Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1051 - 1080 of 3020

Full-Text Articles in Physical Sciences and Mathematics

A Two-Stage Power Converter Architecture With Maximum Power Extraction For Low-Power Energy Sources, Ridvan Umaz Jan 2019

A Two-Stage Power Converter Architecture With Maximum Power Extraction For Low-Power Energy Sources, Ridvan Umaz

Turkish Journal of Electrical Engineering and Computer Sciences

A two-stage power converter with maximum power extraction for energy harvesting is presented. The power converter consists of two stages; a maximum power extraction stage (i.e. first stage) and a regulation stage (i.e. second stage). The first stage consists of a number of charge pumps connected in parallel to extract power from the energy source while the second stage steps up low input voltage level to a usable level for a load. Proposed converter operates as low as 0.3 V and the output up-converts to 3.3 V. The proposed converter is aimed to extract maximum power from either low-power energy …


Survey Of Network Embedding Techniques For Social Networks, Pranav Nerurkar, Madhav Chandane, Sunil Bhirud Jan 2019

Survey Of Network Embedding Techniques For Social Networks, Pranav Nerurkar, Madhav Chandane, Sunil Bhirud

Turkish Journal of Electrical Engineering and Computer Sciences

High dimensionality of data is a challenging scenario in the current era as the digital transformation of the society is in process. This problem is particularly complex in social networks as in such systems, it is coupled with other challenges such as interdependency of data points and heterogeneity of data sources. To overcome such disadvantages and aid in creation of downstream applications for social network analysis, network embedding techniques have been proposed. These techniques, in themselves, are not important but are the backbone of various network-based applications. Due to the scientific interest in this domain there has been a mushrooming …


Predicting Co And Nox Emissions From Gas Turbines: Novel Data And A Benchmark Pems, Heysem Kaya, Pinar Tüfekci̇, Erdi̇nç Uzun Jan 2019

Predicting Co And Nox Emissions From Gas Turbines: Novel Data And A Benchmark Pems, Heysem Kaya, Pinar Tüfekci̇, Erdi̇nç Uzun

Turkish Journal of Electrical Engineering and Computer Sciences

Predictive emission monitoring systems (PEMS) are important tools for validation and backing up of costly continuous emission monitoring systems used in gas-turbine-based power plants. Their implementation relies on the availability of appropriate and ecologically valid data. In this paper, we introduce a novel PEMS dataset collected over five years from a gas turbine for the predictive modeling of the CO and NOx emissions. We analyze the data using a recent machine learning paradigm, and present useful insights about emission predictions. Furthermore, we present a benchmark experimental procedure for comparability of future works on the data


A Generalized Detection System To Detect Distributed Denial Of Service Attacks And Flash Events For Information Theory Metrics, Sunny Behal, Krishan Kumar, Monika Sachdeva Jan 2018

A Generalized Detection System To Detect Distributed Denial Of Service Attacks And Flash Events For Information Theory Metrics, Sunny Behal, Krishan Kumar, Monika Sachdeva

Turkish Journal of Electrical Engineering and Computer Sciences

Distributed denial of service (DDoS) attacks pose a severe threat to extensively used web-based services and applications. Many detection approaches have been proposed in the literature, but ensuring the security and availability of data, resources, and services to end users remains an ongoing research challenge. Nowadays, the traffic volume of legitimate users has also increased manifold. A flash event (FE) is a high-rate legitimate traffic situation wherein millions of legitimate users start accessing a particular network resource, such as a web server, simultaneously. The detection of DDoS attacks becomes more challenging when DDoS attacks are launched during behaviorally similar FEs. …


Improved Transient Response Capacitor Less Low Dropout Regulator Employing Adaptive Bias And Bulk Modulation, Suresh Alapati, Sreehari Rao Patri Jan 2018

Improved Transient Response Capacitor Less Low Dropout Regulator Employing Adaptive Bias And Bulk Modulation, Suresh Alapati, Sreehari Rao Patri

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents a low quiescent current, fast settling time, and adaptively biased capacitor less low-dropout (LDO) regulator. The topology involves a segmented pass transistor with bulk modulation and adaptively biased current control stages to improve the transient performance. The bulk modulation of the pass transistor assists in fast settling of the output voltage. The frequency compensation makes the LDO voltage regulator stable adaptively over load current transitions. In addition, the biasing stage is designed such that it adapts to the load transitions while consuming the quiescent current abstemiously. This arrangement further improves settling time to be within 1 µs …


Q-Axis Current Perturbation Based Active Islanding Detection For Converter Interfaced Distributed Generators, Suman Murugesan, Venkatakirthiga Murali Jan 2018

Q-Axis Current Perturbation Based Active Islanding Detection For Converter Interfaced Distributed Generators, Suman Murugesan, Venkatakirthiga Murali

Turkish Journal of Electrical Engineering and Computer Sciences

Thanks to the incessant developments in technology towards extracting electric power from renewable energy resources, incorporation of distributed generators has been gaining great importance in recent years. The key expedients for such power generation include reduction in power loss and improvement in the power quality and reliability. In spite of the numerous advantages, it is mandatory to ascertain the island formation and shut down the distributed generators (DGs) during an unplanned islanding. An analyzing technique subsequent to an active islanding detection technique is proposed in this work for faster and accurate detection of island formation. The proposed technique is investigated …


L-Index Based Contingency Filtering For Voltage Stability Constrained Reactive Power Planning, Farid Karbalaei, Shahriar Abbasi Jan 2018

L-Index Based Contingency Filtering For Voltage Stability Constrained Reactive Power Planning, Farid Karbalaei, Shahriar Abbasi

Turkish Journal of Electrical Engineering and Computer Sciences

One of the most important objectives in reactive power planning (RPP) is maintaining required voltage stability margin under normal and single-contingency situations. For this, an optimization problem must be formulated considering N-1 contingencies constrained for a set of predetermined contingencies. Traditionally, all these contingencies must simultaneously be addressed in the optimization problem. This can dramatically increase the problem dimension and decrease the convergence ability of its solution for large scale applications. This paper uses an L-index based contingency filtering strategy to select a small number of contingencies to be addressed in RPP problem. For this, the predetermined set of all …


Technoeconomic Analysis Of A Grid-Connected Pv And Battery Energy Storagesystem Considering Time Of Use Pricing, Chinmay Kumar Nayak, Manas Ranjan Nayak Jan 2018

Technoeconomic Analysis Of A Grid-Connected Pv And Battery Energy Storagesystem Considering Time Of Use Pricing, Chinmay Kumar Nayak, Manas Ranjan Nayak

Turkish Journal of Electrical Engineering and Computer Sciences

This paper examines the technoeconomic optimization of the size of valve-regulated lead acid-type battery energy storage systems (BESSs) in order to minimize the total annual operating cost of a grid-connected photovoltaic BESS within the framework of system operational constraints, using the improved harmony search algorithm. The electricity cost is calculated using time of use pricing, where the price of energy varies according to the load demand. The concept of feed-in-tariff is discussed, where power can be bought from and sold back to the grid. A sensitivity analysis is performed for three cases: without storage, with storage and without peak load …


Performance Estimation And Analysis Of Power Line Communication Using Single-Ended Loop Testing, Bharathi Mayilswamy, Amsaveni Avinashiappan Jan 2018

Performance Estimation And Analysis Of Power Line Communication Using Single-Ended Loop Testing, Bharathi Mayilswamy, Amsaveni Avinashiappan

Turkish Journal of Electrical Engineering and Computer Sciences

Using the electricity infrastructure for broadband data transmission is known as power line communication (PLC). The quality of broadband connectivity over a power line is a strong function of the line topology. Two-step hybrid single-ended loop testing (SELT) to estimate the open port loop topology of power lines is discussed in this paper. Correlation time domain reflectometry (CTDR) at different sockets is used to construct the initial topology. Optimization-based frequency domain reflectometry (FDR) is employed to ascertain more accurate power line topology. The discussed method has the advantage of reusing the existing DSL modem for the measurement and no prior …


Extra High Voltage Transmission Line Operation Simulation Using The Actualcorona-Loss Characteristics, Ashraf Balametov, Elman Halilov, Tarana Isayeva Jan 2018

Extra High Voltage Transmission Line Operation Simulation Using The Actualcorona-Loss Characteristics, Ashraf Balametov, Elman Halilov, Tarana Isayeva

Turkish Journal of Electrical Engineering and Computer Sciences

In transmission line equations with distributed parameters, corona power losses are represented as conduc- tivity, i.e. corona losses considered as a function of the line voltage squared. On the other hand, valid corona power losses are 4-8 degree functions from voltage. Therefore, extra high voltage transmission line equations with the distributed parameters have methodical errors. Methodical errors of extra high voltage transmission line operation mode parame- ters modeling are estimated. The method of modeling extra high voltage transmission line operation mode taking into account actual corona-loss characteristics is offered. The cascade-connected scheme is used for increasing the accuracy of modeling …


Construction Of A Turkish Proposition Bank, Koray Ak, Cansu Toprak, Volkan Esgel, Olcay Taner Yildiz Jan 2018

Construction Of A Turkish Proposition Bank, Koray Ak, Cansu Toprak, Volkan Esgel, Olcay Taner Yildiz

Turkish Journal of Electrical Engineering and Computer Sciences

This paper describes our approach to developing the Turkish PropBank by adopting the semantic role-labeling guidelines of the original PropBank and using the translation of the English Penn-TreeBank as a resource. We discuss the semantic annotation process of the PropBank and language-specific cases for Turkish, the tools we have developed for annotation, and quality control for multiuser annotation. In the current phase of the project, more than 9500 sentences are semantically analyzed and predicate-argument information is extracted for 1330 verbs and 1914 verb senses. Our plan is to annotate 17,000 sentences by the end of 2017.


Upper Envelope Detection Of Ecg Signals For Baseline Wander Correction: A Pilot Study, Mohammed Assam Ouali, Mouna Ghanai, Kheireddine Chafaa Jan 2018

Upper Envelope Detection Of Ecg Signals For Baseline Wander Correction: A Pilot Study, Mohammed Assam Ouali, Mouna Ghanai, Kheireddine Chafaa

Turkish Journal of Electrical Engineering and Computer Sciences

Baseline wander (BW) is a common low frequency artifact in electrocardiogram (ECG) signals. The prime cause from which BW arises is the patient's breathing and movement. To facilitate reliable visual interpretation of the ECG and to discern particular patterns in the ECG signal, BW needs to be removed. In this paper, a novel BW removal method is presented. The hypothesis is based on the observation that ECG signal variation covaries with its BW. As such, the P, Q, R, S, and T peaks will follow the baseline drift. On this basis, the following proposition is true: a reliable approximation of …


Mutatedsocioagentsim (Msas): Semisupervised Modelling Of Multiagent Simulation To Predict And Detect The Mutation In A Camouflaged Social Network, Karthika Subbaraj, Bose Sundan Jan 2018

Mutatedsocioagentsim (Msas): Semisupervised Modelling Of Multiagent Simulation To Predict And Detect The Mutation In A Camouflaged Social Network, Karthika Subbaraj, Bose Sundan

Turkish Journal of Electrical Engineering and Computer Sciences

A social network is a networked structure formed by a set of agents/actors. It describes their interrelationships that facilitate the exchange and flow of resources and information. A camouflaged social network is one such community that influences the underlying structure and the profile of the agents, to cause mutation. The proposed MSAM is a novel system that simulates a multiagent network whose community structure is analyzed to identify the critical agents by studying the mutations caused due to attachment and detachment of agents. The isolation of the tagged agents will demonstrate disruption of information flow, which leads to the dismantling …


User Interaction In Hands-Free Gaming: A Comparative Study Of Gaze-Voice And Touchscreen Interface Control, Muhtar Çağkan Uludağli, Cengi̇z Acartürk Jan 2018

User Interaction In Hands-Free Gaming: A Comparative Study Of Gaze-Voice And Touchscreen Interface Control, Muhtar Çağkan Uludağli, Cengi̇z Acartürk

Turkish Journal of Electrical Engineering and Computer Sciences

The goal of the present study is to contribute to the research on the use of eye tracking in hands-free gaming. We report the results of an experimental study by using a platform game designed by the authors. The game allowed gaze-voice command control, as well touchscreen control of the interface by the player. We employed a set of performance measures and we measured player engagement as an indicator of user experience. The findings revealed that the players did not improve in game performance when they used the gaze-voice control compared to the touchscreen control. On the other hand, they …


Feature Selection Algorithm For No-Reference Image Quality Assessment Using Natural Scene Statistics, Imran Fareed Nizami, Muhammad Majid, Khawar Khurshid Jan 2018

Feature Selection Algorithm For No-Reference Image Quality Assessment Using Natural Scene Statistics, Imran Fareed Nizami, Muhammad Majid, Khawar Khurshid

Turkish Journal of Electrical Engineering and Computer Sciences

Images play an essential part in our daily lives and the performance of various imaging applications is dependent on the user?s quality of experience. No-reference image quality assessment (NR-IQA) has gained importance to assess the perceived quality, without using any prior information of the nondistorted version of the image. Different NR-IQA techniques that utilize natural scene statistics classify the distortion type based on groups of features and then these features are used for estimating the image quality score. However, every type of distortion has a different impact on certain sets of features. In this paper, a new feature selection algorithm …


Diode Clamped Gate Driver-Based High Voltage Pulse Generator For Electroporation, Krishnaveni Subramani, Rajini Veeraraghavalu Jan 2018

Diode Clamped Gate Driver-Based High Voltage Pulse Generator For Electroporation, Krishnaveni Subramani, Rajini Veeraraghavalu

Turkish Journal of Electrical Engineering and Computer Sciences

Pulsed electric field technology is an emerging nonthermal food processing method. PEF food processing requires a high voltage pulse generator that produces high intensive pulses to be delivered to the food product. Innovation in semiconductor technology motivates researchers to modernize high voltage pulse generators to reduce the cost, size, and complexities in circuit operation and to increase the suitability for food processing since the last few decades. The present study aims to explore a high voltage pulse generator for electroporation study. The implemented high voltage pulse generator develops $\sim $1.62 kV with adjustable pulse widths of 0.62 $\mu $s and …


A New Technique For Optimum Excitation Of Switched Reluctance Motor Drives Over A Wide Speed Range, Mahmoud Hamouda, László Számel Jan 2018

A New Technique For Optimum Excitation Of Switched Reluctance Motor Drives Over A Wide Speed Range, Mahmoud Hamouda, László Számel

Turkish Journal of Electrical Engineering and Computer Sciences

Optimum performance of switched reluctance motors (SRMs) over a wide range of speed control is an essential approach for many industrial applications. However, the doubly salient structure and deep magnetic saturation make magnetization characteristics of SRMs a highly nonlinear function of rotor position and current magnitude. This, in turn, makes the control of SRM drives a challenging task. As the control of SRMs depends on the inductance profile, it requires an adaptive control technique for optimum operation over a wide range of operating speeds. This paper presents an adaptive control technique for optimum excitation of SRM drives. The proposed control …


Multimodal Medical Imaging Repository And Information System In Epilepsysurgery, Gülsüm Akdeni̇z, İbrahi̇m Atli, Fati̇h Vehbi̇ Çelebi̇ Jan 2018

Multimodal Medical Imaging Repository And Information System In Epilepsysurgery, Gülsüm Akdeni̇z, İbrahi̇m Atli, Fati̇h Vehbi̇ Çelebi̇

Turkish Journal of Electrical Engineering and Computer Sciences

Surgery is an option for patients with drug-resistant epilepsy, but it requires a comprehensive assessment. Electroencephalography (EEG), magnetic resonance imaging (MRI), and functional MRI (fMRI) are used to localize the epileptogenic zone, which directly affects the surgery outcome. Accessing EEG, MRI, and fMRI results and patient information simultaneously using traditional methods might result in misinformation and increase the workload of clinicians. In this study, we developed a modern web-based repository system for the preoperative evaluation of epilepsy disorder, including multimodal medical images and patient information. Our dedicated system is enriched with clinical metadata that are not currently available and is …


Gnss Augmentation Through Ku-Band Communication Satellites With Rtkrealization, Şenol Gülgönül Jan 2018

Gnss Augmentation Through Ku-Band Communication Satellites With Rtkrealization, Şenol Gülgönül

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, a method to broadcast real-time kinematics (RTK) corrections over a communication satellite is proposed. RTK corrections generated by the reference station are uplinked to the communication satellite within a multiplexed DVB-S carrier. Corrections are received by a satellite dish and the DVB-S satellite receiver. Better than 18 cm of accuracy is achieved for rover distances of up to 500 km in Turkey. The proposed method can be used as an alternative satellite-based augmentation system for Turkey and other countries.


An Optimized Multiobjective Cpu Job Scheduling Using Evolutionary Algorithms, Santhi Venkatraman, Dharshikha Selvagopal Jan 2018

An Optimized Multiobjective Cpu Job Scheduling Using Evolutionary Algorithms, Santhi Venkatraman, Dharshikha Selvagopal

Turkish Journal of Electrical Engineering and Computer Sciences

Scheduling in a multiprocessor parallel computing environment is an NP-hard optimization problem. The main objective of this work is to obtain a schedule in a distributed computing system (DCS) environment that minimizes the makespan and maximizes the throughput. We study the use of two of the evolutionary swarm optimization techniques, the firefly algorithm and the artificial bee colony (ABC) algorithm, to optimize the scheduling in a DCS. We also enhance the traditional ABC algorithm by merging the genetic algorithm techniques of crossover and mutation with the employed bee phase and the onlooker phase, respectively. The resulting enhanced ABC algorithm is …


Improved Discrete Sliding Mode Control Strategy For Pulse-Width Modulationrectifier, Jing Cao, Chaonan Tong Jan 2018

Improved Discrete Sliding Mode Control Strategy For Pulse-Width Modulationrectifier, Jing Cao, Chaonan Tong

Turkish Journal of Electrical Engineering and Computer Sciences

An improved sliding mode control utilizing repetitive control (ISMRC) is proposed for a three-phase pulse- width modulation (PWM) rectifier. The proposed controller integrates the advantages of both sliding mode control (SMC) and repetitive control (RC) by implementing a structure that embeds an RC controller into the equivalent control branch of an SMC controller. Both a simulation and an experiment are conducted to compare the proposed ISMRC controller with a conventional SMC controller. It is demonstrated that the fifth harmonic distortion of the current of the PWM rectifier system is controlled at 3.3%, the power factor is close to the unit, …


Decoupled Indirect Duty Cycle Pwm Technique With Carrier Frequency Adjustmentfor A Matrix Converter, Murugesan Kullan, Senthilkumaran Mahadevan, Anitha Roseline Johnson, Ranganath Muthu Jan 2018

Decoupled Indirect Duty Cycle Pwm Technique With Carrier Frequency Adjustmentfor A Matrix Converter, Murugesan Kullan, Senthilkumaran Mahadevan, Anitha Roseline Johnson, Ranganath Muthu

Turkish Journal of Electrical Engineering and Computer Sciences

The conventional sinusoidal pulse width modulation (SPWM) and the space vector PWM (SVPWM) switching techniques are widely used for power converters due to their ability to control the harmonic content of the output voltage. The most popular PWM techniques used in matrix converters are direct space vector modulation (DSVM) and indirect space vector modulation (ISVM). Since these techniques are complex and difficult to implement, there is demand for a PWM technique with minimum computation to operate matrix converters continuously. In this paper, decoupled indirect duty cycle (DIDC) PWM technique is proposed for the conventional matrix converter (CMC). This technique eliminates …


Field-Verified Integrated Eaf-Svc-Electrode Positioning Model Simulation And Anovel Hybrid Series Compensation Control For Eaf, Ahmed Hassan, Amr Abou-Ghazala, Ashraf Megahed Jan 2018

Field-Verified Integrated Eaf-Svc-Electrode Positioning Model Simulation And Anovel Hybrid Series Compensation Control For Eaf, Ahmed Hassan, Amr Abou-Ghazala, Ashraf Megahed

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, modeling and simulation of a typical steel-making network are realized using MATLAB Simulink environment and validated using trends collected from an actual steel plant. The models integrate different reactions between an electric arc furnace (EAF), a static Var compensator, and electrode positioning systems according to a previously introduced theory of operations. In addition, the conventional electrode positioning control performance is compared with the new hybrid series compensation control method to demonstrate the superiority of the new method regarding system response. With help of the proposed series compensation, the reference resistance value was restored 2.5 s faster than …


Fragment-Based Transmission Using Minimum Power Consumed Routing(Fbtmpcr) Algorithm Of A Mimo Integrated Manet, Swati Chowdhuri, Pranab Banerjee, Sheli Sinha Chaudhury Jan 2018

Fragment-Based Transmission Using Minimum Power Consumed Routing(Fbtmpcr) Algorithm Of A Mimo Integrated Manet, Swati Chowdhuri, Pranab Banerjee, Sheli Sinha Chaudhury

Turkish Journal of Electrical Engineering and Computer Sciences

The establishment of an efficient broadcast routing technique in a multiple input multiple output (MIMO)- based mobile ad hoc network is a challenge in wireless communication. MIMO configuration provides enhancement of data throughput even under conditions of interference and multipath fading. Improvement of transmission efficiency by increasing saturation throughput, reducing transmission delay, and minimizing bit error rate is the main motivation of the present work. In this paper a hybrid routing algorithm, fragment-based transmission using minimum power consumed routing, has been developed. It is an integration of the cooperative transmission process and fragmentation of packet payload. The routing algorithm is …


Two-Stage Optimization Method For Power Loss And Voltage Profile Control Indistribution Systems With Dgs And Evs Using Stochastic Second-Order Coneprogramming, Huiling Tang, Jiekang Wu, Zhijiang Wu, Lingmin Chen Jan 2018

Two-Stage Optimization Method For Power Loss And Voltage Profile Control Indistribution Systems With Dgs And Evs Using Stochastic Second-Order Coneprogramming, Huiling Tang, Jiekang Wu, Zhijiang Wu, Lingmin Chen

Turkish Journal of Electrical Engineering and Computer Sciences

This paper introduces a stochastic second-order cone programming (SSCOP) approach to solve the distributed generation coordination problem considering the uncertainty of electric vehicle charging in distribution networks. To minimize the total power loss in the distribution system, the problem is formulated to coordinate the output power of distributed generations (DGs). Two stages are presented to solve the optimization problem: the first stage is to optimize the output power of distributed generators without electric vehicle charging in the distribution system, and the second stage is to optimize the output power of distributed generators according to the stochastic increased load due to …


A Novel Perturbed Particle Swarm Optimization-Based Support Vector Machine Forfault Diagnosis In Power Distribution Systems, Hoang Thi Thom, Cho Ming-Yuan, Vu Quoc Tuan Jan 2018

A Novel Perturbed Particle Swarm Optimization-Based Support Vector Machine Forfault Diagnosis In Power Distribution Systems, Hoang Thi Thom, Cho Ming-Yuan, Vu Quoc Tuan

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a novel perturbed particle swarm optimization (PPSO) algorithm is investigated to improve the performance of a support vector machine (SVM) for short-circuit fault diagnosis in power distribution systems. In the proposed PPSO algorithm, the velocity of each particle is perturbed whenever the particles strike into a local optimum, in order to achieve a higher quality solution to optimization problems. Furthermore, the concept of proposed perturbation is applied to three variants of PSO, and improved corresponding algorithms are named perturbed C-PSO (PC-PSO), perturbed T-PSO (PT-PSO), and perturbed K-PSO (PK-PSO). For the purpose of fault diagnosis, the time- domain …


Multiobjective Aerodynamic Optimization Of A Microscale Ducted Wind Turbineusing A Genetic Algorithm, Emre Alpman Jan 2018

Multiobjective Aerodynamic Optimization Of A Microscale Ducted Wind Turbineusing A Genetic Algorithm, Emre Alpman

Turkish Journal of Electrical Engineering and Computer Sciences

A two-objective aerodynamic optimization of a microscale ducted wind turbine was performed using a genetic algorithm. Two different fitness function pairs were considered for this purpose. In the first alternative the algorithm maximized the power produced while minimizing the drag force at a given wind speed and tip speed ratio. In the second alternative, however, the annual energy production was maximized while minimizing the maximum drag force developed between the cut-in and cut-off wind speeds. Computational uid dynamics solutions performed for selected best designs showed that optimizations performed using the second alternative yielded better turbines, which could produce more power …


Consistency-Based Trust Management In P2p Networks, Yasi̇n Şahi̇n, Ahmet Burak Can Jan 2018

Consistency-Based Trust Management In P2p Networks, Yasi̇n Şahi̇n, Ahmet Burak Can

Turkish Journal of Electrical Engineering and Computer Sciences

Detecting malicious peers is a challenging task in peer-to-peer networks due to their decentralized structure and lack of central authority. Trust models can help identify malicious peers by maintaining information about peer relations and interactions. Keeping information about trust relations helps to reduce risks when providing or using services. This paper introduces two consistency concepts in trust management. Feedback consistency is used to evaluate how consistent feedback is with respect to past feedbacks. On the other side, peer consistency measures consistency of a peer's past feedbacks. These metrics help to reduce malicious interactions and increase successful downloads. Furthermore, the model …


Automated Testing For Distributed Databases With Fuzzy Fragment Reallocation, Akhan Akbulut, Gözde Karataş Jan 2018

Automated Testing For Distributed Databases With Fuzzy Fragment Reallocation, Akhan Akbulut, Gözde Karataş

Turkish Journal of Electrical Engineering and Computer Sciences

As the Internet and big data become more widespread, relational database management systems (RDBMSs) become increasingly inadequate for web applications. To provide what RDBMSs cannot, during the past 15 years distributed database systems (DDBSs) have thus emerged. However, given the complicated structure of these systems, the methods used to validate the efficiency of databases, all towards ensuring quality and security, have become diversified. In response, this paper demonstrates a system for performing automated testing with DDBSs, given that testing is significant in software verification and that accredited systems are more productive in business environments. The proposed system applies several tests …


Design And Implementation Of A New Speed Planner For Semiautonomous Systems, Mustafa Demi̇r, Volkan Sezer Jan 2018

Design And Implementation Of A New Speed Planner For Semiautonomous Systems, Mustafa Demi̇r, Volkan Sezer

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a new speed planning method is developed for semiautonomous systems by improving our previous fuzzy logic-based approach. In this proposed method, an extended risk factor is calculated on top of the classical risk factor, using environmental factors and the user's speed reference. We obtain safer speed values in critical scenarios with this new extended risk factor definition. Another improvement comes from the design of the semiautonomous architecture. Instead of the fully autonomous solution of the previous work, we calculate the final speed reference by combining the risk factor-based speed value and user's speed reference, which provides a …