Download insode-2016 abstracts book - Awer

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Nonlinear dimensionality reduction wikipedia , lookup

Cluster analysis wikipedia , lookup

Transcript
6th WORLD CONFERENCE ON INNOVATION AND COMPUTER
SCIENCE
(INSODE-2016)
Limak Limra Hotel Convention Center
Kemer, Antalya – Turkey
12-14 May 2016
ABSTRACTS BOOK
Sponsors
Gazi University, Turkey
Middlesex University, UK
Anadolu University, Turkey
Islamic Azad University, Iran
Gaziosmanpasa University, TR
Near East University, North Cyprus
University of Kyrenia, North Cyprus
Manchester Metropolitan University, UK
Bucharest University (Academy) of Economic Studies, RO
Global Journal of Business, Economics & Managements
Organization
Association for Human, Science, Nature, Education and Technology
Academic World Education and Research Center - A non-profit international organization
www.awer-center.org
ORGANIZING COMMITTEE
INSODE – 2016
Chair
Prof. Dr. Doğan Ibrahim,
Near East University, North Cyprus
Co-chair
Assoc. Prof. Dr. Özcan Asilkan
Akdeniz University, Turkey
Conference Committee Members
Prof. Dr. Ergun Gide, CQUniversity Sydney, Australia
Prof. Dr. Mehmet Karamanoglu, Middlesex University, UK
Assoc. Prof. Dr. Adem Karahoca, Bahcesehir University, Turkey
Assist. Prof. Dr. Aslıhan Tüfekçi, Gazi University, Turkey
Assist. Prof. Dr. Mentor Hamidi, South East European University, Macedonia
Dr. Ahmet Yücel, Bahcesehir University, Turkey
Secretariat
Aras Arifoğlu
Essex University, UK
[email protected]
II
International Scientific Committee
Adem Karahoca, Bahcesehir University, Turkey
Alex James, Indian Institute of Information Technology and Management Kerala, India
Ali Amiri, University of Zanjan, Iran
Ali Hennache, Al-Imam Muhammad Ibn Saud Islamic University, Kingdom of Saudi Arabia
Ali Hussain Mohammed, Sri Sai Madhavi Institute of Science & Technology, India
Ana Loureiro, Polytechnics Institute of Santarem, Portugal
Angel Garrido, UNED, Spain
Ayhan Gün, Dumlupinar University, Turkey
Balasubramanian, A.C. Tech Campus, Anna University, India
Benhabib Karim, University de Picardie Jules Verne, France
Bernard De Baets, Ghent University, Belgium
Branko Kaučič, University of Ljubljana, Slovenia
Cosmina Ivan, Technical University of Cluj, Romania
Dianne M. Murray, Computer-Human Interaction, UK
Dogan Ibrahim, Near East University, North Cyprus
Eddie YK Ng, Nanyang Technological University, Singapore
Ergun Gide, CQUniversity Sydney, Australia
Fahrettin Sadıkoğlu, Near East University, North Cyprus
Fezile Özdamlı, Near East University, North Cyprus
Gabriela Grosseck, University of the West Timisoara, Romania
Gerhard Ritter, University of Florida, USA
Gregorio Hernandez-Zamora, National University of Mexico, Mexico
Hafize Keser, Ankara University, Turkey
Hany F. EL Yamany, Suez Canal University, Egypt
Huseyin Uzunboylu, Near East University, North Cyprus
Jaba Shelia, Anna University, India
Jack Dongarra, University of Tennessee, USA
Jacques Bahi, University of Franche-Comte, France
James C. Crabbe, University of Bedfordshire, UK
Süleyman Demokan, Bahcesehir University, Turkey
Mehmet Erdem, University of Nevada, USA
Mehmet Karamanoglu, Middlesex University. UK
Meltem Özturan, Bogazici University, Turkey
Mohammad S. Obaidat, Monmouth University, USA
Mohammad Yarmohammadian, Isfahan University of Medical Sciences, Iran
Murat Tezer, Near East University, North Cyprus
Mustafa İlkan, Eastern Mediterranean University, North Cyprus
Nadia Tahernia Islamic Azad University, Iran
Nadire Çavuş, Near East University, North Cyprus
Nizamettin Aydın, Yıldız Technical University, Turkey
Orhan Okcol, Bahcesehir University, Turkey
Oya Kalıpsız, Yıldız Technical University, Turkey
Ramkumar Jaganathan, VLB Janakiammal College of Arts and Science, India
Rozhan M. Idrus, University Sains, Malaysia
Sanjay K. Dhurandher, Netaji Subash Institute of Technology, India
Selçuk Öğrenci, Kadir Has University, Turkey
Sevinç Gülseçen, Istanbul University, Turkey
Simon Vogl, Studio Pervasive Computing Applications, Austria
Svec Peter, Constantine the Philospher University in Nitre, Slovakia
Wibowo Santoso, Central Queensland University, Australia
Zulkhairi Dahalin, University of Utara, Malaysia
III
ABSTRACTS
The Buying Behavior of Smartphones among Students from
Eastern Mediterranean University in North Cyprus
Selira Kotoua, Eastern Mediterranean University, Turkey
Abstract
The aim of this study is to target buying behavior of smart mobile phones by students from Eastern
Mediterranean University. A conceptual research model has been designed to investigate the social influences,
effect of convenience, social needs in relation to Eastern Mediterranean University students’ dependency on
smartphones to buy tourism products and how this determines future buying behavior. This paper identifies
students emerging and increasing dependence on Smartphones to buy tourism products to destinations, the
implications, reasons and fact based submissions from interviews and questionnaire based data collection was
utilized. Data collected from students who have experience in using, owning smartphones and buying tourism
products to environments through the adopting of a structured questionnaire method and close ended
questions. The ease of internet transaction; multiple communication on social network websites, portability,
style, easy navigation, amongst others increases consumer usage and dependence on smartphones hence, the
influence on consumer dependence on smartphones.
Keywords: smartphone, students, North Cyprus
ADDRESS FOR CORRESPONDENCE: Selira Kotoua, Eastern Mediterranean University, Turkey
E-Mail Address: [email protected]
1|P a g e
Efficiency of K-Means and K-Medoids Algorithms for
Detecting Problems of Waste-Water Treatment Plant
Process
Mehmet Ali Altuncu, Kocaeli University, Turkey
Fidan Kaya Gülağız, Kocaeli University, Turkey
Sevinç İlhan Omurca, Kocaeli University, Turkey
Abstract
Clustering is one of the most widely used method in data mining.The aim of clustering methods are grouping
data according to similarities of data attributes.In most cases this grouping process is performed according to
distance between the data attributes. Many different methods has been developed by different researchers to
analyze the performance of clustering in data mining process.The developed methods can perform differently
on different data sets. In this study we aimed to be clustered problems in water treatment plants using by KMeans and K-Medoids clustering algorithms.Waste water treatment systems have an important place in our
lives. In daily life, water is the most important natural resource for people and other creatures which provides
to continue their vital functions.Treatment process of wastewater treatment plant consists of many different
stages. In this study it has shown effectiveness of two different clustering algorithms to identify the problems
encountered in wastewater treatment plants.Experimental results showed that K-means algorithm is more
stable than K-medoids algorithm to solve problems in wastewater treatment process .
Keywords: Data Clustering, wastewater, k-means, k-medoids;
ADDRESS FOR CORRESPONDENCE: Mehmet Ali Altuncu, Kocaeli University, Turkey
E-Mail Address: [email protected]
2|P a g e
Kurumsal Kolektif Süreçler için E-Posta İletilerinden Görev
Keşfi ve Gerçek Zamanlı Görev Yönetim Sisteminin
Geliştirilmesi
Halil Arslan, Sakarya University, Turkey
Sinan Tüncel, Sakarya University, Turkey
Ahmet Gürkan Yüksek, Sakarya University, Turkey
Osman Gün, Sakarya University, Turkey
Abstract
E-mail systems, is one of the main tools used for corporate communication and collaboration. Almost all
corporate tasks for information flow related to basic workflows notably planning, project and resource
management are carried out by these systems. Therefore, e-mail systems, storage and services contain
valuable information for companies has become very important center areas where businesses are managed. It
is very important to be able to manage the workflows via e-mail services especially for customer oriented
instutions. Even if there is an opportunity to create customer oriented job lists via central softwares in
enterprise systems, these claims are usually transmitted to employee e-mail accounts. This case can cause
employee to forget, lose, not to be able to determine level of importance correctly or plan the jobs in e-mail
account. In this study a method is proposed to tag the e-mails of employees that includes demands to be
managed and to provide inputs to to-do lists by using text mining and classifying techniques. The proposed
methodand developed application offers real-time collaborative working relationship with the integration of
extensible messaging and presence protocol. Thus, the transformation process of corporate e-mails to job lists
through enterprise instant messaging systems have been adapted to collaborative work by the real-time
situation management approach.
Keywords: collaborative processes, todo list management, e-mail analysisi, text mining
ADDRESS FOR CORRESPONDENCE: Halil Arslan, Sakarya University, Turkey
E-Mail Address: [email protected]
3|P a g e
Some performance and qualitie tests of the pixel sieve
cryptographic method
Incze Arpad, University of Alba Lulia, Romania
Abstract
Pixel sieving is a cryptographic primitive in the field of secret sharing visual cryptograhy. After solving some
major issues regarding the cryptograhic strenght of the proposed method the software application wrote to
test the methode is put to a series of tests. In the first set o tests we intended to measure the computing
performances like encryption and decryption time and to determine how specific factors contribute tho this
performances. A second set o tests were conducted in order to measure the efficiency of the method. For this
the encrypted shares ar put to a series of comparative tests. As result of the testing, we can state that the pixel
sieve method has a strong security but the methode is vulnerable to some weak keys.
ADDRESS FOR CORRESPONDENCE: Incze Arpad, University of Alba Lulia, Romania
E-Mail Address: [email protected]
4|P a g e
Integer Representation on FPU
Murat Uysal, Meb Mesleki Ve Teknik Anadolu Lisesi, Çaycuma, Zonguldak, Turkey
Abstract
Integer numbers are subject to short limited range and overflow problems. For a 64-bit representation, for
example, their values ranges from -264 to 264-1. Due to arithmetic operations, an integer can grow beyond the
limits.
The ranges of floating point numbers are relatively broader, e.g. from ±4.94x10-324 to ±1.79x10308 for double
precision (64-bit) numbers. Although they can represent integers, about half of the floating point number range
are reserved for the fractional numbers between 0 and 1.
This study proposes to represent integers as floating point number. The range is between 0 and ±22099-1 for
64-bit representation. The precision corresponds to 14-16 decimal digits as in double precision floating point
numbers.
Because integers are represented as floating point numbers, the arithmetic operations are performed on FPUs
(floating point units), which greatly ensures preventions of overflow. Exponents of operands are implicitly
equalized before operations and results of operations are rounded on FPU.
Addition and substraction do not need an explicit operation. The exponents of operands are adjusted before
multiplication and after division.
The experiments showed that the proposed method prevents results of calculations on large numbers
overflow. Although some bits of the floating point numbers are reserved for exponent coding, the precision are
found to be satisfactory.
ADDRESS FOR CORRESPONDENCE: Murat Uysal, Meb Mesleki Ve Teknik Anadolu Lisesi, Çaycuma, Zonguldak,
Turkey
E-Mail Address: [email protected]
5|P a g e
A Hybrid Model Based on Metaheuristics for Multiple
Sequence Alignment Problem
lamiche Chaabane, M'sila university, Algeria
Abstract
In this work, a novel hybrid model called PSOSA for solving multiple sequence alignment (MSA)
problem is proposed. The developed approach is a combination between particle swam optimization (PSO)
algorithm and simulated annealing (SA) technique. In our PSOSA approach, PSO is exploited in global search,
but it is easily trapping into local optimum and may lead to the premature convergence. SA is incorporated as
local improvement approach to overcome local optimum problem and intensify the search in local regions to
improve solution quality. Numerical results on BaliBASE benchmark have shown the effectiveness of the
proposed method and its ability to achieve good quality solutions comparing to those given by other existing
methods.
ADDRESS FOR CORRESPONDENCE: lamiche Chaabane, M'sila university, Algeria
E-Mail Address: [email protected]
6|P a g e
MPminer: A Data Mining Tool for Data Analysis
Musa PEKER, Mugla Sitki Kocman University, Turkey
Abstract
Data mining is a matter of accessing to the information from large-scale data. Nowadays, increasing number of
data, the widespread use of computers and steps towards becoming an information society increases the
importance of data mining. In this study, software developed to perform data analysis with data mining
techniques has been introduced. This software named MPminer includes data mining steps. In the software,
there are numerous algorithms in different categories such as feature selection, classification and clustering.
MPminer was developed using the C# programming language which is one of .NET languages. The use of the
software is quite easy with the visual interface and it is designed to be user-friendly. In the software, results
can be obtained statistically. In addition, it is possible to follow the performance results graphically. MPminer
can facilitate the work of researchers in academic and scientific studies. Also, in terms of making the work
mechanism of data mining methods more understandable, this software can be benefited as an educational
tool. MPminer and different data mining software in the literature have been applied on the benchmark
datasets and obtained results have been compared. Obtained similar results prove the reliability of the
developed software.
Data mining is a matter of accessing to the information from large-scale data. Nowadays, increasing number of
data, the widespread use of computers and steps towards becoming an information society increases the
importance of data mining. In this study, software developed to perform data analysis with data mining
techniques has been introduced. This software named MPminer includes data mining steps. In the software,
there are numerous algorithms in different categories such as feature selection, classification and clustering.
MPminer was developed using the C# programming language which is one of .NET languages. The use of the
software is quite easy with the visual interface and it is designed to be user friendly. In the software, results can
be obtained statistically. In addition, it is possible to follow the performance results graphically. MPminer can
facilitate the work of researchers in academic and scientific studies. Also, in terms of making the work
mechanism of data mining methods more understandable, this software can be benefited as an educational
tool. MPminer and different data mining software in the literature have been applied on the benchmark
datasets and obtained results have been compared. Obtained similar results prove the reliability of the
developed software.
ADDRESS FOR CORRESPONDENCE: Musa PEKER, Mugla Sitki Kocman University, Turkey
E-Mail Address: [email protected]
7|P a g e
HISTORY OF SOCIAL MEDIA AND ILLISTRATING THE
CONNECTIONS USING GRAPH THEORY
Ozlem Cakir, University of Bulent Ecevit, Turkey
Ümmügülsüm Candeğer, University of Bulent Ecevit, Turkey
Filiz Mete, University of Bulent Ecevit, Turkey
Şerife Büyükköse, Gazi University, Turkey
Abstract
Nowadays, social media plays a significant role in our lives since we spend a considerable amount of our time
on social networks. Inevitably, it has become an integral part of modern society. Despite the fact that it is quite
important in many aspects such as allowing its users to share photos and videos, play games, shop online, write
blogs and comments, send e-mails, chat or update events, people sometimes fail to carry out an appropriate
use of these networks.
In this study, graph theory, concept mapping and literature review methods were used to indicate the history
and evolution of social media from its beginnings to present day. This study includes a review of major
milestones in the timeline of social media developments and how it has come a long way. Since different types
of social media are becoming more advanced as time passes and people now turn to the internet for anything
and everything, it is worth checking how this form of mass media started and, came into our lives and its
informational, educational, interactive and promotional purposes. Illustrate the connections with using graph
theory.
ADDRESS FOR CORRESPONDENCE: Ozlem Cakir, University of Bulent Ecevit, Turkey
E-Mail Address: [email protected]
8|P a g e
Data Mining Process for Estimation of Suspended Sediment
Load In Rivers
Özlem Terzi,
Abstract
The accurate estimation of the suspended sediment load in rivers is important in determining of the service life
of hydraulic structures such as dams and in water resources engineering. The suspended sediment load can be
estimated by empirical formulas. However, the use of these methods is not an easy because of the complicated
processes such as erosion, sediment and the suspended sediment transport. In recent years, data mining
process which is regarded as effective for modeling complex hydrological systems method are used. In this
study, the various models will be developed to estimate suspended sediment load by using data mining process
for the Kızılırmak River. It will be used the monthly flow data of Yamula station for 1973-2003 as input data for
estimation of suspended sediment load. The most appropriate algorithm will be determined among the models
developed with various data-mining algorithms. It will be examined the suitability of data mining algorithms on
estimation suspended sediment load.
ADDRESS FOR CORRESPONDENCE: Özlem Terzi,
E-Mail Address: [email protected]
9|P a g e
Estimation of Daily Pan Evaporation Using Wavelet-ANFIS
Model
Özlem Terzi,
Abstract
Evaporation which is one of the hydrological cycle elements is important in the planning of water resources.
The correctly determination of evaporation amount has a great importance especially during dry periods.
Although there are many equations to estimate evaporation, it is difficult to use these equations for calibrating
these equations and requiring many meteorological parameters. In this study, firstly evaporation models will be
developed using adaptive neuro fuzzy inference system (ANFIS) in Lake Eğirdir. Then, the input data will be
divided into sub-series with wavelet transform (W) and W-ANFIS models will be developed using sub-series as
input values. The developed ANFIS and W-ANFIS models will be compared and the validity of the models will be
investigated.
Keywords: evaporation, ANFIS, wavelet transform
ADDRESS FOR CORRESPONDENCE: Özlem Terzi,
E-Mail Address: [email protected]
10 | P a g e
An Beacon Based Virtual Tag Application
Fidan Kaya Gülağız, Kocaeli University, Turkey
Furkan GÖZ, Kocaeli University, Turkey
Edip Şahin, Kocaeli University, Turkey
Muhammed Samet Albayrak, Kocaeli University, Turkey
Adnan Kava, Kocaeli University, Turkey
Abstract
Rapid developments in technology bring significant benefits to our life. One of them is smartphones.
Smartphones are involved to our life more than before and need of them increases day by day. In this paper, an
application that will provide you to find lost properties within certain distance is developed using smartphones
and Beacon technology. Life of people will be easier via this application and it will be technological solution
that reduces loss of time at the same time. Efficiency of this application are tested both indoor and outdoor
environments and it is observed accurate results in not only outdoor but also indoor environments.
ADDRESS FOR CORRESPONDENCE: Fidan Kaya Gülağız, Kocaeli University, Turkey
E-Mail Address: [email protected]
11 | P a g e
Interactive Serious Games with Visual Programming for
Mobile Robot Learning
Ugur Yayan,
Mustafa Ada,
Mehmet Fevzi Akdeniz,
Ömer Gümgüm,
Meriç Keskin,
Ahmet Yazıcı,
Abstract
With the latest developments in modern technology, the advances in the fields of robotics and programming
have become indispensable parts of our lives. Consequently, it is crucial that provisions are made for training
people starting early in their lives, in the use and development of these technologies that have rapidly entered
our daily lives. This study is an attempt at the development of Interactive Serious Games using Visual
Programming for Mobile Robot Learning (evacocuk). An educational robotic game developed in Unity was
presented to underage users on the internet. In the game, the players have to deliver a robotic character from
its starting point to a target point in the shortest possible time and via the shortest path using visual
programming. While the game scenarios were being prepared, many experiences from everyday life were also
included. This is because our goal is to get the children immersed in the game. In the first of the scenarios that
we have prepared, the robot character first goes home. Afterwards, in the second scenario, he goes to the bus
stop from home in order to go to school. In our third scenario, our robot goes to school from the bus stop. In
forth one, he goes to a friend's house from school and then goes to the park with his friend. After the park, the
robot goes to the charging station. In our final scenario, the robot goes to the gym from the charging station.
After each scenario, the users obtain a score. When calculating the score, game duration, number of actions
and the number of button clicks to run the algorithm are taken into account. The game was designed with the
aim of enabling the users to develop their analytical thinking, programming and problem solving skills.
ADDRESS FOR CORRESPONDENCE: Ugur Yayan,
E-Mail Address: [email protected]
12 | P a g e
New Approaches in Social Responsibility Project For
The Visually Impaired: An E-Commerce Site Availability
Ümmühan Akhisar, Kocaeli University, Turkey
Nilüfer Yurtay, Sakarya University, Turkey
Yüksel Yurtay, Sakarya Üniversitesi, Turkey
Furkan Uğur Eşitti, Beyazıt Dernek, Turkey
Abstract
Computer technology and the Internet, the modern human, easier access to information and communication
needs, provide faster and more economical to find solutions. Electronic commerce today have become
widespread. However, the detection of shortage of visually impaired individuals in this regard is aimed to
design an e-commerce site based on this finding. visually impaired people to benefit from these opportunities,
it is necessary to make some adjustments in the service. Thus, the electronic information from the media,
freedom of access, visual capabilities and business confidence will open doors for people with disabilities. In
this study, see the existing opportunities in computer and information technology work for people with
disabilities and made a survey about the studies carried out and the results were shared. According to the
results it has been seen as possible of the availability of an e-commerce site.
ADDRESS FOR CORRESPONDENCE: Ümmühan Akhisar, Kocaeli University, Turkey
E-Mail Address: [email protected]
13 | P a g e
Graph Representation of Open and Distance Education
History
Filiz Mete, Bülent Ecevit University, Turkey
Şerife Büyükköse, Gazi University, Turkey
Özlem Çakır, Gazi University, Turkey
Ümmügülsüm Candeğer, Ankara University, Turkey
Abstract
Nowadays, learning and instruction take place independent of time and space in distance education system
where the courses are conducted completely online through network technologies using interactive videobased instructional material so instructors and learners do not have to come to school; learners have a chance
to review those materials whenever they want and have an access to the information resources.
Initially, it started with postal service and with the development of technology, it continued with radio and
subsequently, with television. First, computers have been integrated into education and then with the advent
of internet, courses have been conducted online.
The system initially started to be used at universities; later its widespread use in high schools and secondary
schools were made possible. In the course of time, these channels have been used to educate larger groups.
Within this context, the project of YAYÇEP can be given as an example.
The foundation of Graph Theory was laid by Leonhard Euler in 1736. Graph theory studies the graphs that are
used to examine the relations between objects or concepts in Mathematics and Computer Sciences. When the
literature is examined, it can be seen that graph theory is used in logistics, mathematics, computer sciences,
education, chemistry and engineering. Mind maps, which are a kind of graph, are used to visualize the concepts
in mind and this makes it possible to keep them in memory.
The purpose of this study is to examine open and distance education system that took part in the history of
education in the Turkish Republic first at universities, and then in high schools and secondary schools.
Furthermore, we aim to narrate the history of open and distance education by using graph theory trees in
order to provide a better understanding of this process.
Graph theory is considered as an effective method in chronological narratives of subjects and presenting the
connections between them through network. Historical developments, which are connected vertically and
horizontally, could be narrated in a chronological order through graph theory trees and this makes it possible
to see the big picture. It is aimed to make the subject more understandable by explaining the chronological
development of Open and Distance Education in Turkish Republic by using graph theory trees. Therefore, first
Open and Distance Education is explained, then historical information is given and in the conclusion part, a
graph theory tree drawn by using graph theory is used to explain the subject.
ADDRESS FOR CORRESPONDENCE: Filiz Mete, Bülent Ecevit University, Turkey
E-Mail Address: [email protected]
14 | P a g e
ANALYSIS OF IMPACT ON ETHICAL VALUES OF INTERNET
USE: A DATA MINING MODEL APPROACH
Adem Karahoca, Bahcesehir University, Turkey
Dilek Karahoca, Bahcesehir University, Turkey
Merve Arıtürk, Bahcesehir University, Turkey
Abstract
The purpose of this study, analyze the usage of Internet between awareness of information and faith with
investigating the experiences of people who live in Turkey.
In this study, the universe of the sample was reached by the social media platforms. The average age of the
participants was calculated as 21. The survey that was named as “Ethical Internet Usage” was performed on
the Internet.
While maintaining this work, the questions which were on different surveys with the related to our work were
analyzed. After analyzing, the questions were selected with the existing correlation value that significantly
depends on the information and some data mining techniques are used to make predictions.
Keywords: Ethics, Internet Ethics, Values of faith, Data Mining
ADDRESS FOR CORRESPONDENCE: Adem Karahoca, Bahcesehir University, Turkey
E-Mail Address: [email protected]
15 | P a g e
SENTIMENT ANALYSIS OF TURKISH TWEETS
Adem Karahoca, Bahcesehir University, Turkey
Erkut Evirgen, Bahcesehir University, Turkey
Abstract
Others' opinions have always mattered to mankind. Whether it was to wage wars, or make a simple choice as
picking a cola from the local grocery store, we have always looked at what others think about the choice we are
about to make. Perhaps it emanates from an inherent conforming with the majority attitude, but the bottom
line is, that opinions do matter. More so in today's digital world, where thanks to the reach and penetration of
the internet, opinions at a global scale are available. 140 characters. That is all that it takes today to make a
difference. The micro blogging site called Twitter, has fast emerged as one of the most powerful social media
sites which can sway opinions. Sentiment or opinion analysis, has of late emerged one of the most researched
and talked about subject in Natural Language Processing (NLP), thanks mainly to sites like Twitter. In the past,
sentiment analysis models using Twitter data have been built to predict sales performance, rank products and
merchants, public opinion polls, predict election results, political standpoints, predict box-office revenues for
movies and even predict the stock market.
This study proposes a general frame in R programming language; to act as a gateway for the analysis of the
tweets that portray emotions in a short and concentrated format. The target tweets include brief emotion
descriptions and words that are not used with a proper format or grammatical structure.
Majority of the work constituted in Turkish includes the data scope and the aim of preparing a data-set. There
is no concrete and usable work done on Turkish Tweet sentiment analysis as a software client/web application.
This thesis is a starting point on building up the next steps. The aim is to compare five different common
machine learning methods: support vector machines, random forests, boosting, maximum entropy, and
artificial neural networks.
ADDRESS FOR CORRESPONDENCE: Adem Karahoca, Bahcesehir University, Turkey
E-Mail Address: [email protected]
16 | P a g e
Customer behaviour analysis in vehicle leasing industry
by using data mining techniques
Adem Karahoca, Bahcesehir University, Turkey
Serpi Akköse Odabaşı, Bahcesehir University, Turkey
Abstract
Changing economic conditions affect people’s lives and even their vehicle purchasing decisions. In the recent
years, people from different business sectors started to lease their cars from existing vehicle leasing companies
rather than buying their own vehicles. This situation brought alone remarkable income in existing companies’
financials and also new leasing company entries in this very niche sector. The aim of this paper is to analyse
vehicle leasing customer behaviours and their new defined requirements by using WEKA software as data
mining tool. The paper uses a vehicle data set taken from a vehicle leasing company which is operating in
Turkey, whose customer profile is mostly dominated by small and medium enterprises and 100% long term
vehicle lesees. No individual or short term rental customers are analysed in this study, it may be the subject of
another analysis: short term or daily vehicle rentals. The current Turkish long term vehicle leasing companies
generally does not prefer to work with individuals.
ADDRESS FOR CORRESPONDENCE: Adem Karahoca, Bahcesehir University, Turkey
E-Mail Address: [email protected]
17 | P a g e
ELECTRICITY TARIFF USAGE PREDICTION VIA DATA MINING
Adem Karahoca, Bahcesehir University, Turkey
Onur Karlıdağ, Bahcesehir University, Turkey
Abstract
Continuity of electrical energy production is the most important principle for electricity companies. Produced
electrical energy is transmitted to residence, business and industry areas. Production and consumption of
electrical energy should be balanced. Prediction of daily consumption is very important for both meeting the
demand and preventing waste of energy resources.
Energy tariff is an method for balancing demand and supply. Power outages which cause of immediate energy
demand size that system can not supply, prevented with energy tariff, because this tariff encourages customers
to consume certain time interval.
In this study energy-related dataset with tariff information was used. Transitions between tariffs have direct
effect on electricty companies. This thesis provides prediction of tariff transition possibility from flat to
multiple.
In this study, consumption of Istanbul European side data which contains first three months of 2015 was used.
This dataset includes tariff information, invoice amount and consumption basis kWh for each three-time
periods which are day, peak and off peak. It has attributes: flat-time bill amount (thkodnolanasis), flat-time bill
amount group (thkodnolanasisgroup), consumption (kWh) group of day (t1group), consumption (kWh) group of
peak (t2group), consumption (kWh) group of off-peak (t3group), tariff information (tarife), multiple-time bill
amount (thkodnolanesnek) which are input columns and multiple-time bill amount group
(thkodnolanesnekgroup) is determined output column.
Prediction of the tariff transition possibility calculated with following classification algorithms Logistic
Regression, RBF Network, SMO, Naive Bayes, Naive Bayes Net, Naive Bayes Updatable, J48, NBTree using
WEKA. J48, NBTree and Bayes Net classification algorithms have highest accuracy rates which are 100 percent,
100 percent and 99.98 percent.
This study, unlike the literature, provides prediction of tariff transition possibility from flat which means onetime to multiple which means three-time.
ADDRESS FOR CORRESPONDENCE: Adem Karahoca, Bahcesehir University, Turkey
E-Mail Address: [email protected]
18 | P a g e
DETERMINING USABILITY METRICS ON E-LEARNING
SYSTEMS BY FUZZY LOGIC APPROACH
Adem Karahoca, Bahcesehir University, Turkey
Mehmet Rafi Doğ, Bahcesehir University, Turkey
Dilek Karahoca, Bahcesehir University, Turkey
Abstract
Refined computer applications support learning in the cognitive domains and they are slightly different from
commercial transaction processing applications. By the nature of such applications for evaluating their usability
involves different methods.
In this study, we present the application and development of the framework for usability testing of interactive
e-learning applications proposed by Masemola & de Villiers et al., 2006 [1]. In the first usability testing
application, investigation the effectiveness of the think-aloud method is discussed and joined with co-discovery
testing.
E-learning is evolving field, helping with the potential for increased reach and decreased cost of e-learning
applications. Usability has crucial importance for e-learning due to the remote nature of the e-learning
activities. In the direction to evaluate usability of e-learning, the applied usability factors are as follows: elearning system feedback, consistency, error prevention, performance or efficiency, user like or dislike, error
recovery, cognitive load, internationalization, privacy and online help. To express the overall e learning
usability, representation of all of the listed factors above is important and should be first discussed separately
then combined into a single figure of merit. We should take into account that all the dimensions listed are
relatively imprecise and cannot be represented very easily such as numeric representation. Therefore, it is
determined to use Fuzzy System Theory in order to represent them and Takagi-Sugeno (T-S) model is proposed
by Takagi et al.,1985 [2] and is used for Fuzzy reasoning by Wong et al.,2002 [3] which provides single elearning usability figure of merit while combining all the factors. The components involved in this approach can
be listed as: identifying the usability issues in e-learning context and testing for the Fuzzy logic based usability
approach, combine the test results and change them into a single usability measure then validating the
generated Fuzzy Model. This study considers the use of fuzzy systems to illustrate each of these usability
factors and shows how each of them affects the overall rate of the e-learning usability.
Key words: E-learning Systems, Usability Evaluation Methods, Heuristic Evaluation, Metrics for Usability
Standards, Usability Testing, Tuning Algorithms, Fuzzy Systems, Evaluation Criteria, Usability Control
ADDRESS FOR CORRESPONDENCE: Adem Karahoca, Bahcesehir University, Turkey
E-Mail Address: [email protected]
19 | P a g e
PRIORITIZATION OF CRITICAL SUCCESS FACTORS OF IT
SERVICE MANAGEMENT PROCESSES WITH FUZZY AHP
Adem Karahoca, Bahcesehir University, Turkey
Serdar Bahadır Sevim, Bahcesehir University, Turkey
Abstract
In this study, IT Service Management processes were considered to identify the important processes and
metrics. Each ITSM related processes which are well defined in ITIL framework are considered. In the first step,
each factor of the ITSM processes is listed based on the ITIL framework. For prioritization of the factors of each
ITSM related processes, a survey is applied to IT managers who have the seniority and experience in IT sector.
Survey results show that following factor is more important for the ITSM processes; Frequency of service
interruption of critical systems for the Business Continuity Management Process
Keywords: Change Management, Problem Management, Business Continuity, SLA Management, Fuzzy AHP,
Critical Success Factors, IT Management, ITSM, ISACA, CISA, CSF, CobiT, ITIL, Business-IT alignment, Best
Practices in ITSM
ADDRESS FOR CORRESPONDENCE: Adem Karahoca, Bahcesehir University, Turkey
E-Mail Address: [email protected]
20 | P a g e
Customer segmentation for churn management by
using ant colony algorithm
Adem Karahoca, Bahcesehir University, Turkey
Batuhan Güllüoğlu, Bahcesehir University, Turkey
Evren Arifoğlu, Bahcesehir University, Turkey
Abstract
Data mining is interested in clustering, by the similarities of data. Some of clustering techniques covers
evolutionary and optimization. In this study, characteristic selection is used for novel hybrid modeling.
Customer priorities are very important for companies. Moreover, customer priorities must be determined and
campaigns must be ordered according to these priorities. Customer segmentation was done with Ant Colony
algorithm. Shortest path approach is used in Ant Colony algorithm. Moreover, clustering is done by the
euclidean distance formula in Ant Colony algorithm. These results are mostly related with the customer's
income, tenure, equip, callcard and reside. These attributes are the most important satisfaction factors not to
lose customers as expected.
ADDRESS FOR CORRESPONDENCE: Adem Karahoca, Bahcesehir University, Turkey
E-Mail Address: [email protected]
21 | P a g e
A FUZZY AHP BASED APPROACH FOR SELECTING AN IT
PROJECT MANAGEMENT METHODOLOGY
Adem Karahoca, Bahcesehir University, Turkey
Şenay Engür, Bahcesehir University, Turkey
Abstract
One of the most critical activities in the IT project management life cycle which project managers faced is
selecting more proper project management methodology for their IT projects. Since, it is one of the most
important factors effecting project success and results. Most of times project managers don’t know how to
choose the right methodology for their projects. Since, the optimal methodology changes from project to
project. This study aims to use a professional technique in order to select the right methodology for an IT (Core
Application Establishment) Project. In this study fuzzy AHP technique was used. The possible criteria effecting
the methodology selection decision was defined and prioritized due to the questionnaire conducted to nine
project experts in Turkey. With another questionnaire the possible project management methodologies and
their prioritization according to the important criteria were identified. Designing the questionnaires 5-point
scale was used. The fuzzy AHP methodology was applied to the questionnaire results. The fuzzy AHP formulas
were calculated with CGI tool. In conclusion the spiral methodology was selected for our core platform
according to its criticality.
Keywords: Project management methodology, IT project management, Analytical hierarchy process, Multiple
criteria, methodology selection
ADDRESS FOR CORRESPONDENCE: Adem Karahoca, Bahcesehir University, Turkey
E-Mail Address: [email protected]
22 | P a g e
Process Prioritization in CMMI by Using Fuzzy AHP
Adem Karahoca, Bahcesehir University, Turkey
Dilek Karahoca, Bahcesehir University, Turkey
Merve Öztürk Aksu, Bahcesehir University, Turkey
Abstract
In this study, CMMI Level 2 survey has been implemented and they were based on evidence provided by
different organizations that have adopted the CMMI process areas or not, or how much they have adopted the
processes, which are most efficient in their companies. We have achieved some data at the end of this survey
result which is implemented to different organizations. Process prioritization has been done by using Fuzzy
AHP.
ADDRESS FOR CORRESPONDENCE: Adem Karahoca, Bahcesehir University, Turkey
E-Mail Address: [email protected]
23 | P a g e