6th WORLD CONFERENCE ON INNOVATION AND COMPUTER SCIENCE (INSODE-2016)

Limak Limra Hotel Convention Center Kemer, Antalya – 12-14 May 2016

ABSTRACTS BOOK

Sponsors , Turkey Middlesex University, UK , Turkey Islamic Azad University, Iran Gaziosmanpasa University, TR , North Cyprus University of Kyrenia, North Cyprus Manchester Metropolitan University, UK Bucharest University (Academy) of Economic Studies, RO Global Journal of Business, Economics & Managements

Organization Association for Human, Science, Nature, Education and Technology Academic World Education and Research Center - A non-profit international organization www.awer-center.org

ORGANIZING COMMITTEE INSODE – 2016 Chair

Prof. Dr. Doğan Ibrahim,

Near East University, North Cyprus Co-chair

Assoc. Prof. Dr. Özcan Asilkan

Akdeniz University, Turkey Conference Committee Members

Prof. Dr. Ergun Gide, CQUniversity Sydney, Australia

Prof. Dr. Mehmet Karamanoglu, Middlesex University, UK

Assoc. Prof. Dr. Adem Karahoca, Bahcesehir University, Turkey

Assist. Prof. Dr. Aslıhan Tüfekçi, Gazi University, Turkey

Assist. Prof. Dr. Mentor Hamidi, South East European University, Macedonia

Dr. Ahmet Yücel, Bahcesehir University, Turkey Secretariat

Aras Arifoğlu

Essex University, UK [email protected]

II

International Scientific Committee

Adem Karahoca, Bahcesehir University, Turkey Alex James, Indian Institute of Information Technology and Management Kerala, India Ali Amiri, University of Zanjan, Iran Ali Hennache, Al-Imam Muhammad Ibn Saud Islamic University, Kingdom of Saudi Arabia Ali Hussain Mohammed, Sri Sai Madhavi Institute of Science & Technology, India Ana Loureiro, Polytechnics Institute of Santarem, Portugal Angel Garrido, UNED, Spain Ayhan Gün, Dumlupinar University, Turkey Balasubramanian, A.C. Tech Campus, Anna University, India Benhabib Karim, University de Picardie Jules Verne, France Bernard De Baets, Ghent University, Belgium Branko Kaučič, University of Ljubljana, Slovenia Cosmina Ivan, Technical University of Cluj, Romania Dianne M. Murray, Computer-Human Interaction, UK Dogan Ibrahim, Near East University, North Cyprus Eddie YK Ng, Nanyang Technological University, Singapore Ergun Gide, CQUniversity Sydney, Australia Fahrettin Sadıkoğlu, Near East University, North Cyprus Fezile Özdamlı, Near East University, North Cyprus Gabriela Grosseck, University of the West Timisoara, Romania Gerhard Ritter, University of Florida, USA Gregorio Hernandez-Zamora, National University of Mexico, Mexico Hafize Keser, , Turkey Hany F. EL Yamany, Suez Canal University, Egypt Huseyin Uzunboylu, Near East University, North Cyprus Jaba Shelia, Anna University, India Jack Dongarra, University of Tennessee, USA Jacques Bahi, University of Franche-Comte, France James C. Crabbe, University of Bedfordshire, UK Süleyman Demokan, Bahcesehir University, Turkey Mehmet Erdem, University of Nevada, USA Mehmet Karamanoglu, Middlesex University. UK Meltem Özturan, Bogazici University, Turkey Mohammad S. Obaidat, Monmouth University, USA Mohammad Yarmohammadian, Isfahan University of Medical Sciences, Iran Murat Tezer, Near East University, North Cyprus Mustafa İlkan, Eastern Mediterranean University, North Cyprus Nadia Tahernia Islamic Azad University, Iran Nadire Çavuş, Near East University, North Cyprus Nizamettin Aydın, Yıldız Technical University, Turkey Orhan Okcol, Bahcesehir University, Turkey Oya Kalıpsız, Yıldız Technical University, Turkey Ramkumar Jaganathan, VLB Janakiammal College of Arts and Science, India Rozhan M. Idrus, University Sains, Malaysia Sanjay K. Dhurandher, Netaji Subash Institute of Technology, India Selçuk Öğrenci, , Turkey Sevinç Gülseçen, University, Turkey Simon Vogl, Studio Pervasive Computing Applications, Austria Svec Peter, Constantine the Philospher University in Nitre, Slovakia Wibowo Santoso, Central Queensland University, Australia Zulkhairi Dahalin, University of Utara, Malaysia III

ABSTRACTS

The Buying Behavior of Smartphones among Students from Eastern Mediterranean University in North Cyprus

Selira Kotoua, Eastern Mediterranean University, Turkey

Abstract

The aim of this study is to target buying behavior of smart mobile phones by students from Eastern Mediterranean University. A conceptual research model has been designed to investigate the social influences, effect of convenience, social needs in relation to Eastern Mediterranean University students’ dependency on smartphones to buy tourism products and how this determines future buying behavior. This paper identifies students emerging and increasing dependence on Smartphones to buy tourism products to destinations, the implications, reasons and fact based submissions from interviews and questionnaire based data collection was utilized. Data collected from students who have experience in using, owning smartphones and buying tourism products to environments through the adopting of a structured questionnaire method and close ended questions. The ease of internet transaction; multiple communication on social network websites, portability, style, easy navigation, amongst others increases consumer usage and dependence on smartphones hence, the influence on consumer dependence on smartphones.

Keywords: smartphone, students, North Cyprus

ADDRESS FOR CORRESPONDENCE: Selira Kotoua, Eastern Mediterranean University, Turkey

E-Mail Address: [email protected]

1 | P a g e

Task Exploration from E-mail Messages for Corporate Collaborative Processes and Development of a Real-Time Task Management System

Halil Arslan, Cumhuriyet University, Sivas Vocational School

Oğuz Kaynar, Cumhuriyet University, Manegement Information Systems

Ahmet Gürkan Yüksek, Cumhuriyet University, Computer Engineering

Osman Gün, Detaysoft

Abstract

E-mail systems, is one of the main tools used for corporate communication and collaboration. Almost all corporate tasks for information flow related to basic workflows notably planning, project and resource management are carried out by these systems. Therefore, e-mail systems, storage and services contain valuable information for companies has become very important center areas where businesses are managed. It is very important to be able to manage the workflows via e-mail services especially for customer oriented instutions. Even if there is an opportunity to create customer oriented job lists via central softwares in enterprise systems, these claims are usually transmitted to employee e-mail accounts. This case can cause employee to forget, lose, not to be able to determine level of importance correctly or plan the jobs in e-mail account. In this study a method is proposed to tag the e-mails of employees that includes demands to be managed and to provide inputs to to-do lists by using text mining and classifying techniques. The proposed methodand developed application offers real-time collaborative working relationship with the integration of extensible messaging and presence protocol. Thus, the transformation process of corporate e-mails to job lists through enterprise instant messaging systems have been adapted to collaborative work by the real-time situation management approach.

Keywords: collaborative processes, todo list management, e-mail analysisi, text mining

ADDRESS FOR CORRESPONDENCE: Halil Arslan, Cumhuriyet University, Sivas Vocational School

E-Mail Address: [email protected]

2 | P a g e

Some performance and qualitie tests of the pixel sieve cryptographic method

Incze Arpad, University of Alba Lulia, Romania

Abstract

Pixel sieving is a cryptographic primitive in the field of secret sharing visual cryptograhy. After solving some major issues regarding the cryptograhic strenght of the proposed method the software application wrote to test the methode is put to a series of tests. In the first set o tests we intended to measure the computing performances like encryption and decryption time and to determine how specific factors contribute tho this performances. A second set o tests were conducted in order to measure the efficiency of the method. For this the encrypted shares ar put to a series of comparative tests. As result of the testing, we can state that the pixel sieve method has a strong security but the methode is vulnerable to some weak keys.

ADDRESS FOR CORRESPONDENCE: Incze Arpad, University of Alba Lulia, Romania

E-Mail Address: [email protected]

3 | P a g e

Integer Representation on FPU

Murat Uysal, Meb Mesleki Ve Teknik Anadolu Lisesi, Çaycuma, Zonguldak, Turkey

Abstract

Integer numbers are subject to short limited range and overflow problems. For a 64-bit representation, for example, their values ranges from -264 to 264-1. Due to arithmetic operations, an integer can grow beyond the limits. The ranges of floating point numbers are relatively broader, e.g. from ±4.94x10-324 to ±1.79x10308 for double precision (64-bit) numbers. Although they can represent integers, about half of the floating point number range are reserved for the fractional numbers between 0 and 1. This study proposes to represent integers as floating point number. The range is between 0 and ±22099-1 for 64-bit representation. The precision corresponds to 14-16 decimal digits as in double precision floating point numbers. Because integers are represented as floating point numbers, the arithmetic operations are performed on FPUs (floating point units), which greatly ensures preventions of overflow. Exponents of operands are implicitly equalized before operations and results of operations are rounded on FPU. Addition and substraction do not need an explicit operation. The exponents of operands are adjusted before multiplication and after division. The experiments showed that the proposed method prevents results of calculations on large numbers overflow. Although some bits of the floating point numbers are reserved for exponent coding, the precision are found to be satisfactory.

ADDRESS FOR CORRESPONDENCE: Murat Uysal, Meb Mesleki Ve Teknik Anadolu Lisesi, Çaycuma, Zonguldak, Turkey E-Mail Address: [email protected]

4 | P a g e

A Hybrid Model Based on Metaheuristics for Multiple Sequence Alignment Problem lamiche Chaabane, M'sila university, Algeria

Abstract

In this work, a novel hybrid model called PSOSA for solving multiple sequence alignment (MSA) problem is proposed. The developed approach is a combination between particle swam optimization (PSO) algorithm and simulated annealing (SA) technique. In our PSOSA approach, PSO is exploited in global search, but it is easily trapping into local optimum and may lead to the premature convergence. SA is incorporated as local improvement approach to overcome local optimum problem and intensify the search in local regions to improve solution quality. Numerical results on BaliBASE benchmark have shown the effectiveness of the proposed method and its ability to achieve good quality solutions comparing to those given by other existing methods.

ADDRESS FOR CORRESPONDENCE: lamiche Chaabane, M'sila university, Algeria

E-Mail Address: [email protected]

5 | P a g e

MPminer: A Data Mining Tool for Data Analysis

Musa PEKER, Mugla Sitki Kocman University, Turkey

Abstract

Data mining is a matter of accessing to the information from large-scale data. Nowadays, increasing number of data, the widespread use of computers and steps towards becoming an information society increases the importance of data mining. In this study, software developed to perform data analysis with data mining techniques has been introduced. This software named MPminer includes data mining steps. In the software, there are numerous algorithms in different categories such as feature selection, classification and clustering. MPminer was developed using the C# programming language which is one of .NET languages. The use of the software is quite easy with the visual interface and it is designed to be user-friendly. In the software, results can be obtained statistically. In addition, it is possible to follow the performance results graphically. MPminer can facilitate the work of researchers in academic and scientific studies. Also, in terms of making the work mechanism of data mining methods more understandable, this software can be benefited as an educational tool. MPminer and different data mining software in the literature have been applied on the benchmark datasets and obtained results have been compared. Obtained similar results prove the reliability of the developed software. Data mining is a matter of accessing to the information from large-scale data. Nowadays, increasing number of data, the widespread use of computers and steps towards becoming an information society increases the importance of data mining. In this study, software developed to perform data analysis with data mining techniques has been introduced. This software named MPminer includes data mining steps. In the software, there are numerous algorithms in different categories such as feature selection, classification and clustering. MPminer was developed using the C# programming language which is one of .NET languages. The use of the software is quite easy with the visual interface and it is designed to be user friendly. In the software, results can be obtained statistically. In addition, it is possible to follow the performance results graphically. MPminer can facilitate the work of researchers in academic and scientific studies. Also, in terms of making the work mechanism of data mining methods more understandable, this software can be benefited as an educational tool. MPminer and different data mining software in the literature have been applied on the benchmark datasets and obtained results have been compared. Obtained similar results prove the reliability of the developed software.

ADDRESS FOR CORRESPONDENCE: Musa PEKER, Mugla Sitki Kocman University, Turkey

E-Mail Address: [email protected]

6 | P a g e

HISTORY OF SOCIAL MEDIA AND ILLISTRATING THE CONNECTIONS USING GRAPH THEORY

Ozlem Cakir, University of Bulent Ecevit, Turkey

Ümmügülsüm Candeğer, University of Bulent Ecevit, Turkey

Filiz Mete, University of Bulent Ecevit, Turkey

Şerife Büyükköse, Gazi University, Turkey

Abstract

Nowadays, social media plays a significant role in our lives since we spend a considerable amount of our time on social networks. Inevitably, it has become an integral part of modern society. Despite the fact that it is quite important in many aspects such as allowing its users to share photos and videos, play games, shop online, write blogs and comments, send e-mails, chat or update events, people sometimes fail to carry out an appropriate use of these networks. In this study, graph theory, concept mapping and literature review methods were used to indicate the history and evolution of social media from its beginnings to present day. This study includes a review of major milestones in the timeline of social media developments and how it has come a long way. Since different types of social media are becoming more advanced as time passes and people now turn to the internet for anything and everything, it is worth checking how this form of mass media started and, came into our lives and its informational, educational, interactive and promotional purposes. Illustrate the connections with using graph theory.

ADDRESS FOR CORRESPONDENCE: Ozlem Cakir, University of Bulent Ecevit, Turkey

E-Mail Address: [email protected]

7 | P a g e

Data Mining Process for Estimation of Suspended Sediment Load In Rivers

Özlem Terzi, Suleyman Demirel University, Turkey

Abstract

The accurate estimation of the suspended sediment load in rivers is important in determining of the service life of hydraulic structures such as dams and in water resources engineering. The suspended sediment load can be estimated by empirical formulas. However, the use of these methods is not an easy because of the complicated processes such as erosion, sediment and the suspended sediment transport. In recent years, data mining process which is regarded as effective for modeling complex hydrological systems method are used. In this study, the various models will be developed to estimate suspended sediment load by using data mining process for the Kızılırmak River. It will be used the monthly flow data of Yamula station for 1973-2003 as input data for estimation of suspended sediment load. The most appropriate algorithm will be determined among the models developed with various data-mining algorithms. It will be examined the suitability of data mining algorithms on estimation suspended sediment load.

ADDRESS FOR CORRESPONDENCE: Özlem Terzi, Suleyman Demirel University, Turkey

E-Mail Address: [email protected]

8 | P a g e

Estimation of Daily Pan Evaporation Using Wavelet-ANFIS Model

Özlem Terzi, Suleyman Demirel University, Turkey

Abstract

Evaporation which is one of the hydrological cycle elements is important in the planning of water resources. The correctly determination of evaporation amount has a great importance especially during dry periods. Although there are many equations to estimate evaporation, it is difficult to use these equations for calibrating these equations and requiring many meteorological parameters. In this study, firstly evaporation models will be developed using adaptive neuro fuzzy inference system (ANFIS) in Lake Eğirdir. Then, the input data will be divided into sub-series with wavelet transform (W) and W-ANFIS models will be developed using sub-series as input values. The developed ANFIS and W-ANFIS models will be compared and the validity of the models will be investigated.

Keywords: evaporation, ANFIS, wavelet transform

ADDRESS FOR CORRESPONDENCE: Özlem Terzi, Suleyman Demirel University, Turkey

E-Mail Address: [email protected]

9 | P a g e

Interactive Serious Games with Visual Programming for Mobile Robot Learning

Ugur Yayan,

Mustafa Ada,

Mehmet Fevzi Akdeniz,

Ömer Gümgüm,

Meriç Keskin,

Ahmet Yazıcı,

Abstract

With the latest developments in modern technology, the advances in the fields of robotics and programming have become indispensable parts of our lives. Consequently, it is crucial that provisions are made for training people starting early in their lives, in the use and development of these technologies that have rapidly entered our daily lives. This study is an attempt at the development of Interactive Serious Games using Visual Programming for Mobile Robot Learning (evacocuk). An educational robotic game developed in Unity was presented to underage users on the internet. In the game, the players have to deliver a robotic character from its starting point to a target point in the shortest possible time and via the shortest path using visual programming. While the game scenarios were being prepared, many experiences from everyday life were also included. This is because our goal is to get the children immersed in the game. In the first of the scenarios that we have prepared, the robot character first goes home. Afterwards, in the second scenario, he goes to the bus stop from home in order to go to school. In our third scenario, our robot goes to school from the bus stop. In forth one, he goes to a friend's house from school and then goes to the park with his friend. After the park, the robot goes to the charging station. In our final scenario, the robot goes to the gym from the charging station. After each scenario, the users obtain a score. When calculating the score, game duration, number of actions and the number of button clicks to run the algorithm are taken into account. The game was designed with the aim of enabling the users to develop their analytical thinking, programming and problem solving skills.

ADDRESS FOR CORRESPONDENCE: Ugur Yayan,

E-Mail Address: [email protected]

10 | P a g e

New Approaches in Social Responsibility Project For The Visually Impaired: An E-Commerce Site Availability

Ümmühan Akhisar, , Turkey

Nilüfer Yurtay, , Turkey

Yüksel Yurtay, Sakarya Üniversitesi, Turkey

Furkan Uğur Eşitti, Beyazıt Dernek, Turkey

Abstract

Computer technology and the Internet, the modern human, easier access to information and communication needs, provide faster and more economical to find solutions. Electronic commerce today have become widespread. However, the detection of shortage of visually impaired individuals in this regard is aimed to design an e-commerce site based on this finding. visually impaired people to benefit from these opportunities, it is necessary to make some adjustments in the service. Thus, the electronic information from the media, freedom of access, visual capabilities and business confidence will open doors for people with disabilities. In this study, see the existing opportunities in computer and information technology work for people with disabilities and made a survey about the studies carried out and the results were shared. According to the results it has been seen as possible of the availability of an e-commerce site.

ADDRESS FOR CORRESPONDENCE: Ümmühan Akhisar, Kocaeli University, Turkey

E-Mail Address: [email protected]

11 | P a g e

Graph Representation of Open and Distance Education History

Filiz Mete, Bülent Ecevit University, Turkey

Şerife Büyükköse, Gazi University, Turkey

Özlem Çakır, Gazi University, Turkey

Ümmügülsüm Candeğer, Ankara University, Turkey

Abstract

Nowadays, learning and instruction take place independent of time and space in distance education system where the courses are conducted completely online through network technologies using interactive video- based instructional material so instructors and learners do not have to come to school; learners have a chance to review those materials whenever they want and have an access to the information resources. Initially, it started with postal service and with the development of technology, it continued with radio and subsequently, with television. First, computers have been integrated into education and then with the advent of internet, courses have been conducted online. The system initially started to be used at universities; later its widespread use in high schools and secondary schools were made possible. In the course of time, these channels have been used to educate larger groups. Within this context, the project of YAYÇEP can be given as an example. The foundation of Graph Theory was laid by Leonhard Euler in 1736. Graph theory studies the graphs that are used to examine the relations between objects or concepts in Mathematics and Computer Sciences. When the literature is examined, it can be seen that graph theory is used in logistics, mathematics, computer sciences, education, chemistry and engineering. Mind maps, which are a kind of graph, are used to visualize the concepts in mind and this makes it possible to keep them in memory. The purpose of this study is to examine open and distance education system that took part in the history of education in the Turkish Republic first at universities, and then in high schools and secondary schools. Furthermore, we aim to narrate the history of open and distance education by using graph theory trees in order to provide a better understanding of this process. Graph theory is considered as an effective method in chronological narratives of subjects and presenting the connections between them through network. Historical developments, which are connected vertically and horizontally, could be narrated in a chronological order through graph theory trees and this makes it possible to see the big picture. It is aimed to make the subject more understandable by explaining the chronological development of Open and Distance Education in Turkish Republic by using graph theory trees. Therefore, first Open and Distance Education is explained, then historical information is given and in the conclusion part, a graph theory tree drawn by using graph theory is used to explain the subject.

ADDRESS FOR CORRESPONDENCE: Filiz Mete, Bülent Ecevit University, Turkey

E-Mail Address: [email protected]

12 | P a g e

ANALYSIS OF IMPACT ON ETHICAL VALUES OF INTERNET USE: A DATA MINING MODEL APPROACH

Adem Karahoca, Bahcesehir University, Turkey

Dilek Karahoca, Bahcesehir University, Turkey

Merve Arıtürk, Bahcesehir University, Turkey

Abstract

The purpose of this study, analyze the usage of Internet between awareness of information and faith with investigating the experiences of people who live in Turkey. In this study, the universe of the sample was reached by the social media platforms. The average age of the participants was calculated as 21. The survey that was named as “Ethical Internet Usage” was performed on the Internet. While maintaining this work, the questions which were on different surveys with the related to our work were analyzed. After analyzing, the questions were selected with the existing correlation value that significantly depends on the information and some data mining techniques are used to make predictions.

Keywords: Ethics, Internet Ethics, Values of faith, Data Mining

ADDRESS FOR CORRESPONDENCE: Adem Karahoca, Bahcesehir University, Turkey

E-Mail Address: [email protected]

13 | P a g e

SENTIMENT ANALYSIS OF TURKISH TWEETS

Adem Karahoca, Bahcesehir University, Turkey

Erkut Evirgen, Bahcesehir University, Turkey

Abstract

Others' opinions have always mattered to mankind. Whether it was to wage wars, or make a simple choice as picking a cola from the local grocery store, we have always looked at what others think about the choice we are about to make. Perhaps it emanates from an inherent conforming with the majority attitude, but the bottom line is, that opinions do matter. More so in today's digital world, where thanks to the reach and penetration of the internet, opinions at a global scale are available. 140 characters. That is all that it takes today to make a difference. The micro blogging site called Twitter, has fast emerged as one of the most powerful social media sites which can sway opinions. Sentiment or opinion analysis, has of late emerged one of the most researched and talked about subject in Natural Language Processing (NLP), thanks mainly to sites like Twitter. In the past, sentiment analysis models using Twitter data have been built to predict sales performance, rank products and merchants, public opinion polls, predict election results, political standpoints, predict box-office revenues for movies and even predict the stock market. This study proposes a general frame in R programming language; to act as a gateway for the analysis of the tweets that portray emotions in a short and concentrated format. The target tweets include brief emotion descriptions and words that are not used with a proper format or grammatical structure. Majority of the work constituted in Turkish includes the data scope and the aim of preparing a data-set. There is no concrete and usable work done on Turkish Tweet sentiment analysis as a software client/web application. This thesis is a starting point on building up the next steps. The aim is to compare five different common machine learning methods: support vector machines, random forests, boosting, maximum entropy, and artificial neural networks.

ADDRESS FOR CORRESPONDENCE: Adem Karahoca, Bahcesehir University, Turkey

E-Mail Address: [email protected]

14 | P a g e

Customer behaviour analysis in vehicle leasing industry by using data mining techniques

Adem Karahoca, Bahcesehir University, Turkey

Serpi Akköse Odabaşı, Bahcesehir University, Turkey

Abstract

Changing economic conditions affect people’s lives and even their vehicle purchasing decisions. In the recent years, people from different business sectors started to lease their cars from existing vehicle leasing companies rather than buying their own vehicles. This situation brought alone remarkable income in existing companies’ financials and also new leasing company entries in this very niche sector. The aim of this paper is to analyse vehicle leasing customer behaviours and their new defined requirements by using WEKA software as data mining tool. The paper uses a vehicle data set taken from a vehicle leasing company which is operating in Turkey, whose customer profile is mostly dominated by small and medium enterprises and 100% long term vehicle lesees. No individual or short term rental customers are analysed in this study, it may be the subject of another analysis: short term or daily vehicle rentals. The current Turkish long term vehicle leasing companies generally does not prefer to work with individuals.

ADDRESS FOR CORRESPONDENCE: Adem Karahoca, Bahcesehir University, Turkey

E-Mail Address: [email protected]

15 | P a g e

ELECTRICITY TARIFF USAGE PREDICTION VIA DATA MINING

Adem Karahoca, Bahcesehir University, Turkey

Onur Karlıdağ, Bahcesehir University, Turkey

Abstract

Continuity of electrical energy production is the most important principle for electricity companies. Produced electrical energy is transmitted to residence, business and industry areas. Production and consumption of electrical energy should be balanced. Prediction of daily consumption is very important for both meeting the demand and preventing waste of energy resources. Energy tariff is an method for balancing demand and supply. Power outages which cause of immediate energy demand size that system can not supply, prevented with energy tariff, because this tariff encourages customers to consume certain time interval. In this study energy-related dataset with tariff information was used. Transitions between tariffs have direct effect on electricty companies. This thesis provides prediction of tariff transition possibility from flat to multiple. In this study, consumption of Istanbul European side data which contains first three months of 2015 was used. This dataset includes tariff information, invoice amount and consumption basis kWh for each three-time periods which are day, peak and off peak. It has attributes: flat-time bill amount (thkodnolanasis), flat-time bill amount group (thkodnolanasisgroup), consumption (kWh) group of day (t1group), consumption (kWh) group of peak (t2group), consumption (kWh) group of off-peak (t3group), tariff information (tarife), multiple-time bill amount (thkodnolanesnek) which are input columns and multiple-time bill amount group (thkodnolanesnekgroup) is determined output column. Prediction of the tariff transition possibility calculated with following classification algorithms Logistic Regression, RBF Network, SMO, Naive Bayes, Naive Bayes Net, Naive Bayes Updatable, J48, NBTree using WEKA. J48, NBTree and Bayes Net classification algorithms have highest accuracy rates which are 100 percent, 100 percent and 99.98 percent. This study, unlike the literature, provides prediction of tariff transition possibility from flat which means one-time to multiple which means three-time.

ADDRESS FOR CORRESPONDENCE: Adem Karahoca, Bahcesehir University, Turkey

E-Mail Address: [email protected]

16 | P a g e

DETERMINING USABILITY METRICS ON E-LEARNING SYSTEMS BY FUZZY LOGIC APPROACH

Adem Karahoca, Bahcesehir University, Turkey

Mehmet Rafi Doğ, Bahcesehir University, Turkey

Dilek Karahoca, Bahcesehir University, Turkey

Abstract

Refined computer applications support learning in the cognitive domains and they are slightly different from commercial transaction processing applications. By the nature of such applications for evaluating their usability involves different methods.

In this study, we present the application and development of the framework for usability testing of interactive e-learning applications proposed by Masemola & de Villiers et al., 2006 [1]. In the first usability testing application, investigation the effectiveness of the think-aloud method is discussed and joined with co-discovery testing.

E-learning is evolving field, helping with the potential for increased reach and decreased cost of e-learning applications. Usability has crucial importance for e-learning due to the remote nature of the e-learning activities. In the direction to evaluate usability of e-learning, the applied usability factors are as follows: e- learning system feedback, consistency, error prevention, performance or efficiency, user like or dislike, error recovery, cognitive load, internationalization, privacy and online help. To express the overall e learning usability, representation of all of the listed factors above is important and should be first discussed separately then combined into a single figure of merit. We should take into account that all the dimensions listed are relatively imprecise and cannot be represented very easily such as numeric representation. Therefore, it is determined to use Fuzzy System Theory in order to represent them and Takagi-Sugeno (T-S) model is proposed by Takagi et al.,1985 [2] and is used for Fuzzy reasoning by Wong et al.,2002 [3] which provides single e- learning usability figure of merit while combining all the factors. The components involved in this approach can be listed as: identifying the usability issues in e-learning context and testing for the Fuzzy logic based usability approach, combine the test results and change them into a single usability measure then validating the generated Fuzzy Model. This study considers the use of fuzzy systems to illustrate each of these usability factors and shows how each of them affects the overall rate of the e-learning usability.

Key words: E-learning Systems, Usability Evaluation Methods, Heuristic Evaluation, Metrics for Usability Standards, Usability Testing, Tuning Algorithms, Fuzzy Systems, Evaluation Criteria, Usability Control

ADDRESS FOR CORRESPONDENCE: Adem Karahoca, Bahcesehir University, Turkey

E-Mail Address: [email protected]

17 | P a g e

PRIORITIZATION OF CRITICAL SUCCESS FACTORS OF IT SERVICE MANAGEMENT PROCESSES WITH FUZZY AHP

Adem Karahoca, Bahcesehir University, Turkey

Serdar Bahadır Sevim, Bahcesehir University, Turkey

Abstract

In this study, IT Service Management processes were considered to identify the important processes and metrics. Each ITSM related processes which are well defined in ITIL framework are considered. In the first step, each factor of the ITSM processes is listed based on the ITIL framework. For prioritization of the factors of each ITSM related processes, a survey is applied to IT managers who have the seniority and experience in IT sector. Survey results show that following factor is more important for the ITSM processes; Frequency of service interruption of critical systems for the Business Continuity Management Process

Keywords: Change Management, Problem Management, Business Continuity, SLA Management, Fuzzy AHP, Critical Success Factors, IT Management, ITSM, ISACA, CISA, CSF, CobiT, ITIL, Business-IT alignment, Best Practices in ITSM

ADDRESS FOR CORRESPONDENCE: Adem Karahoca, Bahcesehir University, Turkey

E-Mail Address: [email protected]

18 | P a g e

Customer segmentation for churn management by using ant colony algorithm

Adem Karahoca, Bahcesehir University, Turkey

Batuhan Güllüoğlu, Bahcesehir University, Turkey

Evren Arifoğlu, Bahcesehir University, Turkey

Abstract

Data mining is interested in clustering, by the similarities of data. Some of clustering techniques covers evolutionary and optimization. In this study, characteristic selection is used for novel hybrid modeling. Customer priorities are very important for companies. Moreover, customer priorities must be determined and campaigns must be ordered according to these priorities. Customer segmentation was done with Ant Colony algorithm. Shortest path approach is used in Ant Colony algorithm. Moreover, clustering is done by the euclidean distance formula in Ant Colony algorithm. These results are mostly related with the customer's income, tenure, equip, callcard and reside. These attributes are the most important satisfaction factors not to lose customers as expected.

ADDRESS FOR CORRESPONDENCE: Adem Karahoca, Bahcesehir University, Turkey

E-Mail Address: [email protected]

19 | P a g e

A FUZZY AHP BASED APPROACH FOR SELECTING AN IT PROJECT MANAGEMENT METHODOLOGY

Adem Karahoca, Bahcesehir University, Turkey

Şenay Engür, Bahcesehir University, Turkey

Abstract

One of the most critical activities in the IT project management life cycle which project managers faced is selecting more proper project management methodology for their IT projects. Since, it is one of the most important factors effecting project success and results. Most of times project managers don’t know how to choose the right methodology for their projects. Since, the optimal methodology changes from project to project. This study aims to use a professional technique in order to select the right methodology for an IT (Core Application Establishment) Project. In this study fuzzy AHP technique was used. The possible criteria effecting the methodology selection decision was defined and prioritized due to the questionnaire conducted to nine project experts in Turkey. With another questionnaire the possible project management methodologies and their prioritization according to the important criteria were identified. Designing the questionnaires 5-point scale was used. The fuzzy AHP methodology was applied to the questionnaire results. The fuzzy AHP formulas were calculated with CGI tool. In conclusion the spiral methodology was selected for our core platform according to its criticality.

Keywords: Project management methodology, IT project management, Analytical hierarchy process, Multiple criteria, methodology selection

ADDRESS FOR CORRESPONDENCE: Adem Karahoca, Bahcesehir University, Turkey

E-Mail Address: [email protected]

20 | P a g e

Process Prioritization in CMMI by Using Fuzzy AHP

Adem Karahoca, Bahcesehir University, Turkey

Dilek Karahoca, Bahcesehir University, Turkey

Merve Öztürk Aksu, Bahcesehir University, Turkey

Abstract

In this study, CMMI Level 2 survey has been implemented and they were based on evidence provided by different organizations that have adopted the CMMI process areas or not, or how much they have adopted the processes, which are most efficient in their companies. We have achieved some data at the end of this survey result which is implemented to different organizations. Process prioritization has been done by using Fuzzy AHP.

ADDRESS FOR CORRESPONDENCE: Adem Karahoca, Bahcesehir University, Turkey

E-Mail Address: [email protected]

21 | P a g e

Methods for Preventing The WebBots and Screen Scrapers From Extracting The Contents of The Web Sites

Erokan CANBAZOĞLU, Akdeniz Univeristy, Turkey

Özcan ASİLKAN, Akdeniz Univeristy, Turkey

Abstract

One of the most important reasons to build web sites is to get information about the people’s interests while they surf. The search engines are on top of the list of tools that enable the web users to get to the information they need. Today, Google, Bing, Yandex and Yahoo are among the leading search engines and are constantly making improvements on their algorithms while competing with one another to produce the best results possible. With the rapid advancement of technology, search engines require some criteria (e.g. responsive web design) from the web designers to put their web sites up on the search results. “Content” is one of the most essential part of a web site to be on top of the search results. Opportunists can easily clone the content of a website with the applications such as WebBots and Screen Scrapers. There are different types of preventive measures such as encoding the web page’s content against direct entrance, checking the headers of the requests, blocking frequent requests, requiring logins, regularly changing website’s HTML source code, using CAPTCHAs for confirmation and server side restrictions etc. This study investigates the mentioned methods to protect the content of the websites without damaging the search engine optimization.

Key Words: WebBots, Screen Scrapers, Content Protection, Harvest Website, Extract Data

ADDRESS FOR CORRESPONDENCE: Özcan ASİLKAN, Akdeniz Univeristy, Turkey

E-Mail Address: [email protected]

22 | P a g e

Multi-word Aspect Extraction from User Reviews

Ekin Ekinci, Kocaeli University, Turkey

Hazal Türkmen, Kocaeli University, Turkey

Sevinç İlhan Omurca, Kocaeli University, Turkey

Abstract

In these days, for investigation of any product, its user reviews have become a source that is firstly appealed based upon either the popularity of online shopping or increase of the social media utilization. As a consequence of that, aspect based sentiment analysis of user reviews has achieved importance academically and globally. In this study, we tried to get multi-word aspects from the Turkish user reviews. The reliability and the performance of the study were risen with the frequency basis method based on N-gram by unifying finite state automata which are set for the recognition of the Turkish grammar rules. The success of the recommended system is tested via cells phones and by using hotel reviews. When we compare the results with the results by experts, the success obtained is averagely 82% for cell phone domain and averagely 79% for hotel domain.

Acknowledgement: This study is supported by The Scientific and Technological Research Council of Turkey (TUBITAK) under project number 114E422

ADDRESS FOR CORRESPONDENCE: Ekin Ekinci, Kocaeli University, Turkey

E-Mail Address: [email protected]

23 | P a g e

A Study Based on Clustering Techniques in Data Mining: Comparision of Farthest First Clustering, Density Based Clustering, K means and K Medoids Algorithms

Fidan Kaya Gülağız, Kocaeli University, Turkey

Adnan Kavak, Kocaeli University, Turkey

Abstract

As a result of wide use of technology, large data volumes began to emerge. Analyzes on this big size data and obtain knowledge in it very difficult with simple methods. So data mining methods has risen. The purposes of data mining are finding hidden patterns in data and obtain useful information from data. There are many different methods used for these purposes. One of these methods is clustering. Clustering is an unsupervised data mining technique and groups data according to similarities between records. Thus, it tries to make the similarity ratio as minimum inside the cluster and as maximum among other clusters depending on the records attributes in the database. The goal of cluster analysis is finding subclasses that occur naturally in the data set. There are too many different methods improved for data clustering. Some of these are can be listed as Farthest First Clustering, Density Based Clustering, K Means, Self Organizing Map (SOM) and K Medoids algorithms. Performance of these algorithms can be changed according to data set or number of records in dataset etc. In this study we evaluate these five clustering methods using different dataset. Results are compared by considering different parameters such as result similarity, number of steps, processing time etc. At the end of the study methods are also analyzed to show the appropriate data set conditions for each algorithm.

Keywords: Data Clustering, Farthest First Clustering, Density Based Clustering, K-Means, K-Medoids, SOM ;

ADDRESS FOR CORRESPONDENCE: Fidan Kaya Gülağız, Kocaeli University, Turkey

E-Mail Address: [email protected]

24 | P a g e

A Smart Tracking Systems for Museums

Hikmetcan ÖZCAN, Kocaeli University, Turkey

Taner GÜVEN, Kocaeli University, Turkey

Mehmet Ali ALTUNCU, Kocaeli University, Turkey

Burcu KIR SAVAŞ, Kocaeli University, Turkey

Suhap ŞAHİN, Kocaeli University, Turkey

Abstract

Museums which are located almost everywhere in Turkey attract less visitors than desired despite having rich inventory. Thus, the number of the events that direct people to museums must be increased, and the museums must become more appealing places. Unfortunately, these activities that can be achieved easily with the help of technology cannot be realised due to lack of infrastructure. In the study, it is aimed to develop a system which realises the access and distrubition of media data in an interactive way. The system realised consists of a local server, tablets nearby the works, mobile applications visitors of the muesums have on their phones, and a cloud system. Visitors will be provided verbal and visual media support with the mobile application in tablets. Data of inventory are kept both on the cloud and the local server. Regarding the current number of the museums,however, it will be inadequate to direct the data traffic only on the cloud system. It is aimed to decrease that heavy data traffic and to transfer it to the local networks in the museums. Proxy servers are used as buffer servers, in this way, system performance and its efficiency will raise with the help of caching.

Keywords: Museum, cloud, mobile application, web service;

ADDRESS FOR CORRESPONDENCE: Hikmetcan ÖZCAN, Kocaeli University, Turkey

E-Mail Address: [email protected]

25 | P a g e

3D Segmentation Process with Extreme Learning Machine

Ertuğrul KAYA, Kahramanmaraş Sütçü İmam Univeristy

Eser SERT, Kahramanmaraş Sütçü İmam Univeristy

Abstract

Segmentation is usually the first step of image processing. Segmentation can be defined as an image separation to meaningful regions comprising different features in each of them. These regions should not overlap and should be continuous according to a defining characteristic in themselves. For example, it can be similar color shades in an image and these tints can represent objects in different parts of the the related image. Since the images taken with classic cameras are two-dimensional, they don't contain the depth information. This can cause problems related with the perception of the real world in numeric display system. If there are width, height and depth informations of a picture or image, it is called as the 3D dimensional. 3D technology differing from 2D with depth information provides more accurate interpretation of an objects by the digital systems. Because of these advantages, 3D imaging technology widely used in the fields of defense industry, security, medicine, film effects, publishing and art. Extreme Learning Machine algorithm (ELM) is an Artificial Neural Network Model with single hidden layer feed-forward of which input weights calculated randomly and output weights calculated analytically. This algorithm is new and gives much more successful results than other artificial intelligence algorithms. In this study, initially, segmentation is done to image to be modelled as 3D with ELM and different algorithms. Then, 3D modeling is realized by combining segmentation result using of image processing teqhniques with the depth map. Thus, only the 3D modelling of desired object/objects will be done automatically. It is aimed to uncover a system that can be used in security systems, medical, educational, mobile computing and similar areas. The tests procedures has proven success of the selected method.

Keywords: Extreme Learning Machine, ELM, Segmentation, 3D Segmentation, 3D

ADDRESS FOR CORRESPONDENCE: Ertuğrul KAYA, Kahramanmaraş Sütçü İmam Univeristy

E-Mail Address: [email protected]

26 | P a g e

3D Segmentation Process with Extreme Learning Machine

Ertuğrul KAYA, Kahramanmaraş Sütçü İmam Univeristy

Eser SERT, Kahramanmaraş Sütçü İmam Univeristy

Abstract

Segmentation is usually the first step of image processing. Segmentation can be defined as an image separation to meaningful regions comprising different features in each of them. These regions should not overlap and should be continuous according to a defining characteristic in themselves. For example, it can be similar color shades in an image and these tints can represent objects in different parts of the the related image. Since the images taken with classic cameras are two-dimensional, they don't contain the depth information. This can cause problems related with the perception of the real world in numeric display system. If there are width, height and depth informations of a picture or image, it is called as the 3D dimensional. 3D technology differing from 2D with depth information provides more accurate interpretation of an objects by the digital systems. Because of these advantages, 3D imaging technology widely used in the fields of defense industry, security, medicine, film effects, publishing and art. Extreme Learning Machine algorithm (ELM) is an Artificial Neural Network Model with single hidden layer feed-forward of which input weights calculated randomly and output weights calculated analytically. This algorithm is new and gives much more successful results than other artificial intelligence algorithms. In this study, initially, segmentation is done to image to be modelled as 3D with ELM and different algorithms. Then, 3D modeling is realized by combining segmentation result using of image processing teqhniques with the depth map. Thus, only the 3D modelling of desired object/objects will be done automatically. It is aimed to uncover a system that can be used in security systems, medical, educational, mobile computing and similar areas. The tests procedures has proven success of the selected method.

Keywords: Extreme Learning Machine, ELM, Segmentation, 3D Segmentation, 3D

ADDRESS FOR CORRESPONDENCE: Ertuğrul KAYA, Kahramanmaraş Sütçü İmam Univeristy

E-Mail Address: [email protected]

27 | P a g e