27 research outputs found

    SCSO: A novel sine-cosine based swarm optimization algorithm for numerical function optimization

    Get PDF
    Many swarm optimization algorithms have been presented in the literature and these algorithms are generally nature-inspired algorithms. In this paper a novel sine-cosine based particle swarm optimization (SCSO) is presented. In SCSO, firstly particles are generated randomly in the search space. Personal best value and velocity of the particles are calculated and by using step. Calculated velocity is used for updating particles. The proposed algorithm is basic algorithm and approximately 30 rows MATLAB codes are used to implement the proposed algorithm. This short code surprisingly has high optimization capability. In order to evaluate performance and prove success of this algorithm, 14 well known numerical functions was used and the results illustrate that the proposed algorithm is successful in numerical functions optimization

    A Tunable-Q wavelet transform and quadruple symmetric pattern based EEG signal classification method

    Get PDF
    Electroencephalography (EEG) signals have been widely used to diagnose brain diseases for instance epilepsy, Parkinson's Disease (PD), Multiple Skleroz (MS), and many machine learning methods have been proposed to develop automated disease diagnosis methods using EEG signals. In this method, a multilevel machine learning method is presented to diagnose epilepsy disease. The proposed multilevel EEG classification method consists of pre-processing, feature extraction, feature concatenation, feature selection and classification phases. In order to create levels, Tunable-Q wavelet transform (TQWT) is chosen and 25 frequency coefficients sub-bands are calculated by using TQWT in the pre-processing. In the feature extraction phase, quadruple symmetric pattern (QSP) is chosen as feature extractor and extracts 256 features from the raw EEG signal and the extracted 25 sub-bands. In the feature selection phase, neighborhood component analysis (NCA) is used. The 128, 256, 512 and 1024 most significant features are selected in this phase. In the classification phase, k nearest neighbors (kNN) classifier is utilized as classifier. The proposed method is tested on seven cases using Bonn EEG dataset. The proposed method achieved 98.4% success rate for 5 classes case. Therefore, our proposed method can be used in bigger datasets for more validation

    Tent Map based Optimization Method

    Get PDF
    In the real life, some problems cannot be solved using mathematical methods. Meta-heuristic optimization methods are usually used to solve these problems. One of the solutions used to increase the performance of meta-heuristic optimization methods is the use of chaotic maps. Chaos is a phenomenon of nonlinear methods. In this article, a new chaotic optimization method is proposed by using a tent map which is one of the frequently used chaotic maps. The proposed method is a particle-based method, which consists of random particle creation, best-fit calculation, particle update, and best-value update. The tent map is used during the particle update phase. In order to test the performance of the proposed method, 12 numerical comparison functions, which are frequently used in the literature, were used and the results obtained were compared with previously proposed and widely used optimization methods in the literature. Experimental results and comparisons show that the proposed method is a successful optimization method

    A New Subtraction Based Simplifying Method on Karnaugh Map

    No full text
    Karnaugh map is one of the methods that are widely used to simplify boolean expressions by using neighborhoods. The most important advantage provided by K-Map is to realize an electronic circuit with a minimum number of physical gates. K-Map is one of the most important subjects of electronic and logic courses, but students sometimes can not identify groups when simplifying using K-Map. In this study, inputs were added to easily identify large groups with KMap. With the addition of elements, large groups can be detected easily. Once large groups have been identified, the added elements have been removed to obtain the true expression. Only logical addition (OR) and logical multiplication (AND) operations are used for simplification on the K-Map. This paper demonstrates that the subtraction process of K-Maps can be done and proved by using De-Morgan theorem. In this study, subtraction is performed on K-Map for the first time in the literature up to now and an effective subtraction-based simplification method is proposed for K-Maps. De Morgan theorem and experimental results show the correctness of the proposed method

    Block-based fuzzy-image authentication method

    No full text

    The Importance of Keeping Network Devices under Control in Big Networks for Network Forensics

    No full text
    Network forensics is to capture, record and analyze security attacks and other problems, which might occur on the network. Network forensics is accepted as a sub-branch of digital forensics. Also, it is possible to consider network device forensics as a sub-branch of network forensics. In order to determine whether there is a crime or not, it is not enough to take and scrutinize entire information in the personal computer of suspicious users. The data traffic on the network is significant to be on record before and after the case. It is extremely important to take necessary security measures on network devices so that those records are not damaged. For the purpose of satisfying the necessities which might arise, the network should always be kept under control of the network administrator –before and after the case of digital forensics-. In addition, any activity without the administrator’s knowledge should be prohibited. Especially, following information is crucial to be recorded in order to keep the network under control: • Usage frequency of ports existing in the network devices which are used as switches • The information about whether different devices are in action on the same port at different times or not • Which ports are not used for a long time • Which ports are uplink ports • How many Mac addresses are seen behind the port • The information about vLan (Virtual Local Area Network) numbers on the port. Devices connected on the network should be automatically and periodically detected and reported. Besides, being able to show location of connected devices is another issue that facilitates the network management. Together with so many open-source codes which are practicable for network management, netdisco software is used in order to carry out the processes mentioned above. Tests are executed on a university campus which has 150 manageable switch devices

    Kurumsal Ağlar İçin Beş Katmanlı Güvenlik Politikası

    No full text
    Bu çalışmada büyük ağ yapılarına sahip kurumsal yapılarda siber güvenlik tehlikelerine karşı alınacak önlemlerin nasıl olması gerektiğinden bahsedilmektedir. Kurumsal yapı içerisinde kullanıcı cihazları, kenar anahtarlama cihazları, omurga anahtarlama cihazları, kurumsal güvenlik duvarı ve saldırı tespit ve engelleme sistemi olmak üzere beş ana yapıda alınacak olan güvenlik önlemlerinin ağın işleyişine yapacağı katkı ortaya koyulmaktadır. Katmanlı bir yapıda alınan güvenlik önemleri ile güvenlik zafiyetinin oluştuğu katmanda bu problemin ortadan kaldırılarak üst katmana problem taşınmadan durdurulabilmesinin önemi üzerinde durulmaktadır. Kurumsal bir ağda güvenlik politikalarının nasıl olması gerektiğine dair fikir oluşması amaçlanmıştır.In this study actions to be taken against cyber security threats for large corporate structures has big network structure is mentioned. User devices within the corporate structure, side switching devices, backbone switching devices, enterprise firewalls and intrusion detection and prevention systems including security measures, which will be five main structure will contribute to the functioning of the network are highlighted. Just received a similar structure to the onion rings importance of eliminating security weaknesses in the ring can stop problem from moving to the top layer is focused

    A Watermarking Application For Authentication Of Holly Quran

    No full text
    Nowadays, with the development of technology transfer to the information transmitted safely started to carry more importance to reach the desired aim
    corecore