Filtreler
Filtreler
Bulunan: 90 Adet 0.003 sn
Koleksiyon [16]
Tam Metin [2]
Yayın Türü [3]
Yazar [20]
Yayın Yılı [6]
Konu Başlıkları [20]
Yayın Dili [2]
Dergi Adı [20]
Araştırmacılar
Yayınlar
Derivation of the closed-form BER expressions for DL-NOMA over Nakagami-m fading channels [Nakagami-m sönümlemeli kanallarda DL-NOMA için kapali-form BHO ifadelerinin türetilmesi]

Kara F. | Kaya H.

Konferans nesnesi | 2018 | 26th IEEE Signal Processing and Communications Applications Conference, SIU 2018 , pp.1 - 4

NOMA is as a strong candidate for the Future Radio Access Network (FRA) due to its potential to support massive connectivity and high spectral efficiency. However, the most important drawback of NOMA is the error during Successive Interference Canceller (SIC) is implemented because of the inter-user interferences. In this paper, we derive closed-form exact Bit-Error Rate expressions for Downlink(DL) NOMA over Nakagami-m fading channels in the presence of SIC errors. The derived expressions are validated by the computer simulations. It is shown that the m parameter still represents the diversity order like as OMA systems. Besides, th . . .e BER performances of users for NOMA have substantially depended on the power allocation coefficient. © 2018 IEEE Daha fazlası Daha az

Threshold-Based Selective Cooperative-NOMA

Kara F. | Kaya H.

Makale | 2019 | IEEE Communications Letters23 ( 7 ) , pp.1263 - 1266

In this letter, we propose threshold-based selective cooperative-NOMA (TBS-C-NOMA) to increase the data reliability of conventional cooperative-NOMA (C-NOMA) networks. In TBS-C-NOMA, the intra-cell user forwards the symbols of cell-edge user after successive interference canceler (SIC) only if the signal-to-interference plus noise ratio (SINR) is greater than the pre-determined threshold value. Hence, the data reliability of the cell-edge user is increased by eliminating the effect of the error propagation. We derive closed-form end-to-end exact bit error probability (BEP) of the proposed system for various modulation constellations . . .. Then, the optimum threshold value is analyzed in order to minimize the BEP. The obtained expressions are validated via simulations and it is revealed that the TBS-C-NOMA outperforms C-NOMA and full diversity order is achieved. © 2019 IEEE Daha fazlası Daha az

Occupancy detection from temperature, humidity, light, CO2 and humidity ratio measurements using machine learning techniques [Makine Ögrenmesi Teknikleri ile Sicaklik, Nem, Aydinlik Seviyesi, CO2 ve Nem Orani Ölçümlerinden Varlik Tespiti]

Palabas T. | Eroglu K.

Konferans nesnesi | 2018 | 26th IEEE Signal Processing and Communications Applications Conference, SIU 2018 , pp.1 - 4

Order to save energy and to use energy resources efficiently, automatic occupancy determination based on sensor information is performed and energy is adjusted according to the demand in a closed area. In this study is used records consisting of T (temperature), H (humidity), L (light level), CO2 (carbon dioxide) and R (humidity ratio) sensor data. Occupancy analysis based on sensor data has been performed with REPTree (Reduced Error Pruning tree), NB (Naive Bayes), SVM (Support Vector Machine) and KNN (K Nearest Neighbor) classification algorithms. The highest classification success (97.98%) was obtained with the REPTree classifica . . .tion algorithm. Then the importance of the attributes is determined by the CFS (Correlation-based Feature Selection) algorithm to be taken into account in reducing costs in the data collection step and the effect of the attributes on the classification performance is examined. Finally, ensemble algorithms Adaboost, Bagging, RandomSubSpace are used to increase classification success and achieve more stable results. The performance evaluation criteria are shown that the ensemble algorithms improve the classification success. The highest classification success (98.28%) was obtained by using the Adaboost community algorithm together with the ADTree classifier. According to the sensor values in the dataset, the use of office room was determined with high success rate. © 2018 IEEE Daha fazlası Daha az

Using wigner-ville distribution in ECG arrhythmia detection for telemedicine applications

Akdeniz F. | Kayikçioglu I. | Kaya I. | KayikçIoglu T.

Konferans nesnesi | 2016 | 2016 39th International Conference on Telecommunications and Signal Processing, TSP 2016 , pp.409 - 412

While the world's population is growing, average life expectancy is increasing. As a result, the growing elderly population is profoundly affecting the delivery of healthcare for everyone and in particular for those with chronic diseases. The remote monitoring of chronic patients may be achieved by a telemedicine system utilizing today's information and mobile communication technologies. In this study, an ECG arrhythmia detection algorithm based on Wigner-Ville distribution is proposed. The performance of the method is tested on a large dataset obtained from the PhysioNet database. Compared to other studies, the proposed method yiel . . .ds better accuracy, sensitivity and specificity results. Furthermore the computation time is suitable for telemedicine applications. © 2016 IEEE Daha fazlası Daha az

Investigation of the effect of interpolation on noisy images with filtering methods [Gürültülü görüntü üzerinde interpolasyon etkisinin filtre yöntemleri ile incelenmesi]

Tanyeri U. | Incetas M.O. | Aydemir Z.

Konferans nesnesi | 2017 | 2017 25th Signal Processing and Communications Applications Conference, SIU 2017 , pp.409 - 412

Interpolation techniques are used to obtain values that are unknown from known values in functions whose variation is within a certain range. Image processing methods use the same approaches when enlarging and reducing the image. However, some corruptions can be seen in the result image. Likewise, there are degradations due to environmental factors or sensors in the process of acquiring or moving images. This study investigates the filtering performance in interpolated noisy images where both states are active and discusses the situation in interpolated distorted pictures. © 2017 IEEE.

A survey on security threats and authentication approaches in wireless sensor networks

Karakaya A. | Akleylek S.

Konferans nesnesi | 2018 | 6th International Symposium on Digital Forensic and Security, ISDFS 2018 - Proceeding2018-January , pp.1 - 4

Wireless sensor networks (WSN) are networks in which data obtained by observing the environment by a large number of sensors deployed in a specific area are sent securely to other sensors or centers in the network. These networks have the abilities of being not connected to a central node, self-managing and healing, not being connected to a specific network topology, multi-way routing, preserving the integrity and confidentiality of data, and being robust. Today's ongoing work: designing sensors that are resistant to harsh weather conditions, reducing energy consumption, designing low-cost sensors with high capacities, and making da . . .ta flow faster and safer. The data obtained from the sensors must be transmitted safely to the target. Wireless sensor networks have a large number of attack types (Sybil, Wormhole, Sinkhole, etc.) that threaten data flow. While designing security policies, a general structure is aimed at eliminating some or all of the attacks. For this reason, policies based on information security principles such as privacy, integrity, availability, authentication and non-repudiation have been developed. In this paper, current problems are assessed in the security of wireless sensor networks, and authentication security policies are discussed. © 2018 IEEE Daha fazlası Daha az

Wigner-Ville distribution based ECG arrhythmia detection for telemedicine applications [Tele-Tip Uygulamalari için Wigner-Ville Dagilim Esasli EKG Aritmi Belirleme]

Kayikcioglu I. | Akdeniz F. | Kayikcioglu T.

Konferans nesnesi | 2016 | 2016 24th Signal Processing and Communication Application Conference, SIU 2016 - Proceedings , pp.2045 - 2048

While the world's population is growing, average life expectancy is increasing. As a result, the growing elderly population is profoundly affecting the delivery of healthcare for everyone and in particular for those with chronic diseases. The remote monitoring of chronic patients may be achieved by a telemedicine system utilizing today's information and mobile communication technologies. In this study, an ECG arrhythmia detection algorithm based on Wigner-Ville distribution is developed. The performance of the method is tested on data obtained from the PhysioNet database. © 2016 IEEE.

Hammerstein model performance of three axes gimbal system on Unmanned Aerial Vehicle (UAV) for route tracking [Rota takibinde insansiz hava araci üzerinde bulunan üç eksenli yalpa sisteminin hammerstein model başarimi]

Altan A. | Hacioglu R.

Konferans nesnesi | 2018 | 26th IEEE Signal Processing and Communications Applications Conference, SIU 2018 , pp.1 - 4

In this study, focuses on the non-linear Hammerstein model under external disturbance with white Gaussian noise based on the experimental input (motor velocities) and output (end effector position) data of the three axes gimbal system on the Unmanned Aerial Vehicle (UAV), which is autonomously moving for route tracking. The performance of UAV in reaching the target point on a planned route in sinusoidal form in avoiding obstacles, depends on the route tracking performance of the three axes gimbal system on the UAV. In intelligence activities such as exploration and surveillance, Hammerstein and Nonlinear AutoRegressive and Moving Av . . .erage (NARMA) models of the gimbal system with great importance for UAV that real time image transmission and in the tasks of leaving payloads to targets with unknown coordinates with the least mistake are obtained. The parameters of the obtained models are estimated by Recursive Least Squares (RLS) algorithm and the model performances are compared. © 2018 IEEE Daha fazlası Daha az

Automatic transcription of open string notes from violin recordings [Keman Kayitlarindan Boş Tel Notalarinin Otomatik Transkripsiyonu]

Avci K. | Acuner T.S.

Konferans nesnesi | 2017 | 2017 25th Signal Processing and Communications Applications Conference, SIU 2017 , pp.1 - 4

In this paper, a study which automatically detects four open string notes of the violin from the recorded violin sounds is presented for the purpose of using in the beginner level violin education. First, in order to be able to analyze the violin sound recordings, it is necessary for the music piece to be segmented into the notes forming the music piece itself. For this, it is necessary to correctly determine the starting times (onsets) of the notes. Because of the envelope characteristic that the violin sound has, it is more difficult to detect the note onset than other musical instrument sounds such as piano and guitar. By using t . . .he complex spectral difference method, the note onsets were determined, then by determining the fundamental frequency the note of the violin sound was found. The proposed system was applied to the open string sound tracks obtained from eight people by using the iPad-based professional recording system, and the results showed that the proposed system worked successfully. © 2017 IEEE Daha fazlası Daha az

Online dead body detection experiment with an unmanned underwater vehicle [Bir insansiz sualti araci ile çevirimiçi ceset tanilama deneyi]

Berik M. | Kartal S.K.

Konferans nesnesi | 2018 | 26th IEEE Signal Processing and Communications Applications Conference, SIU 2018 , pp.1 - 4

In this study, real-time online body detection under water was conducted using an unmanned underwater observation tool. According to the underwater position of the vehicle, data from the vehicle camera is provided to identify different body parts of a body in a real-time video stream. Here we present an approach for underwater human body detection based on the use of highly educated classifiers. The algorithm's performance in real time video shooting of the car is optimized to reduce the false positive rate by aiming to identify a corpse part of each picture frame. According to the results obtained, it was ensured that the corpse pa . . .rts were successfully detected under changing conditions with incorrect positive perception. Algorithms were developed using the Pyhton program. © 2018 IEEE Daha fazlası Daha az

Performance analysis of fuzzy logic controllers having Mamdani and Takagi-Sugeno inference methods by using unique software and toolbox [Mamdani ve Takagi-Sugeno Çikarim Yöntemlerine Sahip Bulanik Mantik Denetleyicilerin Özgün Yazilim ve Araç Kutusu Performans Analizi]

Unsal S. | Aliskan I.

Konferans nesnesi | 2017 | 2016 National Conference on Electrical, Electronics and Biomedical Engineering, ELECO 2016 , pp.237 - 241

Fuzzy logic controllers are structurally consisted of fuzzification, rule based inference mechanism and defuzzification units. Membership functions and inference methods are important factors that directly effect the performance of controller. In the literature, there are several membership functions and inference methods in different structures. In the performed study, speed control of permanent magnet synchronous motor has been made with fuzzy logic controllers having Mamdani and Takagi-Sugeno inference methods. In the studies, performances of the fuzzy logic controllers that are realized by using unique softwares and toolboxes ha . . .ve been analyzed under different operating conditions. When the obtained results have been evaluated, It has been seen that designed controllers provide consistent results with each other. © 2016 The Chamber of Turkish Electrical Engineers Daha fazlası Daha az

Use of Support Vector Machines to Predict the Success of Wart Treatment Methods [Sigil Tedavi Yöntemlerinin Basarisinin Tahmininde Destek Vektör Makineleri Kullanimi]

Uzun R. | Isler Y. | Toksan M.

Konferans nesnesi | 2018 | Proceedings - 2018 Innovations in Intelligent Systems and Applications Conference, ASYU 2018 , pp.237 - 241

Warts are virus-based dermatosis that are common in the society. In this study, it was predicted if the method to be applied in the treatment of warts will success or not using a machine learning method. For this purpose, two online and freely available datasets of 180 patients with common warts and plantar warts, who are treated with cryotherapy and immunotherapy methods, were used together. As a result, the algoerithm of support vector machines predicted whether the selected treatment success with an accuracy of 85.46%. © 2018 IEEE.


6698 sayılı Kişisel Verilerin Korunması Kanunu kapsamında yükümlülüklerimiz ve çerez politikamız hakkında bilgi sahibi olmak için alttaki bağlantıyı kullanabilirsiniz.


Bu site altında yer alan tüm kaynaklar Creative Commons Alıntı-GayriTicari-Türetilemez 4.0 Uluslararası Lisansı ile lisanslanmıştır.