Search Results

Now showing 1 - 10 of 133
  • Conference Object
    Citation - Scopus: 64
    Performance Analysis of Ad-Hoc Networks Under Black Hole Attacks
    (Institute of Electrical and Electronics Engineers Inc., 2007) Dokurer,S.; Erten,Y.M.; Acar,C.E.
    A wireless ad-hoc network is a temporary network set up by wireless nodes usually moving randomly and communicating without a network infrastructure. Due to security vulnerabilities of the routing protocols, however, wireless ad-hoc networks may be unprotected against attacks by the malicious nodes. In this study we investigated the effects of Black Hole attacks on the network performance. We simulated black hole attacks in Network Simulator 2 (ns-2) and measured the packet loss in the network with and without a black hole. We also proposed a simple solution against black hole attacks. Our solution improved the network performance in the presence of a black hole by about 19%. © 2007 IEEE.
  • Conference Object
    Citation - Scopus: 3
    Comparison of a Magnetically Geared Pm Wind Generator With Radial Flux Generator
    (Institute of Electrical and Electronics Engineers Inc., 2018) Zeinali,R.; Ertan,H.B.
    Direct drive wind turbines promise to be more reliable and efficient than commonly used geared wind turbines. This paper presents part of a study aiming to identify whether 'Dual Stator Spoke Array Vernier Permanent Magnet' (DSSAVPM) generators present an advantage, regarding size or cost, as compared to the conventional radial flux PM machine for direct drive applications. For this purpose, design of both machines is optimized for the same specifications and using the same design criteria. optimization results are presented and discussed. It is found that a DSSVPM generator design, with almost the same performance as the RFPM generator, but with 45% of its mass is possible. © 2018 IEEE.
  • Conference Object
    Citation - Scopus: 1
    Numerical Evaluation of Thermal Comfort, Iaq Indices, and Tes for the Improvement of the Energy Performance in Crowded Area
    (Institute of Electrical and Electronics Engineers Inc., 2022) Al-Malaki,F.; Jafari,R.
    This paper proposed new strategies for investigating the reality of indoor air quality (IAQ). The actual crowded cell was simulated by scale of 1:4 containing five persons in which two of them are lying. It was aimed to keep the stability of the oxygen / air ratio to prevent suffocation by controlling the air velocity as quickly as possible from HVAC systems, especially in the overcrowded area. Phase change materials (PCMs) were used to reduce the fluctuations of inside space temperatures for the thermal performance. Two different organic PCMs were used to analyse the temperature distribution in the prototype model. This study also is focused on the analysis of the thermal efficiency of PCMs that is established on thermal energy storage (TES) for energy embalmment in the prototype model, for thermal management of special zone temperature applications. In addition, temperature distributions inside the cell with and without the embedded PCM in the ceiling have been illustrated. Using of PCM has reduced the cell temperature about 7°C. © 2022 IEEE.
  • Conference Object
    Citation - Scopus: 3
    Reciprocal Altruism-Based Path Planning Optimization for Multi-Agents
    (Institute of Electrical and Electronics Engineers Inc., 2022) Maeedi,A.; Khan,M.U.; Irfanoglu,B.
    This paper investigates solutions for the fundamental yet challenging problem of path planning of autonomous multi-agents. The novelty of the proposed algorithm, reciprocal altruism-based particle swarm optimization (RAPSO), lies in the introduction of information sharing among the agents. The RAPSO utilizes kinship relatedness among the agents during the optimization process to reciprocate the significant data. The concept of reciprocation is introduced to ensure that all agents remain in close contact through information exchange. The amount of exchange depends upon their physical location in the search space and their associated health indicator. Agents are classified as donors, recipients, or un-active concerning their health indicator and their positions. The ability of RAPSO to keep all agents closer to local optima through reciprocal altruism is evaluated for path planning optimization problem. Simulation results show that the RAPSO is very competitive when compared with the canonical PSO. The results of the generalized simulation scenario also prove its potential in solving path planning problems in robotics. © 2022 IEEE.
  • Conference Object
    Citation - Scopus: 1
    Developing and Evaluating a Model-Based Metric for Legal Question Answering Systems
    (Institute of Electrical and Electronics Engineers Inc., 2023) Bakir,D.; Yildiz,B.; Aktas,M.S.
    In the complicated world of legal law, Question Answering (QA) systems only work if they can give correct, situation-aware, and logically sound answers. Traditional evaluation methods, which rely on superficial similarity measures, can't catch the complex accuracy and reasoning needed in legal answers. This means that evaluation methods need to change completely. To fix the problems with current methods, this study presents a new model-based evaluation metric that is designed to work well with legal QA systems. We are looking into the basic ideas that are needed for this kind of metric, as well as the problems of putting it into practice in the real world, finding the right technological frameworks, creating good evaluation methods. We talk about a theory framework that is based on legal standards and computational linguistics. We also talk about how the metric was created and how it can be used in real life. Our results, which come from thorough tests, show that our suggested measure is better than existing ones. It is more reliable, accurate, and useful for judging legal quality assurance systems. © 2023 IEEE.
  • Conference Object
    Citation - Scopus: 8
    An Exploratory Case Study on Effort Estimation in Microservices
    (Institute of Electrical and Electronics Engineers Inc., 2023) Unlu,H.; Hacaloglu,T.; Omural,N.K.; Caliskanel,N.; Leblebici,O.; Demirors,O.
    Software project management plays an important role in producing high-quality software, and effort estimation can be considered as a backbone for successful project management. Size is a very significant attribute of software by being the only input to perform early effort estimation. Even though functional size measurement methods showed successful results in effort estimation of traditional data-centric architectures such as monoliths, they were not designed for today's architectures which are more service-based and decentralized such as microservices. In these new systems, the event concept is highly used specifically for communication among different services. By being motivated by this fact, in this study, we looked for more microservice-compatible ways of sizing microservices using events and developed a method accordingly. Then, we conducted an exploratory case study in an organization using agile methods and measured the size of 17 Product Backlog Items (PBIs) to assess how this proposed method can be useful in effort estimation in microservices. The implication from the case study is that despite performing a more accurate effort estimation using the proposed size measurement than COSMIC, we were unable to significantly outperform using the total number of events. However, our suggested approach demonstrated to us a different way to use software size in terms of events, namely, to determine the coupling complexity of the project. This finding can be beneficial specifically when evaluating the change requests. © 2023 IEEE.
  • Conference Object
    Citation - Scopus: 1
    Effect of Secret Image Transformation on the Steganography Process
    (Institute of Electrical and Electronics Engineers Inc., 2017) Buke,M.; Tora,H.; Gokcay,E.
    Steganography is the art of hiding information in something else. It is favorable over encryption because encryption only hides the meaning of the information; whereas steganography hides the existence of the information. The existence of a hidden image decreases Peak Signal to Noise Ratio (PSNR) and increases Mean Square Error (MSE) values of the stego image. We propose an approach to improve PSNR and MSE values in stego images. In this method a transformation is applied to the secret image, concealed within another image, before embedding into the cover image. The effect of the transformation is tested with Least Significant Bit (LSB) insertion and Discrete Cosine Transformation (DCT) techniques. MSE and PSNR are calculated for both techniques with and without transformation. Results show a better MSE and PSNR values when a transformation is applied for LSB technique but no significant difference was shown in DCT technique. © 2017 IEEE.
  • Conference Object
    Citation - Scopus: 8
    On the Seven Misconceptions About Functional Size Measurement
    (Institute of Electrical and Electronics Engineers Inc., 2017) Ozkan,B.; Demirors,O.
    Among the various approaches to software size measurement, Functional Size Measurement has been widely recognized for its usability in early phases of software development cycles and its independence from implementation language, development method and technology. Starting from its introduction with the original Function Point Analysis method in 1979, functional size has been a favored input to estimation and productivity models. As a result of the search for solutions to emerging measurement needs and the advancements in the discipline of software measurement, FSM concepts have been redefined and measurement methods have matured with notable contributions from the ISO standardization process. Despite the progress towards an unambiguously defined and versatile measure in software engineering, several misconceptions about FSM in software community keep on leading to misuse of functional size and unproductive measurement practices. While such misperceptions results in disappointment and wasted resources, an important consequence is the disinterest in FSM. In this paper, we elaborate seven misconceptions in FSM. We review functional size and FSM by discussing the misconceptions. Our purpose is to give a state-of-the-art presentation of functional size and to guide software practitioners and researchers in applying FSM principles properly in their practices and software engineering methods and models. © 2016 IEEE.
  • Conference Object
    Citation - Scopus: 19
    Examination of Ev-Grid Integration Using Real Driving and Transformer Loading Data
    (Institute of Electrical and Electronics Engineers Inc., 2016) Erden,F.; Kisacikoglu,M.C.; Gurec,O.H.
    The growing environmental concerns and the increase in oil prices will lead to the proliferation of electric vehicles (EVs) in the near future. The increase in the number of EVs, while providing green and inexpensive solutions to transportation needs, may cause constraints on the operation of the utility grid that should be investigated. In this paper, the real user driving information is collected from individual data tracking devices of passenger vehicle owners instead of assuming randomly distributed trip characteristics. The collected trip data are first analyzed to generate a statistical model of the trip characteristics in terms of home arrival times and state of charge (SOC) levels. The resulting model is then used to simulate and analyze the impact of EV integration in a real grid with different EV penetration levels. For this, real distribution transformer data provided by Başkent Electric Distribution Co. is used. The proposed method produces more realistic results in comparison to the studies assuming random scenarios. © 2015 Chamber of Electrical Engineers of Turkey.
  • Conference Object
    The Use of Artificial Neural Networks in Network Intrusion Detection: a Systematic Review
    (Institute of Electrical and Electronics Engineers Inc., 2019) Öney,M.U.; Peker,S.
    Network intrusion detection is an important research field and artificial neural networks have become increasingly popular in this subject. Despite this, there is a lack of systematic literature review on that issue. In this manner, the aim of this study to examine the studies concerning the application artificial neural network approaches in network intrusion detection to determine the general trends. For this purpose, the articles published within the last decade from 2008 to 2018 were systematically reviewed and 43 articles were retrieved from commonly used databases by using a search strategy. Then, these selected papers were classified by the publication type, the year of publication, the type of the neural network architectures they employed, and the dataset they used. The results indicate that there is a rising trend in the usage of ANN approaches in the network intrusion detection with the gaining popularity of deep neural networks in recent years. Moreover, the KDD'99 dataset is the most commonly used dataset in the studies of network intrusion detection using ANNs. We hope that this paper provides a roadmap to guide future research on network intrusion detection using ANNs. © 2018 IEEE.