目的是开发一个共同的关键成功因素模型,该模型将代表构成该领域利益相关者的运营专家和学术专家的观点。采用层次分析法(AHP)确定领域专家的意见,采用文本挖掘法确定学者的观点。因此,本文引入了一种新的文本挖掘辅助AHP模型。建议模型的分析结果揭示了社会文化因素。研究结果表明,这两种观点在组织领域有很大的重叠,在社会文化、环境和法律领域也有相对的重叠。
{"title":"Determination Of The Critical Success Factors In Disaster Management Through The Text Mining Assisted Ahp Approach","authors":"H. Cebeci, Y. Korkut","doi":"10.35377/SAUCIS.04.01.863190","DOIUrl":"https://doi.org/10.35377/SAUCIS.04.01.863190","url":null,"abstract":"In the academic field and as well as the application field, substantial attention has been drawn to coping with disasters. Since natural dangers causing a large proportion of disasters cannot be avoided, attempts to combat disasters have centered on preventing hazards from evolving into disasters through measures and restructuring works taken before, during, and after the disaster. There are many players involved in the disaster management process and many factors are influential in the effectiveness of this process. Among these factors, deciding the critical ones offers significant advantages, particularly in terms of practical studies. Concentrating on a single stakeholder in deciding the factors crucial to the success of this management structure, which has many stakeholders, can cause to ignoring the significant viewpoints of other stakeholder groups. Accordingly, for the evaluation of several success factors achieved as a result of a thorough and systematic literature review, the purpose of our study is to develop a common critical success factor model that will represent both the viewpoints of operational experts and academic experts, who constitute the stakeholders of this domain. Analytical Hierarchy Process (AHP) is utilized to determine the opinions of field experts while the text mining method was used to determine the perspectives of academics. In the study, therefore, a new AHP model assisted by text mining is introduced. Socio-cultural factors were brought to light by the analysis results of the suggested model. It has been determined by the results of the study that these two perspectives are overlapped largely in the organizational field and relatively in socio-cultural, environmental, and legal fields.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129200244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Implementation of Blockchain Based Single Sign-On Authentication System for Web Applications 基于区块链的Web应用单点登录认证系统设计与实现
Pub Date : 2020-12-30 DOI: 10.35377/saucis.03.03.757459
Mustafa Tanrıverdi
Today, many services are provided through web applications and the number of these applications is increasing rapidly. Nowadays, most users use their username and password to login to web applications. Many of these users also use the same login information in different applications. This causes a major security vulnerability for applications and users. As a solution to these weaknesses in the field of authentication, there have been many developments in recent years. Some of these studies have been third party identity authentication systems like Google and Facebook. Since this method also contains potential risks, studies have been conducted on the TwoFactor Authentication (2FA) method for more security. In parallel with the innovations that emerge every day, methods should be used in the field of authentication. In these times, blockchain technology offers solutions that make life easier in many areas thanks to its distributed, transparent, secure and immutable structure. In this study, blockchain based single sign-on (SSO) authentication system was developed and implemented for web applications. In this system, a public address and a private key are defined on the private blockchain network for users and this information is used for the 2FA method through the developed mobile application. Detailed information was given about the proposed system and technologies used in the study.
今天,许多服务都是通过web应用程序提供的,并且这些应用程序的数量正在迅速增加。如今,大多数用户使用用户名和密码登录web应用程序。这些用户中的许多人还在不同的应用程序中使用相同的登录信息。这会给应用程序和用户带来严重的安全漏洞。为了解决这些问题,近年来在身份验证领域取得了许多进展。其中一些研究是第三方身份认证系统,如谷歌和Facebook。由于这种方法也存在潜在的风险,为了提高安全性,人们研究了双因素认证(two - factor Authentication, 2FA)方法。与每天出现的创新并行,应该在身份验证领域使用方法。在这个时代,区块链技术提供了解决方案,由于其分布式、透明、安全和不可变的结构,使许多领域的生活变得更容易。本研究针对web应用开发并实现了基于区块链的单点登录(SSO)认证系统。在该系统中,在私有区块链网络上为用户定义一个公共地址和一个私钥,并通过开发的移动应用程序将这些信息用于2FA方法。详细介绍了拟议的系统和研究中使用的技术。
{"title":"Design and Implementation of Blockchain Based Single Sign-On Authentication System for Web Applications","authors":"Mustafa Tanrıverdi","doi":"10.35377/saucis.03.03.757459","DOIUrl":"https://doi.org/10.35377/saucis.03.03.757459","url":null,"abstract":"Today, many services are provided through web applications and the number of these applications is increasing rapidly. Nowadays, most users use their username and password to login to web applications. Many of these users also use the same login information in different applications. This causes a major security vulnerability for applications and users. As a solution to these weaknesses in the field of authentication, there have been many developments in recent years. Some of these studies have been third party identity authentication systems like Google and Facebook. Since this method also contains potential risks, studies have been conducted on the TwoFactor Authentication (2FA) method for more security. In parallel with the innovations that emerge every day, methods should be used in the field of authentication. In these times, blockchain technology offers solutions that make life easier in many areas thanks to its distributed, transparent, secure and immutable structure. In this study, blockchain based single sign-on (SSO) authentication system was developed and implemented for web applications. In this system, a public address and a private key are defined on the private blockchain network for users and this information is used for the 2FA method through the developed mobile application. Detailed information was given about the proposed system and technologies used in the study.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117321936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Term Weighting for Spam SMS Filtering 垃圾短信过滤中的词权研究
Pub Date : 2020-12-30 DOI: 10.35377/saucis.03.03.735463
Turgut Dogan
Due to rapid development of the technology, the usage of mobile telephones and short message services (SMS) have become widespread. Thus, the number of spam SMS messages has dramatically increased and the significance of identifying and filtering of suchlike messages raised. Moreover, since they have also risk to steal users’ personal information; the problem of identifying and filtering of Spam SMS messages stays popular in terms of also information and data security. In this study, the classification performances of five different term weighting methods on three different datasets containing SMS messages categorized as Spam and legitimate are compared by using two classifiers for corresponding problem. The results obtained showed that reasonable weighting of SMS contents plays an important role in identifying of spam SMS messages. On the other hand, it can be expressed that real classification potential of term weighting schemes reflected betterly the with feature vectors created by using fifty and higher number of terms on especially Turkish and English SMS message datasets. In addition, it has been observed that value ranges of the classification results of obtained from term weighting methods on Turkish SMS message dataset is wider for than ones obtained in English SMS message datasets.
由于技术的快速发展,移动电话和短信服务(SMS)的使用已经变得普遍。因此,垃圾短信的数量急剧增加,识别和过滤此类短信的重要性也随之提高。此外,由于他们也有窃取用户个人信息的风险;识别和过滤垃圾短信的问题在信息和数据安全方面仍然很受欢迎。在本研究中,通过使用两个分类器对相应问题进行分类,比较了五种不同的词加权方法在包含垃圾短信和合法短信的三种不同数据集上的分类性能。结果表明,合理的短信内容权重对识别垃圾短信具有重要作用。另一方面,在土耳其语和英语短信数据集上,术语加权方案的真实分类潜力更好地反映了使用50个及以上数量的术语创建的特征向量。此外,我们还观察到,在土耳其语短信数据集上使用术语加权方法得到的分类结果的取值范围比在英语短信数据集上得到的分类结果的取值范围更宽。
{"title":"On Term Weighting for Spam SMS Filtering","authors":"Turgut Dogan","doi":"10.35377/saucis.03.03.735463","DOIUrl":"https://doi.org/10.35377/saucis.03.03.735463","url":null,"abstract":"Due to rapid development of the technology, the usage of mobile telephones and short message services (SMS) have become widespread. Thus, the number of spam SMS messages has dramatically increased and the significance of identifying and filtering of suchlike messages raised. Moreover, since they have also risk to steal users’ personal information; the problem of identifying and filtering of Spam SMS messages stays popular in terms of also information and data security. In this study, the classification performances of five different term weighting methods on three different datasets containing SMS messages categorized as Spam and legitimate are compared by using two classifiers for corresponding problem. The results obtained showed that reasonable weighting of SMS contents plays an important role in identifying of spam SMS messages. On the other hand, it can be expressed that real classification potential of term weighting schemes reflected betterly the with feature vectors created by using fifty and higher number of terms on especially Turkish and English SMS message datasets. In addition, it has been observed that value ranges of the classification results of obtained from term weighting methods on Turkish SMS message dataset is wider for than ones obtained in English SMS message datasets.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116684719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Hybrid Filter Approach for Image Processing 一种新的图像处理混合滤波方法
Pub Date : 2020-12-30 DOI: 10.35377/saucis.03.03.785749
B. Aksoy, O. Salman
Today, with the rapidly advancing technology, the importance of image processing techniques is increasing. Image processing is used in many areas from facial recognition to plant disease identification. One of the important image processing stages is the filtering stage used for smoothing images and object detection. Among these filtering techniques, basic filtering techniques such as mean, median and Gaussian are used in image processing. However, these filtering techniques are known to be insufficient to achieve the desired results in some cases. In this study, a new hybrid filtering approach named Mean-Median-Gaussian (MMG) is presented using these three basic filtering techniques. It has been demonstrated that the obtained MMG hybrid algorithm gives more successful results than these three basic filtering techniques in smoothing the images and determining the boundary lines.
在科技飞速发展的今天,图像处理技术的重要性与日俱增。从人脸识别到植物病害鉴定,图像处理在许多领域都有应用。其中一个重要的图像处理阶段是滤波阶段,用于平滑图像和目标检测。在这些滤波技术中,在图像处理中使用了均值、中值和高斯等基本滤波技术。然而,在某些情况下,这些过滤技术不足以达到预期的结果。在本研究中,利用这三种基本滤波技术,提出了一种新的混合滤波方法——均值-中值-高斯滤波(MMG)。结果表明,所得到的MMG混合算法在平滑图像和确定边界线方面比这三种基本滤波技术取得了更好的效果。
{"title":"A New Hybrid Filter Approach for Image Processing","authors":"B. Aksoy, O. Salman","doi":"10.35377/saucis.03.03.785749","DOIUrl":"https://doi.org/10.35377/saucis.03.03.785749","url":null,"abstract":"Today, with the rapidly advancing technology, the importance of image processing techniques is increasing. Image processing is used in many areas from facial recognition to plant disease identification. One of the important image processing stages is the filtering stage used for smoothing images and object detection. Among these filtering techniques, basic filtering techniques such as mean, median and Gaussian are used in image processing. However, these filtering techniques are known to be insufficient to achieve the desired results in some cases. In this study, a new hybrid filtering approach named Mean-Median-Gaussian (MMG) is presented using these three basic filtering techniques. It has been demonstrated that the obtained MMG hybrid algorithm gives more successful results than these three basic filtering techniques in smoothing the images and determining the boundary lines.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"27 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132089403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Sakarya University Journal of Computer and Information Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1