Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

2019

Discipline
Institution
Keyword
Publication

Articles 2161 - 2190 of 2225

Full-Text Articles in Engineering

Importance-Based Signal Detection And Parameter Estimation With Applications To New Particle Search, Hati̇ce Doğan, Nasuf Sönmez, Güleser Kalayci Demi̇r Jan 2019

Importance-Based Signal Detection And Parameter Estimation With Applications To New Particle Search, Hati̇ce Doğan, Nasuf Sönmez, Güleser Kalayci Demi̇r

Turkish Journal of Electrical Engineering and Computer Sciences

One of the hardest challenges in data analysis is perhaps the detection of rare anomalous data buried in a huge normal background. We study this problem by constructing a novel method, which is a combination of the Kullback?Leibler importance estimation procedure based anomaly detection algorithm and linear discriminant classifier. We choose to illustrate it with the example of charged Higgs boson (CHB) search in particle physics. Indeed, the Large Hadron Collider experiments at CERN ensure that CHB signal must be a tiny effect within the irreducible W-boson background. In simulations, different CHB events with different characteristics are produced and judiciously …


Towards Wearable Blood Pressure Measurement Systems From Biosignals: A Review, Ümi̇t Şentürk, Kemal Polat, İbrahi̇m Yücedağ Jan 2019

Towards Wearable Blood Pressure Measurement Systems From Biosignals: A Review, Ümi̇t Şentürk, Kemal Polat, İbrahi̇m Yücedağ

Turkish Journal of Electrical Engineering and Computer Sciences

Blood pressure is the pressure by the blood to the vein wall. High blood pressure, which is called silent death, is the cause of nearly 13 % of mortality all over the world. Blood pressure is not only measured in the medical environment, but the blood pressure measurement is also a need for people in their daily life. Blood pressure estimation systems with low error rates have been developed besides the new technologies and algorithms. Blood pressure measurements are differentiated as invasive blood pressure (IBP) measurement and noninvasive blood pressure (NIBP) measurement methods. Although IBP measurement provides the most accurate …


Symptom-Aware Hybrid Fault Diagnosis Algorithm In The Network Virtualization Environment, Yuze Su, Xiangru Meng, Xiaoyang Han, Qiaoyan Kang Jan 2019

Symptom-Aware Hybrid Fault Diagnosis Algorithm In The Network Virtualization Environment, Yuze Su, Xiangru Meng, Xiaoyang Han, Qiaoyan Kang

Turkish Journal of Electrical Engineering and Computer Sciences

As an important technology in next-generation networks, network virtualization has received more and more attention. Fault diagnosis is the crucial element for fault management and it is the process of inferring the exact failure in the network virtualization environment (NVE) from the set of observed symptoms. Although various traditional fault diagnosis algorithms have been proposed, the virtual network has some new characteristics, which include inaccessible fault information of the substrate network, inaccurate network observations, and a dynamic embedding relationship. To solve these challenges, a symptom-aware hybrid fault diagnosis (SAHFD) algorithm in the NVE is proposed in this paper. First, a …


A Heuristic Algorithm To Find Rupture Degree In Graphs, Rafet Durgut, Tufan Turaci, Hakan Kutucu Jan 2019

A Heuristic Algorithm To Find Rupture Degree In Graphs, Rafet Durgut, Tufan Turaci, Hakan Kutucu

Turkish Journal of Electrical Engineering and Computer Sciences

Since the problem of Konigsberg bridge was released in 1735, there have been many applications of graph theory in mathematics, physics, biology, computer science, and several fields of engineering. In particular, all communication networks can be modeled by graphs. The vulnerability is a concept that represents the reluctance of a network to disruptions in communication after a deterioration of some processors or communication links. Furthermore, the vulnerability values can be computed with many graph theoretical parameters. The rupture degree $r(G)$ of a graph $G=(V,E)$ is an important graph vulnerability parameter and defined as $r(G)=max\{\omega(G-S)- S -m(G-S):\omega(G-S)\geq2, S\subset V \}$, where …


Privacy Issues In Post Dissemination On Facebook, Burcu Sayi̇n Günel, Serap Şahi̇n, Dimitris G. Kogias, Charalampos Z. Patrikakis Jan 2019

Privacy Issues In Post Dissemination On Facebook, Burcu Sayi̇n Günel, Serap Şahi̇n, Dimitris G. Kogias, Charalampos Z. Patrikakis

Turkish Journal of Electrical Engineering and Computer Sciences

With social networks (SNs) being populated by a still increasing numbers of people who take advantage of the communication and collaboration capabilities that they offer, the probability of the exposure of people's personal moments to a wider than expected audience is also increasing. By studying the functionalities and characteristics that modern SNs offer, along with the people's habits and common behaviors in them, it is easy to understand that several privacy risks may exist, many of which people may be unaware of. In this paper, we focus on users' interactions with posts in a social network (SN), using Facebook as …


Atomic-Shaped Efficient Delay And Data Gathering Routing Protocol For Underwater Wireless Sensor Networks, Wajiha Farooq, Tariq Ali, Ahmad Shaf, Muhammad Umar, Sana Yasin Jan 2019

Atomic-Shaped Efficient Delay And Data Gathering Routing Protocol For Underwater Wireless Sensor Networks, Wajiha Farooq, Tariq Ali, Ahmad Shaf, Muhammad Umar, Sana Yasin

Turkish Journal of Electrical Engineering and Computer Sciences

High end-to-end delay is a major challenge in autonomous underwater vehicle (AUV)-aided routing protocols for underwater monitoring applications. In this paper, a new routing protocol called atomic-shaped efficient delay and data gathering (ASEDG) has been introduced for underwater wireless sensor networks. The ASEDG is divided into two phases; in the first phase, the atomic-shaped trajectory model with horizontal and vertical ellipticals was designed for the movement of the AUV. In the second phase, two types of delay models were considered to make our protocol more delay efficient: member nodes (MNs) to MNs and MNs to gateway nodes (GNs). The MNs-to-MNs …


Increasing Bluetooth Low Energy Communication Efficiency By Presetting Protocol Parameters, Dusan Hatvani, Dominik Macko Jan 2019

Increasing Bluetooth Low Energy Communication Efficiency By Presetting Protocol Parameters, Dusan Hatvani, Dominik Macko

Turkish Journal of Electrical Engineering and Computer Sciences

Standard protocols are important regarding the compatibility of devices provided by different vendors. However, specific applications have various requirements and do not always need all features offered by standard protocols, making them inefficient. This paper focuses on standard Bluetooth Low Energy modifications, reducing control overhead for the intended healthcare application. Specifically, the connection establishment, device pairing, and connection parameter negotiations have been targeted. The simulation-based experiments showed over 20 times reduction of control-overhead time preceding a data transmission. It does not just directly increase the energy efficiency of communication; it also prolongs the time for sensor-based end devices to spend …


Solving Vehicle Routing Problem For Multistorey Buildings Using Iterated Local Search, Osman Gökalp, Aybars Uğur Jan 2019

Solving Vehicle Routing Problem For Multistorey Buildings Using Iterated Local Search, Osman Gökalp, Aybars Uğur

Turkish Journal of Electrical Engineering and Computer Sciences

Vehicle routing problem (VRP) which is a well-known combinatorial optimisation problem that has many applications used in industry is also a generalised form of the travelling salesman problem. In this study, we defined and formulated the VRP in multistorey buildings (Multistorey VRP) for the first time and proposed a solving method employing iterated local search metaheuristic algorithm. This variant of VRP has a great potential for turning the direction of optimisation research and applications to the vertical cities area as well as the horizontal ones. Routes of part picking or placing vehicles/humans in multistorey plants can be minimised by this …


Reusable And Interactive Classes: A New Way Of Object Composition, Saeid Masoumi, Ali Mahjur Jan 2019

Reusable And Interactive Classes: A New Way Of Object Composition, Saeid Masoumi, Ali Mahjur

Turkish Journal of Electrical Engineering and Computer Sciences

Separating object features from base classes is one of the popular ways of software development. Some popular programming approaches like object-oriented programming, feature-oriented programming, and aspect-oriented programming follow this approach. There are four advantages of using features: 1) Instantiability: the ability to create instances of a feature, 2) Reusability: the quality of a feature being reusable in many compositions, 3) Loosely coupled composability: the ability to compose/decompose features easily at object instantiation time (not offering new data types for compositions), and 4) Interactability: the ability of a feature to crosscut (interact with) other features inside the object. Existing approaches do …


Incremental Author Name Disambiguation Using Author Profile Models And Self-Citations, Ijaz Hussain, Sohail Asghar Jan 2019

Incremental Author Name Disambiguation Using Author Profile Models And Self-Citations, Ijaz Hussain, Sohail Asghar

Turkish Journal of Electrical Engineering and Computer Sciences

Author name ambiguity in bibliographic databases (BDs) such as DBLP is a challenging problem that degrades the information retrieval quality, citation analysis, and proper attribution to the authors. It occurs when several authors have the same name (homonym) or when an author publishes under several name variants (synonym). Traditionally, much research has been conducted to disambiguate whole bibliographic database at once whenever some new citations are added in these BDs. However, it is more time-consuming and discards the manual disambiguation effects (if any). Only a few incremental author name disambiguation methods are proposed but these methods produce fragmented clusters which …


Biometric Person Authentication Framework Using Polynomial Curve Fitting-Based Ecg Feature Extraction, Şahi̇n Işik, Kemal Özkan, Semi̇h Ergi̇n Jan 2019

Biometric Person Authentication Framework Using Polynomial Curve Fitting-Based Ecg Feature Extraction, Şahi̇n Işik, Kemal Özkan, Semi̇h Ergi̇n

Turkish Journal of Electrical Engineering and Computer Sciences

The applications of modern biometric techniques for person identification systems rapidly increase for meeting the rising security demands. The distinctive physiological characteristics are more correctly measurable and trustworthy since previous measurements are not appropriately made for physiological properties. While a variety of strategies have been enabled for identification, the electrocardiogram (ECG)-based approaches are popular and reliable techniques in the senses of measurability, singularity, and universal awareness of heartbeat signals. This paper presents a new ECG-based feature extraction method for person identification using a huge amount of ECG recordings. First of all, 1800 heartbeats for each of the 36 subjects have …


I See Ek: A Lightweight Technique To Reveal Exploit Kit Family By Overall Url Patterns Of Infection Chains, Emre Süren, Peli̇n Angin, Nazi̇fe Baykal Jan 2019

I See Ek: A Lightweight Technique To Reveal Exploit Kit Family By Overall Url Patterns Of Infection Chains, Emre Süren, Peli̇n Angin, Nazi̇fe Baykal

Turkish Journal of Electrical Engineering and Computer Sciences

The prevalence and nonstop evolving technical sophistication of exploit kits (EKs) is one of the most challenging shifts in the modern cybercrime landscape. Over the last few years, malware infections via drive-by download attacks have been orchestrated with EK infrastructures. Malicious advertisements and compromised websites redirect victim browsers to web-based EK families that are assembled to exploit client-side vulnerabilities and finally deliver evil payloads. A key observation is that while the webpage contents have drastic differences between distinct intrusions executed through the same EK, the patterns in URL addresses stay similar. This is due to the fact that autogenerated URLs …


Scale-Invariant Mfccs For Speech/Speaker Recognition, Zekeri̇ya Tüfekci̇, Gökay Di̇şken Jan 2019

Scale-Invariant Mfccs For Speech/Speaker Recognition, Zekeri̇ya Tüfekci̇, Gökay Di̇şken

Turkish Journal of Electrical Engineering and Computer Sciences

The feature extraction process is a fundamental part of speech processing. Mel frequency cepstral coefficients (MFCCs) are the most commonly used feature types in the speech/speaker recognition literature. However, the MFCC framework may face numerical issues or dynamic range problems, which decreases their performance. A practical solution to these problems is adding a constant to filter-bank magnitudes before log compression, thus violating the scale-invariant property. In this work, a magnitude normalization and a multiplication constant are introduced to make the MFCCs scale-invariant and to avoid dynamic range expansion of nonspeech frames. Speaker verification experiments are conducted to show the effectiveness …


Segmented Character Recognition Using Curvature-Based Global Image Feature, Belaynesh Chekol, Numan Çelebi̇, Tuğrul Taşci Jan 2019

Segmented Character Recognition Using Curvature-Based Global Image Feature, Belaynesh Chekol, Numan Çelebi̇, Tuğrul Taşci

Turkish Journal of Electrical Engineering and Computer Sciences

Character recognition in natural scene images is a fundamental prerequisite for many text-based image analysis tasks. Generally, local image features are employed widely to recognize characters segmented from natural scene images. In this paper, a curvature-based global image feature and description for segmented character recognition is proposed. This feature is entirely dependent on the curvature information of the image pixels. The proposed feature is employed for segmented character recognition using Chars74k dataset and ICDAR 2003 character recognition dataset. From the two datasets, 1068 and 540 images of characters, respectively, are randomly chosen and 573-dimensional feature vector is synthesized per image. …


Trmor: A Finite-State-Based Morphological Analyzer For Turkish, Ayla Kayabaş, Helmut Schmi̇d, Ahmet Ercan Topcu, Özkan Kiliç Jan 2019

Trmor: A Finite-State-Based Morphological Analyzer For Turkish, Ayla Kayabaş, Helmut Schmi̇d, Ahmet Ercan Topcu, Özkan Kiliç

Turkish Journal of Electrical Engineering and Computer Sciences

Morphological analysis is an important component of natural language processing systems like spelling correction tools, parsers, machine translation systems, and dictionary tools. In this paper, we present TRMOR, a morphological analyzer for Turkish, which uses the SFST tool (Stuttgart Finite-State Transducer). TRMOR can be freely used for academic research (see http://www.cis.uni-muenchen.de/~schmid/tools/SFST/). It covers a large part of Turkish morphology including inflection, derivation, and some compounding. It uses morphotactic and morphophonological rules and a stem lexicon. We describe the morphological structure of Turkish, explain the phonological and morphological rules implemented in TRMOR, evaluate the system, and test it in special cases. …


Research On The Dynamic Networking Of Smart Meters Based On Characteristics Of The Collected Data, Yaxin Huang, Yunlian Sun, Xiaodi Zhang Jan 2019

Research On The Dynamic Networking Of Smart Meters Based On Characteristics Of The Collected Data, Yaxin Huang, Yunlian Sun, Xiaodi Zhang

Turkish Journal of Electrical Engineering and Computer Sciences

In order to accurately collect the electricity usage information from the smart meter which uses the power line for communication, this paper proposes the method of dynamic networking to enhance the reliability of the smart meter communication. We shall firstly establish a logical topology between the smart meter and the concentrator with reference to their communication paths within the power supply range of the same transformer, and then grade smart meters, and choose the relay for each level network based on the selection methods of relay, and finally use the improved ant colony algorithm to choose the optimal communication path …


Heat Flux Capacity Measurement And Improvement For The Test Of Superconducting Logic Circuits In Closed-Cycle Cryostats, Sasan Razmkhah, Ali̇ Bozbey Jan 2019

Heat Flux Capacity Measurement And Improvement For The Test Of Superconducting Logic Circuits In Closed-Cycle Cryostats, Sasan Razmkhah, Ali̇ Bozbey

Turkish Journal of Electrical Engineering and Computer Sciences

With the current progress of superconducting integrated circuits, circuit complexities have reached more than 100,000 Josephson junctions. At the laboratory environment, circuit tests are generally being conducted at liquid Helium environments. With the commercialization of the superconducting integrated circuit-based systems and/or price increase of liquid Helium, utilization of the closed-cycle systems will be inevitable. Even though it is possible to implement closed-cycle systems with quite substantial excess cooling powers after all the wirings and peripheral circuits, one point not to be overlooked is the power density at the superconducting chips. We have observed that the circuits designed for operation at …


Investigation Of Start-Up Conditions On Electric Submersible Pump Driven With Flux Switching Motor, Mohammadhossein Barzegari Bafghi, Abolfazl Vahedi Jan 2019

Investigation Of Start-Up Conditions On Electric Submersible Pump Driven With Flux Switching Motor, Mohammadhossein Barzegari Bafghi, Abolfazl Vahedi

Turkish Journal of Electrical Engineering and Computer Sciences

One of the motor types that is recently considered to be a candidate for electric submersible pumps (ESPs) is the flux switching motor. Therefore, it becomes crucial to verify that this type of motor can stand ESP conditions. The main subject of this paper is to investigate the start-up condition of ESP along with considering the long power supply cable to study the motor performance, where the real aspect of the ESP conditions is investigated. Since there is not any model of pump load that models the dynamic behavior of ESP correctly, first, a model for the pump is developed. …


A Modified Gravitational Search Algorithm And Its Application In Lifetime Maximization Of Wireless Sensor Networks, Sepehr Ebrahimi Mood, Mohammad Masoud Javidi Jan 2019

A Modified Gravitational Search Algorithm And Its Application In Lifetime Maximization Of Wireless Sensor Networks, Sepehr Ebrahimi Mood, Mohammad Masoud Javidi

Turkish Journal of Electrical Engineering and Computer Sciences

Recently, academic communities and industrial sectors have been affected by significant advancements in wireless sensor networks (WSNs). Employing clustering methods is the dominant method to maximize the WSN's lifetime, which is considered to be a major issue. Metaheuristic algorithms have attracted wide attention in the research area of clustering. In this paper, first a novel nature-inspired optimization algorithm based on the gravitational search algorithm (GSA) is defined. To control the exploitation and exploration capabilities of this algorithm, along with calculating the masses value, the tournament selection method is employed. Tournament size, the parameter of this method, is computed automatically using …


An Automated Snick Detection And Classification Scheme As A Cricket Decision Review System, Aftab Khan, Syed Qadir Hussain, Muhammad Waleed, Ashfaq Khan, Umair Khan Jan 2019

An Automated Snick Detection And Classification Scheme As A Cricket Decision Review System, Aftab Khan, Syed Qadir Hussain, Muhammad Waleed, Ashfaq Khan, Umair Khan

Turkish Journal of Electrical Engineering and Computer Sciences

Umpire decisions can greatly affect the outcome of a cricket game. When there is doubt about the umpire?s call for a decision, a decision review system (DRS) may be brought into play by a batsman or bowler to validate the decision. Recently, the latest technologies, including Hotspot, Hawk-eye, and Snickometer, have been employed when there is doubt among the on-field umpire, batsman, or bowlers. This research is a step forward in gaging the true class of a snick generated from the contact of the cricket ball with either (i) the bat, (ii) gloves, (iii) pad, or (iv) a combination of …


Decision-Making For Small Industrial Internet Of Things Using Decision Fusion, Tuğrul Çavdar, Nader Ebrahimpour Jan 2019

Decision-Making For Small Industrial Internet Of Things Using Decision Fusion, Tuğrul Çavdar, Nader Ebrahimpour

Turkish Journal of Electrical Engineering and Computer Sciences

The industrial Internet of Things (IIoT) is a new field of Internet of Things (IoT) that has gained more popularity recently in industrial units and makes it possible to access information anywhere and anytime. In other words, geographic coordinates cannot prevent obtaining equipment and its data. Today, it is possible to manage and control equipment simply without spending time in an operational area and just by using the IIoT. This system collects data from manufacturing and production units by using wireless sensor networks or other networks for classification of fault detection. These data are then used after analysis to allow …


Enabling Space Time Division Multiple Access In Ietf 6tisch Protocol, Sedat Görmüş, Sercan Külcü Jan 2019

Enabling Space Time Division Multiple Access In Ietf 6tisch Protocol, Sedat Görmüş, Sercan Külcü

Turkish Journal of Electrical Engineering and Computer Sciences

IETF 6TiSCH standard aims to create reliable, deterministic, and low-power networks by scheduling bandwidth resources in time and frequency domains. The main emphasis of 6TiSCH protocol is that it creates Internet of things (IoT) networks with a deterministic and controllable delay. However, many of its benefits are tied to the ability of the 6TiSCH scheduler to optimally distribute radio resources among wireless nodes which may not be possible when the number of frequency resources are limited and several other wireless technologies share the same frequency band (e.g., WiFi, Bluetooth and IEEE 802.15.4). Here the integration of a low-complexity directional antenna …


Gacnn Sleeptunenet: A Genetic Algorithm Designing The Convolutional Neural Network Architecture For Optimal Classification Of Sleep Stages From A Single Eeg Channel, Shahnawaz Qureshi, Seppo Karilla, Sirirut Vanichayobon Jan 2019

Gacnn Sleeptunenet: A Genetic Algorithm Designing The Convolutional Neural Network Architecture For Optimal Classification Of Sleep Stages From A Single Eeg Channel, Shahnawaz Qureshi, Seppo Karilla, Sirirut Vanichayobon

Turkish Journal of Electrical Engineering and Computer Sciences

This study presents a method for designing--by a genetic algorithm, without manual intervention--the feature learning architecture for classification of sleep stages from a single EEG channel, when using a convolutional neural network called GACNN SleepTuneNet. Two EEG electrode positions were selected, namely FP2-F4 and FPz-Cz, from two available datasets. Twenty-five generations were involved in diagnosis without hand-crafted features, to learn the architecture for classification of sleep stages based on AASM standard. Based on the results, our model not only achieved the highest classification accuracy, but it also distinguished the sleep stages based on either of the two EEG electrode signals, …


Defect Detection Of Seals In Multilayer Aseptic Packages Using Deep Learning, Kemal Adem, Cemi̇l Közkurt Jan 2019

Defect Detection Of Seals In Multilayer Aseptic Packages Using Deep Learning, Kemal Adem, Cemi̇l Közkurt

Turkish Journal of Electrical Engineering and Computer Sciences

Sealing in aseptic packages, one of the healthiest and cheapest technologies to protect food from parasites in the liquid food industry, requires a detailed and careful control process. Since the controls are made manually and visually by expert machine operators, the human factor can lead to the failure to detect defects, resulting in high cost and food safety risks. Therefore, this study aims to perform a leak test in aseptic package seals by a system that makes decisions using independent deep learning methods. The proposed Faster R-CNN and the Updated Faster R-CNN deep learning models were subjected to training and …


Parallel Algorithms For Computing Sparse Matrix Permanents, Kamer Kaya Jan 2019

Parallel Algorithms For Computing Sparse Matrix Permanents, Kamer Kaya

Turkish Journal of Electrical Engineering and Computer Sciences

The permanent is an important characteristic of a matrix and it has been used in many applications. Unfortunately, it is a hard to compute and hard to approximate the immanant. For dense/full matrices, the fastest exact algorithm, Ryser, has O($2^{n-1}$n) complexity. In this work, a parallel algorithm, SkipPer, is proposed to exploit the sparsity within the input matrix as much as possible. SkipPer restructures the matrix to reduce the overall work, skips the unnecessary steps, and employs a coarse-grain, shared-memory parallelization with dynamic scheduling. The experiments show that SkipPer increases the performance of exact permanent computation up to 140 compared …


Performance Evaluation Of Webrtc-Based Online Consultation Platform, Ergün Alperay Tarim, Hüseyi̇n Cumhur Teki̇n Jan 2019

Performance Evaluation Of Webrtc-Based Online Consultation Platform, Ergün Alperay Tarim, Hüseyi̇n Cumhur Teki̇n

Turkish Journal of Electrical Engineering and Computer Sciences

Information technologies give patients the opportunity to communicate with medical professionals remotely. Telemedicine uses these technologies to provide advanced healthcare and medical services. We present a medical online consultation application based on Web Real-Time Communications (WebRTC) technology enabling chat, audio, and video calls. Communication architecture and protocols of the application are explained in detail. Additionally, the user interface of the application is shown via performed calls. The application is tested and evaluated on different network connections (3G, 4G, local, and DSL) and different browsers and mobile operating systems (Android, Chrome, Firefox, Internet Explorer, iOS, Opera, Safari). During calls, communication quality …


Automatic Prostate Segmentation Using Multiobjective Active Appearance Model In Mr Images, Ahad Salimi, Mohammad Ali Pourmina, Mohamma-Shahram Moien Jan 2019

Automatic Prostate Segmentation Using Multiobjective Active Appearance Model In Mr Images, Ahad Salimi, Mohammad Ali Pourmina, Mohamma-Shahram Moien

Turkish Journal of Electrical Engineering and Computer Sciences

Prostate cancer is the second largest cause of mortality among men. Prostate segmentation, i.e. the precise determination of the prostate region in magnetic resonance imaging (MRI), is generally used for prostate volume measurement, which can be used as a potential prostate cancer indicator. This paper presents a new fully automatic statistical model called the multiobjective active appearance model (MOAAM) for prostate segmentation in MR images. First, in the training stage, the appearance model, including the shape and texture model, is developed by applying principal component analysis to the training images, already outlined by a physician. Then noise and roughness are …


Heart Attack Mortality Prediction: An Application Of Machine Learning Methods, Issam Salman Jan 2019

Heart Attack Mortality Prediction: An Application Of Machine Learning Methods, Issam Salman

Turkish Journal of Electrical Engineering and Computer Sciences

The heart is an important organ in the human body, and acute myocardial infarction (AMI) is the leading cause of death in most countries. Researchers are doing a lot of data analysis work to assist doctors in predicting the heart problem. An analysis of the data related to different health problems and its functions can help in predicting the wellness of this organ with a degree of certainty. Our research reported in this paper consists of two main parts. In the first part of the paper, we compare different predictive models of hospital mortality for patients with AMI. All results …


On The Output Regulation For Linear Fractional Systems, Jesus Alberto Meda Campana, Elba Cinthya Garcia Estrada, Julio Cesar Gomez Mancilla, Jose De Jesus Rubio Avila, Mario Ricardo Cruz Deviana, Ricardo Tapia Herrera Jan 2019

On The Output Regulation For Linear Fractional Systems, Jesus Alberto Meda Campana, Elba Cinthya Garcia Estrada, Julio Cesar Gomez Mancilla, Jose De Jesus Rubio Avila, Mario Ricardo Cruz Deviana, Ricardo Tapia Herrera

Turkish Journal of Electrical Engineering and Computer Sciences

In this work, the regulation problem is extended to the field of fractional-order linear systems considering the Caputo fractional derivative. The regulation equations are obtained on the basis of the Francis equations. It is also shown that the linear fractional regulator exists at $t=0$ only if the order of the plant is not greater than the order of the reference system.


Modified Recycling Folded Cascode Ota With Enhancement In Transconductance And Output Impedance, Sudheer Raja Venishetty, Kumaravel Sundaram Jan 2019

Modified Recycling Folded Cascode Ota With Enhancement In Transconductance And Output Impedance, Sudheer Raja Venishetty, Kumaravel Sundaram

Turkish Journal of Electrical Engineering and Computer Sciences

A modified recycling folded cascode (MRFC) operational transconductance amplifier (OTA) for achieving high DC gain, slew rate, and unity gain bandwidth (UGB) is proposed in this paper. Positive feedback is adopted to enhance DC gain and unity gain bandwidth. The proposed MRFC OTA is compared with conventional folded cascode (FC), recycling folded cascode (RFC), and other OTAs existing in the literature. Three OTAs, FC, RFC, and MRFC, are realized and implemented using the UMC 180 nm CMOS process for the same bias current of 300 $\mu$A. The designs are simulated in the Cadence Spectre Environment. From the simulation results, it …