2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)最新文献

筛选
英文 中文
Speed Control of DC Motor Using Improved Sine Cosine Algorithm Based PID Controller 基于改进正弦余弦算法的PID控制器的直流电动机速度控制
Serdar Ekinci, B. Hekimoğlu, A. Demirören, Erdal Eker
{"title":"Speed Control of DC Motor Using Improved Sine Cosine Algorithm Based PID Controller","authors":"Serdar Ekinci, B. Hekimoğlu, A. Demirören, Erdal Eker","doi":"10.1109/ISMSIT.2019.8932907","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932907","url":null,"abstract":"Direct current (DC) motors that convert electrical energy into mechanical energy are used in almost every field of industry. Therefore, speed control of DC motor is very important and for this purpose generally proportional + integral + derivative (PID) controllers are preferred. In this study, it is aimed to improve the speed response of DC motor by designing a PID controller tuned by improved sine cosine algorithm (ISCA), namely the ISCA-PID controller. Unlike the original SCA and other meta-heuristic algorithms, the ISCA technique has balanced exploration and exploitation processes. The performance of the proposed ISCA-PID controller was compared with two current approaches in the literature in terms of transient response, frequency response and disturbance load response analyzes. The results of these analyzes confirmed the stability of the proposed ISCA-PID controller and its success in suppressing the disturbance loads.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123923002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Image based guidance for near rendezvous and docking of spacecraft 基于图像的航天器近交会对接制导
Harun Çelik
{"title":"Image based guidance for near rendezvous and docking of spacecraft","authors":"Harun Çelik","doi":"10.1109/ISMSIT.2019.8932816","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932816","url":null,"abstract":"Autonomous, energy saving and survivable systems are crucial for space related systems in order to achieve sustainable goals. In such systems, instead of a single method, alternative and ancillary methods are required to be used to accomplish space missions successfully, and increase independency of operating systems. In this paper, an image based alternative guidance method is investigated. Hence, independent from radio signaling, spacecraft is able to track the target station as soon as the station is detected by the camera which is mounted on spacecraft. Proposed method can be applied purely at near rendezvous phase and docking since the range of camera is constrained. A camera projection model is derived to estimate relative motion of spacecraft by camera parameters. Smooth approach, collision avoidance and energy saving would be achieved by means of the approaching strategy improved by using this image based method.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"402 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123199784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open-Source Web-Based Software for Performing Permutation Tests 用于执行排列测试的基于web的开源软件
Z. Tunç, Şeyma Yaşar, C. Colak
{"title":"Open-Source Web-Based Software for Performing Permutation Tests","authors":"Z. Tunç, Şeyma Yaşar, C. Colak","doi":"10.1109/ISMSIT.2019.8932946","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932946","url":null,"abstract":"In this study, it is aimed to develop a new user-friendly web-based software which can overcome the difficulties of use due to the limitations in the use stages of parametric and non-parametric tests and can easily use the permutation tests which can be used as an alternative to these tests.Shiny, an open-source R package, is used to develop the recommended web software. In the developed software, by selecting \"the Specify Sample Number\" tab, the number of samples presented as \"Single\", \"Two\" and \"More than two\" options is selected and analyzes are made by selecting the appropriate data set from the file upload menu.In this study, in order to show the way the software works and to evaluate its outputs, a data set containing 1000 observations with the standard normal distribution of variables consisting of two variables was used. \"Two Dependent Sample Permutation Tests\" were selected to analyze whether there was any difference between the variables. According to the results, no statistically significant difference was found between the variables.The developed software is a new user-friendly web-based software that can be used to perform the permutation tests in an easy way as an alternative to parametric and non-parametric tests.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114067747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perimeter Network Security Solutions: A Survey 周界网络安全解决方案:调查
Goksel Uctu, M. Alkan, I. Dogru, Murat Dörterler
{"title":"Perimeter Network Security Solutions: A Survey","authors":"Goksel Uctu, M. Alkan, I. Dogru, Murat Dörterler","doi":"10.1109/ISMSIT.2019.8932821","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932821","url":null,"abstract":"Technically, cyber security requires a combination of various engineering disciplines. Ensuring security also requires a multi-disciplinary and multi-layered structure. Similar to OSI or TCP / IP models, which form the basis of network technologies, security should be provided in each layer that creates cyber space. These are perimeter network security, internal network security, endpoint security, data security, policy management and operations. In this study, current peripheral cyber security solutions are discussed; the use of these technologies, their working methods, their development and their future trends have been demonstrated.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114854139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Comparison of Phase-Shifted Carrier PWM Techniques on Cascaded H-Bridge Multilevel Inverters with Unequal DC Voltages 非等直流电压级联h桥多电平逆变器移相载波PWM技术的性能比较
F. Eroǧlu, M. Kurtoglu, A. O. Arslan, Ahmet Mete Vural
{"title":"Performance Comparison of Phase-Shifted Carrier PWM Techniques on Cascaded H-Bridge Multilevel Inverters with Unequal DC Voltages","authors":"F. Eroǧlu, M. Kurtoglu, A. O. Arslan, Ahmet Mete Vural","doi":"10.1109/ISMSIT.2019.8932903","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932903","url":null,"abstract":"In this paper, a comparison of phase-shifted carrier PWM (PSC-PWM) techniques on a three-phase CHB-MLI is presented. First, principles of three different PSC-PWM techniques are investigated in detail in terms of their PWM generations and frequency spectrums. Then, total harmonic distortion and magnitude of the fundamental frequency component parameters are observed for different PSC-PWM techniques on a three-phase CHB-MLI with equal and unequal DC voltages for all phase and line voltages as well as line current.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129975820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification and Success Investigation of Biomedical Data Sets Using Supervised Machine Learning Models 使用监督机器学习模型的生物医学数据集分类和成功研究
Sarmad N. Mohammed, Mehmet Serdar Guzel, E. Bostanci
{"title":"Classification and Success Investigation of Biomedical Data Sets Using Supervised Machine Learning Models","authors":"Sarmad N. Mohammed, Mehmet Serdar Guzel, E. Bostanci","doi":"10.1109/ISMSIT.2019.8932734","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932734","url":null,"abstract":"Nowadays, information technologies are used in almost every field of Computer Science and Engineering. One of the most used areas is the health sector. With the use of digital hospital systems, patient data is now stored in a computerized environment, thereby creating biomedical data sets. These datasets, which are very large in size, are very difficult to analyze and interpret by a human. The machine learning algorithms are mainly used to analyze and interpreted these data sets. In this study, the performances of 5 machine learning algorithms have been compared by employing 5 different biomedical data sets and the results obtained were compared statistically. Results reveal that the KNN algorithm performs better for small biomedical data sets, whereas the ANN algorithm performs better for large data sets in terms of classification problem for the health sector.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130261414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sentence Classification with Deep Learning Method For Virtual Assistant Applications 基于深度学习方法的句子分类虚拟助手应用
Gurur Pi̇rana, A. Sertbas, T. Ensari
{"title":"Sentence Classification with Deep Learning Method For Virtual Assistant Applications","authors":"Gurur Pi̇rana, A. Sertbas, T. Ensari","doi":"10.1109/ISMSIT.2019.8932888","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932888","url":null,"abstract":"This paper investigates three different deep learning method performance for virtual assistant applications about sentence classification. The classification is based in Turkish texts. For three different model we demonstrate the performance of each model. We investigate Convolutional Neural Network (CNN), Region Convolutional Neural Network (RCNN) and Long Short Term Memory (LSTM) deep learning methods and compare the accuracy results of the related models. Furthermore, we aim to select the best classification model for our dataset.We have researched effect of the hyper parameters to model accuracy and we used best hyper parameters for each methods and we aimed to gain best performance for our dataset.This resarch helps applications like virtual assistant with classification of the sentence and giving the output of the class. The output of classification could be a text, image or document. Benefit of this comparsion of the methods we realized that instance number increses the model accuracy. The best method for our dataset was the Convolutional Neural Networks (CNN) with the %87.3 accuracy.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129406339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network Anomaly Detection System using Genetic Algorithm, Feature Selection and Classification 网络异常检测系统采用遗传算法、特征选择和分类
Elif Uysal, Gülnur Demircioğlu, Gulsade Kale, E. Bostanci, M. Güzel, Sarmad N. Mohammed
{"title":"Network Anomaly Detection System using Genetic Algorithm, Feature Selection and Classification","authors":"Elif Uysal, Gülnur Demircioğlu, Gulsade Kale, E. Bostanci, M. Güzel, Sarmad N. Mohammed","doi":"10.1109/ISMSIT.2019.8932750","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932750","url":null,"abstract":"Networks are dangerous environments with containing numerous security vulnerabilities and those vulnerabilities are likely to be used while attacking systems with the intent of stealing valuable information or stopping the services. A system should be protected from already-known types of attacks and also have ability to detect unknown types of attacks to prevent abduction of the information. Unknown types of attacks may give harm to the system by stopping the services that runs effective and stable. For that purpose, it has become necessary to develop a flexible and adaptable system which can collect instant data from the network, distinguish between harmless and harmful behaviors and take measures against them. The main goal of this work is to explain a network anomaly detection system that is developed using genetic algorithm and Weka classification features to fulfill the purposes stated above. The Genetic Algorithm is used to generate various individuals with the aim of determining which attributes of the individual are providing a better result about learning the behavioral pattern of the network traffic. Furthermore, Weka classifiers are applied to the train and test datasets to calculate the best fitness value, and to decide on individual's attributes that are more effective about finding the anomaly occurring in a given instant.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132814548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey on Keyword and Key Phrase Extraction with Deep Learning 基于深度学习的关键词和关键短语提取研究综述
Özlem Kilic, Aydın Çetin
{"title":"A Survey on Keyword and Key Phrase Extraction with Deep Learning","authors":"Özlem Kilic, Aydın Çetin","doi":"10.1109/ISMSIT.2019.8932811","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932811","url":null,"abstract":"With the technological developments, a large amount of data has been produced. Tera bytes of data previously recorded by manpower were digitized with the use of personal computers. As a result, rapidly growing data stacks were formed, making it difficult to find information among these unanticipated data. The need to make sense of this data has made predefined statistical methods more important. It is possible to access the required information from a single document or from the document stacks by means of text mining methods. This problem, which was previously solved mostly by statistical methods or Natural Language Processing (NLP) techniques, has been started to be solved by machine learning algorithms and artificial neural networks. In recent years, deep learning, which is a specialized study area of artificial neural networks, gives better results than the current statistical and NLP methods in many problems and has provided the application of these methods in problems such as machine translation, keyword extraction and summarizing. In this study, deep learning methods used in the extraction of keywords and key phrases are examined.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128883830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Keratinocyte Carcinoma Detection via Convolutional Neural Networks 角化细胞癌的卷积神经网络检测
Ali Serener, Sertan Serte
{"title":"Keratinocyte Carcinoma Detection via Convolutional Neural Networks","authors":"Ali Serener, Sertan Serte","doi":"10.1109/ISMSIT.2019.8932828","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932828","url":null,"abstract":"Skin cancer is the most prevalent form of cancer. Melanoma and non-melanoma, also known as keratinocyte carcinoma, skin cancers have frequent occurrence although melanoma skin cancer is known to be more deadly. Still, keratinocyte carcinoma skin cancers are encountered with higher frequency and come with more numerous types than melanoma. In this paper, an automated method is used to detect the frequently occurring keratinocyte carcinoma skin cancer. The method is based on deep learning, where AlexNet, ResNet-18, and ResNet-50 architectures are employed to classify common malignant pigmented skin lesion images as belonging to basal cell carcinoma, squamous cell carcinoma or keratinocyte carcinoma. A public archive of skin images is used to test and validate the success of the deep learning methods employed. The results show that ResNet-50 architecture gives the best detection results where for keratinocyte carcinoma detection the area under the receiver operating characteristic curve performance of it is 0.80.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114395128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信