Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- China Simulation Federation (3382)
- TÜBİTAK (3020)
- Wright State University (1729)
- Washington University in St. Louis (697)
- Embry-Riddle Aeronautical University (427)
-
- Singapore Management University (410)
- Old Dominion University (356)
- Selected Works (342)
- University of Nebraska - Lincoln (234)
- University of Dayton (163)
- Chulalongkorn University (150)
- Air Force Institute of Technology (120)
- Portland State University (117)
- Purdue University (83)
- University of Nevada, Las Vegas (77)
- Chapman University (74)
- University for Business and Technology in Kosovo (70)
- Technological University Dublin (68)
- University of New Haven (68)
- University of Arkansas, Fayetteville (62)
- University of South Florida (59)
- SelectedWorks (53)
- California Polytechnic State University, San Luis Obispo (50)
- University of South Carolina (48)
- Western University (48)
- University of New Mexico (36)
- Edith Cowan University (35)
- San Jose State University (33)
- Loyola University Chicago (29)
- University of Kentucky (28)
- Keyword
-
- Computer Science (290)
- Department of Computer Science and Engineering (237)
- Engineering (191)
- Simulation (175)
- Machine learning (169)
-
- Deep learning (162)
- College of Engineering and Computer Science (157)
- Newsletters (157)
- Science news (157)
- Technical writing (157)
- Optimization (102)
- Classification (101)
- Genetic algorithm (98)
- Particle swarm optimization (83)
- Security (78)
- Machine Learning (74)
- Artificial intelligence (59)
- Robotics (59)
- Clustering (57)
- Virtual reality (57)
- Modeling (56)
- Wireless sensor networks (56)
- Digital forensics (55)
- Support vector machine (54)
- Computer Engineering (53)
- Neural network (51)
- Feature extraction (49)
- Cybersecurity (48)
- Image processing (48)
- Path planning (48)
- Publication Year
- Publication
-
- Journal of System Simulation (3382)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Computer Science & Engineering Syllabi (1312)
- All Computer Science and Engineering Research (683)
- Research Collection School Of Computing and Information Systems (394)
-
- Journal of Digital Forensics, Security and Law (298)
- Browse all Theses and Dissertations (260)
- Electrical and Computer Engineering Faculty Publications (164)
- BITs and PCs Newsletter (157)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (150)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (138)
- Theses and Dissertations (133)
- Electrical & Computer Engineering Theses & Dissertations (127)
- Annual ADFSL Conference on Digital Forensics, Security and Law (104)
- Faculty Publications (91)
- Computer Science Faculty Publications and Presentations (81)
- Dissertations (77)
- Electrical & Computer Engineering and Computer Science Faculty Publications (67)
- Engineering Faculty Articles and Research (66)
- Electronic Theses and Dissertations (58)
- Computer Science Faculty Publications (54)
- USF Tampa Graduate Theses and Dissertations (54)
- UBT International Conference (51)
- Monish R. Chatterjee (47)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (47)
- CSE Conference and Workshop Papers (45)
- Christopher N. Roman (45)
- Computer Science Theses & Dissertations (38)
- Partha Banerjee (35)
- Graduate Theses and Dissertations (32)
- Publication Type
Articles 10171 - 10200 of 12811
Full-Text Articles in Physical Sciences and Mathematics
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum
Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum
Journal of Digital Forensics, Security and Law
Phishing continues to grow as phishers discover new exploits and attack vectors for hosting malicious content; the traditional response using takedowns and blacklists does not appear to impede phishers significantly. A handful of law enforcement projects — for example the FBI's Digital PhishNet and the Internet Crime and Complaint Center (ic3.gov) — have demonstrated that they can collect phishing data in substantial volumes, but these collections have not yet resulted in a significant decline in criminal phishing activity. In this paper, a new system is demonstrated for prioritizing investigative resources to help reduce the time and effort expended examining this …
Trust Account Fraud And Effective Information Security Management, Sameera Mubarak
Trust Account Fraud And Effective Information Security Management, Sameera Mubarak
Journal of Digital Forensics, Security and Law
The integrity of lawyers’ trust accounts has come under scrutiny in the last few years. There are strong possibilities of information technology security breaches happening within the firms, either accidental or deliberate. The damage caused by these security breaches could be extreme. For example, a trust account fund in an Australian law firm was misused in a security breach in which Telstra charged A$50,000 for phone usage, mainly for ISD calls to Hong Kong. Our study involved interviewing principals of ten law companies to find out solicitors’ attitudes to computer security and the possibility of breaches of their trust accounts. …
Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin
Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin
Journal of Digital Forensics, Security and Law
The recovery of digital evidence of crimes from storage media is an increasingly time consuming process as the capacity of the storage media is in a state of constant growth. It is also a difficult and complex task for the forensic investigator to analyse all of the locations in the storage media. These two factors, when combined, may result in a delay in bringing a case to court. The concept of this paper is to start the initial forensic analysis of the storage media in locations that are most likely to contain digital evidence, the Windows Registry. Consequently, the forensic …
Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward
Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward
Journal of Digital Forensics, Security and Law
Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ to hinder forensic analysis. Although legitimate software can incorporate the same analysis avoidance techniques to provide a measure of protection against reverse engineering and to protect intellectual property, malware invariably makes much greater use of such techniques to make detailed analysis labour intensive and very time consuming. Analysis avoidance techniques are so heavily used by malware that the detection of the use of analysis avoidance techniques could be a very good indicator of the presence of malicious intent. However, there is a tendency for analysis …
The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies
The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies
Journal of Digital Forensics, Security and Law
The ever increasing use and reliance upon computers in both the public and private sector has led to enormous numbers of computers being disposed of at the end of their useful life within an organisation. As the cost of computers has dropped, their use in the home has also continued to increase. In most organisations, computers have a relatively short life and are replaced on a regular basis with the result that, if not properly cleansed of data, they are released into the public domain containing data that can be relatively up to date. This problem is exacerbated by the …
Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma
Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma
Journal of Digital Forensics, Security and Law
The rules of civil procedure in common law countries have been amended to better deal with the requirements of electronic discovery. One of the key changes in case management is the scheduling of a meet-and-confer session where the parties to litigation must meet early in the case before any discovery procedures have begun to exchange information regarding the nature, location, formats, and pertinent facts regarding custody and control of a party’s electronically stored information (ESI). Failure to abide by the rules and participate in good faith at the meet-and-confer session can have dire consequences for the parties and lawyers involved. …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Algebraic Theories Over Nominal Sets, Alexander Kurz, Daniela Petrişan, Jiří Velebil
Algebraic Theories Over Nominal Sets, Alexander Kurz, Daniela Petrişan, Jiří Velebil
Engineering Faculty Articles and Research
We investigate the foundations of a theory of algebraic data types with variable binding inside classical universal algebra. In the first part, a category-theoretic study of monads over the nominal sets of Gabbay and Pitts leads us to introduce new notions of finitary based monads and uniform monads. In a second part we spell out these notions in the language of universal algebra, show how to recover the logics of Gabbay-Mathijssen and Clouston-Pitts, and apply classical results from universal algebra.
State Variable Distributed-Parameter Representation Of Transmission Line For Transient Simulations, Mehmet Sali̇h Mami̇ş, Asim Kaygusuz, Muhammet Köksal
State Variable Distributed-Parameter Representation Of Transmission Line For Transient Simulations, Mehmet Sali̇h Mami̇ş, Asim Kaygusuz, Muhammet Köksal
Turkish Journal of Electrical Engineering and Computer Sciences
In this paper, a distributed-parameter state variable approach is used to calculate transients on transmission lines based on the concept of travelling waves. The method of characteristics for lossless line is used and the state equations are derived for the system. These equations are converted to a set of difference equations using the trapezoidal rule of integration and solved in time domain using LU decomposition. Single- and multi-phase transmission lines with various linear and non-linear terminations are considered in the illustrative examples. State-space modeling of transposed lines using modal decomposition is introduced and the effects caused by lumped parameter approximation …
M&S Body Of Knowledge: Progress Report And Look Ahead, Andreas Tolk
M&S Body Of Knowledge: Progress Report And Look Ahead, Andreas Tolk
Computational Modeling & Simulation Engineering Faculty Publications
No abstract provided.
Artificial Neural Network Based Chaotic Generator For Cryptology, İlker Dalkiran, Kenan Danişman
Artificial Neural Network Based Chaotic Generator For Cryptology, İlker Dalkiran, Kenan Danişman
Turkish Journal of Electrical Engineering and Computer Sciences
Chaotic systems are sensitive to initial conditions, system parameters and topological transitivity and these properties are also remarkable for cryptanalysts. Noise like behavior of chaotic systems is the main reason of using these systems in cryptology. However some properties of chaotic systems such as synchronization, fewness of parameters etc. cause serious problems for cryptology. In this paper, to overcome disadvantages of chaotic systems, the dynamics of Chua's circuit namely x, y and z were modeled using Artificial Neural Network (ANN). ANNs have some distinctive capabilities like learning from experiences, generalizing from a few data and nonlinear relationship between inputs and …
Filter Scheduling Function Model In Internet Server: Resource Configuration, Performance Evaluation And Optimal Scheduling, Minghua Xu
Wayne State University Dissertations
ABSTRACT
FILTER SCHEDULING FUNCTION MODEL IN INTERNET SERVER:
RESOURCE CONFIGURATION, PERFORMANCE EVALUATION AND
OPTIMAL SCHEDULING
by
MINGHUA XU
August 2010
Advisor: Dr. Cheng-Zhong Xu
Major: Computer Engineering
Degree: Doctor of Philosophy
Internet traffic often exhibits a structure with rich high-order statistical properties like selfsimilarity
and long-range dependency (LRD). This greatly complicates the problem of
server performance modeling and optimization. On the other hand, popularity of Internet
has created numerous client-server or peer-to-peer applications, with most of them,
such as online payment, purchasing, trading, searching, publishing and media streaming,
being timing sensitive and/or financially critical. The scheduling policy in Internet servers …
Families Of Symmetries As Efficient Models Of Resource Binding, Vincenzo Ciancia, Alexander Kurz, Ugo Montanari
Families Of Symmetries As Efficient Models Of Resource Binding, Vincenzo Ciancia, Alexander Kurz, Ugo Montanari
Engineering Faculty Articles and Research
Calculi that feature resource-allocating constructs (e.g. the pi-calculus or the fusion calculus) require special kinds of models. The best-known ones are presheaves and nominal sets. But named sets have the advantage of being finite in a wide range of cases where the other two are infinite. The three models are equivalent. Finiteness of named sets is strictly related to the notion of finite support in nominal sets and the corresponding presheaves. We show that named sets are generalisd by the categorical model of families, that is, free coproduct completions, indexed by symmetries, and explain how locality of interfaces gives good …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Determination Of Autoregressive Model Orders For Seizure Detection, Serap Aydin
Determination Of Autoregressive Model Orders For Seizure Detection, Serap Aydin
Turkish Journal of Electrical Engineering and Computer Sciences
In the present study, a step-wise least square estimation algorithm (SLSA), implemented in a Matlab package called as ARfit, has been newly applied to clinical data for estimation of the accurate Auto-Regressive (AR) model orders of both normal and ictal EEG series where the power spectral density (PSD) estimations are provided by the Burg Method. The ARfit module is found to be usefull in comparison to a large variety of traditional methods such as Forward Prediction Error (FPE), Akaike's Information Criteria (AIC), Minimum Description Lenght (MDL), and Criterion of Autoregressive Transfer function (CAT) for EEG discrimination. According to tests, the …
P2p Collaborative Filtering With Privacy, Ci̇han Kaleli̇, Hüseyi̇n Polat
P2p Collaborative Filtering With Privacy, Ci̇han Kaleli̇, Hüseyi̇n Polat
Turkish Journal of Electrical Engineering and Computer Sciences
With the evolution of the Internet and e-commerce, collaborative filtering (CF) and privacy-preserving collaborative filtering (PPCF) have become popular. The goal in CF is to generate predictions with decent accuracy, efficiently. The main issue in PPCF, however, is achieving such a goal while preserving users' privacy. Many implementations of CF and PPCF techniques proposed so far are centralized. In centralized systems, data is collected and stored by a central server for CF purposes. Centralized storage poses several hazards to users because the central server controls users' data. In this work, we investigate how to produce naïve Bayesian classifier (NBC)-based recommendations …
Experimental Studies Of A Scaled-Down Tsr-Based Svc And Tcr-Based Svc Prototype For Voltage Regulation And Compensation, Ayetül Gelen, Tankut Yalçinöz
Experimental Studies Of A Scaled-Down Tsr-Based Svc And Tcr-Based Svc Prototype For Voltage Regulation And Compensation, Ayetül Gelen, Tankut Yalçinöz
Turkish Journal of Electrical Engineering and Computer Sciences
In this paper, prototypes of two shunt flexible AC transmission system (FACTS) devices, a thyristor switched reactor (TSR)-based static VAr compensator (SVC) and a thyristor controlled reactor (TCR)-based static VAr compensator- have been developed. The design and testing of both a TSR-based SVC and a TCR-based SVC are accomplished in the Power Systems Research Laboratory of Nigde University. The TSR-based SVC and TCR-based SVC devices are studied in three-bus and single machine infinite bus systems for three-phase static load conditions. The effects of TSR-based SVC and TCR-based SVC devices on load voltages are also analyzed. Experimental results show that significant …
Robust Multimedia Watermarking: Hidden Markov Model Approach For Video Sequences, Ersi̇n Elbaşi
Robust Multimedia Watermarking: Hidden Markov Model Approach For Video Sequences, Ersi̇n Elbaşi
Turkish Journal of Electrical Engineering and Computer Sciences
Because of the large amount of frames, similarity between frames and temporal attacks (frame dropping, frame averaging, frame swapping etc.), the process for video watermarking is more difficult than that for image watermarking. Current image watermarking methods are limited to solve all these difficulties. We propose a novel video watermarking system based on the Hidden Markov Model (HMM). This novel watermarking scheme splits the video sequences into a Group of Pictures (GOP) with HMM. Portions of the binary watermark are embedded into each GOP with a wavelet domain watermarking algorithm. The embedding process is the standard additive algorithm [1] in …
The Effect Of Heat On The Metallurgical Structure And B-H Characteristic Of (Stator) Armature With Iron-Silicon Alloy In Electric Machines, Fevzi̇ Kentli̇, Ümi̇t Kemaletti̇n Terzi̇
The Effect Of Heat On The Metallurgical Structure And B-H Characteristic Of (Stator) Armature With Iron-Silicon Alloy In Electric Machines, Fevzi̇ Kentli̇, Ümi̇t Kemaletti̇n Terzi̇
Turkish Journal of Electrical Engineering and Computer Sciences
Coils in electric machines are varnished for insulation after winding. These varnished coils are formed in stiff construction in slots. Under heavy-duty operating conditions, all or part of some coils may be burnt or broken. Thermal method is one of several ways to remove the defective coils. In this method, current is passed through the defective coils by an autotransformer (variac) until all the varnish of the coils is burned. If all the coils are out of order, the varnish is burned by replacing the stator or armature in a burning room. Consequently, defective coils in the stator (armature) slots …
Nonlinear Dynamic Analysis Of Mitral Valve Doppler Signals: Surrogate Data Analysis, Esma Uzunhi̇sarcikli
Nonlinear Dynamic Analysis Of Mitral Valve Doppler Signals: Surrogate Data Analysis, Esma Uzunhi̇sarcikli
Turkish Journal of Electrical Engineering and Computer Sciences
In our study, the nonlinear dynamics of mitral valve Doppler signals from 32 healthy and 28 patients with mitral valve stenosis was evaluated using by the computation of Lyapunov exponents, correlation dimension values and surrogate data analysis. Two chaotic features are compared for healthy and patient subjects. It was found that the largest Lyapunov exponent and correlation dimension values derived from patient subjects were larger than that of healthy subjects (\rho < 0.005). Surrogate data analysis was performed to determine the chaotic dynamics of Doppler signals. It was observed that the original and surrogate data have similar spectral features. Receiver operating characteristic (ROC) curves were used to evaluate the nonlinearity character Area Under the curve (AUC) values were obtained as 0.99 and 0.978 for the largest Lyapunov exponent and correlation dimension values, respectively. According to these results, Doppler signals have a nonlinear dynamic property and the largest Lyapunov exponent. Correlation dimension features can be used to detect the change in blood flow velocity of patients with mitral valve stenosis.
A Review Of High Frequency Surface Wave Radar For Detection And Tracking Of Ships, Tony Ponsford, Jian Wang
A Review Of High Frequency Surface Wave Radar For Detection And Tracking Of Ships, Tony Ponsford, Jian Wang
Turkish Journal of Electrical Engineering and Computer Sciences
In today's resource-driven economy, maritime nations are claiming economic borders that extend beyond the continental shelf or the 200 nautical mile (nm) Exclusive Economic Zone (EEZ). However, claiming such large economic area places responsibilities on the parent nation to exercise jurisdiction through surveillance and enforcement. The requirement to see beyond the horizon has long been a goal of maritime security forces. Today, this is largely dependent on cooperative vessels voluntarily communicating their intentions to local shore-side authorities, as well as on those vessel sightings reported by patrollers. Recent advances in technology provide maritime nations with options to provide more systematic …
Implementation Of Method For Operating Multiple High Frequency Surface Wave Radars On A Common Carrier Frequency, Ryan Riddolls
Implementation Of Method For Operating Multiple High Frequency Surface Wave Radars On A Common Carrier Frequency, Ryan Riddolls
Turkish Journal of Electrical Engineering and Computer Sciences
The increasing use of High Frequency Surface Wave Radar (HFSWR) for the surveillance of coastal regions is faced with the problem of limited channel availability in the electromagnetic spectrum. Thus, there is a need for multiple radars to share a common frequency channel. Proof-of-concept work is presented here for a method to operate multiple radar systems on a common carrier frequency. A review is provided of an existing concept where a common waveform is modulated by tones varying by a few hertz across the different radars. The signals from the different radars are separated by either pulse-domain filtering or Doppler …
Propagation Modeling And Path Loss Prediction Tools For High Frequency Surface Wave Radars, Gökhan Apaydin, Levent Sevgi̇
Propagation Modeling And Path Loss Prediction Tools For High Frequency Surface Wave Radars, Gökhan Apaydin, Levent Sevgi̇
Turkish Journal of Electrical Engineering and Computer Sciences
Propagation modeling and simulation approaches for the use of High Frequency Surface Wave Radar (HFSWR) are discussed. HFSWR uses vertically polarized surface waves along multi-mixed paths in the lower HF band (3 MHz - 15 MHz). Various numerical propagators are reviewed with an early analytical model. Split Step Fast Fourier Transformation, finite- difference, and finite-element solutions of the well-known one-way, forward propagation Parabolic Equation (PE) model are presented. MATLAB-based numerical propagation prediction tools based on these models are listed. Tests and comparisons among these analytical and numerical tools are given for some canonical surface wave propagation scenarios. The Millington effect …
Antenna Systems With Beam Forming And Beam Steering Capabilities For Hf Skywave Radars, Çağatay Uluişik
Antenna Systems With Beam Forming And Beam Steering Capabilities For Hf Skywave Radars, Çağatay Uluişik
Turkish Journal of Electrical Engineering and Computer Sciences
Radiation characteristics of linearly phased, periodic, planar dipole arrays, which can be used as transmitting/receiving antenna systems for HF skywave radars, are investigated. Rectangular, triangular and trapezoidal arrays are proposed in obtaining different beam shapes in the desired directions. Beam steering is achieved by adjusting the inter-element phase increments coherently. The effects of vertical array-tilt with a desired take-off angle (TOA) \alpha are presented by a number of radiation pattern examples. The ground effect is investigated using the image theory by assuming the Earth's surface as perfectly electric conductor (PEC). Radiated fields are obtained using Floquet wave representations plus the …
Active Illumination And Appearance Model For Face Alignment, Muhi̇tti̇n Gökmen, Fati̇h Kahraman, Sune Darkner, Rasmus Larsen
Active Illumination And Appearance Model For Face Alignment, Muhi̇tti̇n Gökmen, Fati̇h Kahraman, Sune Darkner, Rasmus Larsen
Turkish Journal of Electrical Engineering and Computer Sciences
Illumination conditions have an explicit effect on the performance of face recognition systems. In particular, varying the illumination upon the face imposes such complex effects that the identification often fails to provide a stable performance level. In this paper, we propose an approach integrating face identity and illumination models in order to reach acceptable and stable face recognition rates. For this purpose, Active Appearance Model (AAM) and illumination model of faces are combined in order to obtain an illumination invariant face localization. The proposed method is an integrated Active Illumination and Appearance Model (AIA) which combines identity, illumination and shape …
Formation Control Of Nonholonomic Mobile Robots Using Implicit Polynomials And Elliptic Fourier Descriptors, Yeşi̇m Hümay Esi̇n, Mustafa Ünel
Formation Control Of Nonholonomic Mobile Robots Using Implicit Polynomials And Elliptic Fourier Descriptors, Yeşi̇m Hümay Esi̇n, Mustafa Ünel
Turkish Journal of Electrical Engineering and Computer Sciences
This paper presents a novel method for the formation control of a group of nonholonomic mobile robots using implicit and parametric descriptions of the desired formation shape. The formation control strategy employs implicit polynomial (IP) representations to generate potential fields for achieving the desired formation and the elliptical Fourier descriptors (EFD) to maintain the formation once achieved. Coordination of the robots is modeled by linear springs between each robot and its two nearest neighbors. Advantages of this new method are increased flexibility in the formation shape, scalability to different swarm sizes and easy implementation. The shape formation control is first …
Simultaneous Rotor And Stator Resistance Estimation Of Squirrel Cage Induction Machine With A Single Extended Kalman Filter, Eşref Emre Özsoy, Meti̇n Gökaşan, Ovsanna Seta Estrada
Simultaneous Rotor And Stator Resistance Estimation Of Squirrel Cage Induction Machine With A Single Extended Kalman Filter, Eşref Emre Özsoy, Meti̇n Gökaşan, Ovsanna Seta Estrada
Turkish Journal of Electrical Engineering and Computer Sciences
Accurate knowledge of rotor and stator resistance variations in a squirrel-cage induction motor (SCIM) is crucial for the performance of sensorless control of SCIM over a wide range of speeds. This study seeks to address this issue with a single Extended Kalman Filter (EKF) based solution, which is also known to have accuracy limitations when a high number of parameters/states are estimated with a limited number of inputs. To this aim, different from the author's previous approach in operating several EKFs in an alternating manner (the so-called braided EKF), an 8^{th}-order EKF is implemented in this study to test its …
Precise Position Control Using Shape Memory Alloy Wires, Burcu Dönmez, Bülent Özkan, Fevzi̇ Suat Kadioğlu
Precise Position Control Using Shape Memory Alloy Wires, Burcu Dönmez, Bülent Özkan, Fevzi̇ Suat Kadioğlu
Turkish Journal of Electrical Engineering and Computer Sciences
Shape memory alloys (SMAs) are active metallic ``smart'' materials used as actuators and sensors in high technology smart systems [1]. The term shape memory refers to ability of certain materials to ``remember'' a shape, even after rather severe deformations: once deformed at low temperatures, these materials will stay deformed until heated, whereupon they will return to their original, pre-deformed ``learned'' shape [2]. This property can be used to generate motion and/or force in electromechanical devices and micro-machines. However, the accuracy of SMA actuators is severely limited by their highly nonlinear stimulus-response characteristics. In this work, modeling, simulation, and experimental efforts …
The Use Of Fpga In Field-Oriented Control Of An Induction Machine, Özkan Akin, İrfan Alan
The Use Of Fpga In Field-Oriented Control Of An Induction Machine, Özkan Akin, İrfan Alan
Turkish Journal of Electrical Engineering and Computer Sciences
In this study, the feasibility of embedding the field oriented control (FOC) of an induction machine into field programmable gate arrays (FPGA) is investigated. An indirect FOC of an induction machine is simulated in a Matlab Simulink environment using a Xilinx System Generator implemented in a Xilinx Spartan-3 XC3S200 FPGA board. Design of the developed controller for the induction machine is simulated via a Simulink full digital platform. The resulting design has a flexible and modular structure where the designer can customize the hardware blocks by changing the number of inputs, outputs, and algorithm when it is compared to the …