Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

Journal

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 256

Full-Text Articles in Entire DC Network

Security Fusion Method Of Physical Fitness Training Data Based On The Internet Of Things, Bin Zhou May 2024

Security Fusion Method Of Physical Fitness Training Data Based On The Internet Of Things, Bin Zhou

Turkish Journal of Electrical Engineering and Computer Sciences

Physical fitness training, an important way to improve physical fitness, is the basic guarantee for forming combat effectiveness. At present, the evaluation types of physical fitness training are mostly conducted manually. It has problems such as low efficiency, high consumption of human and material resources, and subjective factors affecting the evaluation results. ”Internet+” has greatly expanded the traditional network from the perspective of technological convergence and network coverage objects. It has expedited and promoted the rapid development of Internet of Things (IoT) technology and its applications. The IoT with many sensor nodes shows the characteristics of acquisition information redundancy, node …


Unveiling Anomalies: A Survey On Xai-Based Anomaly Detection For Iot, Esin Eren, Feyza Yildirim Okay, Suat Özdemi̇r May 2024

Unveiling Anomalies: A Survey On Xai-Based Anomaly Detection For Iot, Esin Eren, Feyza Yildirim Okay, Suat Özdemi̇r

Turkish Journal of Electrical Engineering and Computer Sciences

In recent years, the rapid growth of the Internet of Things (IoT) has raised concerns about the security and reliability of IoT systems. Anomaly detection is vital for recognizing potential risks and ensuring the optimal functionality of IoT networks. However, traditional anomaly detection methods often lack transparency and interpretability, hindering the understanding of their decisions. As a solution, Explainable Artificial Intelligence (XAI) techniques have emerged to provide human-understandable explanations for the decisions made by anomaly detection models. In this study, we present a comprehensive survey of XAI-based anomaly detection methods for IoT. We review and analyze various XAI techniques, including …


Allocation Of Phasor Measurement Units In The Wide-Area Measurement System, Samir Dawoud, Mohamed Elnemr, Alyaa Yehia Mar 2024

Allocation Of Phasor Measurement Units In The Wide-Area Measurement System, Samir Dawoud, Mohamed Elnemr, Alyaa Yehia

Journal of Engineering Research

WIDE Area in the power system which has been introduced to power system literature in the late 1980s. They are now commercially in power systems for purposes of monitoring, operation, and control. The wide area is a combination between the phasor measurement unit (PMU) and communication infrastructure (CI). In this paper, the location of the PMU and the CI can be optimized to involve system observability. There are a lot of methods to solve the optimal placement of PMU. The communication infrastructure is designed and implemented to collect the data from PMU and transfer data to the control center. In …


Longitudinal Attacks Against Iterative Data Collection With Local Differential Privacy, Mehmet Emre Gürsoy Feb 2024

Longitudinal Attacks Against Iterative Data Collection With Local Differential Privacy, Mehmet Emre Gürsoy

Turkish Journal of Electrical Engineering and Computer Sciences

Local differential privacy (LDP) has recently emerged as an accepted standard for privacy-preserving collection of users’ data from smartphones and IoT devices. In many practical scenarios, users’ data needs to be collected repeatedly across multiple iterations. In such cases, although each collection satisfies LDP individually by itself, a longitudinal collection of multiple responses from the same user degrades that user’s privacy. To demonstrate this claim, in this paper, we propose longitudinal attacks against iterative data collection with LDP. We formulate a general Bayesian adversary model, and then individually show the application of this adversary model on six popular LDP protocols: …


Market Analysis And Bidding Strategy Of Hybrid Renewable Energy Systems Considering Emissions, Fatma Elzahraa, Mohamed Elnemr, Samir Dawoud Jan 2024

Market Analysis And Bidding Strategy Of Hybrid Renewable Energy Systems Considering Emissions, Fatma Elzahraa, Mohamed Elnemr, Samir Dawoud

Journal of Engineering Research

The competition in the electricity markets makes it difficult to choose a suitable strategy for maximizing profit while reducing harmful emissions. To have an adequate energy price for consumers while minimizing the harmful emissions to the atmosphere and maximizing profits of all participants in the electricity market needs an aggressive bidding strategy. Developing these bidding strategies with the integration of renewable energy (RE) in the electricity market became important. This research studies various bidding strategies for maximizing profits in the deregulated energy market since participants are keen on developing bidding strategies considering emissions. These bidding strategies will consider the integration …


Trends In The Development And Improvement Of Glass Furnaces And Monitoring And Control Systems, N.R Yusupbekov, O'Tkir U. Xolmanov Oct 2023

Trends In The Development And Improvement Of Glass Furnaces And Monitoring And Control Systems, N.R Yusupbekov, O'Tkir U. Xolmanov

Chemical Technology, Control and Management

The theory and practice of establishing industrial automation systems for glass furnaces and installations as they are right now are taken into consideration. Comparative analysis is based on publications over the last 20 years in the field being studied. On the basis of an analysis of the review materials, generalizations are made that form the basis for proposals aimed at modernizing and improving the technology and instrumentation of fuel combustion processes in gas-burning furnaces and installations, as well as monitoring and control systems for technological processes occurring in glass furnaces and installations.


Metric Algorithms Of Symbol Detection For Determining A Group Of Significant Objects, Sherzod Ismoiljonovich Yuldashev Oct 2023

Metric Algorithms Of Symbol Detection For Determining A Group Of Significant Objects, Sherzod Ismoiljonovich Yuldashev

Chemical Technology, Control and Management

This article examines the algorithm of nearest neighbors, which widely uses metric classification algorithms and the combinatorial theory of reconnection with the precedent information in solving practical recognition problems. One of the most important issues in the development of image recognition systems is that the image recognition system determines the characteristics of objects. Most pattern recognition methods are used in the process of recognizing not all objects of the training sample, but a certain part of the objects. The formation of a training sample by filtering objects according to the level of importance for metric classification algorithms is carried out …


Fortifying Iot Against Crimpling Cyber-Attacks: A Systematic Review, Usman Tariq, Irfan Ahmed, Muhammad Attique Khan, Ali Kashif Bashir Oct 2023

Fortifying Iot Against Crimpling Cyber-Attacks: A Systematic Review, Usman Tariq, Irfan Ahmed, Muhammad Attique Khan, Ali Kashif Bashir

Karbala International Journal of Modern Science

The rapid growth and increasing demand for Internet of Things (IoT) devices in our everyday lives create exciting opportunities for human involvement, data integration, and seamless automation. This fully interconnected ecosystem considerably impacts crucial aspects of our lives, such as transportation, healthcare, energy management, and urban infrastructure. However, alongside the immense benefits, the widespread adoption of IoT also brings a complex web of security threats that can influence society, policy, and infrastructure conditions. IoT devices are particularly vulnerable to security violations, and industrial routines face potentially damaging vulnerabilities. To ensure a trustworthy and robust security framework, it is crucial to …


Smart Service Function Chain System For Dynamic Traffic Steering Using Reinforcement Learning (Chrl), Ahmed Nadhum, Ahmed Al-Saadi Oct 2023

Smart Service Function Chain System For Dynamic Traffic Steering Using Reinforcement Learning (Chrl), Ahmed Nadhum, Ahmed Al-Saadi

Karbala International Journal of Modern Science

The rapid development of the Internet and network services coupled with the growth of communication infrastructure necessitates the employment of intelligent systems. The complexity of the network is heightened by these systems, as they offer diverse services contingent on traffic type, user needs, and security considerations. In this context, a service function chain offers a toolkit to facilitate the management of intricate network systems. However, various traffic types require dynamic adaptation in the sets of function chains. The problem of optimizing the order of service functions in the chain must be solved using the proposed approach, along with balancing the …


Intellectualization Of The Process Of Monitoring Of Complex Technological Productions, Dmitry Semenovich Karpovich, Umidjon Abdimajitovich Ruziev Jun 2023

Intellectualization Of The Process Of Monitoring Of Complex Technological Productions, Dmitry Semenovich Karpovich, Umidjon Abdimajitovich Ruziev

Chemical Technology, Control and Management

The article deals with the creation of intelligent monitoring systems for complex technological processes. The methods and models of the intellectualization of information processing systems are analyzed. The advantages of using intelligent measuring instruments in monitoring systems are given, which allow obtaining reliable information necessary for the effective control of complex technological processes. The issues of using intelligent measuring instruments in monitoring systems are considered. A block diagram of intelligent monitoring of signal processing of complex production processes has been proposed. An algorithm for parametric correction of intelligent measuring instruments in monitoring systems has been developed. A model of a …


Probabilistic Assessment Of Power Systems Resilience Under Natural Disasters, Enas M. Hegazy, Abdelfattah A. Eladl, Magdi M. El-Saadawi May 2023

Probabilistic Assessment Of Power Systems Resilience Under Natural Disasters, Enas M. Hegazy, Abdelfattah A. Eladl, Magdi M. El-Saadawi

Mansoura Engineering Journal

Extreme weather can have a substantial influence on a power system's operational resilience since they are high-impact, low-probability (HILP) events. Therefore, Power systems must be resilient to HILP incidents in addition to being reliable against widely spread and credible threats. Despite the rarity of such events, the severity of their potential impact necessitates the development of appropriate resilience assessment tools to capture their implications and enhance the resilience of energy infrastructure systems. In this paper, a probabilistic strategy is proposed to assess and evaluate the operational resilience of power distribution networks against the impacts of HILP events depending on value-at-risk …


Synchronization Of The Training Of Specialists In The Automation Of Technological Processes In Accordance With The Dynamics Of The Taxonomy Of Learning Goals, Yusuf Shodievich Avazov, Kamola Abdullaeva Feb 2023

Synchronization Of The Training Of Specialists In The Automation Of Technological Processes In Accordance With The Dynamics Of The Taxonomy Of Learning Goals, Yusuf Shodievich Avazov, Kamola Abdullaeva

Chemical Technology, Control and Management

Changes in the characteristics of modern ones, reflecting them as the "digital generation", inevitably necessitate electronic interactive, mobile and mixed, machine learning, especially in the field of automation and control of technological processes and production. As a consequence of reflecting these realities, there have been parallel changes in the taxonomy of learning objectives - from the classical to the revised rethought and digital.

In order to study the problem of synchronizing the training of future specialists in the field of automation and control of technological processes and production and funny knowledge in accordance with the dynamics of the taxonomy of …


Ads-B Communication Interference In Air Traffic Management, George Ray Jan 2023

Ads-B Communication Interference In Air Traffic Management, George Ray

International Journal of Aviation, Aeronautics, and Aerospace

Automated Dependent Surveillance Broadcast (ADS-B) provides position and state information about aircraft and is becoming an essential component in the global air traffic management system. ADS-B transponders broadcast this key information on a common frequency to both other aircraft and to secondary surveillance radar systems located at ground stations. Both the aircraft transponders and the ground stations work together to assist in managing the commercial airspace. Since the aircraft transponders all broadcast on the same frequency and are in close proximity there is an apparent risk of interference and the garbling of the communications needed to manage the airspace.

The …


Deep Learning-Based Classification Of Chaotic Systems Over Phase Portraits, Sezgi̇n Kaçar, Süleyman Uzun, Burak Aricioğlu Jan 2023

Deep Learning-Based Classification Of Chaotic Systems Over Phase Portraits, Sezgi̇n Kaçar, Süleyman Uzun, Burak Aricioğlu

Turkish Journal of Electrical Engineering and Computer Sciences

This study performed a deep learning-based classification of chaotic systems over their phase portraits. To the best of the authors' knowledge, such classification studies over phase portraits have not been conducted in the literature. To that end, a dataset consisting of the phase portraits of the most known two chaotic systems, namely Lorenz and Chen, is generated for different values of the parameters, initial conditions, step size, and time length. Then, a classification with high accuracy is carried out employing transfer learning methods. The transfer learning methods used in the study are SqueezeNet, VGG-19, AlexNet, ResNet50, ResNet101, DenseNet201, ShuffleNet, and …


Variational Autoencoder-Based Anomaly Detection In Time Series Data For Inventory Record Inaccuracy, Hali̇l Arğun, Sadetti̇n Emre Alpteki̇n Jan 2023

Variational Autoencoder-Based Anomaly Detection In Time Series Data For Inventory Record Inaccuracy, Hali̇l Arğun, Sadetti̇n Emre Alpteki̇n

Turkish Journal of Electrical Engineering and Computer Sciences

Retail companies monitor inventory stock levels regularly and manage them based on forecasted sales to sustain their market position. Inventory accuracy, defined as the difference between the warehouse stock records and the actual inventory, is critical for preventing stockouts and shortages. The root causes of inventory inaccuracy are the employee or customer theft, product damage or spoilage, and wrong shipments. In this paper, we aim at detecting inaccurate stocks of one of Turkey's largest supermarket chain using the variational autoencoder (VAE), which is an unsupervised learning method. Based on the findings, we showed that VAE is able to model the …


Binary Text Classification Using Genetic Programming With Crossover-Based Oversampling For Imbalanced Datasets, Mona Aljero, Nazi̇fe Di̇mi̇li̇ler Jan 2023

Binary Text Classification Using Genetic Programming With Crossover-Based Oversampling For Imbalanced Datasets, Mona Aljero, Nazi̇fe Di̇mi̇li̇ler

Turkish Journal of Electrical Engineering and Computer Sciences

It is well known that classifiers trained using imbalanced datasets usually have a bias toward the majority class. In this context, classification models can present a high classification performance overall and for the majority class, even when the performance for the minority class is significantly lower. This paper presents a genetic programming (GP) model with a crossover-based oversampling technique for oversampling the imbalanced dataset for binary text classification. The aim of this study is to apply an oversampling technique to solve the imbalanced issue and improve the performance of the GP model that employed the proposed technique. The proposed technique …


Human Blood Grup And Rhesus Detection Tool Prototype Design Based On Iot, Trisiani Dewi Hendrawati, Inzaghi Hasanudin Dec 2022

Human Blood Grup And Rhesus Detection Tool Prototype Design Based On Iot, Trisiani Dewi Hendrawati, Inzaghi Hasanudin

Elinvo (Electronics, Informatics, and Vocational Education)

Currently, medical practitioners carry out blood type and rhesus examinations by directly observing the agglutination reaction and depending on the examiner's eye. Meanwhile, the effects of eye fatigue and saturation will cause inaccurate data. Therefore, a detection device was made which aims to display information about reading human blood type and rhesus on a digital display which can also store the data into a database. The ABO and rhesus systems were used in this study. This research was made using a real-time method based on the internet of things (IoT). sending data in real-time using WiFi Module ESP-01 and other …


Identification Of Initial Events Of Cascading Failures Using Graph Theory Methods, Mojtaba Fekri, Javad Nikoukar, Gevork Babamalek Gharehpetian Nov 2022

Identification Of Initial Events Of Cascading Failures Using Graph Theory Methods, Mojtaba Fekri, Javad Nikoukar, Gevork Babamalek Gharehpetian

Turkish Journal of Electrical Engineering and Computer Sciences

In power systems, the unintentional outage of a grid element can lead to overload and outage of other equipment and, through a domino effect, all or a large part of a power system may collapse. The resulting events are called cascading, consecutive, or sequential failures. So far, various methods have been proposed to identify the initial events of cascading failures with different levels of accuracy and computational load. In this paper, an effective approach is employed which, by calculating the maximum flow of independent paths between generators and loads in the network graph, identifies the critical lines and transformers of …


Blockchain And Federated Learning-Based Security Solutions For Telesurgery System: A Comprehensive Review, Sachi Chaudjary, Riya Kakkar, Rajesh Gupta, Sudeep Tanwar, Smita Agrawal, Ravi Sharma Nov 2022

Blockchain And Federated Learning-Based Security Solutions For Telesurgery System: A Comprehensive Review, Sachi Chaudjary, Riya Kakkar, Rajesh Gupta, Sudeep Tanwar, Smita Agrawal, Ravi Sharma

Turkish Journal of Electrical Engineering and Computer Sciences

The advent of telemedicine with its remote surgical procedures has effectively transformed the working of healthcare professionals. The evolution of telemedicine facilitates the remote monitoring of patients that lead to the advent of telesurgery systems, i.e. one of the most critical applications in telemedicine systems. Apart from gaining popularity, the telesurgery system may encounter security and trust issues of patients? data while communicating with the surgeon for their remote treatment. Motivated by this, we have presented a comprehensive survey on secure telesurgery systems comprising healthcare, surgical robots, traditional telesurgery systems, and the role of artificial intelligence to deal with the …


Enhancement Of Stability Delay Margins By Virtual Inertia Control For Microgrids With Time Delay, Suud Ademnur Hasen, Şahi̇n Sönmez, Saffet Ayasun Sep 2022

Enhancement Of Stability Delay Margins By Virtual Inertia Control For Microgrids With Time Delay, Suud Ademnur Hasen, Şahi̇n Sönmez, Saffet Ayasun

Turkish Journal of Electrical Engineering and Computer Sciences

Large-scale deployment of renewable energy sources (RESs) contributes to fluctuations in the system frequency due to their inherent reduced inertia feature. Time delays have emerged as a major source of concern in microgrids (MGs) as a result of the broad adoption of open communication networks since significant delays inevitably reduce the controller?s performance and even cause instabilities. In this article, a frequency-domain direct method is used to evaluate the impact of the virtual inertia (VI) control on the stability delay margins of MG with communication delays. By avoiding approximation, the approach first removes transcendental terms from characteristic equations and turns …


Presenting A Method To Detect Intrusion In Iot Through Private Blockchain, Rezvan Mahmoudie, Saeed Parsa, Amir Masoud Rahmani Sep 2022

Presenting A Method To Detect Intrusion In Iot Through Private Blockchain, Rezvan Mahmoudie, Saeed Parsa, Amir Masoud Rahmani

Turkish Journal of Electrical Engineering and Computer Sciences

Blockchain (BC) has been used as a new solution to overcome security and privacy challenges in the Internet of Things (IoT). However, recent studies have indicated that the BC has a limited scalability and is computationally costly. Also, it has significant overhead and delay in the network, which is not suitable to the nature of IoT. This article aims at implementing BC in the IoT context for smart home management, as the integration of these two technologies ensures the IoT's security and privacy. Therefore, we proposed an overlay network in private BC to optimize its compatibility with IoT by increasing …


A New Network-Based Community Detection Algorithm For Disjoint Communities, Peli̇n Çeti̇n, Şahi̇n Emrah Amrahov Sep 2022

A New Network-Based Community Detection Algorithm For Disjoint Communities, Peli̇n Çeti̇n, Şahi̇n Emrah Amrahov

Turkish Journal of Electrical Engineering and Computer Sciences

A community is a group of people that shares something in common. The definition of the community can be generalized as things that have common properties. By using this definition, community detection can be used to solve different problems in various areas. In this study, we propose a new network-based community detection algorithm that can work on different types of datasets. The proposed algorithm works on unweighted graphs and determines the weight by using cosine similarity. We apply a bottom-up approach and find the disjoint communities. First, we accept each node as an independent community. Then, the merging process is …


Packet-Level And Ieee 802.11 Mac Frame-Level Analysis For Iot Device Identification, Rajarshi Roy Chowdhury, Azam Che Idris, Pg Emeroylariffion Abas Jul 2022

Packet-Level And Ieee 802.11 Mac Frame-Level Analysis For Iot Device Identification, Rajarshi Roy Chowdhury, Azam Che Idris, Pg Emeroylariffion Abas

Turkish Journal of Electrical Engineering and Computer Sciences

In cyberspace, a large number of Internet of Things (IoT) devices from different manufacturers with hetero-geneous functionalities are connected together. It is challenging to identify all these devices in an IoT ecosystem. The situation becomes even more complicated when the devices come from the same manufacturer and of similar types due to their analogous network communication behaviour. In this paper, a device fingerprinting (DFP) approach based on a set of combined features from packet-level and frame-level has been proposed. A large number of features has been studied, and consequently, a suitable subset of features has been selected according to gain-ratio …


A Survey On Organizational Choices For Microservice-Based Software Architectures, Hüseyi̇n Ünlü, Burak Bi̇lgi̇n, Onur Demi̇rörs May 2022

A Survey On Organizational Choices For Microservice-Based Software Architectures, Hüseyi̇n Ünlü, Burak Bi̇lgi̇n, Onur Demi̇rörs

Turkish Journal of Electrical Engineering and Computer Sciences

During the last decade, the demand for more flexible, responsive, and reliable software applications increased exponentially. The availability of internet infrastructure and new software technologies to respond to this demand led to a new generation of applications. As a result, cloud-based, distributed, independently deployable web applications working together in a microservice-based software architecture style have gained popularity. The style has been a common practice in the industry and successfully utilized by companies. Adopting this style demands software organizations to transform their culture. However, there is a lack of research studies that explores common practices for microservices. Thus, we performed a …


Anomaly Detection In Rotating Machinery Using Autoencoders Based On Bidirectional Lstm And Gru Neural Networks, Krishna Patra, Rabi Narayan Sethi, Dhiren Kkumar Behera May 2022

Anomaly Detection In Rotating Machinery Using Autoencoders Based On Bidirectional Lstm And Gru Neural Networks, Krishna Patra, Rabi Narayan Sethi, Dhiren Kkumar Behera

Turkish Journal of Electrical Engineering and Computer Sciences

A time series anomaly is a form of anomalous subsequence that indicates future faults will occur. The development of novel techniques for detecting this type of anomaly is significant for real-time system monitoring. Several algorithms have been used to classify anomalies successfully. However, the time series anomaly detection algorithm was not studied well. We use a new bidirectional LSTM and GRU neural networks-based hybrid autoencoder to detect if a machine is operating normally in this research. An autoencoder is trained on a set of 12 features taken from healthy operating data gathered promptly after a planned maintenance period using vibration …


Software Security Management In Critical Infrastructures: A Systematic Literature Review, Gülsüm Ece Ekşi̇, Bedi̇r Teki̇nerdoğan, Cagatay Catal May 2022

Software Security Management In Critical Infrastructures: A Systematic Literature Review, Gülsüm Ece Ekşi̇, Bedi̇r Teki̇nerdoğan, Cagatay Catal

Turkish Journal of Electrical Engineering and Computer Sciences

Critical infrastructure (CI) is an integrated set of systems and assets that are essential to ensure the functioning of a nation, including its economy, the public's health and/or safety. Hence, protecting critical infrastructures (CI) is vital because of the potential severe consequences that may emerge at the national level. Many CIs are now controlled by software, and likewise, software is often the major source of many security problems in critical infrastructures. Software security management in CIs has been addressed in the literature and several useful approaches have been provided. Yet, these approaches are fragmented over multiple different studies, often do …


Evaluation Of Social Bot Detection Models, Muhammet Buğra Torusdağ, Mücahi̇d Kutlu, Ali̇ Aydin Selçuk May 2022

Evaluation Of Social Bot Detection Models, Muhammet Buğra Torusdağ, Mücahi̇d Kutlu, Ali̇ Aydin Selçuk

Turkish Journal of Electrical Engineering and Computer Sciences

Social bots are employed to automatically perform online social network activities; thereby, they can also be utilized in spreading misinformation and malware. Therefore, many researchers have focused on the automatic detection of social bots to reduce their negative impact on society. However, it is challenging to evaluate and compare existing studies due to difficulties and limitations in sharing datasets and models. In this study, we conduct a comparative study and evaluate four different bot detection systems in various settings using 20 different public datasets. We show that high-quality datasets covering various social bots are critical for a reliable evaluation of …


Residential Energy Management System Based On Integration Of Fuzzy Logic And Simulated Annealing, Ömer Ci̇han Kivanç, Beki̇r Tevfi̇k Akgün, Semi̇h Bi̇lgen, Sali̇h Bariş Öztürk, Suat Baysan, Ramazan Nejat Tuncay May 2022

Residential Energy Management System Based On Integration Of Fuzzy Logic And Simulated Annealing, Ömer Ci̇han Kivanç, Beki̇r Tevfi̇k Akgün, Semi̇h Bi̇lgen, Sali̇h Bariş Öztürk, Suat Baysan, Ramazan Nejat Tuncay

Turkish Journal of Electrical Engineering and Computer Sciences

With the increase in prosperity level and industrialization, energy need continues to overgrow in many countries. To meet the rapidly increasing energy needs, countries attach great importance to using limited natural resources rationally, diversifying their energy production using novel technologies, improving the efficiency of existing technologies, and implementing policies and strategies toward alternative energy sources. In particular, individual energy prosumers (someone that both produces and consumes energy) head toward smart home energy management systems (SHEMS) that include renewable energy sources in their homes. By integrating PV solar panels into houses, there is a need to optimize home energy production/consumption scenarios …


Identification Of Gain And Phase Margins Based Robust Stability Regions For Atime-Delayed Micro-Grid System Including Fractional-Order Controller In Presenceof Renewable Power Generation, Hakan Gündüz, Şahi̇n Sönmez, Saffet Ayasun Mar 2022

Identification Of Gain And Phase Margins Based Robust Stability Regions For Atime-Delayed Micro-Grid System Including Fractional-Order Controller In Presenceof Renewable Power Generation, Hakan Gündüz, Şahi̇n Sönmez, Saffet Ayasun

Turkish Journal of Electrical Engineering and Computer Sciences

This study examines the gain and phase margins (GPMs) based robust stability margins in the parameter space of fractional order proportional-integral (FOPI) controller for a micro-grid (MG) system with communication time delays. Fluctuations in renewable energy sources (RESs), uncertainties in parameters of system components and communication delays could adversely affect the dynamical analysis and frequency stability of the MG system. Such a MG system has an interval characteristic due to the parametric variations and the interval transfer functions defined by Kharitonov's theorem, which presents a solution for checking of robust stability. Therefore, this study addresses the robust stability regions containing …


Calculating Influence Based On The Fusion Of Interest Similarity And Informationdissemination Ability, Shulin Cheng, Ziming Wang, Meng Qian, Shan Yang, Xin Zheng Mar 2022

Calculating Influence Based On The Fusion Of Interest Similarity And Informationdissemination Ability, Shulin Cheng, Ziming Wang, Meng Qian, Shan Yang, Xin Zheng

Turkish Journal of Electrical Engineering and Computer Sciences

With the popularization, in-depth development and application of the Internet, microblogs have become a mainstream social network platform. Several studies on social networks have conducted researches, and user influence evaluation is an important research hotspot. Most of the existing studies calculate user influence by improving PageRank and have achieved certain results. However, these studies ignored the fusion of users' interest theme similarity and information dissemination ability, and the analysis of interaction behaviors among users is not comprehensive. To address these issues, we propose a new microblog user influence algorithm called microblog user influence based on interest similarity and information dissemination …