Search Results

Now showing 1 - 10 of 115
  • Conference Object
    Citation - Scopus: 4
    Convolution Neural Network (cnn) Based Automatic Sorting of Cherries
    (Institute of Electrical and Electronics Engineers Inc., 2021) Park,H.; Khan,M.U.
    Cherries are spring fruits enriched with nutrients, and are easily available in food markets around the world. Due to their excess demand, many enterprises solely focused on their processing. Cherries are especially susceptible to pathological-, physiological-diseases and structural degradation due to their soft outer skin. The post-harvest life of the fruit is limited by various characteristics. The agricultural industry has also been at the forefront to get benefits from the advanced machine learning tools. This study presents an image processing-based system for sorting cherries using the convolutional neural network (CNN). For this study, Prunus avium L cherries of export quality, available in Turkey, tagged as ‘0900 Ziraat’, are used. Surprisingly, there exists no dataset for these cherries; hence, we developed our dataset. Through the proposed approach based upon U-Net, the binary classification accuracy of 99% is achieved. Clear identification is demonstrated by the test results of varying mixture ratios of good and bad cherries. It can therefore be said that for cherry sorting and grading, U-Net can be applied as a reliable and promising machine learning tool. ©2021 IEEE
  • Conference Object
    Need for a Software Development Methodology for Research-Based Software Projects
    (Institute of Electrical and Electronics Engineers Inc., 2018) Cereci,I.; Karakaya,Z.
    Software development is mostly carried by a group of individuals. Software development methodologies are heavily utilized to organize these individuals and keep track of the entire software development process. Although previously proposed software development methodologies meet the needs of the industry and the firms, they are not usually suitable for research-based software projects that are carried by universities and individual researchers. In this paper, we aim to show the necessity of a new software development methodology for research-based problems carried by universities. The literature review will show the differences between industry and university software projects from certain aspects. These findings will be supported by the authors own research on the area. This qualitative research involves collecting data through interviews and applying Grounded Theory to better understand the development process. © 2018 IEEE.
  • Conference Object
    Citation - Scopus: 2
    Insights From Eye-Movement Events in an Educational Computer-Based Environment (ece) for Endo-Neurosurgery Training Considering Gender, Hand Condition and Scenario Effects
    (Institute of Electrical and Electronics Engineers Inc., 2018) Dalveren,G.G.M.; Cagiltay,N.E.
    Surgical residents of endo-neurosurgery are required to develop several surgical skills such as eye-hand coordination, ability to use both hand coordination, and depth perception. During the process of gaining these skills, there are several effective factors on the individual performance such as gender, nature of the scenarios and hand condition that can be important to better organize appropriate training programs. Earlier studies show that, surgeons' mental workload show differences according to the difficulty levels of the tasks and hand conditions during the operations. Also there are some evidences showing that male surgeons performing the surgical tasks with a better performance compared to the females. However, in the literature there are not many studies conducted to better understand these effects by analyzing the eye-movements on simulation-based surgical training environments. This study aims to understand the mental workload and gender differences from fixation number and fixation duration eye-movement events. In this study four different computer-based-simulation scenarios which are developed for an Educational Computer-based-simulation Environment (ECE) for endo-neurosurgery training have been performed by 23 (3 female) surgical residents. Participants have performed each scenario in different hand conditions (dominant, non-dominant and both hand). While surgical residents were performing the scenarios their eye-movements were recorded by an eye-tracker. The Binocular Individual Threshold (BIT) classification algorithm was used for eye-movement event classification. According to the results of fixation number and fixation duration events in these four scenarios, hand conditions, scenario fidelity levels and gender are found to be important factors that make changes on mental workload of surgical residents. It can be concluded that, in non-dominant and both hand conditions mental workload increases according to the dominant hand condition. Additionally results show that scenario fidelity levels and gender have an effect on the eye-movements of surgical residents. © 2018 IEEE.
  • Conference Object
    Perceptions, Expectations and Implementations of Big Data in Public Sector : Kamuda Buÿük Veri: Alglar, Beklentiler Ve Uygulamalar
    (Institute of Electrical and Electronics Engineers Inc., 2018) Dogdu,E.; Ozbayoglu,M.; Yazici,A.; Karakaya,Z.
    Big Data is one of the most commonly encountered buzzwords among IT professionals nowadays. Technological advancements in data acquisition, storage, telecommunications, embedded systems and sensor technologies resulted in huge inflows of streaming data coming from variety of sources, ranging from financial streaming data to social media tweets, or wearable health gadgets to drone flight logs. The processing and analysis of such data is a difficult task, but as appointed by many IT experts, it is crucial to have a Big Data Implementation plan in today's challenging industry standards. In this study, we performed a survey among IT professionals working in the public sector and tried to address some of their implementation issues and their perception of Big Data today and their expectations about how the industry will evolve. The results indicate that most of the public sector professionals are aware of the current Big Data requirements, embrace the Big Data challenge and are optimistic about the future. © 2018 IEEE.
  • Conference Object
    Internet-Of Smart Transportation Systems for Safer Roads
    (Institute of Electrical and Electronics Engineers Inc., 2020) Derawi,M.; Dalveren,Y.; Cheikh,F.A.
    From the beginning of civilizations, transportation has been one of the most important requirements for humans. Over the years, it has been evolved to modern transportation systems such as road, train, and air transportation. With the development of technology, intelligent transportation systems have been enriched with Information and Communications Technology (ICT). Nowadays, smart city concept that integrates ICT and Internet-of-Things (IoT) have been appeared to optimize the efficiency of city operations and services. Recently, several IoT-based smart applications for smart cities have been developed. Among these applications, smart services for transportation are highly required to ease the issues especially regarding to road safety. In this context, this study presents a literature review that elaborates the existing IoT-based smart transportation systems especially in terms of road safety. In this way, the current state of IoT-based smart transportation systems for safer roads are provided. Then, the current research efforts undertaken by the authors to provide an IoT-based safe smart traffic system are briefly introduced. It is emphasized that road safety can be improved using Vehicle-to-Infrastructure (V2I) communication technologies via the cloud (Infrastructure-to-Cloud - I2C). Therefore, it is believed that this study offers useful information to researchers for developing safer roads in smart cities. © 2020 IEEE.
  • Conference Object
    Citation - Scopus: 3
    Radial Basis Function (rbf) Based on Multistage Autoencoders for Intrusion Detection System (ids)
    (Institute of Electrical and Electronics Engineers Inc., 2019) Kadhim,Y.; Mishra,A.
    In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to detect IDS attacks with 98.80% accuracy when validated using UNSW-NB15 dataset. The experimental results show the proposed method presents satisfactory results when compared with those obtained in this field. © 2019 IEEE.
  • Conference Object
    Citation - Scopus: 11
    Design of Low-Cost Modular Rf Front End for Rf Fingerprinting of Bluetooth Signals
    (Institute of Electrical and Electronics Engineers Inc., 2017) Uzundurukan,E.; Ali,A.M.; Kara,A.
    For RF fingerprinting of wireless devices, data acquisition has a critical role. Because of this, highly sophisticated devices are used for data capturing or acquisition. In this paper, design of a RF receiver front end with modular components is presented. This design contains filtering and down conversion processing of Bluetooth signals for cellular phones. Moreover, AWR VSS and MATLAB have been used for simulating the down converter circuit. With this simulation, effects of components that used in the design on recorded signal have been observed. In this work in progress paper, only high SNR conditions are considered. © 2017 IEEE.
  • Conference Object
    Citation - Scopus: 4
    Magnetically geared direct drive wind generator thermal analysis
    (Institute of Electrical and Electronics Engineers Inc., 2017) Zeinali,R.; Ertan,H.B.; Yamali,C.; Tarvirdilu-Asl,R.
    This paper considers Dual Stator Spoke Array Vernier Permanent Magnet (DSSA-VPM) generator for the direct drive wind-electric energy conversion. The structure of the generator is described. Although how this design is optimized is not discussed, dimensions of the designed generator are given. In electrical machine design thermal performance is naturally of utmost importance. In this paper thermal performance of the design and how its temperature can be kept within the temperature limit imposed by its insulation class and the permanent magnets used is investigated. It is found that when air flow within the generator is not permitted, at rated load condition the generator temperature reaches very high levels. To lower the operating temperature, ventilation holes are introduced to the end plates of the frame. Also some blades are placed on the rotor to help flow of air over the end windings. A model is introduced to calculate the air speed in the region where air flows. Using the calculated air speed a new heat transfer coefficient is determined for the region where air flows. It is found out that with the mentioned modifications to the structure of the generator the designed generator temperature rise can be kept within the value permitted for its insulation class. Therefore, the power density of the design can be safely compared with the power density of other types of designs for direct drive turbines. It is found that DSSA-VPM generator topology offers a clear advantage over other types of generators considered in the literature. © 2017 IEEE.
  • Conference Object
    Citation - Scopus: 14
    A Decentralized Application for Secure Messaging in a Trustless Environment
    (Institute of Electrical and Electronics Engineers Inc., 2019) Abdulaziz,M.; Culha,D.; Yazici,A.
    Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol. © 2018 IEEE.
  • Conference Object
    Citation - Scopus: 4
    Comparison of computer-based propagation models with experimental data collected in an urban area at 1800 MHz
    (Institute of Electrical and Electronics Engineers Inc., 2015) Acar,T.; Caliskan,F.; Aydin,E.
    Nowadays a lot of models are set for the efficient and economic usage of frequency band since the band is a limited source. Therefore, the propagation models created for this purpose were studied in the literature. These models are Free Space Path Loss (Fspl) + Reflection plus Multiple Diffraction (RMD), COST-Hata and COST-WI models. In order to compare the success of the models, electric field strength measurements were taken in a chosen district (Mustafa Kemal Mahallesi - Ankara, Turkey) where an irregular structure style can be observed. First set of measurements were recorded at random coordinates and second set of measurements were collected by the following coordinates tracking on a single line. As a conclusion, measured values were compared with the results which were taken from the mentioned models with graphical presentations. The most appropriate model was tried to be found and as another aim of the study, a correction factor was generated as a modification for COST-Hata propagation model. © 2015 IEEE.