166 results
Search Results
Now showing 1 - 10 of 166
Conference Object Naturalness Analysis of the Speech Synthesized by a Tts Card(Ieee, 2016) Tora, Hakan; Uslu, BaranIt is known that the performance of a developed text-to-speech (TTS) synthesis system is assessed by subjective tests. These assessments are usually based on the intelligibility and naturalness of the synthesized speech. In this study, an investigation on relating these subjective test results, thus the naturalness of the synthesized speech, to which acoustic features is accomplished. Consequently the features which will increase the performance while synthesizing the speech are determined. Our work is focused especially on the pitch frequency and energy parameters.Conference Object Citation - WoS: 2Fem-Based Design Modifications and Efficiency Improvements of a Brushed Permanent Magnet Dc Motor(Ieee, 2017) Tarvirdilu-Asl, Rasul; Zeinali, Reza; Ertan, H. BulentThis paper describes design modifications of a brushed permanent magnet DC motor. Test motor is modeled using a Finite Element Method (FEM) based software. Model accuracy is investigated by comparing measurement and simulation results. Reducing material consumption in motor fabrication while the motor develops the desired torque at a higher efficiency is aimed in this paper. Modifications are done in three stages and simulations results are also presented. These results are also compared to simulation results of the test machine.Conference Object Citation - WoS: 2A Proposal on Requirements for Cosmic Fsm Automation From Source Code(Ieee, 2016) Tarhan, Ayca; Ozkan, Baris; Icoz, Gonca CananAutomation of functional size measurement (FSM) process has increasingly gained importance since manual measurement is time-consuming, costly, and sometimes error-prone. There exist studies that automate measurement from different software artifacts such as requirements specifications, design models, and software code. In this study we review and compare four studies that we have carried out in recent years to automate COSMIC FSM from software code. Based on the comparison and the lessons learned, we derive an operational scenario for automated FSM from software code and propose a set of requirements that need to be considered in automation. We think the proposal will be helpful not only for our future studies and also for future work of interested researchers.Conference Object Distance Laboratory Applications Errl(Ieee, 2008) Aydin, C. C.; Turkmen, G.; Ozyurt, E.; Aydin, E. U.; Cagiltay, N. E.; Ozbek, M. E.; Kara, A.In the last decade, the effect of internet usage in education is gradually increased. When we look from academic perspective, the new technologies provided alternatives for students learning. As distance education becomes important everyday, the indispensable elements of teaching and education, laboratories must be reachable via remote connection. Consequently, the education that is going to be given to the students will be more flexible with respect to place and time constraints and students can reach laboratory facilities at any time and anywhere not only in lectures and practical hours. In this study, European Remote Radio Laboratory (ERRL) which is a distance remote Radio Frequency (RF) laboratory designed for electrical-electronics students, is described generally. The software architecture, infrastructure and experiment that can be done with a remote connection have been described.Conference Object Citation - WoS: 14Examination of Ev-Grid Integration Using Real Driving and Transformer Loading Data(Ieee, 2015) Erden, Fatih; Kisacikoglu, Mithat C.; Gurec, Ozan H.The growing environmental concerns and the increase in oil prices will lead to the proliferation of electric vehicles (EVs) in the near future. The increase in the number of EVs, while providing green and inexpensive solutions to transportation needs, may cause constraints on the operation of the utility grid that should be investigated. In this paper, the real user driving information is collected from individual data tracking devices of passenger vehicle owners instead of assuming randomly distributed trip characteristics. The collected trip data are first analyzed to generate a statistical model of the trip characteristics in terms of home arrival times and state of charge (SOC) levels. The resulting model is then used to simulate and analyze the impact of EV integration in a real grid with different EV penetration levels. For this, real distribution transformer data provided by Baskent Electric Distribution Co. is used. The proposed method produces more realistic results in comparison to the studies assuming random scenarios.Conference Object An Experimental Study Towards Examining Human Body Movements in Indoor Wave Propagation at 18-22 Ghz(Ieee, 2018) Alabish, Ahmed; Kara, Ali; Dalveren, YaserAs 5G communication may use Millimeter waves (mmWave) bands, it is necessary to evaluate short-range indoor links from the link blockage point of view. This paper presents some initial studies for characterizing effects of human body movements on short range indoor links at 18 - 22 GHz. Firstly, measurement system is described, and then, calibration measurements along with initial results of the impact of human body movement on the channel are presented for some scenarios. To the best of our knowledge, this study is the first to experimentally examine the effects of human body movements at this band. Yet, as this study constitutes a part of an ongoing research, further results will be anticipated to present the effects of objects over and around the link on the directional propagation at mmWave bands (28 - 30 GHz).Conference Object Citation - WoS: 4Citation - Scopus: 6A Reinforcement Learning Algorithm for Data Collection in Uav-Aided Iot Networks With Uncertain Time Windows(Ieee, 2021) Cicek, Cihan TugrulUnmanned aerial vehicles (UAVs) have been considered as an efficient solution to collect data from ground sensor nodes in Internet-of-Things (IoT) networks due to their several advantages such as flexibility, quick deployment and maneuverability. Studies on this subject have been mainly focused on problems where limited UAV battery is introduced as a tight constraint that shortens the mission time in the models, which significantly undervalues the UAV potential. Moreover, the sensors in the network are typically assumed to have deterministic working times during which the data is uploaded. In this study, we revisit the UAV trajectory planning problem with a different approach and revise the battery constraint by allowing UAVs to swap their batteries at fixed stations and continue their data collection task, hence, the planning horizon can be extended. In particular, we develop a discrete time Markov process (DTMP) in which the UAV trajectory and battery swapping times are jointly determined to minimize the total data loss in the network, where the sensors have uncertain time windows for uploading. Due to the so-called curse-of-dimensionality, we propose a reinforcement learning (RL) algorithm in which the UAV is trained as an agent to explore the network. The computational study shows that our proposed algorithm outperforms two benchmark approaches and achieves significant reduction in data loss.Conference Object Microstrip Antennas For WiMAX Applications(Ieee, 2015) Demirci, Tugkan; Caliskan, Fatma; Aydin, ElifIn this paper, four different antenna types have been designed to be used for WiMAX applications. These antennas have been designed using HFSS simulation software. This paper has included the return loss and the radiation pattern of the designed antennas. Using the simulation results, it is shown that these four antennas are working on Wi-Fi and WiMAX frequency ranges.Conference Object Citation - WoS: 4A Layered Security Architecture for Corporate 802.11 Wireless Networks(Ieee, 2004) Erten, YM; Tomur, EIn this study we have investigated the security aspects of wireless local area networks and discussed the weaknesses associated with various conventional 802.11 security protocols such as WEP and 802.1x. We propose an architecture to control access to corporate 802.11 wireless networks, based on the privileges and location of users, using the tested wired network components such as VPNs and Firewalls. The presented architecture reduces the security risks in enterprise level deployment of wireless LANs.Conference Object Citation - WoS: 16Citation - Scopus: 30A Search-Based Approach for Cost-Effective Software Test Automation Decision Support and an Industrial Case Study(Ieee, 2014) Amannejad, Yasaman; Garousi, Vahid; Irving, Rob; Sahaf, ZahraTest automation is a widely-used approach to reduce the cost of manual software testing. However, if it is not planned or conducted properly, automated testing would not necessarily be more cost effective than manual testing. Deciding what parts of a given System Under Test (SUT) should be tested in an automated fashion and what parts should remain manual is a frequently-asked and challenging question for practitioner testers. In this study, we propose a search-based approach for deciding what parts of a given SUT should be tested automatically to gain the highest Return On Investment (ROI). This work is the first systematic approach for this problem, and significance of our approach is that it considers automation in the entire testing process (i.e., from test-case design, to test scripting, to test execution, and test result evaluation). The proposed approach has been applied in an industrial setting in the context of a software product used in the oil and gas industry in Canada. Among the results of the case study is that, when planned and conducted properly using our decision-support approach, test automation provides the highest ROI. In this study, we show that if automation decision is taken effectively, test-case design, test execution, and test evaluation can result in about 307%, 675%, and 41% ROI in 10 rounds of using automated test suites.

