Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2401 - 2430 of 8897

Full-Text Articles in Physical Sciences and Mathematics

Performance Enhancement Of Photovoltaic System Using Genetic Algorithm- Based Maximum Power Point Tracking, Brammanayagam Nagarani, Jothiswaroopan Nesamony Jan 2019

Performance Enhancement Of Photovoltaic System Using Genetic Algorithm- Based Maximum Power Point Tracking, Brammanayagam Nagarani, Jothiswaroopan Nesamony

Turkish Journal of Electrical Engineering and Computer Sciences

In recent years, enormous progress has been made on power generation using photovoltaic (PV) system. Solar power is one of the most promising renewable energy sources that is providing its benefit specifically in rural areas. With the increasing need for solar energy, it becomes necessary to extract maximum power from the PV array. The output power of the solar cells varies directly with the ambient temperature and Irradiation. Therefore, the challenge is to track maximum power from the PV array when environmental factors change. This paper focuses on increasing the efficiency of a PV array by incorporating artificial intelligence techniques. …


Automatic Generation Control Analysis Of Power System With Nonlinearities Andelectric Vehicle Aggregators With Time-Varying Delay Implementing A Novel Control Strategy, Nimai Charan Patel, Binod Kumar Sahu, Manoj Kumar Debnath Jan 2019

Automatic Generation Control Analysis Of Power System With Nonlinearities Andelectric Vehicle Aggregators With Time-Varying Delay Implementing A Novel Control Strategy, Nimai Charan Patel, Binod Kumar Sahu, Manoj Kumar Debnath

Turkish Journal of Electrical Engineering and Computer Sciences

Automatic generation control (AGC) also known as load frequency control plays a vital role in interconnected power system for frequency regulation. Electric vehicles (EVs) with battery as the storage device can participate in frequency regulation service. In practice, a large number of EVs are aggregated as a single unit called EV aggregator for participation in frequency regulation service in AGC system. Participation of EV aggregators in AGC system for frequency regulation will be encouraged in near future because EVs have less environmental pollution than the conventional vehicles. However, participation of EV aggregators in AGC system may introduce time delay which …


Design Optimization Using Dielectric Slab For Efficient Microwave Heating, Sofiya Ali Mekonnen, Si̇bel Yeni̇kaya Jan 2019

Design Optimization Using Dielectric Slab For Efficient Microwave Heating, Sofiya Ali Mekonnen, Si̇bel Yeni̇kaya

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, usage of a dielectric slab on the top and bottom sides, on the top side, and on the bottom side of a clay sample was presented as a means of improving heating efficiency in multimode applicator. In order to accomplish the optimization procedure, we used four different dielectric slab types having different thickness values. The simulated results show that by using additional dielectric slab it is possible to increase the electric field intensity inside the applicator and obtain higher power absorption rates within the sample and high-efficiency designs.


Design Of Inverted-F Antenna For Long-Term Evolution-Based Wireless Handhelddevices, Paulkani Iyampalam, Indumathi Ganesan Jan 2019

Design Of Inverted-F Antenna For Long-Term Evolution-Based Wireless Handhelddevices, Paulkani Iyampalam, Indumathi Ganesan

Turkish Journal of Electrical Engineering and Computer Sciences

In this article, a compact triple-band inverted-F antenna for long-term evolution (LTE)-based wireless handheld devices is presented. The proposed antenna comprises three arms, namely the radiating arm, shorting arm, and feeding arm. The structure of the designed antenna looks like an inverted F with folded L-shaped strip antenna. It has three resonant frequencies of 795, 2050, and 3405 MHz with a reflection coefficient of --11.7 dB, --15.1 dB, and --30.5 dB, respectively. The size of the suggested antenna is 10 $\times$ 35 $\times$ 0.8 mm$^3$ and it is built on the FR-4 substrate which is more compact and easy to …


Electromagnetic Radiation Exposure Of Multioperator Co-Sited Urban Base Stations, Ni̇yazi̇ Korkut Uluaydin, Tomasz Dlugosz, Şaban Seli̇m Şeker Jan 2019

Electromagnetic Radiation Exposure Of Multioperator Co-Sited Urban Base Stations, Ni̇yazi̇ Korkut Uluaydin, Tomasz Dlugosz, Şaban Seli̇m Şeker

Turkish Journal of Electrical Engineering and Computer Sciences

Mobile network operators (MNOs) concurrently use different generations of wireless technologies. The base stations (BSs) of different technology generations are co-located in order to decrease operational costs. Furthermore, the MNOs cooperate in order to co-site their base stations. Such an urban site includes more than 25 actively radiating antennas on average with different frequencies and modulations. Electromagnetic radiation (EMR) measurements performed in such an environment may have reduced accuracy. In this paper, the authors propose a new approach for the measurement of EMR in multiple mobile technology interwoven urban BS sites, where more than one operator exists. The maintenance activities …


Thd Minimization For Z-Source-Based Inverters With A Novel Sinusoidal Pwmswitching Method, Davood Ghaderi Jan 2019

Thd Minimization For Z-Source-Based Inverters With A Novel Sinusoidal Pwmswitching Method, Davood Ghaderi

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents a modified sinusoidal pulse width modulation (SPWM) switching method for one-phase and investigated two-phase impedance-source inverter structures. The proposed structure generates pulses for a quasi- Z-source converter and this block produces a unilateral voltage sine wave in the block's output. This signal is applied to the inverter as its input wave. For this purpose, the novel SPWM method is proposed for power switches while being switched complementarily. Two power switches are used in the structure to generate the pure sinusoidal output voltage and to minimize total harmonic distortion (THD), which is an essential parameter in inverter design. …


Unsupervised Deep Feature Embeddings For Speaker Diarization, Rehan Ahmad, Syed Zubair Jan 2019

Unsupervised Deep Feature Embeddings For Speaker Diarization, Rehan Ahmad, Syed Zubair

Turkish Journal of Electrical Engineering and Computer Sciences

Speaker diarization aims to determine ?who spoke when?? from multispeaker recording environments. In this paper, we propose to learn a set of high-level feature representations, referred to as feature embeddings, from an unsupervised deep architecture for speaker diarization. These sets of embeddings are learned through a deep autoencoder model when trained on mel-frequency cepstral coefficients (MFCCs) of input speech frames. Learned embeddings are then used in Gaussian mixture model based hierarchical clustering for diarization. The results show that these unsupervised embeddings are better compared to MFCCs in reducing the diarization error rate. Experiments conducted on the popular subset of the …


Limited-Data Automatic Speaker Verification Algorithm Using Band-Limitedphase-Only Correlation Function, Ángel Pedroza, José De La Rosa, José De Jesus Villa, Aldonso Becerra Jan 2019

Limited-Data Automatic Speaker Verification Algorithm Using Band-Limitedphase-Only Correlation Function, Ángel Pedroza, José De La Rosa, José De Jesus Villa, Aldonso Becerra

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a new method to deal with automatic speaker verification based on band-limited phaseonly correlation (BLPOC) is proposed. The aim of this study is to validate the use of the BLPOC function as a new limited-data automatic speaker verification technique. Although some speaker verification techniques have high accuracy, efficiency usually depends on the extraction of complex theoretical information from speech signals and the amount of the data for training the algorithms. The BLPOC function is a high-accuracy biometric technique traditionally implemented in human identification by fingerprints (through image-matching). When applying the BLPOC function in automatic speaker verification through …


Exploring Bigram Character Features For Arabic Text Clustering, Dia Eddin Abuzeina Jan 2019

Exploring Bigram Character Features For Arabic Text Clustering, Dia Eddin Abuzeina

Turkish Journal of Electrical Engineering and Computer Sciences

The vector space model (VSM) is an algebraic model that is widely used for data representation in text mining applications. However, the VSM poses a critical challenge, as it requires a high-dimensional feature space. Therefore, many feature selection techniques, such as employing roots or stems (i.e. words without infixes and prefixes, and/or suffixes) instead of using complete word forms, are proposed to tackle this space challenge problem. Recently, the literature shows that one more basic unit feature can be used to handle the textual features, which is the twoneighboring character form that we call microword. To evaluate this feature type, …


Word Sense Disambiguation Using Semantic Kernels With Class-Based Term Values, Ayşe Berna Altinel, Murat Can Gani̇z, Bi̇lge Şi̇pal, Eren Can Erkaya, Onur Can Yücedağ, Muhammed Ali̇ Doğan Jan 2019

Word Sense Disambiguation Using Semantic Kernels With Class-Based Term Values, Ayşe Berna Altinel, Murat Can Gani̇z, Bi̇lge Şi̇pal, Eren Can Erkaya, Onur Can Yücedağ, Muhammed Ali̇ Doğan

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, we propose several semantic kernels for word sense disambiguation (WSD). Our approaches adapt the intuition that class-based term values help in resolving ambiguity of polysemous words in WSD. We evaluate our proposed approaches with experiments, utilizing various sizes of training sets of disambiguated corpora (SensEval). With these experiments we try to answer the following questions: 1.) Do our semantic kernel formulations yield higher classification performance than traditional linear kernel?, 2.) Under which conditions a kernel design performs better than others?, 3.) Does the addition of class labels into standard term-document matrix improve the classification accuracy?, 4.) Is …


Adaptive Switching Gain Sliding Mode Control For Speed Regulation In Pmsms, Yanwei Huang, Yuqing Xie, Zheyi Liu Jan 2019

Adaptive Switching Gain Sliding Mode Control For Speed Regulation In Pmsms, Yanwei Huang, Yuqing Xie, Zheyi Liu

Turkish Journal of Electrical Engineering and Computer Sciences

To suppress uncertainties caused by parametric variations or disturbances, an adaptive switching gain (ASG) is proposed for integral sliding mode control (ISMC) to regulate speed in permanent magnet synchronous motors (PMSMs). According to system uncertainties, the ASG is designed to adjust the switching gain to suppress the chattering. The adaptive law is a positive value resulting in an increment of the switching gain when the tracking trajectory is outside the boundary layer. Conversely, it is negative with a decrement of the gain. Further, it improves a convergent rate by the function of the reciprocal of the tracking error when the …


Fault-Tolerant Control Of A Pmsg-Based Wind Turbine Based On Parallelinterleaved Converters, Mohamed Abbes Jan 2019

Fault-Tolerant Control Of A Pmsg-Based Wind Turbine Based On Parallelinterleaved Converters, Mohamed Abbes

Turkish Journal of Electrical Engineering and Computer Sciences

Lowering the cost of wind energy has been one of the main objectives of the wind industry in the past years. To achieve this objective, considerable research efforts have been made to improve the availability of wind turbines. Recent statistical analyses have shown that frequency converters are among the most frequently failing components for variable speed wind systems. Therefore, several configurations were proposed in the literature to improve the availability of these generating devices. These configurations are mainly based on the redundancy of power converters (active and standby) or the converter bypass technique. However, for the special case of PMSG-based …


Particle Swarm Optimization Approach To Optimal Design Of An Afpm Tractionmachine For Different Driving Conditions, Naghi Rostami Jan 2019

Particle Swarm Optimization Approach To Optimal Design Of An Afpm Tractionmachine For Different Driving Conditions, Naghi Rostami

Turkish Journal of Electrical Engineering and Computer Sciences

Axial flux permanent magnet (AFPM) machines can be employed as the traction motor of electric vehicles due to their high torque capability, high efficiency, modular and compact construction, and capability of integration with other mechanical components in integrated systems. Besides, the system efficiency can be further improved by optimal design of the selected electric machine. In this paper, an AFPM machine is optimized against two well-known driving cycles called the New European Drive Cycle (NEDC) and US06 and the influence of the driving cycle on the obtained machine parameters is evaluated. US06 is the more demanding driving cycle and thus …


Towards Wearable Blood Pressure Measurement Systems From Biosignals: A Review, Ümi̇t Şentürk, Kemal Polat, İbrahi̇m Yücedağ Jan 2019

Towards Wearable Blood Pressure Measurement Systems From Biosignals: A Review, Ümi̇t Şentürk, Kemal Polat, İbrahi̇m Yücedağ

Turkish Journal of Electrical Engineering and Computer Sciences

Blood pressure is the pressure by the blood to the vein wall. High blood pressure, which is called silent death, is the cause of nearly 13 % of mortality all over the world. Blood pressure is not only measured in the medical environment, but the blood pressure measurement is also a need for people in their daily life. Blood pressure estimation systems with low error rates have been developed besides the new technologies and algorithms. Blood pressure measurements are differentiated as invasive blood pressure (IBP) measurement and noninvasive blood pressure (NIBP) measurement methods. Although IBP measurement provides the most accurate …


Sparsity-Based Three-Dimensional Image Reconstruction For Near-Field Mimo Radar Imaging, Fi̇gen S. Oktem Jan 2019

Sparsity-Based Three-Dimensional Image Reconstruction For Near-Field Mimo Radar Imaging, Fi̇gen S. Oktem

Turkish Journal of Electrical Engineering and Computer Sciences

Near-field multiple-input multiple-output (MIMO) radar imaging systems are of interest in diverse fields such as medicine, through-wall imaging, airport security, concealed weapon detection, and surveillance. The successful operation of these radar imaging systems highly depends on the quality of the images reconstructed from radar data. Since the underlying scenes can be typically represented sparsely in some transform domain, sparsity priors can effectively regularize the image formation problem and hence enable high-quality reconstructions. In this paper, we develop an efficient three-dimensional image reconstruction method that exploits sparsity in near-field MIMO radar imaging. Sparsity is enforced using total variation regularization, and the …


Softswitch: A Centralized Honeypot-Based Security Approach Using Software-Defined Switching For Secure Management Of Vlan Networks, Muhammet Baykara, Resul Daş Jan 2019

Softswitch: A Centralized Honeypot-Based Security Approach Using Software-Defined Switching For Secure Management Of Vlan Networks, Muhammet Baykara, Resul Daş

Turkish Journal of Electrical Engineering and Computer Sciences

Honeypot systems are traps for intruders which simulate real systems such as web, application, and database servers used in information systems. Using these systems, unauthorized and malicious access can be efficiently detected. Honeypot is an entity which acts as a source of valued information and its behavior can be monitored. The inability or difficulty of intrusion detection is a serious security problem in networks including virtual local area network (VLAN). According to the literature, the use of honeypots for intrusion detection and prevention in networks including VLAN is strongly recommended. In this paper, in order to provide security and to …


Symptom-Aware Hybrid Fault Diagnosis Algorithm In The Network Virtualization Environment, Yuze Su, Xiangru Meng, Xiaoyang Han, Qiaoyan Kang Jan 2019

Symptom-Aware Hybrid Fault Diagnosis Algorithm In The Network Virtualization Environment, Yuze Su, Xiangru Meng, Xiaoyang Han, Qiaoyan Kang

Turkish Journal of Electrical Engineering and Computer Sciences

As an important technology in next-generation networks, network virtualization has received more and more attention. Fault diagnosis is the crucial element for fault management and it is the process of inferring the exact failure in the network virtualization environment (NVE) from the set of observed symptoms. Although various traditional fault diagnosis algorithms have been proposed, the virtual network has some new characteristics, which include inaccessible fault information of the substrate network, inaccurate network observations, and a dynamic embedding relationship. To solve these challenges, a symptom-aware hybrid fault diagnosis (SAHFD) algorithm in the NVE is proposed in this paper. First, a …


Community Detection In Complex Networks Using A New Agglomerative Approach, Majid Arasteh, Somayeh Alizadeh Jan 2019

Community Detection In Complex Networks Using A New Agglomerative Approach, Majid Arasteh, Somayeh Alizadeh

Turkish Journal of Electrical Engineering and Computer Sciences

Complex networks are used for the representation of complex systems such as social networks. Graph analysis comprises various tools such as community detection algorithms to uncover hidden data. Community detection aims to detect similar subgroups of networks that have tight interconnections with each other while, there is a sparse connection among different subgroups. In this paper, a greedy and agglomerative approach is proposed to detect communities. The proposed method is fast and often detects high-quality communities. The suggested method has several steps. In the first step, each node is assigned to a separated community. In the second step, a vertex …


A Comprehensive Methodology To Evaluate The Performance Of A Cooperative Wireless Network, Aykut Kalaycioğlu, Ahmet Akbulut, Asim Egemen Yilmaz, Di̇lek Arslan Jan 2019

A Comprehensive Methodology To Evaluate The Performance Of A Cooperative Wireless Network, Aykut Kalaycioğlu, Ahmet Akbulut, Asim Egemen Yilmaz, Di̇lek Arslan

Turkish Journal of Electrical Engineering and Computer Sciences

Performance evaluation of a cooperative wireless communication network depends on several parameters. Many of the studies, in fact, take a limited number of performance metrics individually to reach a conclusion about the performance of a network. Besides, in general, some performance metrics might be in conflict. Thus, ignoring the combined effect of all performance criteria in the network may lead to an incorrect conception of the overall communication performance of the network. Therefore, in this study, a comprehensive evaluation methodology in terms of various metrics is proposed to calculate the performance of a cooperative wireless communication network deployment using a …


Privacy Issues In Post Dissemination On Facebook, Burcu Sayi̇n Günel, Serap Şahi̇n, Dimitris G. Kogias, Charalampos Z. Patrikakis Jan 2019

Privacy Issues In Post Dissemination On Facebook, Burcu Sayi̇n Günel, Serap Şahi̇n, Dimitris G. Kogias, Charalampos Z. Patrikakis

Turkish Journal of Electrical Engineering and Computer Sciences

With social networks (SNs) being populated by a still increasing numbers of people who take advantage of the communication and collaboration capabilities that they offer, the probability of the exposure of people's personal moments to a wider than expected audience is also increasing. By studying the functionalities and characteristics that modern SNs offer, along with the people's habits and common behaviors in them, it is easy to understand that several privacy risks may exist, many of which people may be unaware of. In this paper, we focus on users' interactions with posts in a social network (SN), using Facebook as …


Atomic-Shaped Efficient Delay And Data Gathering Routing Protocol For Underwater Wireless Sensor Networks, Wajiha Farooq, Tariq Ali, Ahmad Shaf, Muhammad Umar, Sana Yasin Jan 2019

Atomic-Shaped Efficient Delay And Data Gathering Routing Protocol For Underwater Wireless Sensor Networks, Wajiha Farooq, Tariq Ali, Ahmad Shaf, Muhammad Umar, Sana Yasin

Turkish Journal of Electrical Engineering and Computer Sciences

High end-to-end delay is a major challenge in autonomous underwater vehicle (AUV)-aided routing protocols for underwater monitoring applications. In this paper, a new routing protocol called atomic-shaped efficient delay and data gathering (ASEDG) has been introduced for underwater wireless sensor networks. The ASEDG is divided into two phases; in the first phase, the atomic-shaped trajectory model with horizontal and vertical ellipticals was designed for the movement of the AUV. In the second phase, two types of delay models were considered to make our protocol more delay efficient: member nodes (MNs) to MNs and MNs to gateway nodes (GNs). The MNs-to-MNs …


Lightweight Signature Scheme To Protect Intellectual Properties Of Internet Of Things Applications In System On Chip Field-Programmable Gate Arrays, Kokila Jagadeesh, Ramasubramanian Natarajan Jan 2019

Lightweight Signature Scheme To Protect Intellectual Properties Of Internet Of Things Applications In System On Chip Field-Programmable Gate Arrays, Kokila Jagadeesh, Ramasubramanian Natarajan

Turkish Journal of Electrical Engineering and Computer Sciences

Billions of smart objects in the edge devices offer advanced connectivity to networks which increase the security and complexity of the Internet of things (IoT) applications. To make such entities smarter heterogeneous intellectual property (IP) cores from multiple service providers are reused in system on chip platform. Enabling both chip and IP protection at post fabrication level is imperative. The IoT-based IP cores are signed with the hybrid physical unclonable function and finite state machine model to protect from cloning, misuse, unauthorized user access, and physical attacks. The extended finite-state machine is used to verify the signature, which reduces the …


Solving Vehicle Routing Problem For Multistorey Buildings Using Iterated Local Search, Osman Gökalp, Aybars Uğur Jan 2019

Solving Vehicle Routing Problem For Multistorey Buildings Using Iterated Local Search, Osman Gökalp, Aybars Uğur

Turkish Journal of Electrical Engineering and Computer Sciences

Vehicle routing problem (VRP) which is a well-known combinatorial optimisation problem that has many applications used in industry is also a generalised form of the travelling salesman problem. In this study, we defined and formulated the VRP in multistorey buildings (Multistorey VRP) for the first time and proposed a solving method employing iterated local search metaheuristic algorithm. This variant of VRP has a great potential for turning the direction of optimisation research and applications to the vertical cities area as well as the horizontal ones. Routes of part picking or placing vehicles/humans in multistorey plants can be minimised by this …


An Algorithm For Line Matching In An Image By Mapping Into An $N$-Dimensional Vector Space, Rayi̇mbek Sultanov, Ahmet Atakan, Rita Ismailova Jan 2019

An Algorithm For Line Matching In An Image By Mapping Into An $N$-Dimensional Vector Space, Rayi̇mbek Sultanov, Ahmet Atakan, Rita Ismailova

Turkish Journal of Electrical Engineering and Computer Sciences

This paper proposes a minimal length difference algorithm for construction of a line in an image by solving the problem of optimal contour approximation. In this algorithm, a method for finding interest points is proposed, and the object matching (classification) is done by mapping interest points onto a vector space. In cases where the lines in the representation of the images are not smooth, the algorithm converges rapidly. The results of the experiments showed that for convergence of the contour simplification, there were 5-6 iterations for $n = 13$. To check how close the curve approximation calculated by the algorithm …


Hgab3c: A New Hybrid Global Optimization Algorithm, Kamaljeet Kaur, Shakti Kumar, Jyoti Saxena Jan 2019

Hgab3c: A New Hybrid Global Optimization Algorithm, Kamaljeet Kaur, Shakti Kumar, Jyoti Saxena

Turkish Journal of Electrical Engineering and Computer Sciences

This paper proposes a new optimization algorithm, namely HGAB3C, and presents its performance on the CEC-2014 test suite. In HGAB3C, simple genetic algorithms (GAs) and big bang-big crunch (BB-BC) are hybridized. The algorithm carries out global searches using a simple GA. In every generation the BB-BC algorithm is used to carry out local searches. The addition of local search has improved the capability of simple GAs significantly. The performance of the proposed algorithm is compared with 17 other optimization algorithms on all 30 functions of the CEC-2014 benchmark suite. It is observed that HGAB3C outperforms all other algorithms on 4 …


An Improved Imperialist Competitive Algorithm For Global Optimization, Ting You, Yueli Hu, Peijiang Li, Yinggan Tang Jan 2019

An Improved Imperialist Competitive Algorithm For Global Optimization, Ting You, Yueli Hu, Peijiang Li, Yinggan Tang

Turkish Journal of Electrical Engineering and Computer Sciences

The imperialist competitive algorithm (ICA), inspired by sociopolitical behavior in the real world, is a new optimization algorithm. The ICA shows great potential to solve complex optimization problems. In order to improve the ICA's exploration ability and speed up its convergence, two improved schemes are proposed in this paper. The first scheme presents a new possession probability in the imperialistic competition phase. Inspired by geopolitics, not only the power of the empire but also the distance between the imperialists are taken into account in calculating the new possession probability. The second scheme introduces the wavelet mutation operator into the original …


Test Case Prioritization And Distributed Testing Of Object-Oriented Program, Vipin Kumar K S, Sheena Mathew Jan 2019

Test Case Prioritization And Distributed Testing Of Object-Oriented Program, Vipin Kumar K S, Sheena Mathew

Turkish Journal of Electrical Engineering and Computer Sciences

Software systems have increased in size and complexity. As a result, object-oriented programming (OOP) is increasingly being used in the development of such large and complex systems. Traditional procedural programming requires a design method that follows a sequential flow of control, which is difficult to follow in the case of large systems design. Thinking in terms of real-life objects and their interactions makes design easier in the case of OOP. However, OOP comes with its own set of disadvantages and testing is one of them. Testing of such systems requires much more effort and time. In our approach the program …


A Robust Ensemble Feature Selector Based On Rank Aggregation For Developing New Vo\Textsubscript{2}Max Prediction Models Using Support Vector Machines, Fatih Abut, Mehmet Fati̇h Akay, James George Jan 2019

A Robust Ensemble Feature Selector Based On Rank Aggregation For Developing New Vo\Textsubscript{2}Max Prediction Models Using Support Vector Machines, Fatih Abut, Mehmet Fati̇h Akay, James George

Turkish Journal of Electrical Engineering and Computer Sciences

This paper proposes a new ensemble feature selector, called the majority voting feature selector (MVFS), for developing new maximal oxygen uptake (VO2max) prediction models using a support vector machine (SVM). The approach is based on rank aggregation, which meaningfully utilizes the correlation among the relevance ranks of predictor variables given by three state-of-the-art feature selectors: Relief-F, minimum redundancy maximum relevance (mRMR), and maximum likelihood feature selection (MLFS). By applying the SVM combined with MVFS on a self-created dataset containing maximal and submaximal exercise data from 185 college students, several new hybrid (VO2max) prediction models have been created. To compare the …


Incremental Author Name Disambiguation Using Author Profile Models And Self-Citations, Ijaz Hussain, Sohail Asghar Jan 2019

Incremental Author Name Disambiguation Using Author Profile Models And Self-Citations, Ijaz Hussain, Sohail Asghar

Turkish Journal of Electrical Engineering and Computer Sciences

Author name ambiguity in bibliographic databases (BDs) such as DBLP is a challenging problem that degrades the information retrieval quality, citation analysis, and proper attribution to the authors. It occurs when several authors have the same name (homonym) or when an author publishes under several name variants (synonym). Traditionally, much research has been conducted to disambiguate whole bibliographic database at once whenever some new citations are added in these BDs. However, it is more time-consuming and discards the manual disambiguation effects (if any). Only a few incremental author name disambiguation methods are proposed but these methods produce fragmented clusters which …


Biometric Person Authentication Framework Using Polynomial Curve Fitting-Based Ecg Feature Extraction, Şahi̇n Işik, Kemal Özkan, Semi̇h Ergi̇n Jan 2019

Biometric Person Authentication Framework Using Polynomial Curve Fitting-Based Ecg Feature Extraction, Şahi̇n Işik, Kemal Özkan, Semi̇h Ergi̇n

Turkish Journal of Electrical Engineering and Computer Sciences

The applications of modern biometric techniques for person identification systems rapidly increase for meeting the rising security demands. The distinctive physiological characteristics are more correctly measurable and trustworthy since previous measurements are not appropriately made for physiological properties. While a variety of strategies have been enabled for identification, the electrocardiogram (ECG)-based approaches are popular and reliable techniques in the senses of measurability, singularity, and universal awareness of heartbeat signals. This paper presents a new ECG-based feature extraction method for person identification using a huge amount of ECG recordings. First of all, 1800 heartbeats for each of the 36 subjects have …