Search Results

Now showing 1 - 10 of 138
  • Conference Object
    Citation - Scopus: 28
    Improvements on Transient Signal Detection for Rf Fingerprinting
    (Institute of Electrical and Electronics Engineers Inc., 2017) Ali,A.M.; Uzundurukan,E.; Kara,A.
    The detection of the transient signal plays a significant role in RF fingerprinting for transmitter devices. This paper proposes modifications on two transient signal detection methods, namely, Bayesian change point detection and phase based detection. For initial tests, Bluetooth signals captured in the laboratory are used for performance analysis of the proposed methods. Preliminary results show that the proposed methods can be used in RF fingerprinting of wireless devices. © 2017 IEEE.
  • Conference Object
    Citation - Scopus: 9
    Attitude Control of Quad-Copter Using Deterministic Policy Gradient Algorithms (dpga)
    (Institute of Electrical and Electronics Engineers Inc., 2019) Ghouri,U.H.; Zafar,M.U.; Bari,S.; Khan,H.; Khan,M.U.
    In aerial robotics, intelligent control has been a buzz for the past few years. Extensive research efforts can be witnessed to produce control algorithms for stable flight operation of aerial robots using machine learning. Supervised learning has the tendency but training an agent using supervised learning can be a tedious task. Moreover, the data gathering could be expensive and always prone to inaccuracies due to parametric variations and system dynamics. An alternative approach is to ensure the stability of the aerial robots with the help of Deep Re-inforcement Learning (DRL). This paper deals with the intelligent control of quad-copter using deterministic policy gradient algorithms. In this research, state of the art Deep Deterministic Policy Gradient (DDPG) and Distributed Distributional Deep Deterministic Policy Gradient (D4PG) algorithms are employed for attitude control of quad-copter. An open source simulation environment GymFC is used for training of quad-copter. The results for comparative analysis of DDPG D4PG algorithms are also presented, highlighting the attitude control performance. © 2019 IEEE.
  • Conference Object
    Securing the Internet of Things: Challenges and Complementary Overview of Machine Learning-Based Intrusion Detection
    (Institute of Electrical and Electronics Engineers Inc., 2024) Isin, L.I.; Dalveren, Y.; Leka, E.; Kara, A.
    The significant increase in the number of IoT devices has also brought with it various security concerns. The ability of these devices to collect a lot of data, including personal information, is one of the important reasons for these concerns. The integration of machine learning into systems that can detect security vulnerabilities has been presented as an effective solution in the face of these concerns. In this review, it is aimed to examine the machine learning algorithms used in the current studies in the literature for IoT network security. Based on the authors' previous research in physical layer security, this research also aims to investigate the intersecting lines between upper layers of security and physical layer security. To achieve this, the current state of the area is presented. Then, relevant studies are examined to identify the key challenges and research directions as an initial overview within the authors' ongoing project. © 2024 IEEE.
  • Conference Object
    Citation - Scopus: 2
    Comparison of Qos Architectures for Voip Traffics in Ipv4 and Ipv6
    (Institute of Electrical and Electronics Engineers Inc., 2017) Al-Fayyadh,H.; Koyuncu,M.
    The Internet has become an integral part of human's life with an ever increasing number of applications and services that it provides to its customers. Both the numbers of Internet users and services provided by the Internet continue to rise tremendously. Quality of Service (QoS) is the ability of a network to provide better services for the users to divide the bandwidth according to the needs of different applications. With an increase in demand for multimedia applications like video streaming, VoIP and video conferencing, larger bandwidth requirement increases drastically since such applications are very sensitive to delay, packet loss, and jitter. IPv6 has new features which are designed to improve QoS supported by IPv4, as well as other improvements. This paper gives a comparative analysis of QoS architectures, namely Integrated Services (IntServ) and Differentiated Services (DiffServ), which are examined to see their effects for Voice over IP (VoIP) in IPv4 and IPv6 environments. For comparisons, OPNET Modeler is used for network modeling and testing. The obtained test results show the importance of IPv6 to support multimedia applications on the Internet. © 2016 IEEE.
  • Conference Object
    Citation - Scopus: 6
    Topic-Controlled Text Generation
    (Institute of Electrical and Electronics Engineers Inc., 2021) Çağlayan,C.; Karakaya,M.
    Today, the text generation subject in the field of Natural Language Processing (NLP) has gained a lot of importance. In particular, the quality of the text generated with the emergence of new transformer-based models has reached high levels. In this way, controllable text generation has become an important research area. There are various methods applied for controllable text generation, but since these methods are mostly applied on Recurrent Neural Network (RNN) based encoder decoder models, which were used frequently, studies using transformer-based models are few. Transformer-based models are very successful in long sequences thanks to their parallel working ability. This study aimed to generate Turkish reviews on the desired topics by using a transformer-based language model. We used the method of adding the topic information to the sequential input. We concatenated input token embedding and topic embedding (control) at each time step during the training. As a result, we were able to create Turkish reviews on the specified topics. © 2021 IEEE
  • Conference Object
    Citation - Scopus: 4
    Need for a Software Development Methodology for Research-Based Software Projects
    (Institute of Electrical and Electronics Engineers Inc., 2018) Cereci,I.; Karakaya,Z.
    Software development is mostly carried by a group of individuals. Software development methodologies are heavily utilized to organize these individuals and keep track of the entire software development process. Although previously proposed software development methodologies meet the needs of the industry and the firms, they are not usually suitable for research-based software projects that are carried by universities and individual researchers. In this paper, we aim to show the necessity of a new software development methodology for research-based problems carried by universities. The literature review will show the differences between industry and university software projects from certain aspects. These findings will be supported by the authors own research on the area. This qualitative research involves collecting data through interviews and applying Grounded Theory to better understand the development process. © 2018 IEEE.
  • Conference Object
    Citation - WoS: 1
    Citation - Scopus: 5
    Smart Contract Upgradability: a Structured and Natural Approach
    (Institute of Electrical and Electronics Engineers Inc., 2024) Culha, Davut; Yazici, Ali
    Software maintenance is crucial as technology rapidly evolves, requiring software to meet new demands and correct errors. Smart contracts, immutable programs on blockchains like Ethereum, face challenges despite their immutability, often needing updates for errors or new features. Smart contracts are upgraded using different patterns, which are not natural because most of them implement upgrades using low-level operations that deviate from their intended use. In other words, these patterns are not natural because upgrades are done by implementing workarounds. Moreover, smart contracts are also susceptible to security vulnerabilities because they may hold large amounts of money. In this paper, upgradability of smart contracts is considered a necessity. For this purpose, a more structured method is proposed by adding high-level features and combining inheritance properties of object-oriented languages. A key component of this method is the gotoContract variable, which allows for the redirection of function calls to upgraded contracts. The proposed method provides a complete upgrade of data and functions in smart contracts. It aims to minimize the effects of upgrades on end users of the smart contracts. Additionally, this natural way of upgrading will help mitigate security risks in the smart contracts by providing a high-level approach to upgrade.
  • Conference Object
    Citation - WoS: 1
    Citation - Scopus: 1
    Sizing of Series Hybrid Electric Vehicle With Hybrid Energy Storage System
    (Institute of Electrical and Electronics Engineers Inc., 2018) Ertan,H.B.; Arikan,F.R.
    This work is aimed to develop a realistic design procedure for a series hybrid plug in vehicle, with a view to use it in a mathematical design optimization. The purpose of the optimization is minimizing the initial cost, as well as the running costs of the vehicle. Therefore there is a multi-objective design optimization problem in hand. Such problems are very suitable for mathematical optimization, however, accurate and not time consuming design procedure is a must, to obtain meaningful results. This paper introduces such a design procedure. The approach is illustrated on a commercial vehicle simulation model. The accuracy of the model is illustrated by comparing simulation results with vehicle test results. © 2018 IEEE.
  • Conference Object
    Neuronavigation systems and passive usage problem;
    (Institute of Electrical and Electronics Engineers Inc., 2017) Cagiltay,N.; Topalli,D.; Borcek,A.O.; Tokdemir,G.; Maras,H.; Tonbul,G.; Aydin,E.
    Nowadays, neuronavigation systems are used in brain surgery procedures, known as a technology to help the surgeon during the operational period. However, the surgeons have faced several problems with the existing systems. Some of these problems are related to the systems software and user interfaces. In this study, such problems are examined and the 'Passive Usage' term is added to the literature by establishing a connection between the problems of endoscopic surgical procedures and similar issues occurred in other domains. The passive usage problem is generalized on different domains for the first time with this study. The results of the study expected to gather up the similar passive usage problems experienced in different domains. Accordingly, the methodologies and studies that are conducted in different research areas may lead to eliminate the Passive Usage problems efficiently. © 2016 IEEE.
  • Conference Object
    Citation - Scopus: 1
    Analyzing the Requirements for E-Government Transition of Iraqi Ics Services: an Iraqi Correction Services Case Study
    (Institute of Electrical and Electronics Engineers Inc., 2017) Alameri,M.A.; Bostan,A.; Akman,I.
    Iraqi Correction Services (ICS) is a department within the Ministry of Justice. Most services are provided through traditional paper and pen system. This system causes delays in service provision time and work over-load on ICS staff which translates into a high cost of service provision. E-government applications represent an opportunity to automate governmental services while improving both effectiveness and efficiency. This work presents the approach taken to determine the priority to automate ICS service from the perspective of service beneficiaries. The research is yet to be completed, however, up to this point we developed four different questionnaire-sets in order to collect the requirements from the shareholders, verified them and implemented the actual survey in the field. The experience gained throughout these steps and the future analysis plan is reported in this paper. © 2017 IEEE.