Cellular Automata Rules Generator For Microbial Communities,
2010
California State University, San Bernardino
Cellular Automata Rules Generator For Microbial Communities, Melissa Marie Quintana
Theses Digitization Project
The purpose of this project is to provide a visual representation as program output so that the rules and the radius of effect can be estimated. Currently there is a need for a method that extracts the cellular automata rules which simulate the growth patterns of microbial communities found within extreme environments. Contains source code.
Homomorphic Images Of Progenitors Of Order Three,
2010
California State University, San Bernardino
Homomorphic Images Of Progenitors Of Order Three, Mark Gutierrez
Theses Digitization Project
The main purpose of this thesis is to construct finite groups as homomorphic images of infinite semi-direct products, 2*n : N, 3*n : N, and 3*n :m N, where 2*n and 3*n are free products of n copies of the cyclic group C₂ extended by N, a group of permutations on n letters.
Determination Of Autoregressive Model Orders For Seizure Detection,
2010
TÜBİTAK
Determination Of Autoregressive Model Orders For Seizure Detection, Serap Aydin
Turkish Journal of Electrical Engineering and Computer Sciences
In the present study, a step-wise least square estimation algorithm (SLSA), implemented in a Matlab package called as ARfit, has been newly applied to clinical data for estimation of the accurate Auto-Regressive (AR) model orders of both normal and ictal EEG series where the power spectral density (PSD) estimations are provided by the Burg Method. The ARfit module is found to be usefull in comparison to a large variety of traditional methods such as Forward Prediction Error (FPE), Akaike's Information Criteria (AIC), Minimum Description Lenght (MDL), and Criterion of Autoregressive Transfer function (CAT) for EEG discrimination. According to tests, the …
State Variable Distributed-Parameter Representation Of Transmission Line For Transient Simulations,
2010
TÜBİTAK
State Variable Distributed-Parameter Representation Of Transmission Line For Transient Simulations, Mehmet Sali̇h Mami̇ş, Asim Kaygusuz, Muhammet Köksal
Turkish Journal of Electrical Engineering and Computer Sciences
In this paper, a distributed-parameter state variable approach is used to calculate transients on transmission lines based on the concept of travelling waves. The method of characteristics for lossless line is used and the state equations are derived for the system. These equations are converted to a set of difference equations using the trapezoidal rule of integration and solved in time domain using LU decomposition. Single- and multi-phase transmission lines with various linear and non-linear terminations are considered in the illustrative examples. State-space modeling of transposed lines using modal decomposition is introduced and the effects caused by lumped parameter approximation …
Comparison Of Daubechies Wavelets For Hurst Parameter Estimation,
2010
TÜBİTAK
Comparison Of Daubechies Wavelets For Hurst Parameter Estimation, Cebrai̇l Çi̇ftli̇kli̇, Ali̇ Gezer
Turkish Journal of Electrical Engineering and Computer Sciences
Time scale dependence on the working nature of wavelet analysis makes it a valuable tool for Hurst parameter estimation. Similar to other wavelet-based signal processing applications, the selection of a particular wavelet type and vanishing moment in wavelet based Hurst estimation is a challenging problem. In this paper, we investigate the best Daubechies wavelet in wavelet based Hurst estimation for an exact self similar process, fractional Gaussian noise and how Daubechies vanishing moment affects the Hurst estimation accuracy. Daubechies wavelets are preferred in analysis because increasing vanishing moment does not cause excessive increase of time support of Daubechies wavelets. Thus, …
Differential Power Analysis Resistant Hardware Implementation Of The Rsa Cryptosystem,
2010
TÜBİTAK
Differential Power Analysis Resistant Hardware Implementation Of The Rsa Cryptosystem, Kekli̇k Alpteki̇n Bayam, Berna Örs
Turkish Journal of Electrical Engineering and Computer Sciences
In this paper, RSA cryptosystem was implemented on hardware, then modified to be resistant against Differential Power Analysis attacks by using the Randomized Table Window method. This is the first FPGA realization of an algorithmic countermeasure which makes RSA resistant to power analysis attacks. Modular exponentiation is realized with Montgomery Modular Multiplication. The Montgomery modular multiplier has been realized with Carry-Save Adders. Carry-Save representation has been used throughout the RSA encryption algorithm. The primarily implemented RSA architecture prevents the extraction of the secret key using Simple Power Analysis attacks. When comparing the protected implementation with the unprotected, it can be …
Robust Multimedia Watermarking: Hidden Markov Model Approach For Video Sequences,
2010
TÜBİTAK
Robust Multimedia Watermarking: Hidden Markov Model Approach For Video Sequences, Ersi̇n Elbaşi
Turkish Journal of Electrical Engineering and Computer Sciences
Because of the large amount of frames, similarity between frames and temporal attacks (frame dropping, frame averaging, frame swapping etc.), the process for video watermarking is more difficult than that for image watermarking. Current image watermarking methods are limited to solve all these difficulties. We propose a novel video watermarking system based on the Hidden Markov Model (HMM). This novel watermarking scheme splits the video sequences into a Group of Pictures (GOP) with HMM. Portions of the binary watermark are embedded into each GOP with a wavelet domain watermarking algorithm. The embedding process is the standard additive algorithm [1] in …
An Rfid Based Indoor Tracking Method For Navigating Visually Impaired People,
2010
TÜBİTAK
An Rfid Based Indoor Tracking Method For Navigating Visually Impaired People, Ruşen Öktem, Eli̇f Aydin
Turkish Journal of Electrical Engineering and Computer Sciences
This paper tackles the RFID based tracking problem in an obscured indoor environment. The proposed solution is an integral part of a navigation aid for guiding visually impaired people in a store. It uses RF signal strengths and is based on the Bayes Decision Theory. An observation vector is formed by received radio signal strength indication values, transmitted from three transmitters at distinct frequencies in the UHF band. The indoor area is divided into square grids, where each grid is considered as a class. The problem of tracking is expressed as classifying the observed radio signal strengths to the most …
Stochastic Stability Of The Discrete-Time Constrained Extended Kalman Filter,
2010
TÜBİTAK
Stochastic Stability Of The Discrete-Time Constrained Extended Kalman Filter, Levent Özbek, Esi̇n Köksal Babacan, Murat Efe
Turkish Journal of Electrical Engineering and Computer Sciences
In this paper, stability of the projection-based constrained discrete-time extended Kalman filter (EKF) as applied to nonlinear systems in a stochastic framework has been studied. It has been shown that like the unconstrained EKF, the estimation error of the EKF with known constraints on the states remains bounded when the initial error and noise terms are small, and the solution of the Riccati difference equation remains positive definite and bounded. Stability results are verified and performance of the constrained EKF is demonstrated through simulations on a nonlinear engineering example.
Artificial Neural Network Based Chaotic Generator For Cryptology,
2010
TÜBİTAK
Artificial Neural Network Based Chaotic Generator For Cryptology, İlker Dalkiran, Kenan Danişman
Turkish Journal of Electrical Engineering and Computer Sciences
Chaotic systems are sensitive to initial conditions, system parameters and topological transitivity and these properties are also remarkable for cryptanalysts. Noise like behavior of chaotic systems is the main reason of using these systems in cryptology. However some properties of chaotic systems such as synchronization, fewness of parameters etc. cause serious problems for cryptology. In this paper, to overcome disadvantages of chaotic systems, the dynamics of Chua's circuit namely x, y and z were modeled using Artificial Neural Network (ANN). ANNs have some distinctive capabilities like learning from experiences, generalizing from a few data and nonlinear relationship between inputs and …
K-Anonymity Based Framework For Privacy Preserving Data Collection In Wireless Sensor Networks,
2010
TÜBİTAK
K-Anonymity Based Framework For Privacy Preserving Data Collection In Wireless Sensor Networks, Hayretdi̇n Bahşi̇, Albert Levi̇
Turkish Journal of Electrical Engineering and Computer Sciences
In this paper, k-anonymity notion is adopted to be used in wireless sensor networks (WSN) as a security framework with two levels of privacy. A base level of privacy is provided for the data shared with semi-trusted sink and a deeper level of privacy is provided against eavesdroppers. In the proposed method, some portions of data are encrypted and the rest is generalized. Generalization shortens the size of the data transmitted in the network causing energy saving at the cost of information loss. On the other hand, encryption provides anonymization with no information loss and without saving energy. Thus, there …
The Effect Of The Channel Reliability Factor In The Map Algorithm On Turbo Code Performance In Bluetooth Systems,
2010
TÜBİTAK
The Effect Of The Channel Reliability Factor In The Map Algorithm On Turbo Code Performance In Bluetooth Systems, Sali̇m Kahveci̇, İsmai̇l Kaya
Turkish Journal of Electrical Engineering and Computer Sciences
The effects of the channel reliability factor on the performance of turbo decoders that use a maximum a posteriori probability algorithm are investigated for wireless communication fading channels, such as Bluetooth systems. The channel reliability factor is related to the channel signal-to-noise ratio. For various values of the channel reliability factor, the obtained performance curves of the maximum a posteriori probability algorithm are given for the case of DMx Bluetooth data packets. When the channel reliability factor increases, the bit-error-rate performance of the DMx Bluetooth data packets also increases over fading channels.
Relativistic Electromagnetism In Rotating Media,
2010
TÜBİTAK
Relativistic Electromagnetism In Rotating Media, Pierre Hillion
Turkish Journal of Electrical Engineering and Computer Sciences
This work concerns relativistic electromagnetism in a cylindrical Frenet-Serret frame. The tensor formalism of Maxwell's equations and electromagnetic fields in a vacuum is first developed in terms of cylindrical coordinates and afterwards applied to a rotating frame using the relativistic Trocheris-Takeno description of rotations. The metric ds^2 = g_{\mu \nu} dx^{\mu} dx^{\nu} of this frame is then obtained to find the determinant g of the g_{\mu \nu} matrix intervening in the relativistic Maxwell's equations, where the Greek indices take on the values 1,2,3,4. The propagation of harmonic cylindrical waves in rotating media is analyzed and it is shown that these …
The Effect Of Heat On The Metallurgical Structure And B-H Characteristic Of (Stator) Armature With Iron-Silicon Alloy In Electric Machines, Fevzi̇ Kentli̇, Ümi̇t Kemaletti̇n Terzi̇
Turkish Journal of Electrical Engineering and Computer Sciences
Coils in electric machines are varnished for insulation after winding. These varnished coils are formed in stiff construction in slots. Under heavy-duty operating conditions, all or part of some coils may be burnt or broken. Thermal method is one of several ways to remove the defective coils. In this method, current is passed through the defective coils by an autotransformer (variac) until all the varnish of the coils is burned. If all the coils are out of order, the varnish is burned by replacing the stator or armature in a burning room. Consequently, defective coils in the stator (armature) slots …
Modeling And Simulation Strategies In High Frequency Surface Wave Radars,
2010
TÜBİTAK
Modeling And Simulation Strategies In High Frequency Surface Wave Radars, Levent Sevgi̇
Turkish Journal of Electrical Engineering and Computer Sciences
Surface Wave High Frequency Radars (SWHFR) are taken into account in the content of modeling and simulation challenges. Examples related to multi-mixed path surface wave propagation, radar cross section (RCS) prediction, and total radar echo showing target, clutter, noise, and interference are presented.
A Review Of High Frequency Surface Wave Radar For Detection And Tracking Of Ships,
2010
TÜBİTAK
A Review Of High Frequency Surface Wave Radar For Detection And Tracking Of Ships, Tony Ponsford, Jian Wang
Turkish Journal of Electrical Engineering and Computer Sciences
In today's resource-driven economy, maritime nations are claiming economic borders that extend beyond the continental shelf or the 200 nautical mile (nm) Exclusive Economic Zone (EEZ). However, claiming such large economic area places responsibilities on the parent nation to exercise jurisdiction through surveillance and enforcement. The requirement to see beyond the horizon has long been a goal of maritime security forces. Today, this is largely dependent on cooperative vessels voluntarily communicating their intentions to local shore-side authorities, as well as on those vessel sightings reported by patrollers. Recent advances in technology provide maritime nations with options to provide more systematic …
Nonlinear Scattering At Hf: Prospects For Exploitation In Oth Radar Systems,
2010
TÜBİTAK
Nonlinear Scattering At Hf: Prospects For Exploitation In Oth Radar Systems, Stuart Anderson
Turkish Journal of Electrical Engineering and Computer Sciences
HF skywave `over-the-horizon' radars experience exceptionally high levels of clutter from the earth's surface as a consequence of their `look-down' propagation geometry. While Doppler processing is effective in separating aircraft echoes from the clutter, thereby enabling detection, the same does not always hold for slow moving targets. In particular, ship echoes occupy the same region of Doppler space as the sea clutter, so the likelihood of target echo obscuration is high. By exploiting the known dependence of the characteristic spectral form of the clutter Doppler spectrum on radar frequency and other parameters, HF radars can maximise the prospects for detectability …
Radar Cross-Section (Rcs) Analysis Of High Frequency Surface Wave Radar Targets,
2010
TÜBİTAK
Radar Cross-Section (Rcs) Analysis Of High Frequency Surface Wave Radar Targets, Gonca Çakir, Levent Sevgi̇
Turkish Journal of Electrical Engineering and Computer Sciences
Realistic high frequency surface wave radar (HFSWR) targets are investigated numerically in terms of electromagnetic wave -- target interactions. Radar cross sections (RCS) of these targets are simulated via both the finite-difference time-domain (FDTD) method and the Method of Moments (MoM). The virtual RCS prediction tool that was introduced in previous work is used for these investigations. The virtual tool automatically creates the discrete FDTD model of the target under investigation and performs the FDTD RCS analysis. It also automatically constructs a MoM wire grid model of the target; therefore, it is also possible to compare FDTD results against the …
Securing Fuzzy Vault Schemes Through Biometric Hashing,
2010
TÜBİTAK
Securing Fuzzy Vault Schemes Through Biometric Hashing, Cengi̇z Örenci̇k, Thomas Brochmann Pedersen, Erkay Savaş, Mehmet Keski̇nöz
Turkish Journal of Electrical Engineering and Computer Sciences
The fuzzy vault scheme is a well-known technique to mitigate privacy, security, and usability related problems in biometric identification applications. The basic idea is to hide biometric data along with secret information amongst randomly selected chaff points during the enrollment process. Only the owner of the biometric data who presents correct biometrics can recover the secret and identify himself. Recent research, however, has shown that the scheme is vulnerable to certain types of attacks. The recently proposed ``correlation attack'', that allows linking two vaults of the same biometric, pose serious privacy risks that have not been sufficiently addressed. The primary …
A Robust Method For State Estimation Of Power System With Upfc,
2010
TÜBİTAK
A Robust Method For State Estimation Of Power System With Upfc, Mehrdad Tarafdar Hagh, Mehdi Ahmadi Jirdehi
Turkish Journal of Electrical Engineering and Computer Sciences
This paper presents a Least Absolute Value (LAV) state estimator for power system using a new method called Recursive Least Squares (RLS). Also, a suitable model is used for state estimation of power system that includes a Unified Power Flow Controller (UPFC). The IEEE 14-bus test system is used to show the validity of the proposed algorithm in estimation of power system states as well as the states of controllable parameters of UPFC.