Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Classification (65)
- Optimization (60)
- Machine learning (59)
- Deep learning (58)
- Genetic algorithm (57)
-
- Particle swarm optimization (49)
- Artificial neural network (34)
- Support vector machine (34)
- Feature extraction (32)
- Wireless sensor networks (31)
- Feature selection (27)
- Power quality (27)
- Artificial neural networks (26)
- Fuzzy logic (26)
- Distributed generation (25)
- Induction motor (24)
- Clustering (21)
- Support vector machines (20)
- Convolutional neural network (19)
- Convolutional neural networks (19)
- Image processing (18)
- Neural networks (18)
- Energy efficiency (17)
- Reliability (17)
- Sliding mode control (17)
- Electric vehicle (16)
- Neural network (16)
- Renewable energy (16)
- Artificial bee colony (15)
- Data mining (15)
Articles 241 - 270 of 3006
Full-Text Articles in Physical Sciences and Mathematics
Identification And Mitigation Of Non-Line-Of-Sight Path Effect Using Repeater Forhybrid Ultra-Wideband Positioning And Networking System, Gwo Chin Chung, Mohd. Aqmal Syafiq Kamarudin, It Ee Lee, Soo Fun Tan
Identification And Mitigation Of Non-Line-Of-Sight Path Effect Using Repeater Forhybrid Ultra-Wideband Positioning And Networking System, Gwo Chin Chung, Mohd. Aqmal Syafiq Kamarudin, It Ee Lee, Soo Fun Tan
Turkish Journal of Electrical Engineering and Computer Sciences
At least two decades ago, various applications have been proposed for the implementation of ultra-wideband (UWB) technology, but only a few of them are being realised such as radar detection, home networking, and indoor positioning. Although UWB positioning offers precise locality tracking, the accuracy of the estimation is greatly affected by the non-line-of-sight (NLOS) path effect. In this paper, we propose a hybrid indoor UWB positioning and networking system that utilises the existing repeater of the data network to eliminate the NLOS paths. A switching algorithm is written to identify the existence of NLOS paths based on received signal strength …
Biometric Identification Using Panoramic Dental Radiographic Images Withfew-Shot Learning, Musa Ataş, Cüneyt Özdemi̇r, İsa Ataş, Burak Ak, Esma Özeroğlu
Biometric Identification Using Panoramic Dental Radiographic Images Withfew-Shot Learning, Musa Ataş, Cüneyt Özdemi̇r, İsa Ataş, Burak Ak, Esma Özeroğlu
Turkish Journal of Electrical Engineering and Computer Sciences
Determining identity is a crucial task especially in the cases of mass disasters such as tsunamis, earthquakes, fires, epidemics, and in forensics. Although there are various studies in the literature on biometric identification from radiographic dental images, more research is still required. In this study, a panoramic dental radiographic (PDR) imagebased human identification system was developed using a customized deep convolutional neural network model in a few-shot learning scheme. The proposed model (PDR-net) was trained on 600 PDR images obtained from a total of 300 patients. As the PDR images of the patients were very different in terms of pose …
Performance Analysis Of Lightweight Internet Of Things Devices On Blockchainnetworks, Cem Kösemen, Gökhan Dalkiliç, Şafak Öksüzer
Performance Analysis Of Lightweight Internet Of Things Devices On Blockchainnetworks, Cem Kösemen, Gökhan Dalkiliç, Şafak Öksüzer
Turkish Journal of Electrical Engineering and Computer Sciences
Potential integration or cooperation of the Internet of things (IoT) systems and the blockchain technology is nowadays attracting remarkable interest from the researchers. These inter-operating systems often have to rely on lowcost, low-power, and robust IoT devices that can communicate with the blockchain network through smart contracts. In this work, we designed and ran a benchmark study for ESP32-based lightweight IoT devices interacting within the Quorum blockchain. A software library was built for ESP32 devices to enable elliptic-curve digital signing, Keccak-256 hashing, decoding, encoding, and secure private key generation capabilities, which all are the basic functional requirements for running a …
Permissioned Blockchain Based Remote Electronic Examination, Öznur Kalkar, İsa Sertkaya
Permissioned Blockchain Based Remote Electronic Examination, Öznur Kalkar, İsa Sertkaya
Turkish Journal of Electrical Engineering and Computer Sciences
Recent coronavirus pandemic transformed almost all aspects of daily life including educational institutions and learning environments. As a result, this transformation brought remote electronic examination (shortly e-exam) concepts back into consideration. In this study, we revisit secure and privacy preserving e-exam protocol proposals and propose an e-exam protocol that utilizes decentralized identity-based verifiable credentials for proof of authentication and public-permissioned blockchain for immutably storing records. In regard to the previously proposed e-exam schemes, our scheme offers both privacy enhancement and better efficiency. More concretely, the proposed solution satisfies test answer authentication, examiner authentication, anonymous marking, anonymous examiner, question secrecy, question …
Blocksim-Net: A Network-Based Blockchain Simulator, Prashanthi Ramachandran, Nandini Agrawal, Osman Bi̇çer, Alpteki̇n Küpçü
Blocksim-Net: A Network-Based Blockchain Simulator, Prashanthi Ramachandran, Nandini Agrawal, Osman Bi̇çer, Alpteki̇n Küpçü
Turkish Journal of Electrical Engineering and Computer Sciences
Since its proposal by Eyal and Sirer (CACM '13), selfish mining attacks on proof-of-work blockchains have been studied extensively. The main body of this research aims at both studying the extent of its impact and defending against it. Yet, before any practical defense is deployed in a real world blockchain system, it needs to be tested for security and dependability. However, real blockchain systems are too complex to conduct any test on or benchmark the developed protocols. Instead, some simulation environments have been proposed recently, such as BlockSim (Maher et al., SIGMETRICS Perform. Eval. Rev. '19), which is a modular …
Block Size Optimization For Pow Consensus Algorithm Based Blockchainapplications By Using Whale Optimization Algorithm, Betül Aygün, Hi̇lal Arslan
Block Size Optimization For Pow Consensus Algorithm Based Blockchainapplications By Using Whale Optimization Algorithm, Betül Aygün, Hi̇lal Arslan
Turkish Journal of Electrical Engineering and Computer Sciences
Blockchain-based applications come up with cryptocurrencies, especially Bitcoin, introducing a distributed ledger technologies for peer-to-peer networks and essentially records the transactions in blocks containing hash value of the previous blocks. Block generation constitutes the basis of this technology, and the optimization of such systems is among the most crucial concerns. Determining either the block size or the number of transactions in the block brings out a remarkable problem that has been solved by the miners in recent years. First, higher block size results in higher transaction time, on the other hand, smaller block size has many disadvantages such as security, …
Estonian Internet Voting With Anonymous Credentials, İsa Sertkaya, Peter Roenne, Peter Y. A. Ryan
Estonian Internet Voting With Anonymous Credentials, İsa Sertkaya, Peter Roenne, Peter Y. A. Ryan
Turkish Journal of Electrical Engineering and Computer Sciences
The Estonian Internet voting (EIV) scheme is a unique example of a long-term nation-wide, legally binding electronic voting deployment. The EIV scheme is used in parallel with standard paper-based election day voting, of course invalidating an already cast i-vote. This necessarily requires careful authentication of the eligible voters and makes the Estonian identity card solution a crucial part of the scheme, however, note that Parsovs has recently drawn attention to the security flaws found in Estonian ID-cards. In this study, we propose an e-voting scheme EIV-AC that integrates the EIV scheme with anonymous credentials based on self-sovereign identity. In addition …
Privacy In Blockchain Systems, Murat Osmanoğlu, Ali̇ Aydin Selçuk
Privacy In Blockchain Systems, Murat Osmanoğlu, Ali̇ Aydin Selçuk
Turkish Journal of Electrical Engineering and Computer Sciences
Privacy of blockchains has been a matter of discussion since the inception of Bitcoin. Various techniques with a varying degree of privacy protection and complexity have been proposed over the past decade. In this survey, we present a systematic analysis of these proposals in four categories: (i) identity, (ii) transaction, (iii) consensus, and (iv) smart contract privacy. Each of these categories have privacy requirements of its own, and various solutions have been proposed to meet these requirements. Almost every technique in the literature of privacy enhancing technologies have been applied to blockchains: mix networks, zero-knowledge proofs, blind signatures, ring signatures, …
Tri-Op Redactable Blockchains With Block Modification, Removal, And Insertion, Mohammad Sadeq Dousti, Alpteki̇n Küpçü
Tri-Op Redactable Blockchains With Block Modification, Removal, And Insertion, Mohammad Sadeq Dousti, Alpteki̇n Küpçü
Turkish Journal of Electrical Engineering and Computer Sciences
In distributed computations and cryptography, it is desirable to record events on a public ledger, such that later alterations are computationally infeasible. An implementation of this idea is called blockchain, which is a distributed protocol that allows the creation of an immutable ledger. While such an idea is very appealing, the ledger may be contaminated with incorrect, illegal, or even dangerous data, and everyone running the blockchain protocol has no option but to store and propagate the unwanted data. The ledger is bloated over time, and it is not possible to remove redundant information. Finally, missing data cannot be inserted …
Forming A Decentralized Research Network: Ds4h, Eni̇s Karaarslan, Meli̇h Bi̇ri̇m, Hüseyi̇n Emre Ari
Forming A Decentralized Research Network: Ds4h, Eni̇s Karaarslan, Meli̇h Bi̇ri̇m, Hüseyi̇n Emre Ari
Turkish Journal of Electrical Engineering and Computer Sciences
There is a trend toward decentralized systems, but these systems are developed without conducting enough software tests. Also, the performance, scalability, and sustainability of the decentralized systems are not taken into account. One of the reasons is the time-consuming testing process. The other is the hardware requirements and the complexity of the software installations of the testing environment. Developer communities need stable and secure research networks to test and develop prototypes before releasing the working versions. Cloud-based blockchain test networks are available, but it allows using a specific framework. Also, users are required to learn how to use each framework. …
Data Immutability And Event Management Via Blockchain In The Internet Of Things, Hakan Altaş, Gökhan Dalkiliç, Umut Can Çabuk
Data Immutability And Event Management Via Blockchain In The Internet Of Things, Hakan Altaş, Gökhan Dalkiliç, Umut Can Çabuk
Turkish Journal of Electrical Engineering and Computer Sciences
The Internet of things (IoT) is the key enabler of the smart systems used in many areas, from agriculture to aviation, industrial automation to autonomous vehicles. Most IoT deployments employ cost-efficient lightweight devices with limited resources (e.g., bandwidth, energy, storage). Although an IoT network must be built in its simplest form, engineers include more sophisticated devices like gateways and servers to provide web-based services and benefit from cloud systems. So, although the nodes can be widely distributed geographically or topologically, the system becomes centralized, which causes bottlenecks and single-points-of-failure. Furthermore, providing data integrity, nonrepudiation, and event management becomes tricky. In …
An Approach For Performance Prediction Of Saturated Brushed Permanent Magnetdirect Current (Dc) Motor From Physical Dimensions, Rasul Tarvirdilu, Reza Zeinali, Hulusi̇ Bülent Ertan
An Approach For Performance Prediction Of Saturated Brushed Permanent Magnetdirect Current (Dc) Motor From Physical Dimensions, Rasul Tarvirdilu, Reza Zeinali, Hulusi̇ Bülent Ertan
Turkish Journal of Electrical Engineering and Computer Sciences
An analytical approach for performance prediction of saturated brushed permanent magnet direct current (DC) motors is proposed in this paper. In case of a heavy saturation in the stator back core of electrical machines, some flux completes its path through the surrounding air, and the conventional equivalent circuit cannot be used anymore. This issue has not been addressed in the literature. The importance of considering the effect of the flux penetrating the surrounding air is shown in this paper using finite element simulations and experimental results, and an analytical approach is proposed to consider this effect on magnet operating point …
Application Of Long Short-Term Memory (Lstm) Neural Network Based On Deeplearning For Electricity Energy Consumption Forecasting, Mehmet Bi̇lgi̇li̇, Ni̇yazi̇ Arslan, Ali̇i̇hsan Şekerteki̇n, Abdulkadi̇r Yaşar
Application Of Long Short-Term Memory (Lstm) Neural Network Based On Deeplearning For Electricity Energy Consumption Forecasting, Mehmet Bi̇lgi̇li̇, Ni̇yazi̇ Arslan, Ali̇i̇hsan Şekerteki̇n, Abdulkadi̇r Yaşar
Turkish Journal of Electrical Engineering and Computer Sciences
Electricity is the most substantial energy form that significantly affects the development of modern life, work efficiency, quality of life, production, and competitiveness of the society in the ever-growing global world. In this respect, forecasting accurate electricity energy consumption (EEC) is fairly essential for any country?s energy consumption planning and management regarding its growth. In this study, four time-series methods; long short-term memory (LSTM) neural network, adaptive neuro-fuzzy inference system (ANFIS) with subtractive clustering (SC), ANFIS with fuzzy cmeans (FCM), and ANFIS with grid partition (GP) were implemented for the short-term one-day ahead EEC prediction. Root mean square error (RMSE), …
Stability Regions In Time Delayed Two-Area Lfc System Enhanced By Evs, Ausnain Naveed, Şahi̇n Sönmez, Saffet Ayasun
Stability Regions In Time Delayed Two-Area Lfc System Enhanced By Evs, Ausnain Naveed, Şahi̇n Sönmez, Saffet Ayasun
Turkish Journal of Electrical Engineering and Computer Sciences
With the extensive usage of open communication networks, time delays have become a great concern in load frequency control (LFC) systems since such inevitable large delays weaken the controller performance and even may lead to instabilities. Electric vehicles (EVs) have a potential tool in the frequency regulation. The integration of a large number of EVs via an aggregator amplifies the adverse effects of time delays on the stability and controller design of LFC systems. This paper investigates the impacts of the EVs aggregator with communication time delay on the stability. Primarily, a graphical method characterizing stability boundary locus is implemented. …
Optimized Cancer Detection On Various Magnified Histopathological Colon Imagesbased On Dwt Features And Fcm Clustering, Tina Babu, Tripty Singh, Deepa Gupta, Shahin Hameed
Optimized Cancer Detection On Various Magnified Histopathological Colon Imagesbased On Dwt Features And Fcm Clustering, Tina Babu, Tripty Singh, Deepa Gupta, Shahin Hameed
Turkish Journal of Electrical Engineering and Computer Sciences
Due to the morphological characteristics and other biological aspects in histopathological images, the computerized diagnosis of colon cancer in histopathology images has gained popularity. The images acquired using the histopathology microscope may differ for greater visibility by magnifications. This causes a change in morphological traits leading to intra and inter-observer variability. An automatic colon cancer diagnosis system for various magnification is therefore crucial. This work proposes a magnification independent segmentation approach based on the connected component area and double density dual tree DWT (discrete wavelet transform) coefficients are derived from the segmented region. The derived features are reduced further shortened …
Distributed Wireless Sensor Node Localization Based On Penguin Searchoptimization, Md Al Shayokh, Soo Young Shin
Distributed Wireless Sensor Node Localization Based On Penguin Searchoptimization, Md Al Shayokh, Soo Young Shin
Turkish Journal of Electrical Engineering and Computer Sciences
Wireless sensor networks (WSNs) have become popular for sensing areas-of-interest and performing assigned tasks based on information on the location of sensor devices. Localization in WSNs is aimed at designating distinct geographical information to the inordinate nodes within a search area. Biologically inspired algorithms are being applied extensively in WSN localization to determine inordinate nodes more precisely while consuming minimal computation time. An optimization algorithm belonging to the metaheuristic class and named penguin search optimization (PeSOA) is presented in this paper. It utilizes the hunting approaches in a collaborative manner to determine the inordinate nodes within an area of interest. …
Motion-Aware Vehicle Detection In Driving Videos, Mehmet Kiliçarslan, Tansu Temel
Motion-Aware Vehicle Detection In Driving Videos, Mehmet Kiliçarslan, Tansu Temel
Turkish Journal of Electrical Engineering and Computer Sciences
This paper focuses on vehicle detection based on motion features in driving videos. Long-term motion information can assist in driving scenarios since driving is a complicated and dynamic process. The proposed method is a deep learning based model which processes motion frame image. This image merges both spatial (frame) and temporal (motion) information. Hence, the model jointly detects vehicles and their motion from a single image. The trained model on Toyota Motor Europe Motorway Dataset reaches 83% mean average precision (mAP). Our experiments demonstrate that the proposed method has a higher mAP than a tracking-based model. The proposed method runs …
Fft Enabled Ecc For Wsn Nodes Without Hardware Multiplier Support, Utku Gülen, Selçuk Baktir
Fft Enabled Ecc For Wsn Nodes Without Hardware Multiplier Support, Utku Gülen, Selçuk Baktir
Turkish Journal of Electrical Engineering and Computer Sciences
ECC is a popular cryptographic algorithm for key distribution in wireless sensor networks where power efficiency is desirable. A power efficient implementation of ECC without using hardware multiplier support was proposed earlier for wireless sensor nodes. The proposed implementation utilized the number theoretic transform to carry operands to the frequency domain, and conducted Montgomery multiplication, in addition to other finite field operations, in that domain. With this work, we perform in the frequency domain only polynomial multiplication and use the fast Fourier transform to carry operands between the time and frequency domains. Our ECC implementation over $GF((2^{13}-1)^{13})$ on the MSP430 …
Deep Learning-Aided Automated Personal Data Discovery And Profiling, Apdullah Yayik, Vedat Aybar, Hasan Hüseyi̇n Apik, Sevcan İçöz, Beki̇r Bakar, Tunga Güngör
Deep Learning-Aided Automated Personal Data Discovery And Profiling, Apdullah Yayik, Vedat Aybar, Hasan Hüseyi̇n Apik, Sevcan İçöz, Beki̇r Bakar, Tunga Güngör
Turkish Journal of Electrical Engineering and Computer Sciences
In Turkey, Turkish Personal Data Protection Rule (PDPR) No. 6698, in force since 2016, provides protection to citizens for the legal existence of their personal data. Although the law provides excellent guidance, companies currently face challenges in complying with its regulations in terms of storing, sharing, or monitoring personal data. Since any specially designed software with wide industrial usage is not on the market, almost all of the companies have no other choice but to take expensive and error-prone operations manually to ensure their compliance. In this paper, we present an automated solution to facilitate and accelerate PDPR compliance. In …
Temporal Bagging: A New Method For Time-Based Ensemble Learning, Göksu Tüysüzoğlu, Derya Bi̇rant, Volkan Kiranoğlu
Temporal Bagging: A New Method For Time-Based Ensemble Learning, Göksu Tüysüzoğlu, Derya Bi̇rant, Volkan Kiranoğlu
Turkish Journal of Electrical Engineering and Computer Sciences
One of the main problems associated with the bagging technique in ensemble learning is its random sample selection in which all samples are treated with the same chance of being selected. However, in time-varying dynamic systems, the samples in the training set have not equal importance, where the recent samples contain more useful and accurate information than the former ones. To overcome this problem, this paper proposes a new time-based ensemble learning method, called temporal bagging (T-Bagging). The significant advantage of our method is that it assigns larger weights to more recent samples with respect to older ones, so it …
An Active Contour Model Using Matched Filter And Hessian Matrix For Retinalvessels Segmentation, Mahtab Shabani, Hossein Pourghassem
An Active Contour Model Using Matched Filter And Hessian Matrix For Retinalvessels Segmentation, Mahtab Shabani, Hossein Pourghassem
Turkish Journal of Electrical Engineering and Computer Sciences
Medical image analysis, especially of the retina, plays an important role in diagnostic decision support tools. The properties of retinal blood vessels are used for disease diagnoses such as diabetes, glaucoma, and hypertension. There are some challenges in the utilization of retinal blood vessel patterns such as low contrast and intensity inhomogeneities. Thus, an automatic algorithm for vessel extraction is required. Active contour is a strong method for edge extraction. However, it cannot extract thin vessels and ridges very well. In this research, we propose an improved active contour method that uses discrete wavelet transform for energy minimization to solve …
Stressed Or Just Running? Differentiation Of Mental Stress And Physical Activityby Using Machine Learning, Yekta Sai̇d Can
Stressed Or Just Running? Differentiation Of Mental Stress And Physical Activityby Using Machine Learning, Yekta Sai̇d Can
Turkish Journal of Electrical Engineering and Computer Sciences
Recently, modern people have excessive stress in their daily lives. With the advances in physiological sensors and wearable technology, people?s physiological status can be tracked, and stress levels can be recognized for providing beneficial services. Smartwatches and smartbands constitute the majority of wearable devices. Although they have an excellent potential for physiological stress recognition, some crucial issues need to be addressed, such as the resemblance of physiological reaction to stress and physical activity, artifacts caused by movements and low data quality. This paper focused on examining and differentiating physiological responses to both stressors and physical activity. Physiological data are collected …
A Novel Energy Consumption Model For Autonomous Mobile Robot, Gürkan Gürgöze, İbrahi̇m Türkoğlu
A Novel Energy Consumption Model For Autonomous Mobile Robot, Gürkan Gürgöze, İbrahi̇m Türkoğlu
Turkish Journal of Electrical Engineering and Computer Sciences
In this study, a novel predictive energy consumption model has been developed to facilitate the development of tasks based on efficient energy consumption strategies in mobile robot systems. For the proposed energy consumption model, an advanced mathematical system model that takes into account all parameters during the motion of the mobile robot is created. The parameters of inclination, load, dynamic friction, wheel slip and speed-torque saturation limit, which are often neglected in existing models, are especially used in our model. Thus, the effects of unexpected disruptors on energy consumption in the real world environment are also taken into account. As …
An Effective Prediction Method For Network State Information In Sd-Wan, Erdal Akin, Ferdi̇ Saraç, Ömer Aslan
An Effective Prediction Method For Network State Information In Sd-Wan, Erdal Akin, Ferdi̇ Saraç, Ömer Aslan
Turkish Journal of Electrical Engineering and Computer Sciences
In a software-defined wide area network (SD-WAN), a logically centralized controller is responsible for computing and installing paths in order to transfer packets among geographically distributed locations and remote users. Accordingly, this would necessitate obtaining the global view and dynamic network state information (NSI) of the network. Therefore, the centralized controller periodically collects link-state information from each port of each switch at fixed time periods. While collecting NSI in short periods causes protocol overhead on the controller, collecting in longer periods leads to obtaining inaccurate NSI. In both cases, packet losses are inevitable, which is not preferred for quality of …
A Futuristic Approach To Generate Random Bit Sequence Using Dynamic Perturbedchaotic System, Sathya Krishnamoorthi, Premalatha Jayapaul, Vani Rajasekar, Rajesh Kumar Dhanaraj, Celestine Iwendi
A Futuristic Approach To Generate Random Bit Sequence Using Dynamic Perturbedchaotic System, Sathya Krishnamoorthi, Premalatha Jayapaul, Vani Rajasekar, Rajesh Kumar Dhanaraj, Celestine Iwendi
Turkish Journal of Electrical Engineering and Computer Sciences
Most of the web applications require security which in turn requires random numbers. Pseudo-random numbers are required with good statistical properties and efficiency. Use of chaotic map to dynamically perturb another chaotic map that generates the random bit output is introduced in this work. Perturbance is introduced to improvise the chaotic behaviour of a base map and increase the periodicity. PRNG with this architecture is devised to generate random bit sequence from initial keyspace. The statistical properties of newly constructed PRNG are tested with NIST SP 800-22 statistical test suite and were shown to have good randomness. To ensure its …
Cnn Based Sensor Fusion Method For Real-Time Autonomous Robotics Systems, Berat Yildiz, Aki̇f Durdu, Ahmet Kayabaşi, Mehmet Duramaz
Cnn Based Sensor Fusion Method For Real-Time Autonomous Robotics Systems, Berat Yildiz, Aki̇f Durdu, Ahmet Kayabaşi, Mehmet Duramaz
Turkish Journal of Electrical Engineering and Computer Sciences
Autonomous robotic systems (ARS) serve in many areas of daily life. The sensors have critical importance for these systems. The sensor data obtained from the environment should be as accurate and reliable as possible and correctly interpreted by the autonomous robot. Since sensors have advantages and disadvantages over each other they should be used together to reduce errors. In this study, Convolutional Neural Network (CNN) based sensor fusion was applied to ARS to contribute the autonomous driving. In a real-time application, a camera and LIDAR sensor were tested with these networks. The novelty of this work is that the uniquely …
Improving Collaborative Recommendation Based On Item Weight Link Prediction, Sahraoui Kharroubi, Youcef Dahmani, Omar Nouali
Improving Collaborative Recommendation Based On Item Weight Link Prediction, Sahraoui Kharroubi, Youcef Dahmani, Omar Nouali
Turkish Journal of Electrical Engineering and Computer Sciences
There is a continuous information overload on the Web. The problem treated is how to have relevant items (documents, products, services, etc.) at time and without difficulty. Filtering system also called recommender systems are widely used to recommend items to users by similarity process such as Amazon, MovieLens, Cdnow, etc. In the literature, to predict a link in a bipartite network, most methods are based either on a binary history (like, dislike) or on the common neighbourhood of the active user. In this paper, we modelled the recommender system by a weighted bipartite network. The bipartite topology offers a bidirectional …
Using Vertical Areas In Finite Set Model Predictive Control Of A Three-Level Inverter Aimed At Computation Reduction, Alireza Jaafari, Alireza Davari, Cristian Garcia, Jose Rodriguez
Using Vertical Areas In Finite Set Model Predictive Control Of A Three-Level Inverter Aimed At Computation Reduction, Alireza Jaafari, Alireza Davari, Cristian Garcia, Jose Rodriguez
Turkish Journal of Electrical Engineering and Computer Sciences
In power electronics applications, finite set model predictive control (FS-MPC) has proven to be a viable strategy. However, due to the high processing power required, using this technology in multilevel converters is difficult. This strategy, which is based on predicting the behavior of the system for all conceivable states, has an issue with a numerous of possible switching states. A recent and useful strategy for dealing with the problem is the limiting of calculations based on triangle regions. Despite its success, this method has several limitations, including the computation required to locate the right triangle and the boundary modes. In …
Evaluating The English-Turkish Parallel Treebank For Machine Translation, Onur Görgün, Olcay Taner Yildiz
Evaluating The English-Turkish Parallel Treebank For Machine Translation, Onur Görgün, Olcay Taner Yildiz
Turkish Journal of Electrical Engineering and Computer Sciences
This study extends our initial efforts in building an English-Turkish parallel treebank corpus for statistical machine translation tasks. We manually generated parallel trees for about 17K sentences selected from the Penn Treebank corpus. English sentences vary in length: 15 to 50 tokens including punctuation. We constrained the translation of trees by (i) reordering of leaf nodes based on suffixation rules in Turkish, and (ii) gloss replacement. We aim to mimic human annotator?s behavior in real translation task. In order to fill the morphological and syntactic gap between languages, we do morphological annotation and disambiguation. We also apply our heuristics by …
Automatically Classifying Familiar Web Users From Eye-Tracking Data:A Machine Learning Approach, Meli̇h Öder, Şükrü Eraslan, Yeli̇z Yesi̇lada
Automatically Classifying Familiar Web Users From Eye-Tracking Data:A Machine Learning Approach, Meli̇h Öder, Şükrü Eraslan, Yeli̇z Yesi̇lada
Turkish Journal of Electrical Engineering and Computer Sciences
Eye-tracking studies typically collect enormous amount of data encoding rich information about user behaviours and characteristics on the web. Eye-tracking data has been proved to be useful for usability and accessibility testing and for developing adaptive systems. The main objective of our work is to mine eye-tracking data with machine learning algorithms to automatically detect users' characteristics. In this paper, we focus on exploring different machine learning algorithms to automatically classify whether users are familiar or not with a web page. We present our work with an eye-tracking data of 81 participants on six web pages. Our results show that …