83 results
Search Results
Now showing 1 - 10 of 83
Article Citation - WoS: 9Citation - Scopus: 9Mixture Representations for Three-State Systems With Three-State Components(Ieee-inst Electrical Electronics Engineers inc, 2015) Eryilmaz, SerkanThis paper is concerned with dynamic reliability modeling of three-state systems consisting of three-state s-independent components. The components and the systems are assumed to be in three states: perfect functioning, partial performance, and complete failure. Survival functions of such systems are studied in different state subsets. It is shown that the survival function of a three-state system with a general structure can be represented as a mixture of the survival functions of the three-state k-out-of-n:G systems. The results are illustrated for the three-state consecutive-k-out-of-n:G systems whose components degrade according to a Markov process.Article Citation - WoS: 31Citation - Scopus: 40Variational Mode Decomposition-Based Radio Frequency Fingerprinting of Bluetooth Devices(Ieee-inst Electrical Electronics Engineers inc, 2019) Aghnaiya, Alghannai; Ali, Aysha M.; Kara, AliRadio frequency fingerprinting (RFF) is based on identification of unique features of RF transient signals emitted by radio devices. RF transient signals of radio devices are short in duration, non-stationary and nonlinear time series. This paper evaluates the performance of RF fingerprinting method based on variational mode decomposition (VMD). For this purpose, VMD is used to decompose Bluetooth (BT) transient signals into a series of band-limited modes, and then, the transient signal is reconstructed from the modes. Higher order statistical (HOS) features are extracted from the complex form of reconstructed transients. Then, Linear Support Vector Machine (LVM) classifier is used to identify BT devices. The method has been tested experimentally with BT devices of different brands, models and series. The classification performance shows that VMD based RF fingerprinting method achieves better performance (at least 8% higher) than time-frequency-energy (TFED) distribution based methods such as Hilbert-Huang Transform. This is demonstrated with the same dataset but with smaller number of features (nine features) and slightly lower (2-3 dB) SNR levels.Article Citation - WoS: 8Citation - Scopus: 10Evaluation of Ten Open-Source Eye-Movement Classification Algorithms in Simulated Surgical Scenarios(Ieee-inst Electrical Electronics Engineers inc, 2019) Dalveren, Gonca Gokce Menekse; Cagiltay, Nergiz ErcilDespite providing several insights into visual attention and evidence regarding certain brain states and psychological functions, classifying eye movements is a highly demanding process. Currently, there are several algorithms to classify eye movement events which use different approaches. However, to date, only a limited number of studies have assessed these algorithms under specific conditions, such as those required for surgical training programmes. This study presents an investigation of ten open-source eye-movement classification algorithms using the Eye Tribe eye-tracker. The algorithms were tested on the eye-movement records obtained from 23 surgical residents, who performed computer-based surgical simulation tasks under different hand conditions. The aim was to offer data for the improvement of surgical training programmes. According to the results, due to the different classification methods and default threshold values, the ten algorithms produced different results. Considering the fixation duration, the only common event for all of the investigated algorithms, the binocular-individual threshold (BIT) algorithm resulted in a different clustering compared to the other algorithms. Based on the other set of common events, three clusters were determined by eight algorithms (except BIT and event detection (ED)), distinguishing dispersion-based, velocity-based and modified versions of velocity-based algorithms. Accordingly, it was concluded that dispersion-based and velocity-based algorithms provided different results. Additionally, as it individually specifies the threshold values for the eye-movement data, when there is no consensus about the threshold values to be set, the BIT algorithm can be selected. Especially for such cases like simulation-based surgical skill-training, the use of individualised threshold values in the BIT algorithm can be more beneficial in classifying the raw eye data and thus evaluating the individual progress levels of trainees based on their eye movement behaviours. In conclusion, the threshold values had a critical effect on the algorithm results. Since default values may not always be suitable for the unique features of different data sets, guidelines should be developed to indicate how the threshold values are set for each algorithm.Article Citation - WoS: 14Citation - Scopus: 16Joint Reliability Importance in Coherent Systems With Exchangeable Dependent Components(Ieee-inst Electrical Electronics Engineers inc, 2016) Eryilmaz, Serkan; Oruc, Ozlem Ege; Oger, VolkanIn this paper, a general formula for computing the joint reliability importance of two components is obtained for a binary coherent system that consists of exchangeable dependent components. Using the new formula, the joint reliability importance can be easily calculated if the path sets of the system are known. As a special case, an expression for the joint reliability importance of two components is also obtained for a system consisting of independent and identical components. Illustrative numerical results are presented to compare the joint reliability importance of two components in the bridge system for the two cases when the components are exchangeable dependent and when the components are independent and identical.Article Citation - WoS: 33Citation - Scopus: 41Visual and Auditory Data Fusion for Energy-Efficient and Improved Object Recognition in Wireless Multimedia Sensor Networks(Ieee-inst Electrical Electronics Engineers inc, 2019) Koyuncu, Murat; Yazici, Adnan; Civelek, Muhsin; Cosar, Ahmet; Sert, MustafaAutomatic threat classification without human intervention is a popular research topic in wireless multimedia sensor networks (WMSNs) especially within the context of surveillance applications. This paper explores the effect of fusing audio-visual multimedia and scalar data collected by the sensor nodes in a WMSN for the purpose of energy-efficient and accurate object detection and classification. In order to do that, we implemented a wireless multimedia sensor node with video and audio capturing and processing capabilities in addition to traditional/ordinary scalar sensors. The multimedia sensors are kept in sleep mode in order to save energy until they are activated by the scalar sensors which are always active. The object recognition results obtained from video and audio applications are fused to increase the object recognition performance of the sensor node. Final results are forwarded to the sink in text format, and this greatly reduces the size of data transmitted in network. Performance test results of the implemented prototype system show that the fusing audio data with visual data improves automatic object recognition capability of a sensor node significantly. Since auditory data requires less processing power compared to visual data, the overhead of processing the auditory data is not high, and it helps to extend network lifetime of WMSNs.Article Citation - WoS: 3Citation - Scopus: 3Pseudospectral Time Domain Method Implementation Using Finite Difference Time Stepping(Ieee-inst Electrical Electronics Engineers inc, 2018) Gunes, Ahmet; Aksoy, SerkanLagrange interpolation polynomials-based Cheby-shev pseudospectral time domain (CPSTD) method is an efficient time domain solver for Maxwell equations. Although it has the lowest interpolation error among pseudospectral time domain methods, time derivatives must be calculated using higher order time derivative schemes, such as the Runge-Kutta method. The higher order time derivative methods slow down the computation speed at each step by several folds. In this letter, we show that central finite differences can be used for implementation of time derivatives in CPSTD method. Results are verified by a resonator problem.Article Citation - WoS: 6Citation - Scopus: 8Hybrid Electrooptic and Piezoelectric Laser Beam Steering in Two Dimensions(Ieee-inst Electrical Electronics Engineers inc, 2005) Scrymgeour, DA; Koc, B; Tian, LL; Gentzel, MW; Uchino, K; Gopalan, VWith modern optical technology, there is a great demand for devices capable of steering a laser beam. at high speed. A hybrid electrooptical scanner and an electromechanical scanner capable of two-dimensional (2-D) laser beam scanning Eire demonstrated. This device can scan a laser beam in 2-D. A V scanning angle in the horizontal axis at 50 Hz using electrooptic scanning and a 5.23 degrees scanning angle in vertical axis at 25.6 kHz using piezoelectric scanning are shown.Article Citation - WoS: 81Citation - Scopus: 103Sensors in Assisted Living a Survey of Signal and Image Processing Methods(Ieee-inst Electrical Electronics Engineers inc, 2016) Erden, Fatih; Velipasalar, Senem; Alkar, Ali Ziya; Cetin, A. Enis[No Abstract Available]Article Citation - WoS: 64Citation - Scopus: 99Improved Routh-Pade Approximants: a Computer-Aided Approach(Ieee-inst Electrical Electronics Engineers inc, 2004) Singh, V; Chandra, D; Kar, HA geometric programming based computer-aided method to derive a reduced order (rth-order) approximant for a given (stable) SISO linear continuous-time system is presented. In this method, stability and the first r time moments/Markov parameters are preserved as well as the errors between a set of subsequent time moments/Markov parameters of the system and those of the model are minimized.Article Citation - WoS: 36Agriculture 4.0: an Implementation Framework for Food Security Attainment in Nigeria's Post-Covid Era(Ieee-inst Electrical Electronics Engineers inc, 2021) Oruma, Samson O.; Misra, Sanjay; Fernandez-Sanz, LuisThe challenge of Nigeria's food insecurity in the era of the Covid-19 pandemic, insecurity, climate change, population growth, food wastage, etc., is a demanding task. This study addresses Nigeria's food insecurity challenges by adopting agriculture 4.0 and commercial farming. Using data from six digital libraries, the Nigerian Bureau of Statistics, and other internet sources, we conducted a Systematic Literature Review (SLR using PRISMA) on Nigeria's agriculture, food security, and agriculture 4.0. Our results show Nigeria's current agricultural state, threats to food security, and modern digital agriculture technologies. We adapted our SLR findings to develop an implementation framework for agriculture 4.0 in solving Nigeria's food insecurity challenge in the post-Covid-19 era. Our proposed framework integrates precision agriculture in Nigeria's food production and the necessary enabling digital technologies in the agri-food supply chain. We analyzed the critical implementation considerations during each agri-food supply chain stage of farming inputs, farming scale, farming approach, farming operation, food processing, food preservation/storage, distribution/logistics, and the final consumers. This study will help researchers, investors, and the government address food security in Nigeria. The implementation of agriculture 4.0 will substantially contribute to SDG 2 (zero hunger), SDG 3 (good health and well-being), and SDG 8 (decent work and economic growth) of #Envision 2030 of the United Nations, for the benefit of Nigeria, Africa, and the entire world.

