136 research outputs found

    Performance of limited feedback secure MISO systems in temporally correlated channels

    Get PDF
    25th Signal Processing and Communications Applications Conference, SIU 2017; Antalya; Turkey; 15 May 2017 through 18 May 2017Bu çalışmada, zamanla ilintili kanallarda çoklu anten iletimi ile güvenli haberleşme problemi göz önüne alınmıştır. Güvenlik kapasitesinde kazanç elde etmek için vericide hedeflenen alıcının kablosuz kanal durum bilgisi gereklidir. Bu çalışmada, güvenli çoklu antenli sistemler için kablosuz kanalın zamanda ilintisini kullanan diferansiyel kod kitapçığı içeren bir geri besleme linki sunulmuştur. Farklı kanal ilinti değerleri için güvenlik kapasite performansı gösterilmiştir.We consider the problem of secure communication with multiple antenna transmission in temporally correlated channels. In order to achieve a secrecy gain, a channel state information of the intended receiver at the transmitter is required. In this work, we present a limited feedback link by employing differential codebook which utilizes the temporal correlation properties of the wireless channels for a secure multi-antenna system. The secrecy performances are shown for different channel correlations.TUBITAK (114E626

    FPAA based desıgn and implementation of sprott N chaotic system

    Get PDF
    Nowadays, chaotic systems are used in various studies of different disciplines. Today, chaotic systems are used in various studies of different disciplines. In the literature, chaotic systems with various features have been introduced up to the present. In order to use these new chaotic systems in real-world engineering applications such as encryption, secure communication and authentication, they must be realized besides numerical simulations. In the literature, analog chaotic system implementations have been realized mainly with OPAMP devices. FPGAs and microcontrollers are used mostly in digital designs of chaotic systems. In this study, FPAA (Field Programmable Analog Array) based design and realization of Sprott N chaotic system was carried out. FPAA based design and numerical simulation results confirmed each other. As a result, it has been shown that the Sprott N chaotic system can be used based on FPAA in various engineering applications.Nowadays, chaotic systems are used in various studies of different disciplines. Today, chaotic systems are used in various studies of different disciplines. In the literature, chaotic systems with various features have been introduced up to the present. In order to use these new chaotic systems in real-world engineering applications such as encryption, secure communication and authentication, they must be realized besides numerical simulations. In the literature, analog chaotic system implementations have been realized mainly with OPAMP devices. FPGAs and microcontrollers are used mostly in digital designs of chaotic systems. In this study, FPAA (Field Programmable Analog Array) based design and realization of Sprott N chaotic system was carried out. FPAA based design and numerical simulation results confirmed each other. As a result, it has been shown that the Sprott N chaotic system can be used based on FPAA in various engineering applications

    Lazer Barkod Destekli Cerrahi Alet Takip Sistemi

    Get PDF
    International audienc

    Asymptotically MDS Array BP-XOR Codes

    Get PDF
    Belief propagation or message passing on binary erasure channels (BEC) is a low complexity decoding algorithm that allows the recovery of message symbols based on bipartite graph prunning process. Recently, array XOR codes have attracted attention for storage systems due to their burst error recovery performance and easy arithmetic based on Exclusive OR (XOR)-only logic operations. Array BP-XOR codes are a subclass of array XOR codes that can be decoded using BP under BEC. Requiring the capability of BP-decodability in addition to Maximum Distance Separability (MDS) constraint on the code construction process is observed to put an upper bound on the maximum achievable code block length, which leads to the code construction process to become a harder problem. In this study, we introduce asymptotically MDS array BP-XOR codes that are alternative to exact MDS array BP-XOR codes to pave the way for easier code constructions while keeping the decoding complexity low with an asymptotically vanishing coding overhead. We finally provide and analyze a simple code construction method that is based on discrete geometry to fulfill the requirements of the class of asymptotically MDS array BP-XOR codes.Comment: 8 pages, 4 figures, to be submitte

    Asymptotically MDS Array BP-XOR Codes

    Get PDF
    Belief propagation or message passing on binary erasure channels (BEC) is a low complexity decoding algorithm that allows the recovery of message symbols based on bipartite graph prunning process. Recently, array XOR codes have attracted attention for storage systems due to their burst error recovery performance and easy arithmetic based on Exclusive OR (XOR)-only logic operations. Array BP-XOR codes are a subclass of array XOR codes that can be decoded using BP under BEC. Requiring the capability of BP-decodability in addition to Maximum Distance Separability (MDS) constraint on the code construction process is observed to put an upper bound on the maximum achievable code block length, which leads to the code construction process to become a harder problem. In this study, we introduce asymptotically MDS array BP-XOR codes that are alternative to exact MDS array BP-XOR codes to pave the way for easier code constructions while keeping the decoding complexity low with an asymptotically vanishing coding overhead. We finally provide and analyze a simple code construction method that is based on discrete geometry to fulfill the requirements of the class of asymptotically MDS array BP-XOR codes.Comment: 8 pages, 4 figures, to be submitte

    Deployment and Implementation Aspects of Radio Frequency Fingerprinting in Cybersecurity of Smart Grids

    Get PDF
    Smart grids incorporate diverse power equipment used for energy optimization in intelligent cities. This equipment may use Internet of Things (IoT) devices and services in the future. To ensure stable operation of smart grids, cybersecurity of IoT is paramount. To this end, use of cryptographic security methods is prevalent in existing IoT. Non-cryptographic methods such as radio frequency fingerprinting (RFF) have been on the horizon for a few decades but are limited to academic research or military interest. RFF is a physical layer security feature that leverages hardware impairments in radios of IoT devices for classification and rogue device detection. The article discusses the potential of RFF in wireless communication of IoT devices to augment the cybersecurity of smart grids. The characteristics of a deep learning (DL)-aided RFF system are presented. Subsequently, a deployment framework of RFF for smart grids is presented with implementation and regulatory aspects. The article culminates with a discussion of existing challenges and potential research directions for maturation of RFF.publishedVersio

    Scene text dataset in Turkish

    Get PDF
    25th Signal Processing and Communications Applications Conference, SIU 2017; Antalya; Turkey; 15 May 2017 through 18 May 2017Manzara metni tespit etme ve tanıma gerçek dünya imgelerinden anlamlı içerik çıkarmada ve bu imgelerden olu-şan büyük veri kümelerinde aranan metni bulup getirmede büyük kolaylık sağladığından araştırmacılardan artan bir ilgi görmektedir. Buna rağmen, bu alanda yaygın olarak kullanılan imge kümelerinin büyük kısmı İngilizce metinler içerdiklerinden yapılan çalışmalar tek dil ile kısıtlı kalmıştır. Buradan yola çıkarak, geliştirilen manzara metni tespit etme ve tanıma teknolojilerinin Türkçe metinlere uygulanması, performanslarının analiz edilmesi ve Türkçe’ye özgün algoritmaların geliştirilmesi amacıyla literatürde ilk kez bir Türkçe manzara metni veri kümesi oluşturulmuştur. Bu bildiride, kısaca STRIT (Scene Text Recognition In Turkish) olarak adlandırılan veri kümesinin içeriği anlatılmaktadır. Buna ek olarak, Türkçe manzara tespiti ve tanınması için iki taban çizgisi yöntemi denenmekte ve ön sonuçlar takdim edilmektedir.Scene text localization and recognition keeps attracting an increasing interest from researchers due to its valuable advantage in extracting content from real world images and in image retrieval via text search. Nevertheless, due to the fact that the majority of the image datasets that are commonly used in this field is comprised of text in English, the related studies have mostly been limited to a single language. On that account, in order to apply the technologies developed for scene text detection and recognition to Turkish scene text, analyze their performances and to develop Turkish language specific algorithms, a Turkish scene text database is collected for the first time in the literature. In this paper, the contents of this database, shortly called STRIT (Scene Text Recognition In Turkish), are detailed. Additionally, two baseline methods are tested to detect and recognize scene text in Turkish and the preliminary results are presented.TUBITAK (BIDEB-114C025

    Wireless Power Charging in Electrical Vehicles

    Get PDF
    Wireless Power Transfer (WPT) technology can transfer electrical energy from a transmitter to a receiver wirelessly. Due to its many advantages, WPT technology is a more adequate and suitable solution for many industrial applications compared to the power transfer by wires. Using WPT technology will reduce the annoyance of wires, improve the power transfer mechanisms. Recently, the WPT gain enormous attention to charging the on-board batteries of the Electric Vehicle (EV). Several well-known car manufacturing companies start efforts to adopt WPT technology and enhance its features. Therefore, WPT can be achieved through the affordable inductive coupling between two coils named a transmitter and a receiver coil. In EV charging applications, transmitter coils are located underneath the road, and receiver coils are installed in the EV. The inductive WPT of resonant type is generally applied to medium-high power transfer applications like EV charging because it achieves better energy efficiency. In this chapter, various WPT technologies are discussed and tested in EV wireless charging applications. Furthermore, extensive information is given to developing an advanced WPT technology that can transfer maximum power by achieving maximum efficiency

    Efficient Turkish tweet classification system for crisis response

    Get PDF
    This paper presents a convolutional neural networks Turkish tweet classification system for crisis response. This system has the ability to classify the present information before or during any crisis. In addition, a preprocessing model was also implemented and integrated as a part of the developed system. This paper presents the first ever Turkish tweet dataset for crisis response, which can be widely used and improve similar studies. This dataset has been carefully preprocessed, annotated, and well organized. It is suitable to be used by all the well-known natural language processing tools. Extensive experimental work, using our produced Turkish tweet dataset and the English dataset ("socialmediadisaster-tweets-relevent"), has been performed to illustrate the performance of the developed approach. In addition, vector space model (VSM) techniques were studied to find out the most suitable technique that can be used for the Turkish language. Overall, the developed approach has achieved a quite good performance, robustness, and stability when processing both Turkish and English languages. Our experiments also compare the performance with some stateof-the-art English language systems, such as "CREES" and "deep multimodal"
    corecore