20 results match your criteria: "Information Security Research Center[Affiliation]"

In this study, we present a dual-hop decode-and-forward relaying-based free-space optical (FSO) communication system. We consider utilizing simultaneous lightwave information and power transfer (SLIPT) with a time-splitting technique at the relay, where the direct current component of the received optical signal is harvested as a transmit power for the relay. It is assumed that the FSO links experience a Malaga turbulence channel with pointing errors.

View Article and Find Full Text PDF

Tree bark is an important natural polymer for sound absorption. The main components in the bark of different tree species are polymers with high molecular weight such as cellulose, hemicellulose, and lignin. The aim of this study is to determine the noise reduction coefficient (NRC), lignin, alcohol-benzene solubility (ABS), carbon (C), and nitrogen (N) contents in samples taken from the bark of different tree species-black locust (Robinia pseudoacacia), narrow-leaved ash (Fraxinus angustifolia), stone pine (Pinus pinea), silver lime (Tilia tomentosa), sweet chestnut (Castanea sativa), sessile oak (Quercus petraea), and maritime pine (Pinus pinaster) and to investigate the relationship between these chemical properties and sound absorption measurements.

View Article and Find Full Text PDF

Objective: The aim of this study is to determine the contact relationship and position of impacted mandibular third molar teeth (IMM) with the mandibular canal (MC) in panoramic radiography (PR) images using deep learning (DL) models trained with the help of cone beam computed tomography (CBCT) and DL to compare the performances of the architectures.

Methods: In this study, a total of 546 IMMs from 290 patients with CBCT and PR images were included. The performances of SqueezeNet, GoogLeNet, and Inception-v3 architectures in solving four problems on two different regions of interest (RoI) were evaluated.

View Article and Find Full Text PDF

This study focuses on the problem of dense object counting. In dense scenes, variations in object scales and uneven distributions greatly hinder counting accuracy. The current methods, whether CNNs with fixed convolutional kernel sizes or Transformers with fixed attention sizes, struggle to handle such variability effectively.

View Article and Find Full Text PDF

Background/aim: LUNGBANK was established as part of Project LUNGMARK, pioneering a biorepository dedicated exclusively to lung cancer research. It employs cutting-edge technologies to streamline the handling of biospecimens, ensuring the acquisition of high-quality samples. This infrastructure is fortified with robust data management capabilities, enabling seamless integration of diverse datasets.

View Article and Find Full Text PDF
Article Synopsis
  • * Higher microwave power leads to more notable morphological changes in the propolis extract and improves its solubility, with optimal results (highest solubility and antioxidant capacity) at 900 W.
  • * While microwave drying reduces the total phenolic content compared to fresh propolis, it maintains a comparable total flavonoid content and improves free-radical scavenging activity, especially at higher power levels.
View Article and Find Full Text PDF

A Four Element Stringray-Shaped MIMO Antenna System for UWB Applications.

Micromachines (Basel)

October 2023

Electrical and Electronics Engineering Department, Faculty of Engineering and Natural Sciences, Istanbul Medipol University, Istanbul 34810, Turkey.

This paper presents a CoPlanar-Waveguide (CPW)-fed stingray-shaped Ultra-WideBand (UWB) Multiple-Input-Multiple-Output (MIMO) antenna system designed for microwave imaging applications. Featuring a diagonal square with four inner lines and a vertical line at the center from toe to tip with a CPW feed line, the unit antenna element looks like a stingray fish skeleton and is, therefore, named as a stingray-shaped antenna. It offers a bandwidth spanning from 3.

View Article and Find Full Text PDF

With the rapid development and widespread application of blockchain technology in recent years, smart contracts running on blockchains often face security vulnerability problems, resulting in significant economic losses. Unlike traditional programs, smart contracts cannot be modified once deployed, and vulnerabilities cannot be remedied. Therefore, the vulnerability detection of smart contracts has become a research focus.

View Article and Find Full Text PDF

Uneven lighting conditions often occur during real-life photography, such as images taken at night that may have both low-light dark areas and high-light overexposed areas. Traditional algorithms for enhancing low-light areas also increase the brightness of overexposed areas, affecting the overall visual effect of the image. Therefore, it is important to achieve differentiated enhancement of low-light and high-light areas.

View Article and Find Full Text PDF

Modeling and simulation of an anthropomorphic hand prosthesis with an object interaction.

Comput Methods Programs Biomed

January 2020

Department of Electrical and Electronics Engineering, Hacettepe University, Turkey. Electronic address:

Background And Objective: Kinematic and dynamic modeling of any physical process is critical especially for the design phase of associated control units and the prediction of their performance levels. In this paper, a dynamical model and a development frame including interactions with the objects for a tendon-driven underactuated hand are developed and examined. Using the proposed dynamic model, free movement and the object interaction of the underactuated hand can be simulated with a single, integrated simulation step in the simulation frame.

View Article and Find Full Text PDF

This paper presents an analytical study on the use of deterministic chaos as an entropy source for the generation of random numbers. The chaotic signal generated by a phase-locked loop (PLL) device is investigated using numerical simulations. Depending on the system parameters, the chaos originating from the PLL device can be either bounded or unbounded in the phase direction.

View Article and Find Full Text PDF

Dynamic Flow Characteristics and Design Principles of Laminar Flow Microbial Fuel Cells.

Micromachines (Basel)

September 2018

Department of Electrical and Computer Engineering, Texas A&M University, College Station, TX 77843, USA.

Laminar flow microbial fuel cells (MFCs) are used to understand the role of microorganisms, and their interactions with electrodes in microbial bioelectrochemical systems. In this study, we reported the flow characteristics of laminar flow in a typical MFC configuration in a non-dimensional form, which can serve as a guideline in the design of such microfluidic systems. Computational fluid dynamics simulations were performed to examine the effects of channel geometries, surface characteristics, and fluid velocity on the mixing dynamics in microchannels with a rectangular cross-section.

View Article and Find Full Text PDF

Hereditary spastic paraplegias (HSPs) are a group of genetic disorders resulting in pyramidal tract impairment, predominantly in lower limbs. KIF1C gene has recently been identified as one of the genetic causes of HSP and associated with pure or complicated HSP. We present three patients with complicated HSP from two unrelated families, who had early onset progressive cerebellar signs and developed pyramidal tract signs during follow-up.

View Article and Find Full Text PDF

Securing Cooperative Spectrum Sensing Against Collusive SSDF Attack using XOR Distance Analysis in Cognitive Radio Networks.

Sensors (Basel)

January 2018

Information Security Research Center of State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an 710071, China.

Cooperative spectrum sensing (CSS) is considered as a powerful approach to improve the utilization of scarce spectrum resources. However, if CSS assumes that all secondary users (SU) are honest, it may offer opportunities for attackers to conduct a spectrum sensing data falsification (SSDF) attack. To suppress such a threat, recent efforts have been made to develop trust mechanisms.

View Article and Find Full Text PDF

Device-Free Passive Identity Identification via WiFi Signals.

Sensors (Basel)

November 2017

Information Security Research Center, Harbin Engineering University, Harbin 150001, China.

Device-free passive identity identification attracts much attention in recent years, and it is a representative application in sensorless sensing. It can be used in many applications such as intrusion detection and smart building. Previous studies show the sensing potential of WiFi signals in a device-free passive manner.

View Article and Find Full Text PDF

Application layer firewalls protect the trusted area network against information security risks. However, firewall performance may affect user experience. Therefore, performance analysis plays a significant role in the evaluation of application layer firewalls.

View Article and Find Full Text PDF

FMFilter: A fast model based variant filtering tool.

J Biomed Inform

April 2016

Advanced Genomics and Bioinformatics Research Center (İGBAM), Informatics and Information Security Research Center (BİLGEM), The Scientific and Technological Research Council of Turkey (TÜBİTAK), 41470 Gebze, Kocaeli, Turkey. Electronic address:

The availability of whole exome and genome sequencing has completely changed the structure of genetic disease studies. It is now possible to solve the disease causing mechanisms within shorter time and budgets. For this reason, mining out the valuable information from the huge amount of data produced by next generation techniques becomes a challenging task.

View Article and Find Full Text PDF

Privacy preserving processing of genomic data: A survey.

J Biomed Inform

August 2015

Advanced Genomics and Bioinformatics Research Center (İGBAM), Informatics and Information Security Research Center (BİLGEM), The Scientific and Technological Research Council of Turkey (TÜBİTAK), 41470 Gebze, Kocaeli, Turkey. Electronic address:

Recently, the rapid advance in genome sequencing technology has led to production of huge amount of sensitive genomic data. However, a serious privacy challenge is confronted with increasing number of genetic tests as genomic data is the ultimate source of identity for humans. Lately, privacy threats and possible solutions regarding the undesired access to genomic data are discussed, however it is challenging to apply proposed solutions to real life problems due to the complex nature of security definitions.

View Article and Find Full Text PDF

Bayesian pathway analysis of cancer microarray data.

PLoS One

November 2015

Department of Genetics and Bioengineering, Istanbul Bilgi University Santral Campus, Eyup, Istanbul, Turkey; Department of Electrical Engineering, University of Nebraska-Lincoln, Lincoln, Nebraska, United States of America.

High Throughput Biological Data (HTBD) requires detailed analysis methods and from a life science perspective, these analysis results make most sense when interpreted within the context of biological pathways. Bayesian Networks (BNs) capture both linear and nonlinear interactions and handle stochastic events in a probabilistic framework accounting for noise making them viable candidates for HTBD analysis. We have recently proposed an approach, called Bayesian Pathway Analysis (BPA), for analyzing HTBD using BNs in which known biological pathways are modeled as BNs and pathways that best explain the given HTBD are found.

View Article and Find Full Text PDF

Bayesian network prior: network analysis of biological data using external knowledge.

Bioinformatics

March 2014

Bogazici University, Institute of Biomedical Engineering, Kandilli Campus, 34684, Cengelkoy - Istanbul, TUBITAK-BILGEM, Informatics and Information Security Research Center, 41470, Gebze-Kocaeli and Istanbul Bilgi University, Department of Genetics and Bioengineering, 34060, Eyup - Istanbul, Turkey.

Motivation: Reverse engineering GI networks from experimental data is a challenging task due to the complex nature of the networks and the noise inherent in the data. One way to overcome these hurdles would be incorporating the vast amounts of external biological knowledge when building interaction networks. We propose a framework where GI networks are learned from experimental data using Bayesian networks (BNs) and the incorporation of external knowledge is also done via a BN that we call Bayesian Network Prior (BNP).

View Article and Find Full Text PDF