Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932805
A. Luma, Blerton Abazi, Azir Aliu
Recommended systems are very popular nowadays. They are used online to help a user get the desired product quickly. Recommended Systems are found on almost every website, especially big companies such as Facebook, eBay, Amazon, NetFlix, and others. In specific cases, these systems help the user find a book, movie, article, product of his or her preference, and are also used on social networks to meet friends who share similar interests in different fields. These companies use referral systems because they bring amazing benefits in a very fast time. To generate more accurate recommendations, recommended systems are based on the user's personal information, eg: different ratings, history observation, personal profiles, etc. Use of these systems is very necessary but the way this information is received, and the privacy of this information is almost constantly ignored. Many users are unaware of how their information is received and how it is used. This paper will discuss how recommended systems work in different online companies and how safe they are to use without compromising their privacy. Given the widespread use of these systems, an important issue has arisen regarding user privacy and security. Collecting personal information from recommended systems increases the risk of unwanted exposure to that information. As a result of this paper, the reader will be aware of the functioning of Recommended systems, the way they receive and use their information, and will also discuss privacy protection techniques against Recommended systems.
{"title":"An approach to Privacy on Recommended Systems","authors":"A. Luma, Blerton Abazi, Azir Aliu","doi":"10.1109/ISMSIT.2019.8932805","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932805","url":null,"abstract":"Recommended systems are very popular nowadays. They are used online to help a user get the desired product quickly. Recommended Systems are found on almost every website, especially big companies such as Facebook, eBay, Amazon, NetFlix, and others. In specific cases, these systems help the user find a book, movie, article, product of his or her preference, and are also used on social networks to meet friends who share similar interests in different fields. These companies use referral systems because they bring amazing benefits in a very fast time. To generate more accurate recommendations, recommended systems are based on the user's personal information, eg: different ratings, history observation, personal profiles, etc. Use of these systems is very necessary but the way this information is received, and the privacy of this information is almost constantly ignored. Many users are unaware of how their information is received and how it is used. This paper will discuss how recommended systems work in different online companies and how safe they are to use without compromising their privacy. Given the widespread use of these systems, an important issue has arisen regarding user privacy and security. Collecting personal information from recommended systems increases the risk of unwanted exposure to that information. As a result of this paper, the reader will be aware of the functioning of Recommended systems, the way they receive and use their information, and will also discuss privacy protection techniques against Recommended systems.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114536298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932944
Elif Altunsu, Onur Güneş, A. Sari
Fosil yakitlarin kullaniminin olumsuz etkileri tüm dünyada yenilenebilir enerji kaynaklannin önem kazanmasma sebep olmuştur. Bununla birlikte rüzgâr enerjisine duyulan ihtiyaç dikkate değer bir artiş göstermiştir. Hem Kuzey Amerika hem de Asya ülkelerinde rüzgâr türbini tasarimmi etkileyecek güçlii depremier yaşanmaktadir. Bu ülkelerin rüzgâr enerjisine yönelimi ile bu çalişmalara yön verilmeye başlanilmiştir. Türkiye’nin rüzgâr enerji potansiyeli Türkiye Rüzgâr Ħaritasi’nda da görüleceği üzere sismik tehlikenin yoğun olduğu bölgelerde toplanmiştir. Bu nedenle rüzgâr türbini tasanminda deprem riskinin dikkate almmasi büyük önem taşimaktadir. Bu doğrultuda çalişma kapsammda, National Renewable Energy Laboratory (NREL) tarafindan geliştirilen 5 MW’lik çelik rüzgar türbini üzerinde hem sismik etkiler hem de rüzgar etkisi tartişilmiştir. Rüzgar simülasyonu yine NREL tarafindan geliştirilen açik kaynakh bir yazihm olan FAST programi yardimi ile gerçekleştirilmiştir. Turbin için sismik analiz ise CAPFOS ve SAP2000 kodlan ile yapilmiştir. Sonuçlar karşilaştirmah olarak yorumlanmiştir. Sismik dalgalarda rüzgâr yüklerinden farkli olarak daha yüksek modlarm etkin olduğu geniş bir frekans araliğinm oluşacağindan dolayi sismik yükler altinda rüzgâr türbinlerinin tepki karakteristiklerini tahmin etmek için daha yüksek modlarm modele dahil edilmesi önem kazanmaktadir. Sismik aktivitesi yüksek bölgelerde rüzgar türbini inşaalannda sismik etkilerin gözardi edilemeyeceği anlaşilmiştir.
{"title":"Rüzgar Türbinlerinin Sismik Davranışı","authors":"Elif Altunsu, Onur Güneş, A. Sari","doi":"10.1109/ISMSIT.2019.8932944","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932944","url":null,"abstract":"Fosil yakitlarin kullaniminin olumsuz etkileri tüm dünyada yenilenebilir enerji kaynaklannin önem kazanmasma sebep olmuştur. Bununla birlikte rüzgâr enerjisine duyulan ihtiyaç dikkate değer bir artiş göstermiştir. Hem Kuzey Amerika hem de Asya ülkelerinde rüzgâr türbini tasarimmi etkileyecek güçlii depremier yaşanmaktadir. Bu ülkelerin rüzgâr enerjisine yönelimi ile bu çalişmalara yön verilmeye başlanilmiştir. Türkiye’nin rüzgâr enerji potansiyeli Türkiye Rüzgâr Ħaritasi’nda da görüleceği üzere sismik tehlikenin yoğun olduğu bölgelerde toplanmiştir. Bu nedenle rüzgâr türbini tasanminda deprem riskinin dikkate almmasi büyük önem taşimaktadir. Bu doğrultuda çalişma kapsammda, National Renewable Energy Laboratory (NREL) tarafindan geliştirilen 5 MW’lik çelik rüzgar türbini üzerinde hem sismik etkiler hem de rüzgar etkisi tartişilmiştir. Rüzgar simülasyonu yine NREL tarafindan geliştirilen açik kaynakh bir yazihm olan FAST programi yardimi ile gerçekleştirilmiştir. Turbin için sismik analiz ise CAPFOS ve SAP2000 kodlan ile yapilmiştir. Sonuçlar karşilaştirmah olarak yorumlanmiştir. Sismik dalgalarda rüzgâr yüklerinden farkli olarak daha yüksek modlarm etkin olduğu geniş bir frekans araliğinm oluşacağindan dolayi sismik yükler altinda rüzgâr türbinlerinin tepki karakteristiklerini tahmin etmek için daha yüksek modlarm modele dahil edilmesi önem kazanmaktadir. Sismik aktivitesi yüksek bölgelerde rüzgar türbini inşaalannda sismik etkilerin gözardi edilemeyeceği anlaşilmiştir.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128386148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932926
F. Şal
This paper presents novel results for load-carrying UAVs having morphing capability and guided by output variance constrained controller. Effects of extension ratios of wing span and horizontal tail span on control energy of variance constrained controller satisfying straight level and constant speed flight of load-carrying UAV are in primary scope for this paper. A specific UAV called as ZANKA-II is benefitted and its data is used for these analyses. First of all, dynamic modeling of fixed-wing UAVs is presented and effect of morphing on these models is also emphasized. Then, effect of morphing on control energy of output variance constrained controller for load-carrying UAVs using 3-D Matlab graph is given. Comparisons between control energy versus extension ratios of wing span and horizontal tail span are made. Finally, closed-loop responses for the best scenario is deeply presented and discussed.
{"title":"Effect of Morphing on Control Energy of Output Variance Constrained Controller for Load-Carrying UAVs","authors":"F. Şal","doi":"10.1109/ISMSIT.2019.8932926","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932926","url":null,"abstract":"This paper presents novel results for load-carrying UAVs having morphing capability and guided by output variance constrained controller. Effects of extension ratios of wing span and horizontal tail span on control energy of variance constrained controller satisfying straight level and constant speed flight of load-carrying UAV are in primary scope for this paper. A specific UAV called as ZANKA-II is benefitted and its data is used for these analyses. First of all, dynamic modeling of fixed-wing UAVs is presented and effect of morphing on these models is also emphasized. Then, effect of morphing on control energy of output variance constrained controller for load-carrying UAVs using 3-D Matlab graph is given. Comparisons between control energy versus extension ratios of wing span and horizontal tail span are made. Finally, closed-loop responses for the best scenario is deeply presented and discussed.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130152823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932894
Saad Al-Dakheel, S. T. Ozyer, Faruk Can Ozdemir, Altuğ Karadağ, Mahmood Al-Tekreeti
The drowning cases that are happened whether in sea or ocean specially increasing cases among refugees requires to employ the advanced technology and tools to encounter this problem. Internet of Things (IoT) and cloud computing techniques will be applied in marine sector to address the problems of drowning. Internet of things that represented in sensors, actuators…etc. generate a vast number of data that globally known as a Big data, due to the limited storage and processing of the physical units with the big number of data, a cloud computing is adopted to solve this problem. In this paper, an Unmanned Surface Vehicle (USV) contains GPS and Force Sensitive Resistor (FSR) sensors will be built to discover the location and approximate number of people exposed to drowning. In addition to USV, a real-time map system will be carried out to display this information. All the data and information that generating from the sensors and map system will be stored in a cloud in real-time. This work is a part of the research and development project which is accepted in Turkey Government with the collaboration of the University and Industry.
{"title":"Unmanned Surface Vehicle with Drown Map System","authors":"Saad Al-Dakheel, S. T. Ozyer, Faruk Can Ozdemir, Altuğ Karadağ, Mahmood Al-Tekreeti","doi":"10.1109/ISMSIT.2019.8932894","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932894","url":null,"abstract":"The drowning cases that are happened whether in sea or ocean specially increasing cases among refugees requires to employ the advanced technology and tools to encounter this problem. Internet of Things (IoT) and cloud computing techniques will be applied in marine sector to address the problems of drowning. Internet of things that represented in sensors, actuators…etc. generate a vast number of data that globally known as a Big data, due to the limited storage and processing of the physical units with the big number of data, a cloud computing is adopted to solve this problem. In this paper, an Unmanned Surface Vehicle (USV) contains GPS and Force Sensitive Resistor (FSR) sensors will be built to discover the location and approximate number of people exposed to drowning. In addition to USV, a real-time map system will be carried out to display this information. All the data and information that generating from the sensors and map system will be stored in a cloud in real-time. This work is a part of the research and development project which is accepted in Turkey Government with the collaboration of the University and Industry.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130475644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932958
Salman Sahib M. Gharib, P. Esmaili
Reducing error in each step of robot motion is one of the important issue in the Simultaneous Localization and Mapping algorithms. Hence, an accurate estimation method can enhance the behavior of the SLAM algorithm in the unknown environment. A hybrid estimation method is presented in this work which is consisted of ANFIS with Unscented Kalman Filter (UKF) to estimate the estate of robots and landmarks. This estimation will be reduced the localization errors of the landmark and robot pose. So, the accuracy of the system will be improved in the planar system. The simulation results based on different environment revealed that the proposed algorithm is adaptable to the different environment with high accuracy, and efficiency in comparison with the previous works such as UKFSLAM and Neuro based UKFSLAM.
{"title":"ANFIS Based UKF-SLAM Path Planning Method","authors":"Salman Sahib M. Gharib, P. Esmaili","doi":"10.1109/ISMSIT.2019.8932958","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932958","url":null,"abstract":"Reducing error in each step of robot motion is one of the important issue in the Simultaneous Localization and Mapping algorithms. Hence, an accurate estimation method can enhance the behavior of the SLAM algorithm in the unknown environment. A hybrid estimation method is presented in this work which is consisted of ANFIS with Unscented Kalman Filter (UKF) to estimate the estate of robots and landmarks. This estimation will be reduced the localization errors of the landmark and robot pose. So, the accuracy of the system will be improved in the planar system. The simulation results based on different environment revealed that the proposed algorithm is adaptable to the different environment with high accuracy, and efficiency in comparison with the previous works such as UKFSLAM and Neuro based UKFSLAM.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127835602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932954
S. Sadullaeva, A. Khaydarov, F. A. Kabilianova
This electronic document is a "live" template and already defines the components of your paper [title, text, heads, etc.] in its style sheet. *CRITICAL: Do Not Use Symbols, Special Characters, Footnotes, or Math in Paper Title or Abstract. (Abstract)
{"title":"Modeling of Multidimensional Problems in Nonlinear Heat Conductivity in Non-Divergence Case","authors":"S. Sadullaeva, A. Khaydarov, F. A. Kabilianova","doi":"10.1109/ISMSIT.2019.8932954","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932954","url":null,"abstract":"This electronic document is a \"live\" template and already defines the components of your paper [title, text, heads, etc.] in its style sheet. *CRITICAL: Do Not Use Symbols, Special Characters, Footnotes, or Math in Paper Title or Abstract. (Abstract)","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126505187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932866
T. Georgieva-Trifonova, Miroslav Galabov, D. Valcheva, Teodor Kalushkov
The purpose of this paper is to investigate the graph-based representation of the data required for the vector space model (VSM) and PMI (pointwise mutual information)-enriched VSM used for text mining (e.g. text classification). The transformation of a dataset containing free text reviews for online stores in a graph-based form is described and its format that allows to be used by Neo4j graph database management system is proposed. Queries for retrieving the data required for training text mining models are considered; the steps and the actions for their modification when receiving new data are specified. The advantages of the proposed graph-based representation in regard to the maintenance and the extraction of current data needed for retraining data mining models are summarized, in order to prevent loss of performance of results from the execution of the respective data mining task.
{"title":"Graph-Based Representation of Customer Reviews for Online Stores","authors":"T. Georgieva-Trifonova, Miroslav Galabov, D. Valcheva, Teodor Kalushkov","doi":"10.1109/ISMSIT.2019.8932866","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932866","url":null,"abstract":"The purpose of this paper is to investigate the graph-based representation of the data required for the vector space model (VSM) and PMI (pointwise mutual information)-enriched VSM used for text mining (e.g. text classification). The transformation of a dataset containing free text reviews for online stores in a graph-based form is described and its format that allows to be used by Neo4j graph database management system is proposed. Queries for retrieving the data required for training text mining models are considered; the steps and the actions for their modification when receiving new data are specified. The advantages of the proposed graph-based representation in regard to the maintenance and the extraction of current data needed for retraining data mining models are summarized, in order to prevent loss of performance of results from the execution of the respective data mining task.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114207923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932835
Ozge Mercanoglu Sincan, Sinan Gencoglu, M. Bacak, H. Keles
Segmentation is a crucial step for many classification problems. There are many researchers that approach the problem using classical computer vision methods, recently deep learning approaches have been used more frequently in different domains. In this paper, we propose two segmentation networks that mark face and hands from static images for sign language recognition using only a few training data. Our networks have encoder-decoder structure that contains convolutional, max pooling and upsampling layers; the first one is a U-Net based network and the second one is a VGG-based network. We evaluate our models on two sign language datasets; the first one is our Ankara University Turkish Sign Language dataset (AU-TSL) and the second one is Montalbano Italian gesture dataset. Datasets contain background and illumination variations. Also, they are recorded with different signers. We train our models using only 400 images that we randomly selected from video frames. Our experiments show that even when we reduce the training data in half, we can still obtain satisfactory results. Proposed methods have achieved more than 98% precision using 400 frames with both datasets. Our code is available at https://github.com/au-cvml-lab/Hands-and-Face-Segmentation-With-Limited-Data.
{"title":"Hand and Face Segmentation with Deep Convolutional Networks using Limited Labelled Data","authors":"Ozge Mercanoglu Sincan, Sinan Gencoglu, M. Bacak, H. Keles","doi":"10.1109/ISMSIT.2019.8932835","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932835","url":null,"abstract":"Segmentation is a crucial step for many classification problems. There are many researchers that approach the problem using classical computer vision methods, recently deep learning approaches have been used more frequently in different domains. In this paper, we propose two segmentation networks that mark face and hands from static images for sign language recognition using only a few training data. Our networks have encoder-decoder structure that contains convolutional, max pooling and upsampling layers; the first one is a U-Net based network and the second one is a VGG-based network. We evaluate our models on two sign language datasets; the first one is our Ankara University Turkish Sign Language dataset (AU-TSL) and the second one is Montalbano Italian gesture dataset. Datasets contain background and illumination variations. Also, they are recorded with different signers. We train our models using only 400 images that we randomly selected from video frames. Our experiments show that even when we reduce the training data in half, we can still obtain satisfactory results. Proposed methods have achieved more than 98% precision using 400 frames with both datasets. Our code is available at https://github.com/au-cvml-lab/Hands-and-Face-Segmentation-With-Limited-Data.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131380922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932776
Atakan Ondogan, H. Yavuz
Advanced Driver Assistance Systems (ADAS) form the basis of the autonomous driving. Adaptive Cruise Control (ACC), Lane tracking assist and collision avoidance systems etc. are some popular examples of active safety system technologies of ADAS. In order to prevent traffic accidents and ensure the security and comfort in the traffic, there are several intelligent vehicle technologies. Among them, the Adaptive Cruise Control (ACC) is one of which has crucial importance. In this technology, the adjustment of the speed of the vehicle is done by perceiving the environment and controlling through considering obstacles and other vehicle's positioning and speed. This technology involves the usage of high-tech sensor fusion and control techniques. The limitations of the environment are considered and if there is no danger, vehicle keeps its preset speed. If there is a vehicle in front, the vehicle reduces its speed by using dynamically determined equations that involves velocity and acceleration constraints. In this study, a fuzzy logic based adaptive speed control design has been proposed for low speeds. In practice, a fuzzy inference system was designed as a high level operation, and a simple mathematical model based on vehicle dynamics was used as a low level operation. The performance of the proposed system was tested on a scenario designed in a simulation environment and successful results were obtained.
{"title":"Fuzzy Logic Based Adaptive Cruise Control for Low-Speed Following","authors":"Atakan Ondogan, H. Yavuz","doi":"10.1109/ISMSIT.2019.8932776","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932776","url":null,"abstract":"Advanced Driver Assistance Systems (ADAS) form the basis of the autonomous driving. Adaptive Cruise Control (ACC), Lane tracking assist and collision avoidance systems etc. are some popular examples of active safety system technologies of ADAS. In order to prevent traffic accidents and ensure the security and comfort in the traffic, there are several intelligent vehicle technologies. Among them, the Adaptive Cruise Control (ACC) is one of which has crucial importance. In this technology, the adjustment of the speed of the vehicle is done by perceiving the environment and controlling through considering obstacles and other vehicle's positioning and speed. This technology involves the usage of high-tech sensor fusion and control techniques. The limitations of the environment are considered and if there is no danger, vehicle keeps its preset speed. If there is a vehicle in front, the vehicle reduces its speed by using dynamically determined equations that involves velocity and acceleration constraints. In this study, a fuzzy logic based adaptive speed control design has been proposed for low speeds. In practice, a fuzzy inference system was designed as a high level operation, and a simple mathematical model based on vehicle dynamics was used as a low level operation. The performance of the proposed system was tested on a scenario designed in a simulation environment and successful results were obtained.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131390047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932877
A. Gursoy, T. Oner, Ibrahim Senturk, Necla Kircali Gursoy
In this work, we give a software to calculate deductions which are obtained from premises of syllogisms by the help of the SLCD (Syllogistic Logic with Carroll Diagrams) system. Moreover, this software determines whether syllogistic reasoning valid or not based on the calculus system SLCD. This software is also designed to support intelligent systems to make a decision effectively and based on mathematical background.
{"title":"A Mathematical Software for Deduction of Categorical Syllogisms","authors":"A. Gursoy, T. Oner, Ibrahim Senturk, Necla Kircali Gursoy","doi":"10.1109/ISMSIT.2019.8932877","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932877","url":null,"abstract":"In this work, we give a software to calculate deductions which are obtained from premises of syllogisms by the help of the SLCD (Syllogistic Logic with Carroll Diagrams) system. Moreover, this software determines whether syllogistic reasoning valid or not based on the calculus system SLCD. This software is also designed to support intelligent systems to make a decision effectively and based on mathematical background.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115143851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}