Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Direct Pore-Based Identification For Fingerprint Matching Process, Vedat Delican, Behçet Uğur Töreyi̇n, Ege Çeti̇n, Ayli̇n Yalçin Saribey Sep 2023

Direct Pore-Based Identification For Fingerprint Matching Process, Vedat Delican, Behçet Uğur Töreyi̇n, Ege Çeti̇n, Ayli̇n Yalçin Saribey

Turkish Journal of Electrical Engineering and Computer Sciences

Fingerprints are one of the most important scientific proof instruments in solving forensic cases. Identification in fingerprints consists of three levels based on the flow direction of the papillary lines at the first level, the minutiae points at the second level, and the pores at the third level. The inadequacy of existing imaging systems in detecting fingerprints and the lack of pore details at the desired level limit the widespread use of third-level identification. The fact that fingerprints with images based on pores in the unsolved database are not subjected to any evaluation criteria and remain in the database reveals …


Identification Of Wiener Model Based On Improved Differential Evolution (Sade) Algorithm, Xiaoping Xu, Bai Bo, Fucai Qian Jul 2020

Identification Of Wiener Model Based On Improved Differential Evolution (Sade) Algorithm, Xiaoping Xu, Bai Bo, Fucai Qian

Journal of System Simulation

Abstract: To identify the parameters of nonlinear Wiener model, a new identification method was put forward based on a SADE algorithm. Its basic idea is as follows: the Sigmoid function and adaptive mutation operator were adopted to improve the mutation operation part of the basic differential evolution algorithm, accordingly, the disadvantages of the basic differential evolution algorithm, such as premature convergence, instability, etc, were effectively overcome. The proposed algorithm was used to parameter identification problem of Wiener model; moreover, the accuracy of identification was well improved. In the numerical simulation, compared with other relevant existing algorithms, simulation results show that …


Identifying Criminal Organizations From Their Social Network Structures, Muhammet Serkan Çi̇nar, Burkay Genç, Hayri̇ Sever Jan 2019

Identifying Criminal Organizations From Their Social Network Structures, Muhammet Serkan Çi̇nar, Burkay Genç, Hayri̇ Sever

Turkish Journal of Electrical Engineering and Computer Sciences

Identification of criminal structures within very large social networks is an essential security feat. By identifying such structures, it may be possible to track, neutralize, and terminate the corresponding criminal organizations before they act. We evaluate the effectiveness of three different methods for classifying an unknown network as terrorist, cocaine, or noncriminal. We consider three methods for the identification of network types: evaluating common social network analysis metrics, modeling with a decision tree, and network motif frequency analysis. The empirical results show that these three methods can provide significant improvements in distinguishing all three network types. We show that these …


An Efficient Recurrent Fuzzy Cmac Model Based On A Dynamic-Group--Based Hybrid Evolutionary Algorithm For Identification And Prediction Applications, Chin-Ling Lee, Chengjian Lin Jan 2018

An Efficient Recurrent Fuzzy Cmac Model Based On A Dynamic-Group--Based Hybrid Evolutionary Algorithm For Identification And Prediction Applications, Chin-Ling Lee, Chengjian Lin

Turkish Journal of Electrical Engineering and Computer Sciences

This article presents an efficient TSK-type recurrent fuzzy cerebellar model articulation controller (T-RFCMAC) model based on a dynamic-group--based hybrid evolutionary algorithm (DGHEA) for solving identification and prediction problems. The proposed T-RFCMAC model is based on the traditional CMAC model and the Takagi--Sugeno--Kang (TSK) parametric fuzzy inference system. Otherwise, the recurrent network, which imports feedback links with a receptive field cell, is embedded in the T-RFCMAC model, and the feedback units are used as memory elements. The DGHEA, which is a hybrid of the dynamic-group quantum particle swarm optimization (QPSO) and the Nelder--Mead method, is proposed for adjusting the parameters of …


Regularized Estimation Of Hammerstein Systems Using A Decomposition-Based Iterative Instrumental Variable Method, Vikram Saini, Lillie Dewan Jan 2017

Regularized Estimation Of Hammerstein Systems Using A Decomposition-Based Iterative Instrumental Variable Method, Vikram Saini, Lillie Dewan

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents a two-step instrumental variable (IV) method to obtain the regularized and consistent parameter estimates of the Hammerstein ARMAX model based on the bilinear parameterized form. The two-step identification method consists of estimating the bilinear parameters in the first step, followed by parameter reduction in the second step. An iterative identification method is proposed, based on the idea of separating the bilinear form in the two separable forms with partial parameters and solving the decomposed model forms iteratively. The IV-based estimation is integrated into the formulated decomposed structure by introducing the instruments constructed from the estimated auxiliary model …


On Identities In Modern Networks, Libor Polcak, Radek Hranick, Tomas Martınek Jan 2014

On Identities In Modern Networks, Libor Polcak, Radek Hranick, Tomas Martınek

Journal of Digital Forensics, Security and Law

Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was …


Softcomputing Identification Techniques Of Asynchronous Machine Parameters: Evolutionary Strategy And Chemotaxis Algorithm, Nouri Benaïdja Jan 2009

Softcomputing Identification Techniques Of Asynchronous Machine Parameters: Evolutionary Strategy And Chemotaxis Algorithm, Nouri Benaïdja

Turkish Journal of Electrical Engineering and Computer Sciences

Softcomputing techniques are receiving attention as optimisation techniques for many industrial applications. Although these techniques eliminate the need for derivatives computation, they require much work to adjust their parameters at the stage of research and development. Issues such as speed, stability, and parameters convergence remain much to be investigated. This paper discusses the application of the method of reference model to determine parameters of asynchronous machines using two optimisation techniques. Softcomputing techniques used in this paper are evolutionary strategy and the chemotaxis algorithm. Identification results using the two techniques are presented and compared with respect to the conventional simplex technique …


Parameter Identification Of A Separately Excited Dc Motor Via Inverse Problem Methodology, Mounir Hadef, Mohamed Rachid Mekideche Jan 2009

Parameter Identification Of A Separately Excited Dc Motor Via Inverse Problem Methodology, Mounir Hadef, Mohamed Rachid Mekideche

Turkish Journal of Electrical Engineering and Computer Sciences

Identification is considered to be among the main applications of inverse theory and its objective for a given physical system is to use data which is easily observable, to infer some of the geometric parameters which are not directly observable. In this paper, a parameter identification method using inverse problem methodology is proposed. The minimisation of the objective function with respect to the desired vector of design parameters is the most important procedure in solving the inverse problem. The conjugate gradient method is used to determine the unknown parameters, and Tikhonov's regularization method is then used to replace the original …