10 results
Search Results
Now showing 1 - 10 of 10
Conference Object Citation - Scopus: 1A Framework for Fuzzy Video Content Extraction, Storage and Retrieval(Institute of Electrical and Electronics Engineers Inc., 2010) Koyuncu,M.; Yilmaz,T.; Yildirim,Y.; Yazici,A.This study presents a new comprehensive framework for semantic content extraction from raw video, storage of the extracted data and retrieval of the stored data. Objects, spatial relations between objects, events and temporal relations between events, which are considered as semantic contents of the video, are extracted automatically to a certain extend with the developed approach. Extraction process is supported by manual annotation when automatic extraction is not satisfactory. The extracted information is stored in an intelligent fuzzy object-oriented database in which the database is enhanced with a fuzzy knowledge-based system. Domain specific deduction rules can be defined to derive new information about semantic contents of the video. The database is also supported by an access structure to increase retrieval efficiency. The proposed framework is capable of handling uncertain data arising from annotation process or video nature. © 2010 IEEE.Editorial Acemp-Optim 2019 Opening Speech(Institute of Electrical and Electronics Engineers Inc., 2019) Bulent Ertan,H.[No abstract available]Conference Object Infrared Absorption Spectroscopy of Monolayers With Thin Film Interference Coatings(Institute of Electrical and Electronics Engineers Inc., 2017) Ayas,S.; Bakan,G.; Ozgur,E.; Celebi,K.; Dana,A.We report high performance Infrared spectroscopy platforms based on interference coatings on metal using CaF2 dielectric films and Ge2Sb2Te5 (GST) phase-change films. IR vibrational bands of proteins and organic monolayers are also detected. © 2017 IEEE.Conference Object Citation - Scopus: 5An Application of High-Power Electromagnetic Pulse: Forming of Sheet Metal Using Electromagnetic Waves(Institute of Electrical and Electronics Engineers Inc., 2016) Inanan,G.; Baranoglu,B.; Aydin,E.In this study, the application of high velocity metal forming process by means of electromagnetic field is proposed. Electromagnetic Sheet Metal Forming (ESMF) is a process of forming sheet metal with very high speed (in milliseconds) without mechanical contact using the energy density of a pulsed magnetic field. In this process, deformation of the workpiece is driven by a transient electric current that is induced in a coil using a capacitor bank and discharge switch. This study presents some experiments and their results by examining the effects of different parameters in the proposed ESMF setup. The analysis and modelling of Electromagnetic sheet metal forming (ESMF) process is presented, as well. It has been seen that, it is possible to design a new system using the outcomes of this study. © 2015 Chamber of Electrical Engineers of Turkey.Conference Object Citation - Scopus: 9A Layered Security Architecture for Corporate 802.11 Wireless Networks(Institute of Electrical and Electronics Engineers Inc., 2004) Erten,Y.M.; Tomur,E.In this study we have investigated the security aspects of wireless local area networks and discussed the weaknesses associated with various conventional 802.11 security protocols such as WEP and 802.1x. We propose an architecture to control access to corporate 802.11 wireless networks, based on the privileges and location of users, using the tested wired network components such as VPNs and Firewalls. The presented architecture reduces the security risks in enterprise level deployment of wireless LANs.Conference Object Citation - Scopus: 64Performance Analysis of Ad-Hoc Networks Under Black Hole Attacks(Institute of Electrical and Electronics Engineers Inc., 2007) Dokurer,S.; Erten,Y.M.; Acar,C.E.A wireless ad-hoc network is a temporary network set up by wireless nodes usually moving randomly and communicating without a network infrastructure. Due to security vulnerabilities of the routing protocols, however, wireless ad-hoc networks may be unprotected against attacks by the malicious nodes. In this study we investigated the effects of Black Hole attacks on the network performance. We simulated black hole attacks in Network Simulator 2 (ns-2) and measured the packet loss in the network with and without a black hole. We also proposed a simple solution against black hole attacks. Our solution improved the network performance in the presence of a black hole by about 19%. © 2007 IEEE.Conference Object Citation - Scopus: 19Examination of Ev-Grid Integration Using Real Driving and Transformer Loading Data(Institute of Electrical and Electronics Engineers Inc., 2016) Erden,F.; Kisacikoglu,M.C.; Gurec,O.H.The growing environmental concerns and the increase in oil prices will lead to the proliferation of electric vehicles (EVs) in the near future. The increase in the number of EVs, while providing green and inexpensive solutions to transportation needs, may cause constraints on the operation of the utility grid that should be investigated. In this paper, the real user driving information is collected from individual data tracking devices of passenger vehicle owners instead of assuming randomly distributed trip characteristics. The collected trip data are first analyzed to generate a statistical model of the trip characteristics in terms of home arrival times and state of charge (SOC) levels. The resulting model is then used to simulate and analyze the impact of EV integration in a real grid with different EV penetration levels. For this, real distribution transformer data provided by Başkent Electric Distribution Co. is used. The proposed method produces more realistic results in comparison to the studies assuming random scenarios. © 2015 Chamber of Electrical Engineers of Turkey.Conference Object Citation - Scopus: 5Respiratory Rate Monitoring Using Infrared Sensors(Institute of Electrical and Electronics Engineers Inc., 2016) Erden,F.; Cetin,A.E.Respiratory rate is an essential parameter in many practical applications such as patient and elderly people monitoring. In this paper, a novel contact-free system is introduced to detect the human breathing activity. The system, which consists of two pyro-electric infrared (PIR) sensors, is capable of estimating the respiratory rate and detecting the sleep apnea. Sensors' signals corresponding to the thoracic movements of a human being are sampled using a microprocessor and analyzed on a general-purpose computer. Sampled signals are processed using empirical mode decomposition (EMD) and a new average magnitude difference function (AMDF) is used to detect the periodicity and the period of the processed signals. The resulting period, by using the fact that breathing is almost a periodic activity, is monitored as the respiratory rate. The new AMDF provides a way to fuse the data from the multiple sensors and generate a more reliable estimation of the respiratory rate. © 2015 Chamber of Electrical Engineers of Turkey.Conference Object An Alternative Product Extraction Method for E-Commerce Applications(Institute of Electrical and Electronics Engineers Inc., 2007) Koyuncu,M.Customers generally like to see alternative products and compare their characteristics and prices before deciding on one of them. Therefore, proposing alternative products is one of the crucial issues for e-commerce applications to increase customer satisfaction. This paper proposes a fuzzy similarity-based approach to determine similar products recorded in a database and submit them intelligently to the customer in a ranked way as alternative products. © 2007 IEEE.Conference Object A Layered Security Architecture for Corporate 802.11 Wireless Networks(Institute of Electrical and Electronics Engineers Inc., 2004) Erten,Y.M.; Tomur,E.In this study we have investigated the security aspects of wireless local area networks and discussed the weaknesses associated with various conventional 802.11 security protocols such as WEP and 802.1x. We propose an architecture to control access to corporate 802.11 wireless networks, based on the privileges and location of users, using the tested wired network components such as VPNs and Firewalls. The presented architecture reduces the security risks in enterprise level deployment of wireless LANs.

