Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 241 - 270 of 3006

Full-Text Articles in Physical Sciences and Mathematics

Identification And Mitigation Of Non-Line-Of-Sight Path Effect Using Repeater Forhybrid Ultra-Wideband Positioning And Networking System, Gwo Chin Chung, Mohd. Aqmal Syafiq Kamarudin, It Ee Lee, Soo Fun Tan Mar 2022

Identification And Mitigation Of Non-Line-Of-Sight Path Effect Using Repeater Forhybrid Ultra-Wideband Positioning And Networking System, Gwo Chin Chung, Mohd. Aqmal Syafiq Kamarudin, It Ee Lee, Soo Fun Tan

Turkish Journal of Electrical Engineering and Computer Sciences

At least two decades ago, various applications have been proposed for the implementation of ultra-wideband (UWB) technology, but only a few of them are being realised such as radar detection, home networking, and indoor positioning. Although UWB positioning offers precise locality tracking, the accuracy of the estimation is greatly affected by the non-line-of-sight (NLOS) path effect. In this paper, we propose a hybrid indoor UWB positioning and networking system that utilises the existing repeater of the data network to eliminate the NLOS paths. A switching algorithm is written to identify the existence of NLOS paths based on received signal strength …


Biometric Identification Using Panoramic Dental Radiographic Images Withfew-Shot Learning, Musa Ataş, Cüneyt Özdemi̇r, İsa Ataş, Burak Ak, Esma Özeroğlu Mar 2022

Biometric Identification Using Panoramic Dental Radiographic Images Withfew-Shot Learning, Musa Ataş, Cüneyt Özdemi̇r, İsa Ataş, Burak Ak, Esma Özeroğlu

Turkish Journal of Electrical Engineering and Computer Sciences

Determining identity is a crucial task especially in the cases of mass disasters such as tsunamis, earthquakes, fires, epidemics, and in forensics. Although there are various studies in the literature on biometric identification from radiographic dental images, more research is still required. In this study, a panoramic dental radiographic (PDR) imagebased human identification system was developed using a customized deep convolutional neural network model in a few-shot learning scheme. The proposed model (PDR-net) was trained on 600 PDR images obtained from a total of 300 patients. As the PDR images of the patients were very different in terms of pose …


Performance Analysis Of Lightweight Internet Of Things Devices On Blockchainnetworks, Cem Kösemen, Gökhan Dalkiliç, Şafak Öksüzer Feb 2022

Performance Analysis Of Lightweight Internet Of Things Devices On Blockchainnetworks, Cem Kösemen, Gökhan Dalkiliç, Şafak Öksüzer

Turkish Journal of Electrical Engineering and Computer Sciences

Potential integration or cooperation of the Internet of things (IoT) systems and the blockchain technology is nowadays attracting remarkable interest from the researchers. These inter-operating systems often have to rely on lowcost, low-power, and robust IoT devices that can communicate with the blockchain network through smart contracts. In this work, we designed and ran a benchmark study for ESP32-based lightweight IoT devices interacting within the Quorum blockchain. A software library was built for ESP32 devices to enable elliptic-curve digital signing, Keccak-256 hashing, decoding, encoding, and secure private key generation capabilities, which all are the basic functional requirements for running a …


Permissioned Blockchain Based Remote Electronic Examination, Öznur Kalkar, İsa Sertkaya Feb 2022

Permissioned Blockchain Based Remote Electronic Examination, Öznur Kalkar, İsa Sertkaya

Turkish Journal of Electrical Engineering and Computer Sciences

Recent coronavirus pandemic transformed almost all aspects of daily life including educational institutions and learning environments. As a result, this transformation brought remote electronic examination (shortly e-exam) concepts back into consideration. In this study, we revisit secure and privacy preserving e-exam protocol proposals and propose an e-exam protocol that utilizes decentralized identity-based verifiable credentials for proof of authentication and public-permissioned blockchain for immutably storing records. In regard to the previously proposed e-exam schemes, our scheme offers both privacy enhancement and better efficiency. More concretely, the proposed solution satisfies test answer authentication, examiner authentication, anonymous marking, anonymous examiner, question secrecy, question …


Blocksim-Net: A Network-Based Blockchain Simulator, Prashanthi Ramachandran, Nandini Agrawal, Osman Bi̇çer, Alpteki̇n Küpçü Feb 2022

Blocksim-Net: A Network-Based Blockchain Simulator, Prashanthi Ramachandran, Nandini Agrawal, Osman Bi̇çer, Alpteki̇n Küpçü

Turkish Journal of Electrical Engineering and Computer Sciences

Since its proposal by Eyal and Sirer (CACM '13), selfish mining attacks on proof-of-work blockchains have been studied extensively. The main body of this research aims at both studying the extent of its impact and defending against it. Yet, before any practical defense is deployed in a real world blockchain system, it needs to be tested for security and dependability. However, real blockchain systems are too complex to conduct any test on or benchmark the developed protocols. Instead, some simulation environments have been proposed recently, such as BlockSim (Maher et al., SIGMETRICS Perform. Eval. Rev. '19), which is a modular …


Block Size Optimization For Pow Consensus Algorithm Based Blockchainapplications By Using Whale Optimization Algorithm, Betül Aygün, Hi̇lal Arslan Feb 2022

Block Size Optimization For Pow Consensus Algorithm Based Blockchainapplications By Using Whale Optimization Algorithm, Betül Aygün, Hi̇lal Arslan

Turkish Journal of Electrical Engineering and Computer Sciences

Blockchain-based applications come up with cryptocurrencies, especially Bitcoin, introducing a distributed ledger technologies for peer-to-peer networks and essentially records the transactions in blocks containing hash value of the previous blocks. Block generation constitutes the basis of this technology, and the optimization of such systems is among the most crucial concerns. Determining either the block size or the number of transactions in the block brings out a remarkable problem that has been solved by the miners in recent years. First, higher block size results in higher transaction time, on the other hand, smaller block size has many disadvantages such as security, …


Estonian Internet Voting With Anonymous Credentials, İsa Sertkaya, Peter Roenne, Peter Y. A. Ryan Feb 2022

Estonian Internet Voting With Anonymous Credentials, İsa Sertkaya, Peter Roenne, Peter Y. A. Ryan

Turkish Journal of Electrical Engineering and Computer Sciences

The Estonian Internet voting (EIV) scheme is a unique example of a long-term nation-wide, legally binding electronic voting deployment. The EIV scheme is used in parallel with standard paper-based election day voting, of course invalidating an already cast i-vote. This necessarily requires careful authentication of the eligible voters and makes the Estonian identity card solution a crucial part of the scheme, however, note that Parsovs has recently drawn attention to the security flaws found in Estonian ID-cards. In this study, we propose an e-voting scheme EIV-AC that integrates the EIV scheme with anonymous credentials based on self-sovereign identity. In addition …


Privacy In Blockchain Systems, Murat Osmanoğlu, Ali̇ Aydin Selçuk Feb 2022

Privacy In Blockchain Systems, Murat Osmanoğlu, Ali̇ Aydin Selçuk

Turkish Journal of Electrical Engineering and Computer Sciences

Privacy of blockchains has been a matter of discussion since the inception of Bitcoin. Various techniques with a varying degree of privacy protection and complexity have been proposed over the past decade. In this survey, we present a systematic analysis of these proposals in four categories: (i) identity, (ii) transaction, (iii) consensus, and (iv) smart contract privacy. Each of these categories have privacy requirements of its own, and various solutions have been proposed to meet these requirements. Almost every technique in the literature of privacy enhancing technologies have been applied to blockchains: mix networks, zero-knowledge proofs, blind signatures, ring signatures, …


Tri-Op Redactable Blockchains With Block Modification, Removal, And Insertion, Mohammad Sadeq Dousti, Alpteki̇n Küpçü Feb 2022

Tri-Op Redactable Blockchains With Block Modification, Removal, And Insertion, Mohammad Sadeq Dousti, Alpteki̇n Küpçü

Turkish Journal of Electrical Engineering and Computer Sciences

In distributed computations and cryptography, it is desirable to record events on a public ledger, such that later alterations are computationally infeasible. An implementation of this idea is called blockchain, which is a distributed protocol that allows the creation of an immutable ledger. While such an idea is very appealing, the ledger may be contaminated with incorrect, illegal, or even dangerous data, and everyone running the blockchain protocol has no option but to store and propagate the unwanted data. The ledger is bloated over time, and it is not possible to remove redundant information. Finally, missing data cannot be inserted …


Forming A Decentralized Research Network: Ds4h, Eni̇s Karaarslan, Meli̇h Bi̇ri̇m, Hüseyi̇n Emre Ari Feb 2022

Forming A Decentralized Research Network: Ds4h, Eni̇s Karaarslan, Meli̇h Bi̇ri̇m, Hüseyi̇n Emre Ari

Turkish Journal of Electrical Engineering and Computer Sciences

There is a trend toward decentralized systems, but these systems are developed without conducting enough software tests. Also, the performance, scalability, and sustainability of the decentralized systems are not taken into account. One of the reasons is the time-consuming testing process. The other is the hardware requirements and the complexity of the software installations of the testing environment. Developer communities need stable and secure research networks to test and develop prototypes before releasing the working versions. Cloud-based blockchain test networks are available, but it allows using a specific framework. Also, users are required to learn how to use each framework. …


Data Immutability And Event Management Via Blockchain In The Internet Of Things, Hakan Altaş, Gökhan Dalkiliç, Umut Can Çabuk Feb 2022

Data Immutability And Event Management Via Blockchain In The Internet Of Things, Hakan Altaş, Gökhan Dalkiliç, Umut Can Çabuk

Turkish Journal of Electrical Engineering and Computer Sciences

The Internet of things (IoT) is the key enabler of the smart systems used in many areas, from agriculture to aviation, industrial automation to autonomous vehicles. Most IoT deployments employ cost-efficient lightweight devices with limited resources (e.g., bandwidth, energy, storage). Although an IoT network must be built in its simplest form, engineers include more sophisticated devices like gateways and servers to provide web-based services and benefit from cloud systems. So, although the nodes can be widely distributed geographically or topologically, the system becomes centralized, which causes bottlenecks and single-points-of-failure. Furthermore, providing data integrity, nonrepudiation, and event management becomes tricky. In …


An Approach For Performance Prediction Of Saturated Brushed Permanent Magnetdirect Current (Dc) Motor From Physical Dimensions, Rasul Tarvirdilu, Reza Zeinali, Hulusi̇ Bülent Ertan Jan 2022

An Approach For Performance Prediction Of Saturated Brushed Permanent Magnetdirect Current (Dc) Motor From Physical Dimensions, Rasul Tarvirdilu, Reza Zeinali, Hulusi̇ Bülent Ertan

Turkish Journal of Electrical Engineering and Computer Sciences

An analytical approach for performance prediction of saturated brushed permanent magnet direct current (DC) motors is proposed in this paper. In case of a heavy saturation in the stator back core of electrical machines, some flux completes its path through the surrounding air, and the conventional equivalent circuit cannot be used anymore. This issue has not been addressed in the literature. The importance of considering the effect of the flux penetrating the surrounding air is shown in this paper using finite element simulations and experimental results, and an analytical approach is proposed to consider this effect on magnet operating point …


Application Of Long Short-Term Memory (Lstm) Neural Network Based On Deeplearning For Electricity Energy Consumption Forecasting, Mehmet Bi̇lgi̇li̇, Ni̇yazi̇ Arslan, Ali̇i̇hsan Şekerteki̇n, Abdulkadi̇r Yaşar Jan 2022

Application Of Long Short-Term Memory (Lstm) Neural Network Based On Deeplearning For Electricity Energy Consumption Forecasting, Mehmet Bi̇lgi̇li̇, Ni̇yazi̇ Arslan, Ali̇i̇hsan Şekerteki̇n, Abdulkadi̇r Yaşar

Turkish Journal of Electrical Engineering and Computer Sciences

Electricity is the most substantial energy form that significantly affects the development of modern life, work efficiency, quality of life, production, and competitiveness of the society in the ever-growing global world. In this respect, forecasting accurate electricity energy consumption (EEC) is fairly essential for any country?s energy consumption planning and management regarding its growth. In this study, four time-series methods; long short-term memory (LSTM) neural network, adaptive neuro-fuzzy inference system (ANFIS) with subtractive clustering (SC), ANFIS with fuzzy cmeans (FCM), and ANFIS with grid partition (GP) were implemented for the short-term one-day ahead EEC prediction. Root mean square error (RMSE), …


Stability Regions In Time Delayed Two-Area Lfc System Enhanced By Evs, Ausnain Naveed, Şahi̇n Sönmez, Saffet Ayasun Jan 2022

Stability Regions In Time Delayed Two-Area Lfc System Enhanced By Evs, Ausnain Naveed, Şahi̇n Sönmez, Saffet Ayasun

Turkish Journal of Electrical Engineering and Computer Sciences

With the extensive usage of open communication networks, time delays have become a great concern in load frequency control (LFC) systems since such inevitable large delays weaken the controller performance and even may lead to instabilities. Electric vehicles (EVs) have a potential tool in the frequency regulation. The integration of a large number of EVs via an aggregator amplifies the adverse effects of time delays on the stability and controller design of LFC systems. This paper investigates the impacts of the EVs aggregator with communication time delay on the stability. Primarily, a graphical method characterizing stability boundary locus is implemented. …


Optimized Cancer Detection On Various Magnified Histopathological Colon Imagesbased On Dwt Features And Fcm Clustering, Tina Babu, Tripty Singh, Deepa Gupta, Shahin Hameed Jan 2022

Optimized Cancer Detection On Various Magnified Histopathological Colon Imagesbased On Dwt Features And Fcm Clustering, Tina Babu, Tripty Singh, Deepa Gupta, Shahin Hameed

Turkish Journal of Electrical Engineering and Computer Sciences

Due to the morphological characteristics and other biological aspects in histopathological images, the computerized diagnosis of colon cancer in histopathology images has gained popularity. The images acquired using the histopathology microscope may differ for greater visibility by magnifications. This causes a change in morphological traits leading to intra and inter-observer variability. An automatic colon cancer diagnosis system for various magnification is therefore crucial. This work proposes a magnification independent segmentation approach based on the connected component area and double density dual tree DWT (discrete wavelet transform) coefficients are derived from the segmented region. The derived features are reduced further shortened …


Distributed Wireless Sensor Node Localization Based On Penguin Searchoptimization, Md Al Shayokh, Soo Young Shin Jan 2022

Distributed Wireless Sensor Node Localization Based On Penguin Searchoptimization, Md Al Shayokh, Soo Young Shin

Turkish Journal of Electrical Engineering and Computer Sciences

Wireless sensor networks (WSNs) have become popular for sensing areas-of-interest and performing assigned tasks based on information on the location of sensor devices. Localization in WSNs is aimed at designating distinct geographical information to the inordinate nodes within a search area. Biologically inspired algorithms are being applied extensively in WSN localization to determine inordinate nodes more precisely while consuming minimal computation time. An optimization algorithm belonging to the metaheuristic class and named penguin search optimization (PeSOA) is presented in this paper. It utilizes the hunting approaches in a collaborative manner to determine the inordinate nodes within an area of interest. …


Motion-Aware Vehicle Detection In Driving Videos, Mehmet Kiliçarslan, Tansu Temel Jan 2022

Motion-Aware Vehicle Detection In Driving Videos, Mehmet Kiliçarslan, Tansu Temel

Turkish Journal of Electrical Engineering and Computer Sciences

This paper focuses on vehicle detection based on motion features in driving videos. Long-term motion information can assist in driving scenarios since driving is a complicated and dynamic process. The proposed method is a deep learning based model which processes motion frame image. This image merges both spatial (frame) and temporal (motion) information. Hence, the model jointly detects vehicles and their motion from a single image. The trained model on Toyota Motor Europe Motorway Dataset reaches 83% mean average precision (mAP). Our experiments demonstrate that the proposed method has a higher mAP than a tracking-based model. The proposed method runs …


Fft Enabled Ecc For Wsn Nodes Without Hardware Multiplier Support, Utku Gülen, Selçuk Baktir Jan 2022

Fft Enabled Ecc For Wsn Nodes Without Hardware Multiplier Support, Utku Gülen, Selçuk Baktir

Turkish Journal of Electrical Engineering and Computer Sciences

ECC is a popular cryptographic algorithm for key distribution in wireless sensor networks where power efficiency is desirable. A power efficient implementation of ECC without using hardware multiplier support was proposed earlier for wireless sensor nodes. The proposed implementation utilized the number theoretic transform to carry operands to the frequency domain, and conducted Montgomery multiplication, in addition to other finite field operations, in that domain. With this work, we perform in the frequency domain only polynomial multiplication and use the fast Fourier transform to carry operands between the time and frequency domains. Our ECC implementation over $GF((2^{13}-1)^{13})$ on the MSP430 …


Deep Learning-Aided Automated Personal Data Discovery And Profiling, Apdullah Yayik, Vedat Aybar, Hasan Hüseyi̇n Apik, Sevcan İçöz, Beki̇r Bakar, Tunga Güngör Jan 2022

Deep Learning-Aided Automated Personal Data Discovery And Profiling, Apdullah Yayik, Vedat Aybar, Hasan Hüseyi̇n Apik, Sevcan İçöz, Beki̇r Bakar, Tunga Güngör

Turkish Journal of Electrical Engineering and Computer Sciences

In Turkey, Turkish Personal Data Protection Rule (PDPR) No. 6698, in force since 2016, provides protection to citizens for the legal existence of their personal data. Although the law provides excellent guidance, companies currently face challenges in complying with its regulations in terms of storing, sharing, or monitoring personal data. Since any specially designed software with wide industrial usage is not on the market, almost all of the companies have no other choice but to take expensive and error-prone operations manually to ensure their compliance. In this paper, we present an automated solution to facilitate and accelerate PDPR compliance. In …


Temporal Bagging: A New Method For Time-Based Ensemble Learning, Göksu Tüysüzoğlu, Derya Bi̇rant, Volkan Kiranoğlu Jan 2022

Temporal Bagging: A New Method For Time-Based Ensemble Learning, Göksu Tüysüzoğlu, Derya Bi̇rant, Volkan Kiranoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

One of the main problems associated with the bagging technique in ensemble learning is its random sample selection in which all samples are treated with the same chance of being selected. However, in time-varying dynamic systems, the samples in the training set have not equal importance, where the recent samples contain more useful and accurate information than the former ones. To overcome this problem, this paper proposes a new time-based ensemble learning method, called temporal bagging (T-Bagging). The significant advantage of our method is that it assigns larger weights to more recent samples with respect to older ones, so it …


An Active Contour Model Using Matched Filter And Hessian Matrix For Retinalvessels Segmentation, Mahtab Shabani, Hossein Pourghassem Jan 2022

An Active Contour Model Using Matched Filter And Hessian Matrix For Retinalvessels Segmentation, Mahtab Shabani, Hossein Pourghassem

Turkish Journal of Electrical Engineering and Computer Sciences

Medical image analysis, especially of the retina, plays an important role in diagnostic decision support tools. The properties of retinal blood vessels are used for disease diagnoses such as diabetes, glaucoma, and hypertension. There are some challenges in the utilization of retinal blood vessel patterns such as low contrast and intensity inhomogeneities. Thus, an automatic algorithm for vessel extraction is required. Active contour is a strong method for edge extraction. However, it cannot extract thin vessels and ridges very well. In this research, we propose an improved active contour method that uses discrete wavelet transform for energy minimization to solve …


Stressed Or Just Running? Differentiation Of Mental Stress And Physical Activityby Using Machine Learning, Yekta Sai̇d Can Jan 2022

Stressed Or Just Running? Differentiation Of Mental Stress And Physical Activityby Using Machine Learning, Yekta Sai̇d Can

Turkish Journal of Electrical Engineering and Computer Sciences

Recently, modern people have excessive stress in their daily lives. With the advances in physiological sensors and wearable technology, people?s physiological status can be tracked, and stress levels can be recognized for providing beneficial services. Smartwatches and smartbands constitute the majority of wearable devices. Although they have an excellent potential for physiological stress recognition, some crucial issues need to be addressed, such as the resemblance of physiological reaction to stress and physical activity, artifacts caused by movements and low data quality. This paper focused on examining and differentiating physiological responses to both stressors and physical activity. Physiological data are collected …


A Novel Energy Consumption Model For Autonomous Mobile Robot, Gürkan Gürgöze, İbrahi̇m Türkoğlu Jan 2022

A Novel Energy Consumption Model For Autonomous Mobile Robot, Gürkan Gürgöze, İbrahi̇m Türkoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, a novel predictive energy consumption model has been developed to facilitate the development of tasks based on efficient energy consumption strategies in mobile robot systems. For the proposed energy consumption model, an advanced mathematical system model that takes into account all parameters during the motion of the mobile robot is created. The parameters of inclination, load, dynamic friction, wheel slip and speed-torque saturation limit, which are often neglected in existing models, are especially used in our model. Thus, the effects of unexpected disruptors on energy consumption in the real world environment are also taken into account. As …


An Effective Prediction Method For Network State Information In Sd-Wan, Erdal Akin, Ferdi̇ Saraç, Ömer Aslan Jan 2022

An Effective Prediction Method For Network State Information In Sd-Wan, Erdal Akin, Ferdi̇ Saraç, Ömer Aslan

Turkish Journal of Electrical Engineering and Computer Sciences

In a software-defined wide area network (SD-WAN), a logically centralized controller is responsible for computing and installing paths in order to transfer packets among geographically distributed locations and remote users. Accordingly, this would necessitate obtaining the global view and dynamic network state information (NSI) of the network. Therefore, the centralized controller periodically collects link-state information from each port of each switch at fixed time periods. While collecting NSI in short periods causes protocol overhead on the controller, collecting in longer periods leads to obtaining inaccurate NSI. In both cases, packet losses are inevitable, which is not preferred for quality of …


A Futuristic Approach To Generate Random Bit Sequence Using Dynamic Perturbedchaotic System, Sathya Krishnamoorthi, Premalatha Jayapaul, Vani Rajasekar, Rajesh Kumar Dhanaraj, Celestine Iwendi Jan 2022

A Futuristic Approach To Generate Random Bit Sequence Using Dynamic Perturbedchaotic System, Sathya Krishnamoorthi, Premalatha Jayapaul, Vani Rajasekar, Rajesh Kumar Dhanaraj, Celestine Iwendi

Turkish Journal of Electrical Engineering and Computer Sciences

Most of the web applications require security which in turn requires random numbers. Pseudo-random numbers are required with good statistical properties and efficiency. Use of chaotic map to dynamically perturb another chaotic map that generates the random bit output is introduced in this work. Perturbance is introduced to improvise the chaotic behaviour of a base map and increase the periodicity. PRNG with this architecture is devised to generate random bit sequence from initial keyspace. The statistical properties of newly constructed PRNG are tested with NIST SP 800-22 statistical test suite and were shown to have good randomness. To ensure its …


Cnn Based Sensor Fusion Method For Real-Time Autonomous Robotics Systems, Berat Yildiz, Aki̇f Durdu, Ahmet Kayabaşi, Mehmet Duramaz Jan 2022

Cnn Based Sensor Fusion Method For Real-Time Autonomous Robotics Systems, Berat Yildiz, Aki̇f Durdu, Ahmet Kayabaşi, Mehmet Duramaz

Turkish Journal of Electrical Engineering and Computer Sciences

Autonomous robotic systems (ARS) serve in many areas of daily life. The sensors have critical importance for these systems. The sensor data obtained from the environment should be as accurate and reliable as possible and correctly interpreted by the autonomous robot. Since sensors have advantages and disadvantages over each other they should be used together to reduce errors. In this study, Convolutional Neural Network (CNN) based sensor fusion was applied to ARS to contribute the autonomous driving. In a real-time application, a camera and LIDAR sensor were tested with these networks. The novelty of this work is that the uniquely …


Improving Collaborative Recommendation Based On Item Weight Link Prediction, Sahraoui Kharroubi, Youcef Dahmani, Omar Nouali Jan 2022

Improving Collaborative Recommendation Based On Item Weight Link Prediction, Sahraoui Kharroubi, Youcef Dahmani, Omar Nouali

Turkish Journal of Electrical Engineering and Computer Sciences

There is a continuous information overload on the Web. The problem treated is how to have relevant items (documents, products, services, etc.) at time and without difficulty. Filtering system also called recommender systems are widely used to recommend items to users by similarity process such as Amazon, MovieLens, Cdnow, etc. In the literature, to predict a link in a bipartite network, most methods are based either on a binary history (like, dislike) or on the common neighbourhood of the active user. In this paper, we modelled the recommender system by a weighted bipartite network. The bipartite topology offers a bidirectional …


Using Vertical Areas In Finite Set Model Predictive Control Of A Three-Level Inverter Aimed At Computation Reduction, Alireza Jaafari, Alireza Davari, Cristian Garcia, Jose Rodriguez Jan 2022

Using Vertical Areas In Finite Set Model Predictive Control Of A Three-Level Inverter Aimed At Computation Reduction, Alireza Jaafari, Alireza Davari, Cristian Garcia, Jose Rodriguez

Turkish Journal of Electrical Engineering and Computer Sciences

In power electronics applications, finite set model predictive control (FS-MPC) has proven to be a viable strategy. However, due to the high processing power required, using this technology in multilevel converters is difficult. This strategy, which is based on predicting the behavior of the system for all conceivable states, has an issue with a numerous of possible switching states. A recent and useful strategy for dealing with the problem is the limiting of calculations based on triangle regions. Despite its success, this method has several limitations, including the computation required to locate the right triangle and the boundary modes. In …


Evaluating The English-Turkish Parallel Treebank For Machine Translation, Onur Görgün, Olcay Taner Yildiz Jan 2022

Evaluating The English-Turkish Parallel Treebank For Machine Translation, Onur Görgün, Olcay Taner Yildiz

Turkish Journal of Electrical Engineering and Computer Sciences

This study extends our initial efforts in building an English-Turkish parallel treebank corpus for statistical machine translation tasks. We manually generated parallel trees for about 17K sentences selected from the Penn Treebank corpus. English sentences vary in length: 15 to 50 tokens including punctuation. We constrained the translation of trees by (i) reordering of leaf nodes based on suffixation rules in Turkish, and (ii) gloss replacement. We aim to mimic human annotator?s behavior in real translation task. In order to fill the morphological and syntactic gap between languages, we do morphological annotation and disambiguation. We also apply our heuristics by …


Automatically Classifying Familiar Web Users From Eye-Tracking Data:A Machine Learning Approach, Meli̇h Öder, Şükrü Eraslan, Yeli̇z Yesi̇lada Jan 2022

Automatically Classifying Familiar Web Users From Eye-Tracking Data:A Machine Learning Approach, Meli̇h Öder, Şükrü Eraslan, Yeli̇z Yesi̇lada

Turkish Journal of Electrical Engineering and Computer Sciences

Eye-tracking studies typically collect enormous amount of data encoding rich information about user behaviours and characteristics on the web. Eye-tracking data has been proved to be useful for usability and accessibility testing and for developing adaptive systems. The main objective of our work is to mine eye-tracking data with machine learning algorithms to automatically detect users' characteristics. In this paper, we focus on exploring different machine learning algorithms to automatically classify whether users are familiar or not with a web page. We present our work with an eye-tracking data of 81 participants on six web pages. Our results show that …