Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Permanent URI for this collectionhttps://hdl.handle.net/11147/7148
Browse
17 results
Search Results
Now showing 1 - 10 of 17
Article Citation - WoS: 3Citation - Scopus: 4Liquid Metal-Controlled Dual-Band Doppler Radar for Enhanced Velocity Measurement(IEEE, 2024) Karatay, Anıl; Yaman, FatihDoppler radars, which are critical instruments for velocity measurement, may need to be reconfigured to adapt to different environmental conditions or for ease of use. However, conventional electrical, optical, and physical reconfiguration methods often come with several disadvantages such as deteriorated radiation pattern, reduced radiation efficiency, and high cost. Therefore, the aim of this article is to integrate microwave components that can be controlled using liquid metal (LM) displacement into a Doppler radar to adjust its main lobe direction and operating frequency to the desired values and enhance the measurement capacity of the respective radar. Through this study, multiple parameters of an operational Doppler radar have been simultaneously adjusted using LM displacement exploitation for the first time, thus avoiding the shortcomings associated with conventional reconfiguration methods. To achieve this objective, initially, a back-to-back Vivaldi antenna operating at 2.45 GHz is designed, and beam switching ability is imparted to the structure using the LM displacement method. Subsequently, various techniques are used to convert the structure into a dual-band antenna capable of simultaneous operation at 2.45 and 5.8 GHz, ensuring the desired beam switching feature at both the frequencies. In addition, a power divider capable of switching between the two operating frequencies through LM assistance is proposed, and its integration into the radar system enables the control of both main lobe direction and frequency using the proposed method.Article Link Prediction for Completing Graphical Software Models Using Neural Networks(IEEE, 2023) Leblebici, Onur; Tuğlular, Tuğkan; Belli, FevziDeficiencies and inconsistencies introduced during the modeling of software systems may result in high costs and negatively impact the quality of all developments performed using these models. Therefore, developing more accurate models will aid software architects in developing software systems that match and exceed expectations. This paper proposes a graph neural network (GNN) method for predicting missing connections, or links, in graphical models, which are widely employed in modeling software systems. The proposed method utilizes graphs as allegedly incomplete, primitive graphical models of the system under consideration (SUC) as input and proposes links between its elements through the following steps: (i) transform the models into graph-structured data and extract features from the nodes, (ii) train the GNN model, and (iii) evaluate the performance of the trained model. Two GNN models based on SEAL and DeepLinker are evaluated using three performance metrics, namely cross-entropy loss, area under curve, and accuracy. Event sequence graphs (ESGs) are used as an example of applying the approach to an event-based behavioral modeling technique. Examining the results of experiments conducted on various datasets and variations of GNN reveals that missing connections between events in an ESG can be predicted even with relatively small datasets generated from ESG models. AuthorCorrection Corrections To “massive Mimo-Noma Based Mec in Task Offloading for Delay Minimization”(IEEE, 2023) Yılmaz, Saadet Simay; Özbek, Berna[No abstract available]Article Citation - WoS: 3Citation - Scopus: 3Amperometric Detection of Nh3 by Aromatic Sam-Modified Graphene(IEEE, 2023) Yağmurcukardeş, Nesli; Bayram, Abdullah; Aydın, Hasan; Can, Mustafa; Demiç, Şerafettin; Açıkbaş, Yaşar; Çelebi, CemAmmonia (NH3) is a toxic substance resulting in various acute and chronic effects on individuals. NH3 detection, monitoring methods, and detection tools are desperately needed. In this work, we improved the NH3 sensing capabilities of grapheme (GP) films deposited by chemical vapor deposition (CVD) by modifying aromatic self-assembled monolayer (SAM) molecules such as 5-[(3-methylphenyl) (phenyl) amino] isophthalic acid (MeIPA) and 5-(diphenyl)amino] isophthalic acid (PhIPA) on amperometric detection method. Morphological investigations of the films were carried out by optical and scanning electron microscopy (SEM). Surface potential was characterized with Kelvin probe force microscopy (KPFM), and vibrational properties were characterized with Raman spectroscopy. MeIPA modification increased NH3 uptake by two times compared to unmodified GP. The results indicated that the SAM modification enhanced NH3 molecule adsorption and improved its periodic reversible and reproducible response using the amperometric detection system, indicating that SAM molecules might be a feasible probe for NH3. © 2001-2012 IEEE.Article Citation - WoS: 5Citation - Scopus: 4A New Construction Method for Keystream Generators(IEEE, 2023) Gül, Çağdaş; Kara, OrhunWe introduce a new construction method of diffusion layers for Substitution Permutation Network (SPN) structures along with its security proofs. The new method can be used in block ciphers, stream ciphers, hash functions, and sponge constructions. Moreover, we define a new stream cipher mode of operation through a fixed pseudorandom permutation and provide its security proofs in the indistinguishability model. We refer to a stream cipher as a Small Internal State Stream (SISS) cipher if its internal state size is less than twice its key size. There are not many studies about how to design and analyze SISS ciphers due to the criterion on the internal state sizes, resulting from the classical tradeoff attacks. We utilize our new mode and diffusion layer construction to design an SISS cipher having two versions, which we call DIZY. We further provide security analyses and hardware implementations of DIZY. In terms of area cost, power, and energy consumption, the hardware performance is among the best when compared to some prominent stream ciphers, especially for frame-based encryptions that need frequent initialization. Unlike recent SISS ciphers such as Sprout, Plantlet, LILLE, and Fruit; DIZY does not have a keyed update function, enabling efficient key changing. © 2005-2012 IEEE.Article Citation - WoS: 3Citation - Scopus: 4Application of the Law of Minimum and Dissimilarity Analysis To Regression Test Case Prioritization(IEEE, 2023) Ufuktepe, Ekincan; Tuğlular, TuğkanRegression testing is one of the most expensive processes in testing. Prioritizing test cases in regression testing is critical for the goal of detecting the faults sooner within a large set of test cases. We propose a test case prioritization (TCP) technique for regression testing called LoM-Score inspired by the Law of Minimum (LoM) from biology. This technique calculates the impact probabilities of methods calculated by change impact analysis with forward slicing and orders test cases according to LoM. However, this ordering doesn't consider the possibility that consecutive test cases may be covering the same methods repeatedly. Thereby, such ordering can delay the time of revealing faults that exist in other methods. To solve this problem, we enhance the LoM-Score TCP technique with an adaptive approach, namely with a dissimilarity-based coordinate analysis approach. The dissimilarity-based coordinate analysis uses Jaccard Similarity for calculating the similarity coefficients between test cases in terms of covered methods and the enhanced technique called Dissimilarity-LoM-Score (Dis-LoM-Score) applies a penalty with respective on the ordered test cases. We performed our case study on 10 open-source Java projects from Defects4J, which is a dataset of real bugs and an infrastructure for controlled experiments provided for software engineering researchers. Then, we hand-seeded multiple mutants generated by Major, which is a mutation testing tool. Then we compared our TCP techniques LoM-Score and Dis-LoM-Score with the four traditional TCP techniques based on their Average Percentage of Faults Detected (APFD) results.Article Citation - WoS: 16Citation - Scopus: 25A Privacy-Preserving Scheme for Smart Grid Using Trusted Execution Environment(IEEE, 2023) Akgün, Mete; Üstündağ Soykan, Elif; Soykan, GürkanThe increasing transformation from the legacy power grid to the smart grid brings new opportunities and challenges to power system operations. Bidirectional communications between home-area devices and the distribution system empower smart grid functionalities. More granular energy consumption data flows through the grid and enables better smart grid applications. This may also lead to privacy violations since the data can be used to infer the consumer's residential behavior, so-called power signature. Energy utilities mostly aggregate the data, especially if the data is shared with stakeholders for the management of market operations. Although this is a privacy-friendly approach, recent works show that this does not fully protect privacy. On the other hand, some applications, like nonintrusive load monitoring, require disaggregated data. Hence, the challenging problem is to find an efficient way to facilitate smart grid operations without sacrificing privacy. In this paper, we propose a privacy-preserving scheme that leverages consumer privacy without reducing accuracy for smart grid applications like load monitoring. In the proposed scheme, we use a trusted execution environment (TEE) to protect the privacy of the data collected from smart appliances (SAs). The scheme allows customer-oriented smart grid applications as the scheme does not use regular aggregation methods but instead uses customer-oriented aggregation to provide privacy. Hence the accuracy loss stemming from disaggregation is prevented. Our scheme protects the transferred consumption data all the way from SAs to Utility so that possible false data injection attacks on the smart meter that aims to deceive the energy request from the grid are also prevented. We conduct security and game-based privacy analysis under the threat model and provide performance analysis of our implementation. Our results demonstrate that the proposed method overperforms other privacy methods in terms of communication and computation cost. The execution time of aggregation for 10,000 customers, each has 20 SAs is approximately 1 second. The decryption operations performed on the TEE have a linear complexity e.g., 172800 operations take around 1 second while 1728000 operations take around 10 seconds. These results can scale up using cloud or hyper-scalers for real-world applications as our scheme performs offline aggregation.Article Citation - WoS: 2Citation - Scopus: 6Incremental Testing in Software Product Lines-An Event Based Approach(IEEE, 2023) Beyazıt, Mutlu; Tuğlular, Tuğkan; Öztürk Kaya, DilekOne way of developing fast, effective, and high-quality software products is to reuse previously developed software components and products. In the case of a product family, the software product line (SPL) approach can make reuse more effective. The goal of SPLs is faster development of low-cost and high-quality software products. This paper proposes an incremental model-based approach to test products in SPLs. The proposed approach utilizes event-based behavioral models of the SPL features. It reuses existing event-based feature models and event-based product models along with their test cases to generate test cases for each new product developed by adding a new feature to an existing product. Newly introduced featured event sequence graphs (FESGs) are used for behavioral feature and product modeling; thus, generated test cases are event sequences. The paper presents evaluations with three software product lines to validate the approach and analyze its characteristics by comparing it to the state-of-the-art ESG-based testing approach. Results show that the proposed incremental testing approach highly reuses the existing test sets as intended. Also, it is superior to the state-of-the-art approach in terms of fault detection effectiveness and test generation effort but inferior in terms of test set size and test execution effort.Article Citation - WoS: 15Citation - Scopus: 17Massive Mimo-Noma Based Mec in Task Offloading for Delay Minimization(IEEE, 2023) Yilmaz, Saadet Simay; Özbek, BernaMobile edge computing (MEC) has been considered a promising technology to reduce task offloading and computing delay by enabling mobile devices to offload their computation-intensive tasks. Non-orthogonal multiple access (NOMA) is regarded as a promising method of increasing spectrum efficiency, while Massive multiple-input multiple-output (MIMO) can support a larger number of users for simultaneous offloading. These two technologies can effectively facilitate offloading and further improve the performance of MEC systems. In this work, we propose a NOMA and Massive MIMO assisted MEC system for delay-sensitive applications. Our objective is to minimize the overall computing and transmission delay under users' transmit power and MEC computing capability. Through the pairing scheme for Massive MIMO-NOMA, the users with the higher channel gain can offload all their data, while the users with the lower channel gain can offload a portion of their data to the MEC. Performance results are provided regarding to the sum data rate and overall system delay compared with the orthogonal multiple access (OMA)-MIMO based and Massive MIMO (M-MIMO) based MEC systems.Article Citation - WoS: 3Citation - Scopus: 3A Domain-Specific Language for the Document-Based Model-Driven Engineering of Business Applications(IEEE, 2022) Leblebici, Onur; Kardaş, Geylani; Tuğlular, TuğkanTo facilitate the development of business applications, a domain-specific language (DSL), called DARC, is introduced in this paper. Business documents including the descriptions of the responsibilities, authorizations, and collaborations, are used as the first-class entities during model-driven engineering (MDE) with DARC. Hence the implementation of the business applications can be automatically achieved from the corresponding document models. The evaluation of using DARC DSL for the development of commercial business software was performed in an international sales, logistics, and service solution provider company. The results showed that the code for all business documents and more than 50% of the responsibility descriptions composing the business applications could be generated automatically by modeling with DARC. Finally, according to the users' feedback, the assessment clearly revealed the adoption of DARC features in terms of the DSL quality characteristics, namely functional suitability, usability, reliability, maintainability, productivity, extensibility, compatibility, and expressiveness.
