Search Results

Now showing 1 - 8 of 8
  • Editorial
    Acemp-Optim 2019 Opening Speech
    (Institute of Electrical and Electronics Engineers Inc., 2019) Bulent Ertan,H.
    [No abstract available]
  • Conference Object
    Citation - Scopus: 9
    A Layered Security Architecture for Corporate 802.11 Wireless Networks
    (Institute of Electrical and Electronics Engineers Inc., 2004) Erten,Y.M.; Tomur,E.
    In this study we have investigated the security aspects of wireless local area networks and discussed the weaknesses associated with various conventional 802.11 security protocols such as WEP and 802.1x. We propose an architecture to control access to corporate 802.11 wireless networks, based on the privileges and location of users, using the tested wired network components such as VPNs and Firewalls. The presented architecture reduces the security risks in enterprise level deployment of wireless LANs.
  • Conference Object
    Infrared Absorption Spectroscopy of Monolayers With Thin Film Interference Coatings
    (Institute of Electrical and Electronics Engineers Inc., 2017) Ayas,S.; Bakan,G.; Ozgur,E.; Celebi,K.; Dana,A.
    We report high performance Infrared spectroscopy platforms based on interference coatings on metal using CaF2 dielectric films and Ge2Sb2Te5 (GST) phase-change films. IR vibrational bands of proteins and organic monolayers are also detected. © 2017 IEEE.
  • Conference Object
    Citation - Scopus: 5
    An Application of High-Power Electromagnetic Pulse: Forming of Sheet Metal Using Electromagnetic Waves
    (Institute of Electrical and Electronics Engineers Inc., 2016) Inanan,G.; Baranoglu,B.; Aydin,E.
    In this study, the application of high velocity metal forming process by means of electromagnetic field is proposed. Electromagnetic Sheet Metal Forming (ESMF) is a process of forming sheet metal with very high speed (in milliseconds) without mechanical contact using the energy density of a pulsed magnetic field. In this process, deformation of the workpiece is driven by a transient electric current that is induced in a coil using a capacitor bank and discharge switch. This study presents some experiments and their results by examining the effects of different parameters in the proposed ESMF setup. The analysis and modelling of Electromagnetic sheet metal forming (ESMF) process is presented, as well. It has been seen that, it is possible to design a new system using the outcomes of this study. © 2015 Chamber of Electrical Engineers of Turkey.
  • Conference Object
    Citation - Scopus: 64
    Performance Analysis of Ad-Hoc Networks Under Black Hole Attacks
    (Institute of Electrical and Electronics Engineers Inc., 2007) Dokurer,S.; Erten,Y.M.; Acar,C.E.
    A wireless ad-hoc network is a temporary network set up by wireless nodes usually moving randomly and communicating without a network infrastructure. Due to security vulnerabilities of the routing protocols, however, wireless ad-hoc networks may be unprotected against attacks by the malicious nodes. In this study we investigated the effects of Black Hole attacks on the network performance. We simulated black hole attacks in Network Simulator 2 (ns-2) and measured the packet loss in the network with and without a black hole. We also proposed a simple solution against black hole attacks. Our solution improved the network performance in the presence of a black hole by about 19%. © 2007 IEEE.
  • Conference Object
    Citation - Scopus: 19
    Examination of Ev-Grid Integration Using Real Driving and Transformer Loading Data
    (Institute of Electrical and Electronics Engineers Inc., 2016) Erden,F.; Kisacikoglu,M.C.; Gurec,O.H.
    The growing environmental concerns and the increase in oil prices will lead to the proliferation of electric vehicles (EVs) in the near future. The increase in the number of EVs, while providing green and inexpensive solutions to transportation needs, may cause constraints on the operation of the utility grid that should be investigated. In this paper, the real user driving information is collected from individual data tracking devices of passenger vehicle owners instead of assuming randomly distributed trip characteristics. The collected trip data are first analyzed to generate a statistical model of the trip characteristics in terms of home arrival times and state of charge (SOC) levels. The resulting model is then used to simulate and analyze the impact of EV integration in a real grid with different EV penetration levels. For this, real distribution transformer data provided by Başkent Electric Distribution Co. is used. The proposed method produces more realistic results in comparison to the studies assuming random scenarios. © 2015 Chamber of Electrical Engineers of Turkey.
  • Conference Object
    Citation - Scopus: 5
    Respiratory Rate Monitoring Using Infrared Sensors
    (Institute of Electrical and Electronics Engineers Inc., 2016) Erden,F.; Cetin,A.E.
    Respiratory rate is an essential parameter in many practical applications such as patient and elderly people monitoring. In this paper, a novel contact-free system is introduced to detect the human breathing activity. The system, which consists of two pyro-electric infrared (PIR) sensors, is capable of estimating the respiratory rate and detecting the sleep apnea. Sensors' signals corresponding to the thoracic movements of a human being are sampled using a microprocessor and analyzed on a general-purpose computer. Sampled signals are processed using empirical mode decomposition (EMD) and a new average magnitude difference function (AMDF) is used to detect the periodicity and the period of the processed signals. The resulting period, by using the fact that breathing is almost a periodic activity, is monitored as the respiratory rate. The new AMDF provides a way to fuse the data from the multiple sensors and generate a more reliable estimation of the respiratory rate. © 2015 Chamber of Electrical Engineers of Turkey.
  • Conference Object
    A Layered Security Architecture for Corporate 802.11 Wireless Networks
    (Institute of Electrical and Electronics Engineers Inc., 2004) Erten,Y.M.; Tomur,E.
    In this study we have investigated the security aspects of wireless local area networks and discussed the weaknesses associated with various conventional 802.11 security protocols such as WEP and 802.1x. We propose an architecture to control access to corporate 802.11 wireless networks, based on the privileges and location of users, using the tested wired network components such as VPNs and Firewalls. The presented architecture reduces the security risks in enterprise level deployment of wireless LANs.