Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Machine learning (11)
- Classification (7)
- Convolutional neural networks (6)
- Deep learning (6)
- Genetic algorithm (6)
-
- Optimization (6)
- Artificial neural networks (4)
- Adaptive control (3)
- Feature extraction (3)
- Feature selection (3)
- Genetic algorithms (3)
- Security (3)
- Support vector machine (3)
- Synthetic aperture radar (3)
- Wideband (3)
- Wireless sensor network (3)
- Wireless sensor networks (3)
- 5G (2)
- Artificial bee colony (2)
- Artificial neural network (2)
- CAD (2)
- Clustering (2)
- Conic functions (2)
- Convolutional neural network (2)
- Decision tree (2)
- Detection (2)
- Diversity (2)
- Efficiency (2)
- Energy efficiency (2)
- Energy harvesting (2)
Articles 31 - 60 of 230
Full-Text Articles in Physical Sciences and Mathematics
Novel Random Models Of Entity Mobility Models And Performance Analysis Ofrandom Entity Mobility Models, Meti̇n Bi̇lgi̇n
Novel Random Models Of Entity Mobility Models And Performance Analysis Ofrandom Entity Mobility Models, Meti̇n Bi̇lgi̇n
Turkish Journal of Electrical Engineering and Computer Sciences
It has become possible to collect data from geographically large areas with smart devices that are prevalently used today. Sensors that are integrated into smart devices make it possible for these devices to receive and transmit data wirelessly. The most important problem of this model that is known as mobile crowd sensing and that allows inferences on the data obtained from its users is lack of data. The main reason for this problem is the lack of sufficient usage of the sensors on devices by the user. To increase the amount of data collected, while users may be incentivized in …
A Priority-Based Queuing Model Approach Using Destination Parameters Forreal-Time Applications On Ipv6 Networks, Sadetti̇n Demi̇r, İbrahi̇m Özçeli̇k
A Priority-Based Queuing Model Approach Using Destination Parameters Forreal-Time Applications On Ipv6 Networks, Sadetti̇n Demi̇r, İbrahi̇m Özçeli̇k
Turkish Journal of Electrical Engineering and Computer Sciences
In the early days of the Internet architecture, the most important aim is to transmit data over packet switched networks. The traditional Internet architecture used in these networks lacks quality of service. However, today, as realtime applications increase, it is needed. There are approaches to improving the quality of service using the flow label field in the Internet Protocol version 6 header. In this study, a novel algorithm that uses destination network parameters to reduce queuing and end-to-end delay is created. A round-robin-based time-aware priority queue new model is used within this algorithm. Data packets using this proposed queue are …
An Inter-Domain Attack Mitigating Solution, Gökhan Akin, Ozan Bük, Erdem Uçar
An Inter-Domain Attack Mitigating Solution, Gökhan Akin, Ozan Bük, Erdem Uçar
Turkish Journal of Electrical Engineering and Computer Sciences
Online services on the Internet are increasing day by day, and in parallel, the number of cyber-attacks is rapidly increasing. These attacks are not always about data theft, but they can cause severe damage by denial of service attacks. Intrusion Prevention System products that many organizations use at the border of their enterprise networks are not strong enough to protect against DoS attacks. The typical way to mitigate such attacks is to get support from a service provider. However, a service provider only provides solutions for the traffic originating from itself. If the source of attack is in another ISP …
A Multibeam Subarrayed Time-Modulated Linear Array, Uğur Yeşi̇lyurt, İhsan Kanbaz, Ertuğrul Aksoy
A Multibeam Subarrayed Time-Modulated Linear Array, Uğur Yeşi̇lyurt, İhsan Kanbaz, Ertuğrul Aksoy
Turkish Journal of Electrical Engineering and Computer Sciences
In conventional time-modulated arrays (TMAs), because of the usage of the RF-switch, harmonics are generated at multiples of the modulation frequency. In this study, the synthesis of time-modulated arrays has been analyzed for cognitive radio (CR) systems, in which these harmonics are suitably exploited for more efficient utilization of the spectrum. In order to accomplish the desired pattern at requested harmonic frequencies, a new excitation strategy with sinusoidal signals is proposed. The use of sinusoidal waveforms creates independent beams, allowing independent steering capability. Moreover, by utilizing the subarray structure, it is possible to have a smaller number of excitation functions …
Event-Based Summarization Of News Articles, Feri̇de Savaroğlu Tabak, Vesi̇le Evri̇m
Event-Based Summarization Of News Articles, Feri̇de Savaroğlu Tabak, Vesi̇le Evri̇m
Turkish Journal of Electrical Engineering and Computer Sciences
In recent years, with the increase of available digital information on the Web, the time needed to find relevant information is also increased. Therefore, to reduce the time spent on searching, research on automatic text summarization has gained importance. The proposed summarization process is based on event extraction methods and is called an event-based extractive single-document summarization. In this method, the important features of event extraction and summarization methods are analyzed and combined together to extract the summaries from single-source news documents. Among the tested features, six features are found to be the most effective in constructing good summaries. The …
Dynamic Software Rejuvenation In Web Services: A Whale Optimizationalgorithm-Based Approach, Kimia Rezaei Kalantari, Ali Ebrahimnejad, Homayun Motameni
Dynamic Software Rejuvenation In Web Services: A Whale Optimizationalgorithm-Based Approach, Kimia Rezaei Kalantari, Ali Ebrahimnejad, Homayun Motameni
Turkish Journal of Electrical Engineering and Computer Sciences
In this paper, we suggest a method for determining the restarting time for web services to increase availability, known as rejuvenation. We consider different parameters such as number of users, maximum service request number, response time, and throughput of a web service to determine its restarting time. Software rejuvenation is an effective technique to counteract software aging in continuously running applications such as web service-based systems. In these systems, web services are allocated based on the needs of the receivers and facilities of servers. One of the challenges while assigning web services is selecting the appropriate server to reduce faults. …
Ternary Logical Naming Convention And Application In Ternary Optical Computers, Shuang Li, Yi Jin
Ternary Logical Naming Convention And Application In Ternary Optical Computers, Shuang Li, Yi Jin
Turkish Journal of Electrical Engineering and Computer Sciences
This article introduces the ternary logical naming convention, which was newly discovered in the study of logical units of ternary optical computers (TOCs). First, the design principle and design specification of the ternary logical naming convention are elaborated in detail and several examples are given to illustrate the use of the naming convention. Second, taking the modified signed-digit (MSD) adder of the TOC as an example, the naming convention is applied to build four ternary logical units of the MSD adder, and the implementation method of pipelined addition is introduced. Finally, the correctness of the ternary logical naming convention proposed …
An Automated Eye Disease Recognition System From Visual Content Of Facial Imagesusing Machine Learning Techniques, Ashrafi Akram, Rameswar Debnath
An Automated Eye Disease Recognition System From Visual Content Of Facial Imagesusing Machine Learning Techniques, Ashrafi Akram, Rameswar Debnath
Turkish Journal of Electrical Engineering and Computer Sciences
Many eye diseases like cataracts, trachoma, or corneal ulcer can cause vision problems. Progression of these eye diseases can only be prevented if they are recognized accurately at the early stage. Visually observable symptoms differ a lot among these eye diseases. However, a wide variety of symptoms is necessary to be analyzed for the accurate detection of eye diseases. In this paper, we propose a novel approach to provide an automated eye disease recognition system using visually observable symptoms applying digital image processing techniques and machine learning techniques such as deep convolution neural network (DCNN) and support vector machine (SVM). …
Correlation Coefficients Of Pythagorean Hesitant Fuzzy Sets And Their Applicationto Radar Lpi Performance Evaluation, Cheng Xiu Yang, Qianzhe Wang, Weidong Peng, Shaoting Pei
Correlation Coefficients Of Pythagorean Hesitant Fuzzy Sets And Their Applicationto Radar Lpi Performance Evaluation, Cheng Xiu Yang, Qianzhe Wang, Weidong Peng, Shaoting Pei
Turkish Journal of Electrical Engineering and Computer Sciences
Evaluating low probability of intercept (LPI) performance is the first step to design parameters and arrange radar resources. In the evaluation process it is hard to rely on the intercept receiver?s working scenarios and operating parameters. On the other hand, indicators that affect the LPI performance of radiating side are difficult to consider comprehensively. Thus, building an effective evaluation system is crucial. This research considers the natural parameters of radar extracted from a radiating scenario. Subsequently, a number of criteria are selected, including spatial, time, frequency domain, polarization status, energy status, and waveform features. A multidomain radar LPI performance evaluation …
Development Of A Supervised Classification Method To Construct 2d Mineral Mapson Backscattered Electron Images, Mahmut Camalan, Mahmut Çavur
Development Of A Supervised Classification Method To Construct 2d Mineral Mapson Backscattered Electron Images, Mahmut Camalan, Mahmut Çavur
Turkish Journal of Electrical Engineering and Computer Sciences
The Mineral Liberation Analyzer (MLA) can be used to obtain mineral maps from backscattered electron (BSE) images of particles. This paper proposes an alternative methodology that includes random forest classification, a prospective machine learning algorithm, to develop mineral maps from BSE images. The results show that the overall accuracy and kappa statistic of the proposed method are 97% and 0.94, respectively, proving that random forest classification is accurate. The accuracy indicators also suggest that the proposed method may be applied to classify minerals with similar appearances under BSE imaging. Meanwhile, random forest predicts fewer middling particles with binary and ternary …
Prediction Of Railway Switch Point Failures By Artificial Intelligence Methods, Burak Arslan, Hasan Ti̇ryaki̇
Prediction Of Railway Switch Point Failures By Artificial Intelligence Methods, Burak Arslan, Hasan Ti̇ryaki̇
Turkish Journal of Electrical Engineering and Computer Sciences
In recent years, railway transport has been preferred intensively in local and intercity freight and passenger transport. For this reason, it is of utmost importance that railway lines are operated in an uninterrupted and safe manner. In order to carry out continuous operation, all systems must continue to operate with maximum availability. In this study, data were collected from switch motors, which are the important equipment of railways, and the related equipment and these data were evaluated with sector experience and the results related to the failure status of the switch points were revealed. The obtained results were processed with …
Measurement Based Threat Aware Drone Base Station Deployment, Alper Akarsu, Tolga Gi̇ri̇ci̇
Measurement Based Threat Aware Drone Base Station Deployment, Alper Akarsu, Tolga Gi̇ri̇ci̇
Turkish Journal of Electrical Engineering and Computer Sciences
Unmanned aerial vehicles are gaining importance with many civilian and military applications. Especially the surveillance, search/rescue, and military operations may have to be carried out in extremely constrained environments. In such scenarios, drone base stations (DBSs) have to provide communication services to the people at the ground. The ground users may have no access to the global positioning system (GPS); therefore, their locations have to be estimated using alternative techniques. Besides there may be threats in the environment, such as shooters. In this work, we address the problem of optimal DBS deployment under the aforementioned constraints. We propose a novel …
Design Of A Spurious-Free Rf Frequency Synthesizer For Fast-Settling Receivers, Hi̇lmi̇ Kayhan Yilmaz, Serkan Topaloğlu
Design Of A Spurious-Free Rf Frequency Synthesizer For Fast-Settling Receivers, Hi̇lmi̇ Kayhan Yilmaz, Serkan Topaloğlu
Turkish Journal of Electrical Engineering and Computer Sciences
A tunable reference clock frequency topology is presented as a spur reduction application for frequency synthesizers of fast frequency hopping spread spectrum systems. The method was verified by measurements on a designed hardware operating at L-band frequencies. This spur reduction method is based on optimizing the reference clock frequency of synthesizers to mitigate spurs. By using the spur reduction method, the power of spurious signals was reduced up to 57 dB. The performance of the spur reduction method was also analyzed at different loop-filter configurations. Smaller lock time was obtained by enlarging the bandwidth of the loop filter up to …
Deep Temporal Motion Descriptor (Dtmd) For Human Action Recognition, Nudrat Nida, Muhammad Haroon Yousaf, Aun Irtaza, Sergio A. Velastin
Deep Temporal Motion Descriptor (Dtmd) For Human Action Recognition, Nudrat Nida, Muhammad Haroon Yousaf, Aun Irtaza, Sergio A. Velastin
Turkish Journal of Electrical Engineering and Computer Sciences
Spatiotemporal features have significant importance in human action recognition, as they provide the actor's shape and motion characteristics specific to each action class. This paper presents a new deep spatiotemporal human action representation, the deep temporal motion descriptor (DTMD), which shares the attributes of holistic and deep learned features. To generate the DTMD descriptor, the actor?s silhouettes are gathered into single motion templates by applying motion history images. These motion templates capture the spatiotemporal movements of the actor and compactly represent the human actions using a single 2D template. Then deep convolutional neural networks are used to compute discriminative deep …
The Impact Of Text Preprocessing On The Prediction Of Review Ratings, Muhi̇tti̇n Işik, Hasan Dağ
The Impact Of Text Preprocessing On The Prediction Of Review Ratings, Muhi̇tti̇n Işik, Hasan Dağ
Turkish Journal of Electrical Engineering and Computer Sciences
With the increase of e-commerce platforms and online applications, businessmen are looking to have a rating and review system through which they can easily reveal the feelings of customers related to their products and services. It is undeniable from the statistics that online ratings and reviews attract new customers as well as increase sales by means of providing confidence, ratification, opinions, comparisons, merchant credibility, etc. Although considerable research has been devoted to the sentiment analysis for review classification, rather less attention has been paid to the text preprocessing which is a crucial step in opinion mining especially if convenient preprocessing …
Comparative Analysis Of Classification Techniques For Network Fault Management, Mohammed Madi, Fidaa Jarghon, Yousef Fazea, Omar Almomani, Adeeb Saaidah
Comparative Analysis Of Classification Techniques For Network Fault Management, Mohammed Madi, Fidaa Jarghon, Yousef Fazea, Omar Almomani, Adeeb Saaidah
Turkish Journal of Electrical Engineering and Computer Sciences
Network troubleshooting is a significant process. Many studies were conducted about it. The first step in the troubleshooting procedures is represented in collecting information. It's collected in order to identify the problems. Syslog messages which are sent by almost all network devices include a massive amount of data that concern the network problems. Based on several studies, it was found that analyzing syslog data (which) can be a guideline for network problems and their causes. The detection of network problems can become more efficient if the detected problems have been classified based on the network layers. Classifying syslog data requires …
Implicit Relation-Based Question Answering To Answer Simple Questions Overdbpedia, Maryam Jamehshourani, Afsaneh Fatemi, Mohammadali Nematbakhsh
Implicit Relation-Based Question Answering To Answer Simple Questions Overdbpedia, Maryam Jamehshourani, Afsaneh Fatemi, Mohammadali Nematbakhsh
Turkish Journal of Electrical Engineering and Computer Sciences
RDF-based question answering systems give users the capability of natural language querying over RDF data. In order to respond to natural language questions, it is necessary that the main concept of the question be interpreted correctly, and then it is mapped to RDF data. A natural language question includes entities, classes, and implicit and explicit relationships. In this article, by focusing on identification and mapping of implicit relationships in the question (in addition to the explicit relationships), the mapping step has been improved. In the proposed solution (IRQA), entities and implicit/explicit relationships are identified by means of the provided rules …
Two Novel Radar Detectors For Spiky Sea Clutter With The Presence Of Thermal Noise And Interfering Targets, Nouh Guidoum, Faouzi Soltani, Amar Mezache
Two Novel Radar Detectors For Spiky Sea Clutter With The Presence Of Thermal Noise And Interfering Targets, Nouh Guidoum, Faouzi Soltani, Amar Mezache
Turkish Journal of Electrical Engineering and Computer Sciences
In the context of noncoherent detection and high-resolution maritime radar system with low grazing angle, new Constant False Alarm Rate (CFAR) decision rules are suggested for two Compound Gaussian (CG) clutters namely: The K distribution and the Compound Inverse Gaussian (CIG) distribution, which are considered among the most appropriate models for sea clutter. The proposed decision rules are then modified to deal with the presence of thermal noise and interfering targets. The proposed detectors are investigated on the basis of synthetic data as well as real data of the IPIX radar database. The obtained results exhibit a high probability of …
Investigating The Efficiency Of Multithreading Application Programming Interfacesfor Parallel Packet Classification In Wireless Sensor Networks, Mahdi Abbasi, Milad Rafiee, Mohammad R. Khosravi
Investigating The Efficiency Of Multithreading Application Programming Interfacesfor Parallel Packet Classification In Wireless Sensor Networks, Mahdi Abbasi, Milad Rafiee, Mohammad R. Khosravi
Turkish Journal of Electrical Engineering and Computer Sciences
This paper investigates the most appropriate application programming interface (API) that best accelerates the flow-based applications on the wireless sensor networks (WSNs). Each WSN include many sensor nodes which have limited resources. These sensor nodes are connected together using base stations. The base stations are commonly network systems with conventional processors which are responsible for handling a large amount of communicated data in flows of network packets. For this purpose, classification of the communicated packets is considered the primary process in such systems. With the advent of high-performance multicore processors, developers in the network industry have considered these processors as …
A Template-Based Code Generator For Web Applications, Burak Uyanik, Veysel Harun Şahi̇n
A Template-Based Code Generator For Web Applications, Burak Uyanik, Veysel Harun Şahi̇n
Turkish Journal of Electrical Engineering and Computer Sciences
The importance and usage of web applications grow every day. Today from small businesses to large-scale corporations, many institutions prefer web applications for both their internal and external services. Code size and complexity of these kinds of applications grow rapidly. This brings up the question of how to improve the development process of web applications. A solution can be to use code generators. This paper introduces a template-based code generator to improve the development process of web applications. The code generator was developed and integrated into a real-life web application. Today, the web application together with the code generator is …
Facest: Feedback-Assisted Estimation Of End-To-End Capacity In Ip-Basedcommunication Networks, Fati̇h Abut
Facest: Feedback-Assisted Estimation Of End-To-End Capacity In Ip-Basedcommunication Networks, Fati̇h Abut
Turkish Journal of Electrical Engineering and Computer Sciences
The end-to-end capacity, defined as the maximal transmission rate of the weakest link on the entire path between two end hosts, plays an important role in efficient network design and management. Although various capacity estimation tools have been proposed in the literature, there is still uncertainty in their accuracy and reliability when they are used in today's IP-based communication networks. The main reason for this is that all current capacity estimation tools only yield a potential candidate for an acceptable estimate, without being aware of its reliability level. In this study, we propose a new feedback-assisted end-to-end capacity estimation (FACEST) …
Deep Reinforcement Learning For Acceptance Strategy In Bilateral Negotiations, Yousef Razeghi, Celal Ozan Berk Yavuz, Reyhan Aydoğan
Deep Reinforcement Learning For Acceptance Strategy In Bilateral Negotiations, Yousef Razeghi, Celal Ozan Berk Yavuz, Reyhan Aydoğan
Turkish Journal of Electrical Engineering and Computer Sciences
This paper introduces an acceptance strategy based on reinforcement learning for automated bilateral negotiation, where negotiating agents bargain on multiple issues in a variety of negotiation scenarios. Several acceptance strategies based on predefined rules have been introduced in the automated negotiation literature. Those rules mostly rely on some heuristics, which take time and/or utility into account. For some negotiation settings, an acceptance strategy solely based on a negotiation deadline might perform well; however, it might fail in another setting. Instead of following predefined acceptance rules, this paper presents an acceptance strategy that aims to learn whether to accept its opponent's …
Optimum Reference Distance Based Path Loss Exponent Determination Forvehicle-To-Vehicle Communication, Kenan Kuzulugi̇l, Zeynep Hasirci, İsmai̇l Hakki Çavdar
Optimum Reference Distance Based Path Loss Exponent Determination Forvehicle-To-Vehicle Communication, Kenan Kuzulugi̇l, Zeynep Hasirci, İsmai̇l Hakki Çavdar
Turkish Journal of Electrical Engineering and Computer Sciences
Vehicle-to-vehicle (V2V) communication environment differs from classical wireless communication with respect to low antenna heights and high mobility. Therefore, V2V channel modeling based on real measurements is still crucial to get the channel parameters for the various road environments. One of the most extracted parameters from measurements is path loss exponent and selecting a fixed reference distance value in obtaining this parameter may also cause remarkable fitting errors. Thus, in this study, least square method-based approach for the best-fitted path loss exponent calculation was proposed by determining the optimum reference distance value from the V2V channel measurements. First, V2V channel …
Performance Optimisation Of A Sensing Chamber Using Fluid Dynamics Simulationfor Electronic Nose Applications, Punjan Dohare, Sudeshna Bagchi, Amol P. Bhondekar
Performance Optimisation Of A Sensing Chamber Using Fluid Dynamics Simulationfor Electronic Nose Applications, Punjan Dohare, Sudeshna Bagchi, Amol P. Bhondekar
Turkish Journal of Electrical Engineering and Computer Sciences
The sensor chamber plays a significant role in order to improve the performance of an electronic nose in terms of stability, repeatability, reproducibility, and sensitivity. Fluid dynamics simulations of six different configurations of 3D sensing chambers are presented to facilitate the efficient design of an electronic nose system comprising 64 sensor arrays. Numerical simulations were carried out to investigate the gas (zero air) flow behaviour inside these chambers under steady-state conditions for velocities ranging from 0.1 to 2 m/s using ANSYS software. Design optimisation was performed in terms of area coverage, velocity, and mass fraction. The results show that the …
Exhaustive Hard Triplet Mining Loss For Person Re-Identification, Chao Xu, Xiang Sun, Ziliang Chen, Shoubiao Tan
Exhaustive Hard Triplet Mining Loss For Person Re-Identification, Chao Xu, Xiang Sun, Ziliang Chen, Shoubiao Tan
Turkish Journal of Electrical Engineering and Computer Sciences
Person reidentification (Re-ID) is an important task in computer vision and has many applications in videobased surveillance. Recently, the triplet loss has been popular in the deep learning framework for person Re-ID. It is particularly important to note that the selection of hard triplets has significant influence on the performance of the learned deep model. However, the existing triplet losses only focus on some specific forms of hard triplets, thus leading to weaker generalization capability. To address this issue, we propose a novel variant of the triplet loss, named exhaustive hard triplet mining loss (EHTM), which is able to deal …
Efficient Turkish Tweet Classification System For Crisis Response, Saed Alqaraleh, Merve Işik
Efficient Turkish Tweet Classification System For Crisis Response, Saed Alqaraleh, Merve Işik
Turkish Journal of Electrical Engineering and Computer Sciences
This paper presents a convolutional neural networks Turkish tweet classification system for crisis response. This system has the ability to classify the present information before or during any crisis. In addition, a preprocessing model was also implemented and integrated as a part of the developed system. This paper presents the first ever Turkish tweet dataset for crisis response, which can be widely used and improve similar studies. This dataset has been carefully preprocessed, annotated, and well organized. It is suitable to be used by all the well-known natural language processing tools. Extensive experimental work, using our produced Turkish tweet dataset …
Adaptive Fast Sliding Neural Control For Robot Manipulator, Bariş Özyer
Adaptive Fast Sliding Neural Control For Robot Manipulator, Bariş Özyer
Turkish Journal of Electrical Engineering and Computer Sciences
Robotic manipulators are open to external disturbances and actuation failures during performing a task such as trajectory tracking. In this paper, we present a modifed controller consisting of a global fast sliding surface combined with an adaptive neural network which is called adaptive fast sliding neural control (AFSNC) for a robotic manipulator to precise stable trajectory tracking performance under the external disturbances. The adaptive term is employedtoreduce uncertainties due to unmodeled dynamics. Trackingerror asymptoticallyconvergesto zero according to the Lyapunov stability theorem. Numerical examples have been carried on a planar two-links manipulator to verify the control approach efficiency. The experimental results …
Design And Application Of Spwm Based 21-Level Hybrid Inverter For Induction Motor Drive, Sheikh Tanzim Meraj, Kamrul Hasan, Ammar Masaoud
Design And Application Of Spwm Based 21-Level Hybrid Inverter For Induction Motor Drive, Sheikh Tanzim Meraj, Kamrul Hasan, Ammar Masaoud
Turkish Journal of Electrical Engineering and Computer Sciences
Thispaperpresentstheapplicationofanewlydeveloped21-levelhybridmultilevelinverter. Ahighfrequency modulation technique known as sinusoidal pulse width modulation (SPWM) is applied to the hybrid inverter. This modulation methodology operates the switching sequences of the multilevel inverter to produce the desired 21-level output voltage. To validate the proper application of this inverter, it is further utilized to maintain the speed of a single phase induction motor. The velocity control of the motor is established on the principle of V/f control technique. The speed control strategy along with the compatibility of the SPWM modulation technique were verified by means of simulation and experimental results.
Analysis Of Biometric Data Using Watermarking Techniques, Foday Jorh, Bariş Özyer, Claude Fachkha
Analysis Of Biometric Data Using Watermarking Techniques, Foday Jorh, Bariş Özyer, Claude Fachkha
Turkish Journal of Electrical Engineering and Computer Sciences
This paper evaluates and analyses the discrete wavelet transform (DWT) frequency bands for embedding and extracting of the biometric data using DWT single level and multilevel watermarking approach with and without the use of alpha blending approach. In addition, singular value decomposition (SVD) combined with DWT is used to embed and extract the watermark image. The performance of compression and decompression approaches has been analyzed to examine the robustness and to check whether the compression function does destroy the integrity of the watermarked image. We investigate the proposed approach to understand how robust the watermarked on different sub-band is against …
A Detailed Survey Of Turkish Automatic Speech Recognition, Recep Si̇nan Arslan, Necaatti̇n Barişçi
A Detailed Survey Of Turkish Automatic Speech Recognition, Recep Si̇nan Arslan, Necaatti̇n Barişçi
Turkish Journal of Electrical Engineering and Computer Sciences
Significant improvements have been made in automatic speech recognition(ASR)systems in terms of both the general technology and the software used. Despite these advancements, however, there is still an important difference between the recognition performance of humans and machines. This work focuses on the studies conducted in the field of Turkish speech recognition, the progress made in such studies in recent years, the language-specific constraints, the performance results achieved in the applications developed to date, and the development of a general scheme for researchers wishing to develop an ASR system for the Turkish language. A comprehensive study on the Turkish language, …