{"title":"Retracted: Fabrication and Sc-Refinement of SiCp/A356 Composites by Vacuum Stirring Casting Method","authors":"Journal of Electrical and Computer Engineering","doi":"10.1155/2023/9878434","DOIUrl":"https://doi.org/10.1155/2023/9878434","url":null,"abstract":"<jats:p />","PeriodicalId":23352,"journal":{"name":"Turkish J. Electr. Eng. Comput. Sci.","volume":"79 1","pages":"9878434:1-9878434:1"},"PeriodicalIF":0.0,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72702117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Filtering Algorithm for Positioning Accuracy of the Logistics Tracking System Based on the 3D Virtual Warehousing Logistics Demonstration System","authors":"Journal of Electrical and Computer Engineering","doi":"10.1155/2023/9843297","DOIUrl":"https://doi.org/10.1155/2023/9843297","url":null,"abstract":"<jats:p />","PeriodicalId":23352,"journal":{"name":"Turkish J. Electr. Eng. Comput. Sci.","volume":"238 ","pages":"9843297:1-9843297:1"},"PeriodicalIF":0.0,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91459240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Inbound Tourists' Perception of Tourist Destination Image Classified by UGC Picture Computer Program","authors":"Journal of Electrical and Computer Engineering","doi":"10.1155/2023/9812672","DOIUrl":"https://doi.org/10.1155/2023/9812672","url":null,"abstract":"<jats:p />","PeriodicalId":23352,"journal":{"name":"Turkish J. Electr. Eng. Comput. Sci.","volume":"44 1","pages":"9812672:1-9812672:1"},"PeriodicalIF":0.0,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86379431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. K. Dash, B. P. De, P. Samanta, B. Appasani, R. Kar, D. Mandal, N. Bizon
{"title":"Optimal Design of Voltage Reference Circuit and Ring Oscillator Circuit Using Multiobjective Differential Evolution Algorithm","authors":"S. K. Dash, B. P. De, P. Samanta, B. Appasani, R. Kar, D. Mandal, N. Bizon","doi":"10.1155/2023/7621594","DOIUrl":"https://doi.org/10.1155/2023/7621594","url":null,"abstract":"This paper deals with the optimal design of different VLSI circuits, namely, the CMOS voltage reference circuit and the CMOS ring oscillator (RO). The optimization technique used here is the multiobjective differential evolution algorithm (MDEA). All the circuits are designed for 90 nm technology. The main objective of the CMOS voltage reference circuit is to minimize the voltage variation at the output. The targeted value of the reference voltage is 550 mV. A CMOS ring oscillator (RO) is designed depending on the performance parameters such as power consumption and phase noise. The optimal transistor sizing of each circuit is obtained from MDEA. Each circuit is implemented in SPICE by taking the optimal dimensions of the transistors, and the performance parameters are achieved. The designed voltage reference circuit achieves a reference voltage of 550 mV with 600 nW power dissipation. The reference voltage variation of 8.18% is observed due to temperature variation from −40°C to + 125°C. The MDEA-based optimal design of RO oscillates at 2.001 GHz frequency, has a phase noise of −87 dBc/Hz at 1 MHz offset frequency, and consumes 71 μW power. This work mainly aims to optimize the MOS transistors’ sizes using MDEA for better circuit performance parameters. SPICE simulation has been carried out by using the optimal values of MOS transistor sizes to exhibit the performance parameters of the circuit. Simulation results establish that design specifications are closely met. SPICE results show that MDEA is a better technique for the optimal design of the above-mentioned VLSI circuits.","PeriodicalId":23352,"journal":{"name":"Turkish J. Electr. Eng. Comput. Sci.","volume":"65 1","pages":"7621594:1-7621594:11"},"PeriodicalIF":0.0,"publicationDate":"2023-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75929897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rabiaa Gadal, Aziz Oukennou, F. E. Mariami, Abdelziz Belfqih, Naima Agouzoul
{"title":"Voltage Stability Assessment and Control Using Indices and FACTS: A Comparative Review","authors":"Rabiaa Gadal, Aziz Oukennou, F. E. Mariami, Abdelziz Belfqih, Naima Agouzoul","doi":"10.1155/2023/5419372","DOIUrl":"https://doi.org/10.1155/2023/5419372","url":null,"abstract":"The problem of voltage stability is becoming a more acute and indispensable topic given the major and sensitive role it plays in the electrical system. It can be considered a major factor in the initiation of blackouts around the world. Hence, the need for reliable and fast tools to detect and control the approach of instability points throughout the network, namely, voltage stability indices and flexible alternating current transmission systems (FACTS) devices for the control and management of the electrical network. In this paper, an update on the existing blackouts in the world has been presented. Based on the brief overview of the most significant definitions of voltage stability presented in this work, a new definition of voltage stability has been proposed. A detailed comparative study on voltage stability analysis methods has been conducted. Furthermore, an exhaustive discussion on the various voltage stability indices and FACTS devices existing in the literature with their contribution to voltage stability prediction and improvement has been proposed.","PeriodicalId":23352,"journal":{"name":"Turkish J. Electr. Eng. Comput. Sci.","volume":"180 1","pages":"5419372:1-5419372:18"},"PeriodicalIF":0.0,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72558280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Access Control Mechanism (AACM) for Enterprise Cloud Computing","authors":"Amardeep Kaur, A. Verma","doi":"10.1155/2023/3922393","DOIUrl":"https://doi.org/10.1155/2023/3922393","url":null,"abstract":"Enterprise cloud computing provides various services to enterprises, but access to these services is controlled by a firewall. The firewall determines the actions and operations a legitimate user can perform on the available resources. Access control policies allow or restrict access to resources, and they also keep a record of attempted access. In the role-based access control model, access to resources is based on a user’s role in the enterprise. As resources are limited, the policy manager has to create policies that optimize resource availability to different roles to improve overall resource utilization. However, this optimization is challenging without prior knowledge of user behaviour and resource requirements for each role. Due to insufficient knowledge, some resources may be available to the wrong roles, while others may be required by other roles but are inaccessible. This results in decreased resource utilization, requiring the redefinition of access control policies with optimal resource availability. The optimal allocation of resources can be achieved by analyzing user behaviour under different roles. The study proposes a novel method for access control that utilizes role profiling and redefines access control policies for different roles to optimize resource availability. Formal methods are employed to ensure accurate system behaviour in software and hardware systems. Formal specifications provide a high-level representation of system behaviour and characteristics. This paper proposes formal specifications using the “Z” language to ensure accurate system behaviour in access control mechanisms. The proposed mechanism is implemented in a simulated environment and validated using four variants of the recommender approach. The study concludes that the proposed mechanism consistently enhances operational capability, minimizing over- and under-allocation of resources to roles and improving overall resource utilization within the enterprise. The proposed method is beneficial in dynamic environments where the system must adapt to evolving scenarios.","PeriodicalId":23352,"journal":{"name":"Turkish J. Electr. Eng. Comput. Sci.","volume":"25 1","pages":"3922393:1-3922393:30"},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86955746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Comprehensive Evaluation Model of Project Investment Risk Based on Computer Vision Technology","authors":"Hongjian Wang","doi":"10.1155/2023/5501265","DOIUrl":"https://doi.org/10.1155/2023/5501265","url":null,"abstract":"With the development of the economy and real-time embedded systems and the progress of science and technology, people’s economic income forms have undergone tremendous changes, and the concept of financial management has become clearer in people’s property income arrangements. Project investment is one of the most popular financial management methods in the era of big data. Both large enterprise groups and individual petty bourgeoisie groups have begun to pay attention to the risks and benefits brought by the new financial management method of project investment. This paper’s goal is to develop a fuzzy comprehensive evaluation (FCE) model for project investment risk based on computer vision technology and explore the application of computer vision technology in project investment risk evaluation. This article first uses a real-time embedded system to understand the basic process of project investment and select 10 investment experts for risk assessment, risks, and causes of the risks through literature research and case analysis. Then, this paper establishes a model of fuzzy comprehensive evaluation of project investment risk through computer vision technology, real-time embedded systems, and neural network models in big data and artificial intelligence technology to realize the analysis and prediction of project investment risk. The fuzzy comprehensive evaluation method and analytic hierarchy process (AHP) are used in this evaluation model to evaluate and forecast project investment risks. In addition, this paper also trains and tests the risk evaluation model of this research through the support vector machine classification algorithm, the real-time embedded system, and the average random consistency index. The research shows that the fuzzy comprehensive evaluation model of this study has higher accuracy for project investment risk evaluation than other risk evaluation methods. For example, for the investment risk of chemical fiber projects, this research model evaluated the factors such as organization, management, technology, and economy and found that the risks were all higher than 21.36%, which concluded that the overall investment risk of chemical fiber projects was relatively high.","PeriodicalId":23352,"journal":{"name":"Turkish J. Electr. Eng. Comput. Sci.","volume":"23 1","pages":"5501265:1-5501265:10"},"PeriodicalIF":0.0,"publicationDate":"2023-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86107527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk Probabilistic Characteristics for Contaminated Porcelain Insulator in the Egyptian Sinai Desert","authors":"M. El-Shahat, I. Al-Naimi, E. Tag-eldin","doi":"10.1155/2023/6662939","DOIUrl":"https://doi.org/10.1155/2023/6662939","url":null,"abstract":"Transmission lines in the desert are exposed to the desert environment, which includes sandstorms as one of its hallmarks. A conductive layer develops with prolonged sand deposition and the presence of moisture, ambient humidity, and dew. The ensuing leakage current causes surface discharge, which limits the life of the insulator and interrupting the power supply. The locations of power lines in the Egyptian Sinai desert, where sandstorms are known to occur frequently, are exposed to such a risk. In order to estimate the danger of insulator failure, this paper studies the flow of leakage current on porcelain insulators that have been contaminated with sand. This work relies on accurate data collected and published in a prior study regarding Sinai, which mainly focused on contaminating sand’s grain sizes. Porcelain insulator is simulated using finite element method to determine the leakage current that results on its contaminated surface. The probabilistic characteristics of the insulator’s leakage current are derived using Monte Carlo technique, allowing for the risk assessment of insulator failure. This assessment can be used to justify the suitability of using this kind of insulator in Sinai.","PeriodicalId":23352,"journal":{"name":"Turkish J. Electr. Eng. Comput. Sci.","volume":"2 1","pages":"6662939:1-6662939:7"},"PeriodicalIF":0.0,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86426676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Well-conditioned T-matrix formulation for scattering by a dielectric obstacle","authors":"M. E. Hatipoğlu, F. Dikmen","doi":"10.55730/1300-0632.4011","DOIUrl":"https://doi.org/10.55730/1300-0632.4011","url":null,"abstract":": The classic formulation of the extended boundary condition method is revisited to inject the regularization operators for the unknown coefficients of the eigen-function expansions for the travelling and standing waves throughout the dielectric scatterer. It is shown that, using the new definitions, the existing algorithm of the scattering field calculation can be kept the same for its well-conditioned version. This is exemplified for scalar 2D problems for both TM and TE polarization under illumination of a line source. The condition numbers of the matrix operators in the new version of the algorithm are drastically reduced when the regularization interfaces are eigen-surfaces of the field expansions, i.e. circles on extended boundaries in the counter null-fields. The arbitrariness of the boundary interface is involved in the calculations, via parameterized contours and effects of elongation and corrugation of the interface boundary contour on the condition of the algorithm is extensively discussed in comparison with the results of the boundary integral equation formulation of the same problem.","PeriodicalId":23352,"journal":{"name":"Turkish J. Electr. Eng. Comput. Sci.","volume":"31 1","pages":"693-705"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82070897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Unet segmentation performance using an ensemble model in images containing railway lines","authors":"Mehmet Sevi, I. Aydin","doi":"10.55730/1300-0632.4014","DOIUrl":"https://doi.org/10.55730/1300-0632.4014","url":null,"abstract":": This study aims to make sense of the autonomous system and the railway environment for railway vehicles. For this purpose, by determining the railway line, information about the general condition of the line can be obtained along the way. In addition, objects such as pedestrian crossings, people, cars, and traffic signs on the line will be extracted. The rails and the rail environment in the images will be segmented with a semantic segmentation network. In order to ensure the safety of rail transport, computer vision, and deep learning-based methods are increasingly used to inspect railway tracks and surrounding objects. In particular, the extraction of objects around the railway line has become an important task. The dataset contains images of the railway line and its surroundings, which were obtained in changing environmental conditions, at different times of the day, and under poor lighting conditions. In this study, a new method is proposed for the extraction of objects in and around the railway line. The proposed approach first applied Unet-based segmentation methods on the dataset. Then, a method that improves Unet performance based on the ensemble model is proposed. ResNet34, MobileNetV2, and VGG16 backbones were used to improve segmentation performance. The proposed model is based on the ensemble decision-making process, significantly contributing to the semantic segmentation task. Experimental results of the developed model show that it gives 85% accuracy rate and 54% average IoU results.","PeriodicalId":23352,"journal":{"name":"Turkish J. Electr. Eng. Comput. Sci.","volume":"111 1","pages":"739-750"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74907702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}