Search Results

Now showing 1 - 10 of 39
  • Article
    Citation - WoS: 31
    Citation - Scopus: 40
    Variational Mode Decomposition-Based Radio Frequency Fingerprinting of Bluetooth Devices
    (Ieee-inst Electrical Electronics Engineers inc, 2019) Aghnaiya, Alghannai; Ali, Aysha M.; Kara, Ali
    Radio frequency fingerprinting (RFF) is based on identification of unique features of RF transient signals emitted by radio devices. RF transient signals of radio devices are short in duration, non-stationary and nonlinear time series. This paper evaluates the performance of RF fingerprinting method based on variational mode decomposition (VMD). For this purpose, VMD is used to decompose Bluetooth (BT) transient signals into a series of band-limited modes, and then, the transient signal is reconstructed from the modes. Higher order statistical (HOS) features are extracted from the complex form of reconstructed transients. Then, Linear Support Vector Machine (LVM) classifier is used to identify BT devices. The method has been tested experimentally with BT devices of different brands, models and series. The classification performance shows that VMD based RF fingerprinting method achieves better performance (at least 8% higher) than time-frequency-energy (TFED) distribution based methods such as Hilbert-Huang Transform. This is demonstrated with the same dataset but with smaller number of features (nine features) and slightly lower (2-3 dB) SNR levels.
  • Article
    Citation - WoS: 8
    Citation - Scopus: 10
    Evaluation of Ten Open-Source Eye-Movement Classification Algorithms in Simulated Surgical Scenarios
    (Ieee-inst Electrical Electronics Engineers inc, 2019) Dalveren, Gonca Gokce Menekse; Cagiltay, Nergiz Ercil
    Despite providing several insights into visual attention and evidence regarding certain brain states and psychological functions, classifying eye movements is a highly demanding process. Currently, there are several algorithms to classify eye movement events which use different approaches. However, to date, only a limited number of studies have assessed these algorithms under specific conditions, such as those required for surgical training programmes. This study presents an investigation of ten open-source eye-movement classification algorithms using the Eye Tribe eye-tracker. The algorithms were tested on the eye-movement records obtained from 23 surgical residents, who performed computer-based surgical simulation tasks under different hand conditions. The aim was to offer data for the improvement of surgical training programmes. According to the results, due to the different classification methods and default threshold values, the ten algorithms produced different results. Considering the fixation duration, the only common event for all of the investigated algorithms, the binocular-individual threshold (BIT) algorithm resulted in a different clustering compared to the other algorithms. Based on the other set of common events, three clusters were determined by eight algorithms (except BIT and event detection (ED)), distinguishing dispersion-based, velocity-based and modified versions of velocity-based algorithms. Accordingly, it was concluded that dispersion-based and velocity-based algorithms provided different results. Additionally, as it individually specifies the threshold values for the eye-movement data, when there is no consensus about the threshold values to be set, the BIT algorithm can be selected. Especially for such cases like simulation-based surgical skill-training, the use of individualised threshold values in the BIT algorithm can be more beneficial in classifying the raw eye data and thus evaluating the individual progress levels of trainees based on their eye movement behaviours. In conclusion, the threshold values had a critical effect on the algorithm results. Since default values may not always be suitable for the unique features of different data sets, guidelines should be developed to indicate how the threshold values are set for each algorithm.
  • Article
    Citation - WoS: 3
    Citation - Scopus: 3
    Pseudospectral Time Domain Method Implementation Using Finite Difference Time Stepping
    (Ieee-inst Electrical Electronics Engineers inc, 2018) Gunes, Ahmet; Aksoy, Serkan
    Lagrange interpolation polynomials-based Cheby-shev pseudospectral time domain (CPSTD) method is an efficient time domain solver for Maxwell equations. Although it has the lowest interpolation error among pseudospectral time domain methods, time derivatives must be calculated using higher order time derivative schemes, such as the Runge-Kutta method. The higher order time derivative methods slow down the computation speed at each step by several folds. In this letter, we show that central finite differences can be used for implementation of time derivatives in CPSTD method. Results are verified by a resonator problem.
  • Article
    Citation - WoS: 30
    Citation - Scopus: 48
    A Fusion-Based Framework for Wireless Multimedia Sensor Networks in Surveillance Applications
    (Ieee-inst Electrical Electronics Engineers inc, 2019) Yazici, Adnan; Koyuncu, Murat; Sert, Seyyit Alper; Yilmaz, Turgay
    Multimedia sensors enable monitoring applications to obtain more accurate and detailed information. However, the development of efficient and lightweight solutions for managing data traffic over wireless multimedia sensor networks (WMSNs) has become vital because of the excessive volume of data produced by multimedia sensors. As part of this motivation, this paper proposes a fusion-based WMSN framework that reduces the amount of data to be transmitted over the network by intra-node processing. This framework explores three main issues: 1) the design of a wireless multimedia sensor (WMS) node to detect objects using machine learning techniques; 2) a method for increasing the accuracy while reducing the amount of information transmitted by the WMS nodes to the base station, and; 3) a new cluster-based routing algorithm for the WMSNs that consumes less power than the currently used algorithms. In this context, a WMS node is designed and implemented using commercially available components. In order to reduce the amount of information to be transmitted to the base station and thereby extend the lifetime of a WMSN, a method for detecting and classifying objects on three different layers has been developed. A new energy-efficient cluster-based routing algorithm is developed to transfer the collected information/data to the sink. The proposed framework and the cluster-based routing algorithm are applied to our WMS nodes and tested experimentally. The results of the experiments clearly demonstrate the feasibility of the proposed WMSN architecture in the real-world surveillance applications.
  • Article
    Citation - WoS: 32
    Citation - Scopus: 39
    Backhaul-Aware Optimization of Uav Base Station Location and Bandwidth Allocation for Profit Maximization
    (Ieee-inst Electrical Electronics Engineers inc, 2020) Cicek, Cihan Tugrul; Gultekin, Hakan; Tavli, Bulent; Yanikomeroglu, Halim
    Unmanned Aerial Vehicle Base Stations (UAV-BSs) are envisioned to be an integral component of the next generation Wireless Communications Networks (WCNs) with a potential to create opportunities for enhancing the capacity of the network by dynamically moving the supply towards the demand while facilitating the services that cannot be provided via other means efficiently. A significant drawback of the state-of-the-art have been designing a WCN in which the service-oriented performance measures (e.g., throughput) are optimized without considering different relevant decisions such as determining the location and allocating the resources, jointly. In this study, we address the UAV-BS location and bandwidth allocation problems together to optimize the total network profit. In particular, a Mixed-Integer Non-Linear Programming (MINLP) formulation is developed, in which the location of a single UAV-BS and bandwidth allocations to users are jointly determined. The objective is to maximize the total profit without exceeding the backhaul and access capacities. The profit gained from a specific user is assumed to be a piecewise-linear function of the provided data rate level, where higher data rate levels would yield higher profit. Due to high complexity of the MINLP, we propose an efficient heuristic algorithm with lower computational complexity. We show that, when the UAV-BS location is determined, the resource allocation problem can be reduced to a Multidimensional Binary Knapsack Problem (MBKP), which can be solved in pseudo-polynomial time. To exploit this structure, the optimal bandwidth allocations are determined by solving several MBKPs in a search algorithm. We test the performance of our algorithm with two heuristics and with the MINLP model solved by a commercial solver. Our numerical results show that the proposed algorithm outperforms the alternative solution approaches and would be a promising tool to improve the total network profit.
  • Article
    Citation - WoS: 2
    Citation - Scopus: 3
    A Hybrid Approach for Semantic Image Annotation
    (Ieee-inst Electrical Electronics Engineers inc, 2021) Sezen, Arda; Turhan, Cigdem; Sengul, Gokhan
    In this study, a framework that generates natural language descriptions of images within a controlled environment is proposed. Previous work on neural networks mostly focused on choosing the right labels and/or increasing the number of related labels to depict an image. However, creating a textual description of an image is a completely different phenomenon, structurally, syntactically, and semantically. The proposed semantic image annotation framework presents a novel combination of deep learning models and aligned annotation results derived from the instances of the ontology classes to generate sentential descriptions of images. Our hybrid approach benefits from the unique combination of deep learning and semantic web technologies. We detect objects from unlabeled sports images using a deep learning model based on a residual network and a feature pyramid network, with the focal loss technique to obtain predictions with high probability. The proposed framework not only produces probabilistically labeled images, but also the contextual results obtained from a knowledge base exploiting the relationship between the objects. The framework's object detection and prediction performances are tested with two datasets where the first one includes individual instances of images containing everyday scenes of common objects and the second custom dataset contains sports images collected from the web. Moreover, a sample image set is created to obtain annotation result data by applying all framework layers. Experimental results show that the framework is effective in this controlled environment and can be used with other applications via web services within the supported sports domain.
  • Article
    Citation - WoS: 20
    Citation - Scopus: 25
    Detecting Latent Topics and Trends in Software Engineering Research Since 1980 Using Probabilistic Topic Modeling
    (Ieee-inst Electrical Electronics Engineers inc, 2022) Gurcan, Fatih; Dalveren, Gonca Gokce Menekse; Cagiltay, Nergiz Ercil; Soylu, Ahmet
    The landscape of software engineering research has changed significantly from one year to the next in line with industrial needs and trends. Therefore, today's research literature on software engineering has a rich and multidisciplinary content that includes a large number of studies; however, not many of them demonstrate a holistic view of the field. From this perspective, this study aimed to reveal a holistic view that reflects topics, trends, and trajectories in software engineering research by analyzing the majority of domain-specific articles published over the last 40 years. This study first presents an objective and systematic method for corpus creation through major publication sources in the field. A corpus was then created using this method, which includes 44 domain-specific conferences and journals and 57,174 articles published between 1980 and 2019. Next, this corpus was analyzed using an automated text-mining methodology based on a probabilistic topic-modeling approach. As a result of this analysis, 24 main topics were found. In addition, topical trends in the field were revealed. Finally, three main developmental stages of the field were identified as: the programming age, the software development age, and the software optimization age.
  • Article
    Citation - WoS: 29
    Citation - Scopus: 43
    Software Product Quality Metrics: a Systematic Mapping Study
    (Ieee-inst Electrical Electronics Engineers inc, 2021) Colakoglu, Fatima Nur; Yazici, Ali; Mishra, Alok
    In the current competitive world, producing quality products has become a prominent factor to succeed in business. In this respect, defining and following the software product quality metrics (SPQM) to detect the current quality situation and continuous improvement of systems have gained tremendous importance. Therefore, it is necessary to review the present studies in this area to allow for the analysis of the situation at hand, as well as to enable us to make predictions regarding the future research areas. The present research aims to analyze the active research areas and trends on this topic appearing in the literature during the last decade. A Systematic Mapping (SM) study was carried out on 70 articles and conference papers published between 2009 and 2019 on SPQM as indicated in their titles and abstract. The result is presented through graphics, explanations, and the mind mapping method. The outputs include the trend map between the years 2009 and 2019, knowledge about this area and measurement tools, issues determined to be open to development in this area, and conformity between conference papers, articles and internationally valid quality models. This study may serve as a foundation for future studies that aim to contribute to the development in this crucial field. Future SM studies might focus on this subject for measuring the quality of network performance and new technologies such as Artificial Intelligence (AI), Internet of things (IoT), Cloud of Things (CoT), Machine Learning, and Robotics.
  • Article
    Citation - WoS: 17
    Citation - Scopus: 22
    Seven Principles of Instructional Content Design for a Remote Laboratory: a Case Study on Errl
    (Ieee-inst Electrical Electronics Engineers inc, 2011) Cagiltay, Nergiz Ercil; Aydin, Elif; Aydin, Cansu Cigdem; Kara, Ali; Alexandru, Marian
    This paper discusses the results of a study of the requirements for developing a remote radio frequency (RF) laboratory for electrical engineering students. It investigates students' preferred usage of the technical content of a state-of-the-art RF laboratory. The results of this study are compared to previous findings, which dealt with other user groups (technicians in technical colleges and engineers in the RF domain). Based on the results of these analyses, seven essential principles for designing and developing such a laboratory were identified. As a case study, these principles were then implemented into a remote laboratory system. In this paper, the implementation examples are also provided and discussed. The primary aim of this study is to guide remote laboratory platform developers toward the most effective instructional design. This study also determined, from the remote laboratory system case study, what the requirements are of such a laboratory from the students' perspective.
  • Article
    Citation - WoS: 7
    Citation - Scopus: 8
    Flexible and Lightweight Mitigation Framework for Distributed Denial-Of Attacks in Container-Based Edge Networks Using Kubernetes
    (Ieee-inst Electrical Electronics Engineers inc, 2024) Koksal, Sarp; Catak, Ferhat Ozgur; Dalveren, Yaser
    Mobile Edge Computing (MEC) has a significant potential to become more prevalent in Fifth Generation (5G) networks, requiring resource management that is lightweight, agile, and dynamic. Container-based virtualization platforms, such as Kubernetes, have emerged as key enablers for MEC environments. However, network security and data privacy remain significant concerns, particularly due to Distributed Denial-of-Service (DDoS) attacks that threaten the massive connectivity of end-devices. This study proposes a defense mechanism to mitigate DDoS attacks in container-based MEC networks using Kubernetes. The mechanism dynamically scales Containerized Network Functions (CNFs) with auto-scaling through an Intrusion Detection and Prevention System (IDPS). The architecture of the proposed mechanism leverages distributed edge clusters and Kubernetes to manage resources and balance the load of IDPS CNFs. Experiments conducted in a real MEC environment using OpenShift and Telco-grade MEC profiles demonstrate the effectiveness of the proposed mechanism against Domain Name System (DNS) flood and Yo-Yo attacks. Results also verify that Kubernetes efficiently meets the lightweight, agile, and dynamic resource management requirements of MEC networks.