A Data Mining Model Approach

A Data Mining Model Approach

6th WORLD CONFERENCE ON INNOVATION AND COMPUTER SCIENCE (INSODE-2016) Limak Limra Hotel Convention Center Kemer, Antalya – Turkey 12-14 May 2016 ABSTRACTS BOOK Sponsors Gazi University, Turkey Middlesex University, UK Anadolu University, Turkey Islamic Azad University, Iran Gaziosmanpasa University, TR Near East University, North Cyprus University of Kyrenia, North Cyprus Manchester Metropolitan University, UK Bucharest University (Academy) of Economic Studies, RO Global Journal of Business, Economics & Managements Organization Association for Human, Science, Nature, Education and Technology Academic World Education and Research Center - A non-profit international organization www.awer-center.org ORGANIZING COMMITTEE INSODE – 2016 Chair Prof. Dr. Doğan Ibrahim, Near East University, North Cyprus Co-chair Assoc. Prof. Dr. Özcan Asilkan Akdeniz University, Turkey Conference Committee Members Prof. Dr. Ergun Gide, CQUniversity Sydney, Australia Prof. Dr. Mehmet Karamanoglu, Middlesex University, UK Assoc. Prof. Dr. Adem Karahoca, Bahcesehir University, Turkey Assist. Prof. Dr. Aslıhan Tüfekçi, Gazi University, Turkey Assist. Prof. Dr. Mentor Hamidi, South East European University, Macedonia Dr. Ahmet Yücel, Bahcesehir University, Turkey Secretariat Aras Arifoğlu Essex University, UK [email protected] II International Scientific Committee Adem Karahoca, Bahcesehir University, Turkey Alex James, Indian Institute of Information Technology and Management Kerala, India Ali Amiri, University of Zanjan, Iran Ali Hennache, Al-Imam Muhammad Ibn Saud Islamic University, Kingdom of Saudi Arabia Ali Hussain Mohammed, Sri Sai Madhavi Institute of Science & Technology, India Ana Loureiro, Polytechnics Institute of Santarem, Portugal Angel Garrido, UNED, Spain Ayhan Gün, Dumlupinar University, Turkey Balasubramanian, A.C. Tech Campus, Anna University, India Benhabib Karim, University de Picardie Jules Verne, France Bernard De Baets, Ghent University, Belgium Branko Kaučič, University of Ljubljana, Slovenia Cosmina Ivan, Technical University of Cluj, Romania Dianne M. Murray, Computer-Human Interaction, UK Dogan Ibrahim, Near East University, North Cyprus Eddie YK Ng, Nanyang Technological University, Singapore Ergun Gide, CQUniversity Sydney, Australia Fahrettin Sadıkoğlu, Near East University, North Cyprus Fezile Özdamlı, Near East University, North Cyprus Gabriela Grosseck, University of the West Timisoara, Romania Gerhard Ritter, University of Florida, USA Gregorio Hernandez-Zamora, National University of Mexico, Mexico Hafize Keser, Ankara University, Turkey Hany F. EL Yamany, Suez Canal University, Egypt Huseyin Uzunboylu, Near East University, North Cyprus Jaba Shelia, Anna University, India Jack Dongarra, University of Tennessee, USA Jacques Bahi, University of Franche-Comte, France James C. Crabbe, University of Bedfordshire, UK Süleyman Demokan, Bahcesehir University, Turkey Mehmet Erdem, University of Nevada, USA Mehmet Karamanoglu, Middlesex University. UK Meltem Özturan, Bogazici University, Turkey Mohammad S. Obaidat, Monmouth University, USA Mohammad Yarmohammadian, Isfahan University of Medical Sciences, Iran Murat Tezer, Near East University, North Cyprus Mustafa İlkan, Eastern Mediterranean University, North Cyprus Nadia Tahernia Islamic Azad University, Iran Nadire Çavuş, Near East University, North Cyprus Nizamettin Aydın, Yıldız Technical University, Turkey Orhan Okcol, Bahcesehir University, Turkey Oya Kalıpsız, Yıldız Technical University, Turkey Ramkumar Jaganathan, VLB Janakiammal College of Arts and Science, India Rozhan M. Idrus, University Sains, Malaysia Sanjay K. Dhurandher, Netaji Subash Institute of Technology, India Selçuk Öğrenci, Kadir Has University, Turkey Sevinç Gülseçen, Istanbul University, Turkey Simon Vogl, Studio Pervasive Computing Applications, Austria Svec Peter, Constantine the Philospher University in Nitre, Slovakia Wibowo Santoso, Central Queensland University, Australia Zulkhairi Dahalin, University of Utara, Malaysia III ABSTRACTS The Buying Behavior of Smartphones among Students from Eastern Mediterranean University in North Cyprus Selira Kotoua, Eastern Mediterranean University, Turkey Abstract The aim of this study is to target buying behavior of smart mobile phones by students from Eastern Mediterranean University. A conceptual research model has been designed to investigate the social influences, effect of convenience, social needs in relation to Eastern Mediterranean University students’ dependency on smartphones to buy tourism products and how this determines future buying behavior. This paper identifies students emerging and increasing dependence on Smartphones to buy tourism products to destinations, the implications, reasons and fact based submissions from interviews and questionnaire based data collection was utilized. Data collected from students who have experience in using, owning smartphones and buying tourism products to environments through the adopting of a structured questionnaire method and close ended questions. The ease of internet transaction; multiple communication on social network websites, portability, style, easy navigation, amongst others increases consumer usage and dependence on smartphones hence, the influence on consumer dependence on smartphones. Keywords: smartphone, students, North Cyprus ADDRESS FOR CORRESPONDENCE: Selira Kotoua, Eastern Mediterranean University, Turkey E-Mail Address: [email protected] 1 | P a g e Task Exploration from E-mail Messages for Corporate Collaborative Processes and Development of a Real-Time Task Management System Halil Arslan, Cumhuriyet University, Sivas Vocational School Oğuz Kaynar, Cumhuriyet University, Manegement Information Systems Ahmet Gürkan Yüksek, Cumhuriyet University, Computer Engineering Osman Gün, Detaysoft Abstract E-mail systems, is one of the main tools used for corporate communication and collaboration. Almost all corporate tasks for information flow related to basic workflows notably planning, project and resource management are carried out by these systems. Therefore, e-mail systems, storage and services contain valuable information for companies has become very important center areas where businesses are managed. It is very important to be able to manage the workflows via e-mail services especially for customer oriented instutions. Even if there is an opportunity to create customer oriented job lists via central softwares in enterprise systems, these claims are usually transmitted to employee e-mail accounts. This case can cause employee to forget, lose, not to be able to determine level of importance correctly or plan the jobs in e-mail account. In this study a method is proposed to tag the e-mails of employees that includes demands to be managed and to provide inputs to to-do lists by using text mining and classifying techniques. The proposed methodand developed application offers real-time collaborative working relationship with the integration of extensible messaging and presence protocol. Thus, the transformation process of corporate e-mails to job lists through enterprise instant messaging systems have been adapted to collaborative work by the real-time situation management approach. Keywords: collaborative processes, todo list management, e-mail analysisi, text mining ADDRESS FOR CORRESPONDENCE: Halil Arslan, Cumhuriyet University, Sivas Vocational School E-Mail Address: [email protected] 2 | P a g e Some performance and qualitie tests of the pixel sieve cryptographic method Incze Arpad, University of Alba Lulia, Romania Abstract Pixel sieving is a cryptographic primitive in the field of secret sharing visual cryptograhy. After solving some major issues regarding the cryptograhic strenght of the proposed method the software application wrote to test the methode is put to a series of tests. In the first set o tests we intended to measure the computing performances like encryption and decryption time and to determine how specific factors contribute tho this performances. A second set o tests were conducted in order to measure the efficiency of the method. For this the encrypted shares ar put to a series of comparative tests. As result of the testing, we can state that the pixel sieve method has a strong security but the methode is vulnerable to some weak keys. ADDRESS FOR CORRESPONDENCE: Incze Arpad, University of Alba Lulia, Romania E-Mail Address: [email protected] 3 | P a g e Integer Representation on FPU Murat Uysal, Meb Mesleki Ve Teknik Anadolu Lisesi, Çaycuma, Zonguldak, Turkey Abstract Integer numbers are subject to short limited range and overflow problems. For a 64-bit representation, for example, their values ranges from -264 to 264-1. Due to arithmetic operations, an integer can grow beyond the limits. The ranges of floating point numbers are relatively broader, e.g. from ±4.94x10-324 to ±1.79x10308 for double precision (64-bit) numbers. Although they can represent integers, about half of the floating point number range are reserved for the fractional numbers between 0 and 1. This study proposes to represent integers as floating point number. The range is between 0 and ±22099-1 for 64-bit representation. The precision corresponds to 14-16 decimal digits as in double precision floating point numbers. Because integers are represented as floating point numbers, the arithmetic operations are performed on FPUs (floating point units), which greatly ensures preventions of overflow. Exponents of operands are implicitly equalized before operations and results of operations are

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    31 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us