Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 211 - 230 of 230

Full-Text Articles in Physical Sciences and Mathematics

An Improved Memetic Genetic Algorithm Based On A Complex Network As Asolution To The Traveling Salesman Problem, Hadi Mohammadi, Kamal Mirzaie, Mohammad Reza Mollakhalili Meybodi Jan 2020

An Improved Memetic Genetic Algorithm Based On A Complex Network As Asolution To The Traveling Salesman Problem, Hadi Mohammadi, Kamal Mirzaie, Mohammad Reza Mollakhalili Meybodi

Turkish Journal of Electrical Engineering and Computer Sciences

A genetic algorithm (GA) is not a good option for finding solutions around in neighborhoods. The current study applies a memetic algorithm (MA) with a proposed local search to the mutation operator of a genetic algorithm in order to solve the traveling salesman problem (TSP). The proposed memetic algorithm uses swap, reversion and insertion operations to make changes in the solution. In the basic GA, unlike in the real world, the relationship between generations has not been considered. This gap is resolved using the proposed complex network to allow selection among possible solutions. The degree measure has been used for …


Comparative Study Between Measured And Estimated Wind Energy Yield, Ayman Alquraan, Mohammed Al-Mahmodi, Ashraf Radaideh, Hussein Al-Masri Jan 2020

Comparative Study Between Measured And Estimated Wind Energy Yield, Ayman Alquraan, Mohammed Al-Mahmodi, Ashraf Radaideh, Hussein Al-Masri

Turkish Journal of Electrical Engineering and Computer Sciences

This paper proposes a power-speed (P-V) model of the wind turbine by assuming three different functions for the first performance region; cubic, quadratic and uncorrected cubic. These three functions have been compared with the manufacturer models of five different wind turbines which were installed in five different locations in Jordan; Tafila, Hofa, Fujeij, Al Rajef, and Deahan. The wind turbine of these wind farms are considered as large scale HAWT in the range of Mw. The generated P-V models are developed by applying a new method described in this paper which is basically based on generating a multiplier factor x. …


Gabor Filter-Based Localization Of Straight And Curved Needlesin 2d Ultrasound Images, Mert Kaya, Abdurrahman Enes Şenel, Özkan Bebek Jan 2020

Gabor Filter-Based Localization Of Straight And Curved Needlesin 2d Ultrasound Images, Mert Kaya, Abdurrahman Enes Şenel, Özkan Bebek

Turkish Journal of Electrical Engineering and Computer Sciences

2D ultrasound (US) is one of the most commonly used medical imaging devices for needle localization in biopsies. However, the produced images are low-resolution and contain an excessive number of artifacts, which makes the needle localization challenging. Image processing techniques can help resolve this issue. This paper presents a novel Gabor filter-based method for needle localization in 2D US images, which enhances the needle outline in the images while suppressing other structures. The scheme works in two stages: First, the Gabor filter is applied to the image, the needle insertion angle is estimated, and the needle trajectory is found using …


Chronic Obstructive Pulmonary Disease Severity Analysis Using Deep Learning Onmulti-Channel Lung Sounds, Gökhan Altan, Yakup Kutlu, Ahmet Gökçen Jan 2020

Chronic Obstructive Pulmonary Disease Severity Analysis Using Deep Learning Onmulti-Channel Lung Sounds, Gökhan Altan, Yakup Kutlu, Ahmet Gökçen

Turkish Journal of Electrical Engineering and Computer Sciences

Chronic obstructive pulmonary disease (COPD) is one of the deadliest diseases which cannot be treated but can be kept under control in certain stages. COPD has five severities, including at-risk, mild, moderate, severe, and very severe stages. Diagnosis of COPD at early stages needs additional clinical tests for even experienced specialists. The study aims at detecting the severity of the COPD to start treatment for preventing the progression of the disease to the next levels. We analyzed 12-channel lung sounds with different COPD severities from RespiratoryDatabase@TR. The lung sounds were recorded from the clinical auscultation points from 41 patients on …


Variable Gain High Order Sliding Mode Control Approaches For Pmsg Basedvariable Speed Wind Energy Conversion System, Ameen Ullah, Laiq Khan, Qudrat Khan, Saghir Ahmad Jan 2020

Variable Gain High Order Sliding Mode Control Approaches For Pmsg Basedvariable Speed Wind Energy Conversion System, Ameen Ullah, Laiq Khan, Qudrat Khan, Saghir Ahmad

Turkish Journal of Electrical Engineering and Computer Sciences

This research article proposes two different variants of variable gain higher-order sliding mode control (HOSMC) strategy for a variable-speed wind energy conversion system (WECS) based on a permanent magnet synchronous generator (PMSG). The main objective is to extract the maximum wind power with reduced chattering and mechanical stress. The main flaw of the classical sliding mode control (SMC) is the high-frequency switching, called chattering, which is alleviated by employing HOSMC strategies. The control law design is based on a super-twisting algorithm (STA) and a real-twisting algorithm (RTA) with variable gains. The proposed control techniques inherit the property of robustness and …


Modeling Compaction Parameters Using Support Vector And Decision Treeregression Algorithms, Abdurrahman Özbeyaz, Mehmet Söylemez Jan 2020

Modeling Compaction Parameters Using Support Vector And Decision Treeregression Algorithms, Abdurrahman Özbeyaz, Mehmet Söylemez

Turkish Journal of Electrical Engineering and Computer Sciences

Shortening the periods of compaction tests can be possible by analyzing the data obtained from previous laboratory tests with regression methods. The regression analysis applied to current data reduces the cost of experiments, saves time, and gives estimated outputs. In this study, the MLS-SVR, KB-SVR, and DTR algorithms were employed for the first time for the estimation of soil compaction parameters. The performances of these regression algorithms in estimating maximum dry unit weight (MDD) and optimum water content (OMC) were compared. Furthermore, the soil properties (fine-grained soil, sand, gravel, specific gravity, liquid limit, and plastic limit) were employed as inputs …


Exploring The Parameter Space Of Human Activity Recognition With Mobile Devices, Berrenur Saylam, Muhammad Shoaib, Özlem Durmaz İncel Jan 2020

Exploring The Parameter Space Of Human Activity Recognition With Mobile Devices, Berrenur Saylam, Muhammad Shoaib, Özlem Durmaz İncel

Turkish Journal of Electrical Engineering and Computer Sciences

Motion sensors available on smart phones make it possible to recognize human activities. Accelerometer, gyroscope, magnetometer, and their various combinations are used to classify, particularly, locomotion activities, ranging from walking to biking. In most of the studies, the focus is on the collection of data and on the analysis of the impact of different parameters on the recognition performance. The parameter space includes the types of sensors used, features, classification algorithms, and position/orientation of the mobile device. In most of the studies, the impact of some of these parameters is partially analyzed; however, in this work, we investigate the parameter …


Effects Of Sliding Mode Control Antiretroviral Drug On Hiv-1 Viral Load, Musharif Ahmed, Saad Zafar, Muhammad Aamer Saleem, Muhammad Zubair, Ijaz Mansoor Qureshi Jan 2020

Effects Of Sliding Mode Control Antiretroviral Drug On Hiv-1 Viral Load, Musharif Ahmed, Saad Zafar, Muhammad Aamer Saleem, Muhammad Zubair, Ijaz Mansoor Qureshi

Turkish Journal of Electrical Engineering and Computer Sciences

Human immunodeficiency virus (HIV) has devastating effects on human society. Researchers have proposed many models for the decay of CD4+T cells, the growth of infected cells, and viral load. In this paper, four first-order nonlinear coupled differential equations have been considered. Four variables are CD4+T cells, which are healthy, less infected cells,more infected cells capable of producing virus,and finally the viralload. Apart from the two drug therapies, protease inhibitor (PI) and reverse transcriptase inhibitor (RTI), which have already been considered in the literature, we have proposed antiretroviral drug (ARD) that works as sliding mode controller. We have used numerical methods …


Efficient Turkish Tweet Classification System For Crisis Response, Saed Alqaraleh, Merve Işik Jan 2020

Efficient Turkish Tweet Classification System For Crisis Response, Saed Alqaraleh, Merve Işik

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents a convolutional neural networks Turkish tweet classification system for crisis response. This system has the ability to classify the present information before or during any crisis. In addition, a preprocessing model was also implemented and integrated as a part of the developed system. This paper presents the first ever Turkish tweet dataset for crisis response, which can be widely used and improve similar studies. This dataset has been carefully preprocessed, annotated, and well organized. It is suitable to be used by all the well-known natural language processing tools. Extensive experimental work, using our produced Turkish tweet dataset …


Estimating Synthetic Load Profile Based On Student Behavior Using Fuzzy Inference System For Demand Side Management Application, Nadhirah Omar, Mohd Aifaa Mohd Ariff, Ainnur Farah Izzati Mohd Shah, Muhammad Syafiq Anwar Mustaza Jan 2020

Estimating Synthetic Load Profile Based On Student Behavior Using Fuzzy Inference System For Demand Side Management Application, Nadhirah Omar, Mohd Aifaa Mohd Ariff, Ainnur Farah Izzati Mohd Shah, Muhammad Syafiq Anwar Mustaza

Turkish Journal of Electrical Engineering and Computer Sciences

This paper proposes a novel approach of estimating synthetic load profiles based on the electrical usage behavior using the fuzzy inference system (FIS) for demand side management (DSM). In practice, DSM is utilized to change the pattern of electrical energy consumed by end-users to modify the load profile by manipulating the price of the electricity. This study focuses on the energy consumption consumed by students who are paying electricity bills indirectly. Therefore, the effectiveness of conventional DSM methods on this user requires further investigation. In this study, the FIS estimates the synthetic load profile based on the student?s behavior profile. …


Adaptive Fast Sliding Neural Control For Robot Manipulator, Bariş Özyer Jan 2020

Adaptive Fast Sliding Neural Control For Robot Manipulator, Bariş Özyer

Turkish Journal of Electrical Engineering and Computer Sciences

Robotic manipulators are open to external disturbances and actuation failures during performing a task such as trajectory tracking. In this paper, we present a modifed controller consisting of a global fast sliding surface combined with an adaptive neural network which is called adaptive fast sliding neural control (AFSNC) for a robotic manipulator to precise stable trajectory tracking performance under the external disturbances. The adaptive term is employedtoreduce uncertainties due to unmodeled dynamics. Trackingerror asymptoticallyconvergesto zero according to the Lyapunov stability theorem. Numerical examples have been carried on a planar two-links manipulator to verify the control approach efficiency. The experimental results …


An Energy-Efficient Lightweight Security Protocol For Optimal Resource Provenance In Wireless Sensor Networks, Sujesh Lal, Joe Prathap P M Jan 2020

An Energy-Efficient Lightweight Security Protocol For Optimal Resource Provenance In Wireless Sensor Networks, Sujesh Lal, Joe Prathap P M

Turkish Journal of Electrical Engineering and Computer Sciences

Security of resource sharing and provenance is a major concern in wireless sensor networks(WSNs),wherethe intruders can easily inject malicious intermediate nodes for various personal gains. This selective forwarding attack may reduce the flow of resource sharing and throughput in the network. Most of the existing techniques are complex and do not provide sufficient security to sensor nodes with low energy. This paper proposes an energy-efficient and lightweight security protocol for optimal resource provenance in multihop WSNs and the Internet of things (IoT) network. The sharing of the resources between the sensor nodes indicates the strength of the mutual cooperation between …


Design And Application Of Spwm Based 21-Level Hybrid Inverter For Induction Motor Drive, Sheikh Tanzim Meraj, Kamrul Hasan, Ammar Masaoud Jan 2020

Design And Application Of Spwm Based 21-Level Hybrid Inverter For Induction Motor Drive, Sheikh Tanzim Meraj, Kamrul Hasan, Ammar Masaoud

Turkish Journal of Electrical Engineering and Computer Sciences

Thispaperpresentstheapplicationofanewlydeveloped21-levelhybridmultilevelinverter. Ahighfrequency modulation technique known as sinusoidal pulse width modulation (SPWM) is applied to the hybrid inverter. This modulation methodology operates the switching sequences of the multilevel inverter to produce the desired 21-level output voltage. To validate the proper application of this inverter, it is further utilized to maintain the speed of a single phase induction motor. The velocity control of the motor is established on the principle of V/f control technique. The speed control strategy along with the compatibility of the SPWM modulation technique were verified by means of simulation and experimental results.


Analysis Of Biometric Data Using Watermarking Techniques, Foday Jorh, Bariş Özyer, Claude Fachkha Jan 2020

Analysis Of Biometric Data Using Watermarking Techniques, Foday Jorh, Bariş Özyer, Claude Fachkha

Turkish Journal of Electrical Engineering and Computer Sciences

This paper evaluates and analyses the discrete wavelet transform (DWT) frequency bands for embedding and extracting of the biometric data using DWT single level and multilevel watermarking approach with and without the use of alpha blending approach. In addition, singular value decomposition (SVD) combined with DWT is used to embed and extract the watermark image. The performance of compression and decompression approaches has been analyzed to examine the robustness and to check whether the compression function does destroy the integrity of the watermarked image. We investigate the proposed approach to understand how robust the watermarked on different sub-band is against …


Automated Labeling Of Terms In Medical Reports In Serbian, Aldina Avdic, Ulfeta Marovac, Dragan Jankovic Jan 2020

Automated Labeling Of Terms In Medical Reports In Serbian, Aldina Avdic, Ulfeta Marovac, Dragan Jankovic

Turkish Journal of Electrical Engineering and Computer Sciences

Nowadays, many electronic health reports (EHRs) are stored daily. They consist of the structured part and of an unstructured section written in natural language. Due to the limited time for medical examination, EHRs are short reports which often contain errors and abbreviations. Therefore it is a challenge to process an EHR and extract knowledge from this part of the text for different purposes. This paper compares the results of three proposed methods for automatic labeling of medical terms in unstructured parts of EHRs. All words are categorized as words within the medical domain (symptoms, diagnoses, therapies, anatomy, specialties etc.) and …


Improving Coverage Method Of Autonomous Drones For Environmental Monitoring, Ömür Yildirim, Revna Acar Vural, Klaus Diepold Jan 2020

Improving Coverage Method Of Autonomous Drones For Environmental Monitoring, Ömür Yildirim, Revna Acar Vural, Klaus Diepold

Turkish Journal of Electrical Engineering and Computer Sciences

With the rapid developments of unmanned aerial vehicles (UAVs), usage of UAVs is increasing to bring autonomy for complicated processes such as environmental monitoring. Because of the complexity of the problem, environmental monitoring tasks are highly demanding in terms of time and resources. To reduce expensive costs of operations, improvements on autonomous observation capabilities has a key role. In this work, we offer coverage improvements for our autonomous environmental monitoring system. We compared different path planning approaches to find out the optimum path planning solution. Simulation results showed that required task execution time and required resources are decreased by usage …


A New Smart Networking Architecture For Container Network Functions, Gülsüm Atici, Pinar Bölük Jan 2020

A New Smart Networking Architecture For Container Network Functions, Gülsüm Atici, Pinar Bölük

Turkish Journal of Electrical Engineering and Computer Sciences

5G slices have challenging application demands from a wide variety of fields including high bandwidth, low latency and reliability. The requirements of the container network functions which are used in telecommunications are different from any other cloud native IT applications as they are used for data plane packet processing functions, together with control, signalling and media processing which have critical processing requirements. This study aims to discover high performing container networking solution by considering traffic loads and application types. The behaviour of several container cluster networking solutions -- Flannel, Weave, Libnetwork, Open Virtual Networking for Open vSwitch and Calico -- …


Binary Multicriteria Collaborative Filtering, Emre Yalçin, Alper Bi̇lge Jan 2020

Binary Multicriteria Collaborative Filtering, Emre Yalçin, Alper Bi̇lge

Turkish Journal of Electrical Engineering and Computer Sciences

Collaborative filtering is specialized in suggesting appropriate products and services to the users concerning personal characteristics and past preferences without requiring any effort of users. It might be more efficient to collect preferences of users based on multiple subcriteria of products and services. For this purpose, researchers propose multicriteria recommender systems that are convenient for more accurate and useful evaluation of items. Insuchsystems, it might be preferable tocollect binary ratings instead of numerical ones due to the large number of subcriteria. However, there is a gap in the literature to satisfy a binary preferences-based multicriteria recommender system. In this study, …


A New Configuration For Four-Switch Three-Phase Inverters Based On A Switched-Capacitor Step-Up Cell For Electric Vehicles Application, Alireza Lahooti Eshkevari, Ali Mosallanejad, Mohammad Sadegh Sepasian Jan 2020

A New Configuration For Four-Switch Three-Phase Inverters Based On A Switched-Capacitor Step-Up Cell For Electric Vehicles Application, Alireza Lahooti Eshkevari, Ali Mosallanejad, Mohammad Sadegh Sepasian

Turkish Journal of Electrical Engineering and Computer Sciences

This paper proposes a new configuration for four-switch three-phase inverters based on a step-up switchedcapacitor cell, which is called switched-capacitor four-switch three-phase inverter (SCFSTPI). This converter includes eight power switches and two DC-link capacitors. Voltage step-up feature, high efficiency, integrated structure, and bidirectional power flow are the main contribution of this new configuration. A modified space vector modulation (SVM) strategy is presented to generate appropriate pulses for the converter. This modulation method also eliminates the effect of capacitors voltage imbalance problem on the inverter output voltage and current. Simulation and experimental results are presented and investigated to confirm the performance …


A New Grid Partitioning Technology For Location Privacy Protection, Yue Sun, Lei Zhang, Jing Li, Zhen Zhang Jan 2020

A New Grid Partitioning Technology For Location Privacy Protection, Yue Sun, Lei Zhang, Jing Li, Zhen Zhang

Turkish Journal of Electrical Engineering and Computer Sciences

Nowadays, the location-based service (LBS) has become an essential part of convenient service in people's daily life. However, the untrusted LBS servers can store lots of information about the user, such as the user's identity, location, and destination. Then the information can be used as background knowledge and combined with the query frequency of the user to launch the inference attack to obtain user's privacy. In most of the existing schemes, the author considers the algorithm of virtual location selection from the historical location of the user. However, the LBS server can infer the user's location information on the historical …