Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Load2load: Day-Ahead Load Forecasting At Aggregated Level, Mustafa Berkay Yilmaz Nov 2022

Load2load: Day-Ahead Load Forecasting At Aggregated Level, Mustafa Berkay Yilmaz

Turkish Journal of Electrical Engineering and Computer Sciences

A reliable and accurate short-term load forecasting (STLF) helps utilities and energy providers deal with the challenges posed by supply and demand balance, higher penetration of renewable energies and the development of electricity markets with increasingly complex pricing strategies in future smart grids. Recent advances in deep learning have been successively utilized to STLF. However, there is no certain study that evaluates the performances of different STLF methods at an aggregated level on different datasets with different numbers of daily measurements.In this study, a deep learning STLF architecture called Load2Load is proposed for day-ahead forecasting. Different forecasting methods have been …


Development Of A Hybrid System Based On Abc Algorithm For Selection Of Appropriate Parameters For Disease Diagnosis From Ecg Signals, Ersi̇n Ersoy, Gazi̇ Erkan Bostanci, Mehmet Serdar Güzel Jul 2022

Development Of A Hybrid System Based On Abc Algorithm For Selection Of Appropriate Parameters For Disease Diagnosis From Ecg Signals, Ersi̇n Ersoy, Gazi̇ Erkan Bostanci, Mehmet Serdar Güzel

Turkish Journal of Electrical Engineering and Computer Sciences

The number of people who die due to cardiovascular diseases is quite high. In our study, ECG (electrocar-diogram) signals were divided into segments and waves based on temporal boundaries. Signal similarity methods such as convolution, correlation, covariance, signal peak to noise ratio (PNRS), structural similarity index (SSIM), one of the basic statistical parameters, arithmetic mean and entropy were applied to each of these sections. In addition, a square error-based new approach was applied and the difference of the signs from the mean sign was taken and used as a feature vector. The obtained feature vectors are used in the artificial …


Toward Intelligent Financial Advisors For Identifying Potential Clients: A Multitask Perspective, Qixiang Shao, Runlong Yu, Hongke Zhao, Chunli Liu, Mengyi Zhang, Hongmei Song, Qi Liu Mar 2022

Toward Intelligent Financial Advisors For Identifying Potential Clients: A Multitask Perspective, Qixiang Shao, Runlong Yu, Hongke Zhao, Chunli Liu, Mengyi Zhang, Hongmei Song, Qi Liu

Big Data Mining and Analytics

Intelligent Financial Advisors (IFAs) in online financial applications (apps) have brought new life to personal investment by providing appropriate and high-quality portfolios for users. In real-world scenarios, identifying potential clients is a crucial issue for IFAs, i.e., identifying users who are willing to purchase the portfolios. Thus, extracting useful information from various characteristics of users and further predicting their purchase inclination are urgent. However, two critical problems encountered in real practice make this prediction task challenging, i.e., sample selection bias and data sparsity. In this study, we formalize a potential conversion relationship, i.e., user→activated user→client and decompose this relationship into …


Performance Analysis And Feature Selection For Network-Based Intrusion Detectionwith Deep Learning, Serhat Caner, Nesli̇ Erdoğmuş, Yusuf Murat Erten Mar 2022

Performance Analysis And Feature Selection For Network-Based Intrusion Detectionwith Deep Learning, Serhat Caner, Nesli̇ Erdoğmuş, Yusuf Murat Erten

Turkish Journal of Electrical Engineering and Computer Sciences

An intrusion detection system is an automated monitoring tool that analyzes network traffic and detects malicious activities by looking out either for known patterns of attacks or for an anomaly. In this study, intrusion detection and classification performances of different deep learning based systems are examined. For this purpose, 24 deep neural networks with four different architectures are trained and evaluated on CICIDS2017 dataset. Furthermore, the best performing model is utilized to inspect raw network traffic features and rank them with respect to their contributions to success rates. By selecting features with respect to their ranks, sets of varying size …