Search Results

Now showing 1 - 10 of 85
  • Article
    Citation - WoS: 25
    Citation - Scopus: 27
    Robust stability of 2-D digital filters employing saturation
    (Ieee-inst Electrical Electronics Engineers inc, 2005) Singh, V
    A computationally tractable, i.e., linear matrix inequality (LMI)-based criterion for the global asymptotic stability of uncertain two-dimensional digital filters described by the Fornasini-Marchesini second local state-space model with saturation overflow arithmetic is presented. The criterion is compared with an earlier LMI-based criterion.
  • Article
    Citation - WoS: 36
    Citation - Scopus: 58
    A Suite of Object Oriented Cognitive Complexity Metrics
    (Ieee-inst Electrical Electronics Engineers inc, 2018) Misra, Sanjay; Adewumi, Adewole; Fernandez-Sanz, Luis; Damasevicius, Robertas
    Object orientation has gained a wide adoption in the software development community. To this end, different metrics that can be utilized in measuring and improving the quality of object-oriented (OO) software have been proposed, by providing insight into the maintainability and reliability of the system. Some of these software metrics are based on cognitive weight and are referred to as cognitive complexity metrics. It is our objective in this paper to present a suite of cognitive complexity metrics that can be used to evaluate OO software projects. The present suite of metrics includes method complexity, message complexity, attribute complexity, weighted class complexity, and code complexity. The metrics suite was evaluated theoretically using measurement theory and Weyuker's properties, practically using Kaner's framework and empirically using thirty projects.
  • Article
    Citation - WoS: 10
    Citation - Scopus: 13
    Electromagnetic Launching Systems To Geosynchronously Equatorial Orbit in Space and Cost Calculations
    (Ieee-inst Electrical Electronics Engineers inc, 2017) Inger, Erk; Inger, Erk
    Electromagnetic launching mass driver system (projectile) has been examined and evaluated as an eligible alternative to the chemical propulsion systems, in space transportation. The projectile has been arranged to reach to its orbital speed at delivered altitude, with an energy transferred externally to a projectile all the flyway through the electromagnetic launcher. The multistage electromagnetic launcher structure contains the capacitors for storing energy and transfers this energy through a switching inductor to a mass driver. The mass driver is synchronously being energized by a voltage through an oscillating coil-capacitor circuit. This paper presents dependence and optimization of design and performance parameters of coilgun equations. Cost estimations of electromagnetic launching system are also calculated in energy per unit mass.
  • Article
    Citation - WoS: 193
    Citation - Scopus: 211
    A Generalized Lmi-Based Approach To the Global Asymptotic Stability of Delayed Cellular Neural Networks
    (Ieee-inst Electrical Electronics Engineers inc, 2004) Singh, V
    A novel linear matrix inequality (LMI)-based criterion for the global asymptotic stability and uniqueness of the equilibrium point of a class of delayed cellular neural networks (CNNs) is presented. The criterion turns out to be a generalization and improvement over some previous criteria.
  • Article
    Citation - WoS: 30
    Citation - Scopus: 34
    Discrete Time Shock Models in a Markovian Environment
    (Ieee-inst Electrical Electronics Engineers inc, 2016) Eryilmaz, Serkan
    This paper deals with two different shock models in a Markovian environment. We study a system from a reliability point of view under these two shock models. According to the first model, the system fails if the cumulative shock magnitude exceeds a critical level, while in the second model the failure occurs when the cumulative effect of the shocks in consecutive periods is above a critical level. The shock occurrences over discrete time periods are assumed to be Markovian. We obtain expressions for the failure time distributions of the system under the two model. Illustrative computational results are presented for the survival probabilities and mean time to failure values of the system.
  • Article
    Citation - WoS: 20
    Citation - Scopus: 25
    Detecting Latent Topics and Trends in Software Engineering Research Since 1980 Using Probabilistic Topic Modeling
    (Ieee-inst Electrical Electronics Engineers inc, 2022) Gurcan, Fatih; Dalveren, Gonca Gokce Menekse; Cagiltay, Nergiz Ercil; Soylu, Ahmet
    The landscape of software engineering research has changed significantly from one year to the next in line with industrial needs and trends. Therefore, today's research literature on software engineering has a rich and multidisciplinary content that includes a large number of studies; however, not many of them demonstrate a holistic view of the field. From this perspective, this study aimed to reveal a holistic view that reflects topics, trends, and trajectories in software engineering research by analyzing the majority of domain-specific articles published over the last 40 years. This study first presents an objective and systematic method for corpus creation through major publication sources in the field. A corpus was then created using this method, which includes 44 domain-specific conferences and journals and 57,174 articles published between 1980 and 2019. Next, this corpus was analyzed using an automated text-mining methodology based on a probabilistic topic-modeling approach. As a result of this analysis, 24 main topics were found. In addition, topical trends in the field were revealed. Finally, three main developmental stages of the field were identified as: the programming age, the software development age, and the software optimization age.
  • Article
    Citation - WoS: 31
    Citation - Scopus: 40
    Variational Mode Decomposition-Based Radio Frequency Fingerprinting of Bluetooth Devices
    (Ieee-inst Electrical Electronics Engineers inc, 2019) Aghnaiya, Alghannai; Ali, Aysha M.; Kara, Ali
    Radio frequency fingerprinting (RFF) is based on identification of unique features of RF transient signals emitted by radio devices. RF transient signals of radio devices are short in duration, non-stationary and nonlinear time series. This paper evaluates the performance of RF fingerprinting method based on variational mode decomposition (VMD). For this purpose, VMD is used to decompose Bluetooth (BT) transient signals into a series of band-limited modes, and then, the transient signal is reconstructed from the modes. Higher order statistical (HOS) features are extracted from the complex form of reconstructed transients. Then, Linear Support Vector Machine (LVM) classifier is used to identify BT devices. The method has been tested experimentally with BT devices of different brands, models and series. The classification performance shows that VMD based RF fingerprinting method achieves better performance (at least 8% higher) than time-frequency-energy (TFED) distribution based methods such as Hilbert-Huang Transform. This is demonstrated with the same dataset but with smaller number of features (nine features) and slightly lower (2-3 dB) SNR levels.
  • Article
    Citation - WoS: 7
    Citation - Scopus: 8
    Flexible and Lightweight Mitigation Framework for Distributed Denial-Of Attacks in Container-Based Edge Networks Using Kubernetes
    (Ieee-inst Electrical Electronics Engineers inc, 2024) Koksal, Sarp; Catak, Ferhat Ozgur; Dalveren, Yaser
    Mobile Edge Computing (MEC) has a significant potential to become more prevalent in Fifth Generation (5G) networks, requiring resource management that is lightweight, agile, and dynamic. Container-based virtualization platforms, such as Kubernetes, have emerged as key enablers for MEC environments. However, network security and data privacy remain significant concerns, particularly due to Distributed Denial-of-Service (DDoS) attacks that threaten the massive connectivity of end-devices. This study proposes a defense mechanism to mitigate DDoS attacks in container-based MEC networks using Kubernetes. The mechanism dynamically scales Containerized Network Functions (CNFs) with auto-scaling through an Intrusion Detection and Prevention System (IDPS). The architecture of the proposed mechanism leverages distributed edge clusters and Kubernetes to manage resources and balance the load of IDPS CNFs. Experiments conducted in a real MEC environment using OpenShift and Telco-grade MEC profiles demonstrate the effectiveness of the proposed mechanism against Domain Name System (DNS) flood and Yo-Yo attacks. Results also verify that Kubernetes efficiently meets the lightweight, agile, and dynamic resource management requirements of MEC networks.
  • Article
    Citation - WoS: 11
    Citation - Scopus: 24
    The Effect of Social Media User Behaviors on Security and Privacy Threats
    (Ieee-inst Electrical Electronics Engineers inc, 2022) Cengiz, Aslihan Banu; Kalem, Guler; Boluk, Pinar Sarisaray
    The number of online social network (OSN) users is increasing daily and attacks and threats against over the time spent on online networks has been increasing equally. Attacks against OSN users exploit not only system vulnerabilities but also user-induced vulnerabilities, which naturally affect the hacker's attack strategy as well. This study is designed to investigate the effect of social media user behaviors on their vulnerability level in terms of security and privacy. The study was conducted survey methods, which was applied to social media users in two countries - Turkey and Iraq. This study documents and analyzes the behaviors of 700 OSN users in two countries. This study examines the behaviors of social media users from two nationalities, investigating whether there is a relationship between social media users' behaviors and security and privacy threats. Research findings demonstrate that there is a significant relationship between OSN users' behaviors and their attitudes towards security and privacy. Additionally, Turkish social media users pay more attention to their behaviors in terms of privacy and security awareness than Iraq users.
  • Article
    Citation - WoS: 59
    Citation - Scopus: 68
    Reliability of a k-out-of-n< System Equipped With a Single Warm Standby Component
    (Ieee-inst Electrical Electronics Engineers inc, 2013) Eryilmaz, Serkan
    Ak - out - of - n : system consists of components, and operates if at least of its components operate. Its reliability properties have been widely studied in the literature from different perspectives. This paper is concerned with the reliability analysis of a k - out - of - n : G system equipped with a single warm standby unit. We obtain an explicit expression for the reliability function of the system for arbitrary lifetime distributions. Two different mean residual life functions are also studied for the system.