Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 241 - 270 of 3020

Full-Text Articles in Physical Sciences and Mathematics

Performance Analysis And Feature Selection For Network-Based Intrusion Detectionwith Deep Learning, Serhat Caner, Nesli̇ Erdoğmuş, Yusuf Murat Erten Mar 2022

Performance Analysis And Feature Selection For Network-Based Intrusion Detectionwith Deep Learning, Serhat Caner, Nesli̇ Erdoğmuş, Yusuf Murat Erten

Turkish Journal of Electrical Engineering and Computer Sciences

An intrusion detection system is an automated monitoring tool that analyzes network traffic and detects malicious activities by looking out either for known patterns of attacks or for an anomaly. In this study, intrusion detection and classification performances of different deep learning based systems are examined. For this purpose, 24 deep neural networks with four different architectures are trained and evaluated on CICIDS2017 dataset. Furthermore, the best performing model is utilized to inspect raw network traffic features and rank them with respect to their contributions to success rates. By selecting features with respect to their ranks, sets of varying size …


Determining Allowable Parametric Uncertainty In An Uncommon Quadrotormodel For Closed Loop Stability, Mehmet Baskin, Mehmet Kemal Leblebi̇ci̇oğlu Mar 2022

Determining Allowable Parametric Uncertainty In An Uncommon Quadrotormodel For Closed Loop Stability, Mehmet Baskin, Mehmet Kemal Leblebi̇ci̇oğlu

Turkish Journal of Electrical Engineering and Computer Sciences

In this article, control oriented uncertainty modeling of an uncommon quadrotor in hover is discussed. This quadrotor consists of two counter-rotating big rotors on longitudinal axis and two counter-rotating small tilt rotors on lateral axis. Firstly, approximate linear model of this vehicle around hover is obtained by using Newton--Euler formulation. Secondly, specific uncertainty is assigned to each parameter. Resulting uncertain model is converted into a linear fractional transformation framework for robustness analysis. Next, the most critical uncertain parameters in terms of robust stability in a proposed quadrotor model are investigated using $ \mu $ sensitivities. Finally, skewed-$ \mu $ analysis …


Improving Utilization Rate Of Semi-Parallel Successive Cancellation Architecture For Polar Codes Using 2-Bit Decoding, Dinesh Kumar Devadoss, Shantha Selva Kumari Rama Packiam Mar 2022

Improving Utilization Rate Of Semi-Parallel Successive Cancellation Architecture For Polar Codes Using 2-Bit Decoding, Dinesh Kumar Devadoss, Shantha Selva Kumari Rama Packiam

Turkish Journal of Electrical Engineering and Computer Sciences

Polar codes are the capacity-achieving error-correcting code proved to be a significant invention in coding theory. It can achieve channel capacity at infinite code length N due to its explicit code construction. However, the processing complexity along with the higher latency due to successive cancellation (SC) decoding is being a major design issue, which reduces the utilization rate in the decoder architectures. This paper presents a modified semi-parallel architecture for decoding polar code with a better decoding latency. Precomputation and look-ahead techniques are used to generate two bits in the final stage. Pipelined partial-sum unit with a less critical path …


Predictive Optimization Of Sliding Mode Control Using Recurrent Neural Paradigmfor Nonlinear Dfig-Wpgs During Distorted Voltage, Omar Busati, Xiangjie Liu Mar 2022

Predictive Optimization Of Sliding Mode Control Using Recurrent Neural Paradigmfor Nonlinear Dfig-Wpgs During Distorted Voltage, Omar Busati, Xiangjie Liu

Turkish Journal of Electrical Engineering and Computer Sciences

Dynamic characteristics of the doubly-fed induction generator (DFIG)-based wind power generation (WPGS) are fully nonlinear. Therefore, issues such as stability and achieving high efficiency, especially under harmonics behavior, are challenges that assess the control strategy reliability to find the perfect dynamic solution. This discussion offers a control strategy for the separated stator-port power using a predictive sliding mode strategy with a resonant function (PSMC-R) based on a deep recurrent neural network (DRNN). DRNN is formed as a low-order Taylor series formula. PSMC-R predicts the perfect switching surface path and regulates the distorted nonlinear DFIG with several dynamic aims. This approach …


Scattering Analyses Of Arbitrary Roughness From 2-D Perfectly Conductiveperiodic Surfaces With Moments Method, Yunus Emre Yamaç, Ahmet Kizilay Mar 2022

Scattering Analyses Of Arbitrary Roughness From 2-D Perfectly Conductiveperiodic Surfaces With Moments Method, Yunus Emre Yamaç, Ahmet Kizilay

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a periodic-MoM-based code with high accuracy performance is developed to calculate electromagnetic scattering from a periodic conductive surface in two dimensions with any degree of roughness. Firstly, the existing separate methods in the literature are reviewed step by step to compose a periodic-MoM solution for 2-D periodic surfaces. Then, the dynamic selection of optimal formulation of the periodic-MoM solutions created using these existing methods is evaluated to reduce solution time and obtain high accuracy. In this study, the performance parameters of the existing methods are investigated in solving a real 3-D scattering problem by a periodic-MoM for …


On An Electrostatic Micropump With A Rigorous Mathematical Model, İbrahi̇m Efe, Fati̇h Di̇kmen, Yury Tuchkin Mar 2022

On An Electrostatic Micropump With A Rigorous Mathematical Model, İbrahi̇m Efe, Fati̇h Di̇kmen, Yury Tuchkin

Turkish Journal of Electrical Engineering and Computer Sciences

The novel electrostatic micropump model for applications such as in biomedical drug delivery is presented. The geometrical arrangement of the coupling rigid electrodes lets us exploit our mathematically rigorous boundary integral equation formulation and its solution. Thus, the charge densities involving the fringe effects on the plates are obtained by means of analytical regularization method (ARM) constructed for annular strips earlier. The efficiency of the constructed method is demonstrated with respect to the direct integral equation solvers implemented via the entire domain Galerkin method and point matching. The main physical characteristics of the suggested system and their deviation from that …


Design And Manufacture Of Electromagnetic Absorber Composed Of Boricacid-Incorporated Wastepaper Composites, Ali̇ İhsan Kaya, Ahmet Çi̇fci̇, Fi̇li̇z Kirdioğullari, Mesud Kahri̇man, Osman Çerezci̇ Mar 2022

Design And Manufacture Of Electromagnetic Absorber Composed Of Boricacid-Incorporated Wastepaper Composites, Ali̇ İhsan Kaya, Ahmet Çi̇fci̇, Fi̇li̇z Kirdioğullari, Mesud Kahri̇man, Osman Çerezci̇

Turkish Journal of Electrical Engineering and Computer Sciences

With the effect of technological advances, the use of electrical and electronic devices has increased dramatically in recent years. Wireless technologies and related applications are mostly preferred for the communication of these devices with each other. Thus, people are easily exposed to electromagnetic waves in daily life. The extensive global use of these devices raises the question of their possible biological effects on human health. Also, electromagnetic waves influence the functioning of a nearby device. In this study, an electromagnetic absorber based on boric acid (5, 10, 20, and 30 wt%) added wastepaper was developed. Copper (Cu) and aluminum (Al) …


A New Similarity-Based Multicriteria Recommendation Algorithm Based Onautoencoders, Zeynep Batmaz, Ci̇han Kaleli̇ Mar 2022

A New Similarity-Based Multicriteria Recommendation Algorithm Based Onautoencoders, Zeynep Batmaz, Ci̇han Kaleli̇

Turkish Journal of Electrical Engineering and Computer Sciences

Recommender systems provide their users an efficient way to handle information overload problem by offering personalized suggestions. Traditional recommender systems are based on two-dimensional user-item preference matrix constructed depending on the users' overall evaluations over items. However, they have begun to present their preferences under various circumstances. Thus, traditional recommendation techniques fail to process multicriteria ratings during the recommendation process. Multicriteria recommender systems are an extension of traditional recommender systems that utilize multicriteria-based user preferences. Multicriteria recommender systems provide more personalized and accurate predictions compared to traditional recommender systems. However, the increased amount of data dimension causes sparsity to be …


Defect Classification Of Railway Fasteners Using Image Preprocessing And Alightweight Convolutional Neural Network, İlhan Aydin, Mehmet Sevi̇, Mehmet Umut Salur, Erhan Akin Mar 2022

Defect Classification Of Railway Fasteners Using Image Preprocessing And Alightweight Convolutional Neural Network, İlhan Aydin, Mehmet Sevi̇, Mehmet Umut Salur, Erhan Akin

Turkish Journal of Electrical Engineering and Computer Sciences

Railway fasteners are used to securely fix rails to sleeper blocks. Partial wear or complete loss of these components can lead to serious accidents and cause train derailments. To ensure the safety of railway transportation, computer vision and pattern recognition-based methods are increasingly used to inspect railway infrastructure. In particular, it has become an important task to detect defects in railway tracks. This is challenging since rail track images are acquired using a measuring train in varying environmental conditions, at different times of day and in poor lighting conditions, and the resulting images often have low contrast. In this study, …


Smart Charging Of Electric Vehicles To Minimize The Cost Of Chargingand The Rate Of Transformer Aging In A Residential Distribution Network, Arjun Visakh, M P. Selvan Mar 2022

Smart Charging Of Electric Vehicles To Minimize The Cost Of Chargingand The Rate Of Transformer Aging In A Residential Distribution Network, Arjun Visakh, M P. Selvan

Turkish Journal of Electrical Engineering and Computer Sciences

Electric vehicles (EVs) exhibit several benefits over combustion engine vehicles, making them an attractive mode of mobility for the future. However, supplying the electrical energy required to recharge their batteries could adversely affect the power system infrastructure. The most severe impact of EV integration is expected to be on the distribution transformers, which are among the costliest equipment in the distribution network. Sustained overloads on the transformer could lead to accelerated aging and early retirement. As the rate of EV deployment rises, so does the probability of transformer overloads and the subsequent loss of life. There is a need for …


A Bi-Level Charging Management Approach For Electric Truck Charging Stationconsidering Power Losses, Tayfur Gökçek, Mehmet Tan Turan, Yavuz Ateş, Ahmet Yi̇ği̇t Arabul Mar 2022

A Bi-Level Charging Management Approach For Electric Truck Charging Stationconsidering Power Losses, Tayfur Gökçek, Mehmet Tan Turan, Yavuz Ateş, Ahmet Yi̇ği̇t Arabul

Turkish Journal of Electrical Engineering and Computer Sciences

This article presents an optimized heavy duty electric truck charging station (ETCS) design based on bi-level mixed integer linear programming. Electric truck parameters are integrated with the grid model and charging sequences are firstly formulated to optimize charging stages. As the second level of the optimization stage, line losses are aimed to be minimized for the charging station. ETCS model is obtained from actual parameters of the Istanbul Muratbey Customs zone which is one of the busiest customs zone in Europe and an ideal location for ETCS application in the future. The ETCS is equipped with roof type photovoltaic (PV) …


Visual Interpretability Of Capsule Network For Medical Image Analysis, Mighty Abra Ayidzoe, Yu Yongbin, Patrick Kwabena Mensah, Jingye Cai, Faiza Umar Bawah Mar 2022

Visual Interpretability Of Capsule Network For Medical Image Analysis, Mighty Abra Ayidzoe, Yu Yongbin, Patrick Kwabena Mensah, Jingye Cai, Faiza Umar Bawah

Turkish Journal of Electrical Engineering and Computer Sciences

Deep learning (DL) models are currently not widely deployed for critical tasks such as in health. This is attributable to the "black box", making it difficult to gain the trust of practitioners. This paper proposes the use of visualizations to enhance performance verification, improve monitoring, ensure understandability, and improve interpretability needed to gain practitioners' confidence. These are demonstrated through the development of a CapsNet model for the recognition of gastrointestinal tract infection. The gastrointestinal tract comprises several organs joined in a long tube from the mouth to the anus. It is susceptive to diseases that are difficult for medics to …


Tara: Temperature Aware Online Dynamic Resource Allocation Scheme For Energyoptimization In Cloud Data Centres, Narayanamoorthi Thilagavathi, Arockiasamy John Prakash, Sridhar Sridevi, Vaidyanathan Rhymend Uthariaraj Mar 2022

Tara: Temperature Aware Online Dynamic Resource Allocation Scheme For Energyoptimization In Cloud Data Centres, Narayanamoorthi Thilagavathi, Arockiasamy John Prakash, Sridhar Sridevi, Vaidyanathan Rhymend Uthariaraj

Turkish Journal of Electrical Engineering and Computer Sciences

Cloud data centres, which are characteristic of dynamic workloads, if not optimized for energy consumption, may lead to increased heat dissipation and eventually impact the environment adversely. Consequently, optimizing the usage of energy has become a hard requirement in today's cloud data centres wherein the major part of energy consumption is mostly attributed to computing and cooling systems. Motivated by which this paper proposes an online algorithm for dynamic resource allocation, namely, temperature aware online dynamic resource allocation algorithm (TARA). TARA demonstrates a novel algorithm design to adapt dynamic resource allocation based on the temperature of a data centre using …


Event-Related Microblog Retrieval In Turkish, Çağri Toraman Mar 2022

Event-Related Microblog Retrieval In Turkish, Çağri Toraman

Turkish Journal of Electrical Engineering and Computer Sciences

Microblogs, such as tweets, are short messages in which users are able to share any opinion and information. Microblogs are mostly related to real-life events reported in news articles. Finding event-related microblogs is important to analyze online social networks and understand public opinion on events. However, finding such microblogs is a challenging task due to the dynamic nature of microblogs and their limited length. In this study, assuming that news articles are given as queries and microblogs as documents, we find event-related microblogs in Turkish. In order to represent news articles and microblogs, we examine encoding methods, namely traditional bag-of-words …


Identification And Mitigation Of Non-Line-Of-Sight Path Effect Using Repeater Forhybrid Ultra-Wideband Positioning And Networking System, Gwo Chin Chung, Mohd. Aqmal Syafiq Kamarudin, It Ee Lee, Soo Fun Tan Mar 2022

Identification And Mitigation Of Non-Line-Of-Sight Path Effect Using Repeater Forhybrid Ultra-Wideband Positioning And Networking System, Gwo Chin Chung, Mohd. Aqmal Syafiq Kamarudin, It Ee Lee, Soo Fun Tan

Turkish Journal of Electrical Engineering and Computer Sciences

At least two decades ago, various applications have been proposed for the implementation of ultra-wideband (UWB) technology, but only a few of them are being realised such as radar detection, home networking, and indoor positioning. Although UWB positioning offers precise locality tracking, the accuracy of the estimation is greatly affected by the non-line-of-sight (NLOS) path effect. In this paper, we propose a hybrid indoor UWB positioning and networking system that utilises the existing repeater of the data network to eliminate the NLOS paths. A switching algorithm is written to identify the existence of NLOS paths based on received signal strength …


Identification Of Gain And Phase Margins Based Robust Stability Regions For Atime-Delayed Micro-Grid System Including Fractional-Order Controller In Presenceof Renewable Power Generation, Hakan Gündüz, Şahi̇n Sönmez, Saffet Ayasun Mar 2022

Identification Of Gain And Phase Margins Based Robust Stability Regions For Atime-Delayed Micro-Grid System Including Fractional-Order Controller In Presenceof Renewable Power Generation, Hakan Gündüz, Şahi̇n Sönmez, Saffet Ayasun

Turkish Journal of Electrical Engineering and Computer Sciences

This study examines the gain and phase margins (GPMs) based robust stability margins in the parameter space of fractional order proportional-integral (FOPI) controller for a micro-grid (MG) system with communication time delays. Fluctuations in renewable energy sources (RESs), uncertainties in parameters of system components and communication delays could adversely affect the dynamical analysis and frequency stability of the MG system. Such a MG system has an interval characteristic due to the parametric variations and the interval transfer functions defined by Kharitonov's theorem, which presents a solution for checking of robust stability. Therefore, this study addresses the robust stability regions containing …


Permissioned Blockchain Based Remote Electronic Examination, Öznur Kalkar, İsa Sertkaya Feb 2022

Permissioned Blockchain Based Remote Electronic Examination, Öznur Kalkar, İsa Sertkaya

Turkish Journal of Electrical Engineering and Computer Sciences

Recent coronavirus pandemic transformed almost all aspects of daily life including educational institutions and learning environments. As a result, this transformation brought remote electronic examination (shortly e-exam) concepts back into consideration. In this study, we revisit secure and privacy preserving e-exam protocol proposals and propose an e-exam protocol that utilizes decentralized identity-based verifiable credentials for proof of authentication and public-permissioned blockchain for immutably storing records. In regard to the previously proposed e-exam schemes, our scheme offers both privacy enhancement and better efficiency. More concretely, the proposed solution satisfies test answer authentication, examiner authentication, anonymous marking, anonymous examiner, question secrecy, question …


Blocksim-Net: A Network-Based Blockchain Simulator, Prashanthi Ramachandran, Nandini Agrawal, Osman Bi̇çer, Alpteki̇n Küpçü Feb 2022

Blocksim-Net: A Network-Based Blockchain Simulator, Prashanthi Ramachandran, Nandini Agrawal, Osman Bi̇çer, Alpteki̇n Küpçü

Turkish Journal of Electrical Engineering and Computer Sciences

Since its proposal by Eyal and Sirer (CACM '13), selfish mining attacks on proof-of-work blockchains have been studied extensively. The main body of this research aims at both studying the extent of its impact and defending against it. Yet, before any practical defense is deployed in a real world blockchain system, it needs to be tested for security and dependability. However, real blockchain systems are too complex to conduct any test on or benchmark the developed protocols. Instead, some simulation environments have been proposed recently, such as BlockSim (Maher et al., SIGMETRICS Perform. Eval. Rev. '19), which is a modular …


Performance Analysis Of Lightweight Internet Of Things Devices On Blockchainnetworks, Cem Kösemen, Gökhan Dalkiliç, Şafak Öksüzer Feb 2022

Performance Analysis Of Lightweight Internet Of Things Devices On Blockchainnetworks, Cem Kösemen, Gökhan Dalkiliç, Şafak Öksüzer

Turkish Journal of Electrical Engineering and Computer Sciences

Potential integration or cooperation of the Internet of things (IoT) systems and the blockchain technology is nowadays attracting remarkable interest from the researchers. These inter-operating systems often have to rely on lowcost, low-power, and robust IoT devices that can communicate with the blockchain network through smart contracts. In this work, we designed and ran a benchmark study for ESP32-based lightweight IoT devices interacting within the Quorum blockchain. A software library was built for ESP32 devices to enable elliptic-curve digital signing, Keccak-256 hashing, decoding, encoding, and secure private key generation capabilities, which all are the basic functional requirements for running a …


Tri-Op Redactable Blockchains With Block Modification, Removal, And Insertion, Mohammad Sadeq Dousti, Alpteki̇n Küpçü Feb 2022

Tri-Op Redactable Blockchains With Block Modification, Removal, And Insertion, Mohammad Sadeq Dousti, Alpteki̇n Küpçü

Turkish Journal of Electrical Engineering and Computer Sciences

In distributed computations and cryptography, it is desirable to record events on a public ledger, such that later alterations are computationally infeasible. An implementation of this idea is called blockchain, which is a distributed protocol that allows the creation of an immutable ledger. While such an idea is very appealing, the ledger may be contaminated with incorrect, illegal, or even dangerous data, and everyone running the blockchain protocol has no option but to store and propagate the unwanted data. The ledger is bloated over time, and it is not possible to remove redundant information. Finally, missing data cannot be inserted …


Data Immutability And Event Management Via Blockchain In The Internet Of Things, Hakan Altaş, Gökhan Dalkiliç, Umut Can Çabuk Feb 2022

Data Immutability And Event Management Via Blockchain In The Internet Of Things, Hakan Altaş, Gökhan Dalkiliç, Umut Can Çabuk

Turkish Journal of Electrical Engineering and Computer Sciences

The Internet of things (IoT) is the key enabler of the smart systems used in many areas, from agriculture to aviation, industrial automation to autonomous vehicles. Most IoT deployments employ cost-efficient lightweight devices with limited resources (e.g., bandwidth, energy, storage). Although an IoT network must be built in its simplest form, engineers include more sophisticated devices like gateways and servers to provide web-based services and benefit from cloud systems. So, although the nodes can be widely distributed geographically or topologically, the system becomes centralized, which causes bottlenecks and single-points-of-failure. Furthermore, providing data integrity, nonrepudiation, and event management becomes tricky. In …


Privacy In Blockchain Systems, Murat Osmanoğlu, Ali̇ Aydin Selçuk Feb 2022

Privacy In Blockchain Systems, Murat Osmanoğlu, Ali̇ Aydin Selçuk

Turkish Journal of Electrical Engineering and Computer Sciences

Privacy of blockchains has been a matter of discussion since the inception of Bitcoin. Various techniques with a varying degree of privacy protection and complexity have been proposed over the past decade. In this survey, we present a systematic analysis of these proposals in four categories: (i) identity, (ii) transaction, (iii) consensus, and (iv) smart contract privacy. Each of these categories have privacy requirements of its own, and various solutions have been proposed to meet these requirements. Almost every technique in the literature of privacy enhancing technologies have been applied to blockchains: mix networks, zero-knowledge proofs, blind signatures, ring signatures, …


Block Size Optimization For Pow Consensus Algorithm Based Blockchainapplications By Using Whale Optimization Algorithm, Betül Aygün, Hi̇lal Arslan Feb 2022

Block Size Optimization For Pow Consensus Algorithm Based Blockchainapplications By Using Whale Optimization Algorithm, Betül Aygün, Hi̇lal Arslan

Turkish Journal of Electrical Engineering and Computer Sciences

Blockchain-based applications come up with cryptocurrencies, especially Bitcoin, introducing a distributed ledger technologies for peer-to-peer networks and essentially records the transactions in blocks containing hash value of the previous blocks. Block generation constitutes the basis of this technology, and the optimization of such systems is among the most crucial concerns. Determining either the block size or the number of transactions in the block brings out a remarkable problem that has been solved by the miners in recent years. First, higher block size results in higher transaction time, on the other hand, smaller block size has many disadvantages such as security, …


Estonian Internet Voting With Anonymous Credentials, İsa Sertkaya, Peter Roenne, Peter Y. A. Ryan Feb 2022

Estonian Internet Voting With Anonymous Credentials, İsa Sertkaya, Peter Roenne, Peter Y. A. Ryan

Turkish Journal of Electrical Engineering and Computer Sciences

The Estonian Internet voting (EIV) scheme is a unique example of a long-term nation-wide, legally binding electronic voting deployment. The EIV scheme is used in parallel with standard paper-based election day voting, of course invalidating an already cast i-vote. This necessarily requires careful authentication of the eligible voters and makes the Estonian identity card solution a crucial part of the scheme, however, note that Parsovs has recently drawn attention to the security flaws found in Estonian ID-cards. In this study, we propose an e-voting scheme EIV-AC that integrates the EIV scheme with anonymous credentials based on self-sovereign identity. In addition …


Forming A Decentralized Research Network: Ds4h, Eni̇s Karaarslan, Meli̇h Bi̇ri̇m, Hüseyi̇n Emre Ari Feb 2022

Forming A Decentralized Research Network: Ds4h, Eni̇s Karaarslan, Meli̇h Bi̇ri̇m, Hüseyi̇n Emre Ari

Turkish Journal of Electrical Engineering and Computer Sciences

There is a trend toward decentralized systems, but these systems are developed without conducting enough software tests. Also, the performance, scalability, and sustainability of the decentralized systems are not taken into account. One of the reasons is the time-consuming testing process. The other is the hardware requirements and the complexity of the software installations of the testing environment. Developer communities need stable and secure research networks to test and develop prototypes before releasing the working versions. Cloud-based blockchain test networks are available, but it allows using a specific framework. Also, users are required to learn how to use each framework. …


Cnn Based Sensor Fusion Method For Real-Time Autonomous Robotics Systems, Berat Yildiz, Aki̇f Durdu, Ahmet Kayabaşi, Mehmet Duramaz Jan 2022

Cnn Based Sensor Fusion Method For Real-Time Autonomous Robotics Systems, Berat Yildiz, Aki̇f Durdu, Ahmet Kayabaşi, Mehmet Duramaz

Turkish Journal of Electrical Engineering and Computer Sciences

Autonomous robotic systems (ARS) serve in many areas of daily life. The sensors have critical importance for these systems. The sensor data obtained from the environment should be as accurate and reliable as possible and correctly interpreted by the autonomous robot. Since sensors have advantages and disadvantages over each other they should be used together to reduce errors. In this study, Convolutional Neural Network (CNN) based sensor fusion was applied to ARS to contribute the autonomous driving. In a real-time application, a camera and LIDAR sensor were tested with these networks. The novelty of this work is that the uniquely …


Distributed Wireless Sensor Node Localization Based On Penguin Searchoptimization, Md Al Shayokh, Soo Young Shin Jan 2022

Distributed Wireless Sensor Node Localization Based On Penguin Searchoptimization, Md Al Shayokh, Soo Young Shin

Turkish Journal of Electrical Engineering and Computer Sciences

Wireless sensor networks (WSNs) have become popular for sensing areas-of-interest and performing assigned tasks based on information on the location of sensor devices. Localization in WSNs is aimed at designating distinct geographical information to the inordinate nodes within a search area. Biologically inspired algorithms are being applied extensively in WSN localization to determine inordinate nodes more precisely while consuming minimal computation time. An optimization algorithm belonging to the metaheuristic class and named penguin search optimization (PeSOA) is presented in this paper. It utilizes the hunting approaches in a collaborative manner to determine the inordinate nodes within an area of interest. …


An Approach For Performance Prediction Of Saturated Brushed Permanent Magnetdirect Current (Dc) Motor From Physical Dimensions, Rasul Tarvirdilu, Reza Zeinali, Hulusi̇ Bülent Ertan Jan 2022

An Approach For Performance Prediction Of Saturated Brushed Permanent Magnetdirect Current (Dc) Motor From Physical Dimensions, Rasul Tarvirdilu, Reza Zeinali, Hulusi̇ Bülent Ertan

Turkish Journal of Electrical Engineering and Computer Sciences

An analytical approach for performance prediction of saturated brushed permanent magnet direct current (DC) motors is proposed in this paper. In case of a heavy saturation in the stator back core of electrical machines, some flux completes its path through the surrounding air, and the conventional equivalent circuit cannot be used anymore. This issue has not been addressed in the literature. The importance of considering the effect of the flux penetrating the surrounding air is shown in this paper using finite element simulations and experimental results, and an analytical approach is proposed to consider this effect on magnet operating point …


Deep Learning-Aided Automated Personal Data Discovery And Profiling, Apdullah Yayik, Vedat Aybar, Hasan Hüseyi̇n Apik, Sevcan İçöz, Beki̇r Bakar, Tunga Güngör Jan 2022

Deep Learning-Aided Automated Personal Data Discovery And Profiling, Apdullah Yayik, Vedat Aybar, Hasan Hüseyi̇n Apik, Sevcan İçöz, Beki̇r Bakar, Tunga Güngör

Turkish Journal of Electrical Engineering and Computer Sciences

In Turkey, Turkish Personal Data Protection Rule (PDPR) No. 6698, in force since 2016, provides protection to citizens for the legal existence of their personal data. Although the law provides excellent guidance, companies currently face challenges in complying with its regulations in terms of storing, sharing, or monitoring personal data. Since any specially designed software with wide industrial usage is not on the market, almost all of the companies have no other choice but to take expensive and error-prone operations manually to ensure their compliance. In this paper, we present an automated solution to facilitate and accelerate PDPR compliance. In …


An Effective Prediction Method For Network State Information In Sd-Wan, Erdal Akin, Ferdi̇ Saraç, Ömer Aslan Jan 2022

An Effective Prediction Method For Network State Information In Sd-Wan, Erdal Akin, Ferdi̇ Saraç, Ömer Aslan

Turkish Journal of Electrical Engineering and Computer Sciences

In a software-defined wide area network (SD-WAN), a logically centralized controller is responsible for computing and installing paths in order to transfer packets among geographically distributed locations and remote users. Accordingly, this would necessitate obtaining the global view and dynamic network state information (NSI) of the network. Therefore, the centralized controller periodically collects link-state information from each port of each switch at fixed time periods. While collecting NSI in short periods causes protocol overhead on the controller, collecting in longer periods leads to obtaining inaccurate NSI. In both cases, packet losses are inevitable, which is not preferred for quality of …