Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932949
Aichatou Galy Adam, B. Yesi̇lata
The improvement of the efficiency of the photovoltaic (PV) modules is the focus nowadays of so many researchers. Many test and research were conducted in order to reach that goal. That’s how they came with the idea of a hybrid. Combining the PV module with the thermoelectric module is an innovative approach to improve the efficiency. Thus, not only a part of the solar spectral is exploited as for the PV alone, but a larger spectrum is exploited because the heat too is used. It allows the cooling of the panel and provide an additional power. It was seen also that combining the hybrid with a heat-exchanger (HW) increase the efficiency as well, by changing individually either the PV or the sink of the thermoelectric to reach much better outputs.A comprehensive review on these previous research studies are presented here. Many methods and approaches to enhance the performance of the PV/TE systems are discussed along with mathematical models used. The gaps in existing literature are identified and recommendations for future research are precisely outlined. It is emphasized here that only few experimental studies on PV/TE systems are exist. Therefore, it is highly recommended here that comprehensive experimental studies under real atmospheric conditions should be done with these systems, without neglecting effects of shapes and arrangements of TE materials.
{"title":"Use of Hybrid Photovoltaic-Thermoelectric (PV-TE) solar module for Enhancing Overall System Efficiency","authors":"Aichatou Galy Adam, B. Yesi̇lata","doi":"10.1109/ISMSIT.2019.8932949","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932949","url":null,"abstract":"The improvement of the efficiency of the photovoltaic (PV) modules is the focus nowadays of so many researchers. Many test and research were conducted in order to reach that goal. That’s how they came with the idea of a hybrid. Combining the PV module with the thermoelectric module is an innovative approach to improve the efficiency. Thus, not only a part of the solar spectral is exploited as for the PV alone, but a larger spectrum is exploited because the heat too is used. It allows the cooling of the panel and provide an additional power. It was seen also that combining the hybrid with a heat-exchanger (HW) increase the efficiency as well, by changing individually either the PV or the sink of the thermoelectric to reach much better outputs.A comprehensive review on these previous research studies are presented here. Many methods and approaches to enhance the performance of the PV/TE systems are discussed along with mathematical models used. The gaps in existing literature are identified and recommendations for future research are precisely outlined. It is emphasized here that only few experimental studies on PV/TE systems are exist. Therefore, it is highly recommended here that comprehensive experimental studies under real atmospheric conditions should be done with these systems, without neglecting effects of shapes and arrangements of TE materials.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128707130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932890
Akın Öztopuz, B. Karasulu
The segmantation of the human facial region from a complex background is the basis for the success of today's applications such as facial recognition, expression extraction, surveillance systems, and the guilty people finding. Finding the face region and then extracting attributes that represent the face is another problematic process that needs to be overcome. In general, as is well done in the literature, using the Viola-Jones method or functions in libraries such as D-lib, the above-mentioned operations can be performed fully automatically. This means that the methods applied automatically to use reference data (e.g., XML data format for Viola-Jones) or detectors (D-lib landmark detection) to find keypoints independent of the given object as input. In this study, it is aimed to extract the face region from the image containing the frontal human face with semi-automatic approaches and to mark the area with eye and nose keypoints on the obtained area. Human face contour and face geometry information are used in face positioning. The eye map (i.e., EyeMap) algorithm was used for eye keypoint extraction, while facial geometry, morphological operations and computer vision library OpenCV template matching functions were used for the nasal region. As a result, the main purpose of this study is to obtain the facial region via ensuring the appropriate features with our semi-automatic approach instead of extracting automatically by using known libraries or mostly by machine learning methods. In addition, some discussion and conclusion are involved by our study as well.
{"title":"The Semi-Automatic Approach to Extract the Features of Human Facial Region","authors":"Akın Öztopuz, B. Karasulu","doi":"10.1109/ISMSIT.2019.8932890","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932890","url":null,"abstract":"The segmantation of the human facial region from a complex background is the basis for the success of today's applications such as facial recognition, expression extraction, surveillance systems, and the guilty people finding. Finding the face region and then extracting attributes that represent the face is another problematic process that needs to be overcome. In general, as is well done in the literature, using the Viola-Jones method or functions in libraries such as D-lib, the above-mentioned operations can be performed fully automatically. This means that the methods applied automatically to use reference data (e.g., XML data format for Viola-Jones) or detectors (D-lib landmark detection) to find keypoints independent of the given object as input. In this study, it is aimed to extract the face region from the image containing the frontal human face with semi-automatic approaches and to mark the area with eye and nose keypoints on the obtained area. Human face contour and face geometry information are used in face positioning. The eye map (i.e., EyeMap) algorithm was used for eye keypoint extraction, while facial geometry, morphological operations and computer vision library OpenCV template matching functions were used for the nasal region. As a result, the main purpose of this study is to obtain the facial region via ensuring the appropriate features with our semi-automatic approach instead of extracting automatically by using known libraries or mostly by machine learning methods. In addition, some discussion and conclusion are involved by our study as well.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128758548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932751
Sıdıka Elbi Mutluoğlu, T. Ölmez
Thanks to developments in the computer hardware systems, deep learning has been an attractive field for many researchers in different disciplines. Aim of deep learning is to extract the desired features of raw data as a learning method by operating many hidden layers. Accomplished results of learning methods on complex issues as face recognition, object detection, motion recognition etc. led researchers to think about applying deep learning methods to road lane detection-segmentation which is one of the very important issues of Advanced Driver Assistance Systems (ADAS). Considering main limitations of conventional methods for lane detection, deep learning approach can provide more robustness than existing approaches. The objective of work is to compare the effectiveness of conventional and deep learning applications to improve accuracy of the road segmentation
{"title":"A Comparison of Hough Transform and Deep Neural Network Methods on Road Segmentation","authors":"Sıdıka Elbi Mutluoğlu, T. Ölmez","doi":"10.1109/ISMSIT.2019.8932751","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932751","url":null,"abstract":"Thanks to developments in the computer hardware systems, deep learning has been an attractive field for many researchers in different disciplines. Aim of deep learning is to extract the desired features of raw data as a learning method by operating many hidden layers. Accomplished results of learning methods on complex issues as face recognition, object detection, motion recognition etc. led researchers to think about applying deep learning methods to road lane detection-segmentation which is one of the very important issues of Advanced Driver Assistance Systems (ADAS). Considering main limitations of conventional methods for lane detection, deep learning approach can provide more robustness than existing approaches. The objective of work is to compare the effectiveness of conventional and deep learning applications to improve accuracy of the road segmentation","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127680552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932775
Kutsev Bengisu Altuğ, Sami Emre Küçük
The dynamics underlying the tailpipe NOx emissions in vehicles is in a complex relationship with multiple engine components in a temporal manner. Physical models constructed to explain the relationship are too complex and solutions require high computational power. Additional uncontrollable environmental effects are also unable to incorporate these models. We present novel data-driven methods to predict tailpipe NOx emissions using machine learning and deep learning methods. As an ensemble methods representor eXtreme Gradient Boosting (XGBoost), as regularized linear models Elastic Net and as a deep learning method Long-Short-Term-Memory (LSTM) were chosen and their capability of handling time-series sensor data were assessed. We use engine speed, engine torque, pedal position and vehicle speed obtained from real-world driving data to deduce high NOx emission amount during real world driving. We reveal that satisfactory results can be achieved even if we have small data both in terms volume and variety by using weighted objective functions.
{"title":"Predicting Tailpipe NOx Emission using Supervised Learning Algorithms","authors":"Kutsev Bengisu Altuğ, Sami Emre Küçük","doi":"10.1109/ISMSIT.2019.8932775","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932775","url":null,"abstract":"The dynamics underlying the tailpipe NOx emissions in vehicles is in a complex relationship with multiple engine components in a temporal manner. Physical models constructed to explain the relationship are too complex and solutions require high computational power. Additional uncontrollable environmental effects are also unable to incorporate these models. We present novel data-driven methods to predict tailpipe NOx emissions using machine learning and deep learning methods. As an ensemble methods representor eXtreme Gradient Boosting (XGBoost), as regularized linear models Elastic Net and as a deep learning method Long-Short-Term-Memory (LSTM) were chosen and their capability of handling time-series sensor data were assessed. We use engine speed, engine torque, pedal position and vehicle speed obtained from real-world driving data to deduce high NOx emission amount during real world driving. We reveal that satisfactory results can be achieved even if we have small data both in terms volume and variety by using weighted objective functions.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124689644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932773
Berkan Zöhra, M. Akar
Starting from the first years of the proposed period right up to the 2000s, there were commercialization concerns of line start permanent magnet synchronous motors. This situation, which developed as a result of not developing methods to adequately explain the motor operating characteristics, and also because of the limitations associated with the non-high-performance manufacturing materials, took place widely until the 1970s. In subsequent years, the development of increasingly efficient materials, as well as the use of innovative methods, such as advanced magnetic circuit models and FEM analysis, which better reflect the performance of the motor, these motors became available for an increasing number of industries. In the past 10 years, research has paid off, and finally, line start permanent magnet synchronous motors have begun to be offered on the market as an alternative to AC induction motors. These motors, which are offered on the market with an IE4 efficiency class limits level that is currently tricky to achieve with traditional AC induction motors, are already included in the catalog of many major motor manufacturers.With this study, a detailed literature search was conducted and filtered on the development and improvement of line start permanent magnet synchronous motors. As a result of the study of numerous researches and more than 50 rotor topologies, design trends were identified that are important in the development of such motors. The development steps from the proposed years to the present have been discussed in terms of manufacturability, efficiency and performance.
{"title":"Design Trends for Line Start Permanent Magnet Synchronous Motors","authors":"Berkan Zöhra, M. Akar","doi":"10.1109/ISMSIT.2019.8932773","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932773","url":null,"abstract":"Starting from the first years of the proposed period right up to the 2000s, there were commercialization concerns of line start permanent magnet synchronous motors. This situation, which developed as a result of not developing methods to adequately explain the motor operating characteristics, and also because of the limitations associated with the non-high-performance manufacturing materials, took place widely until the 1970s. In subsequent years, the development of increasingly efficient materials, as well as the use of innovative methods, such as advanced magnetic circuit models and FEM analysis, which better reflect the performance of the motor, these motors became available for an increasing number of industries. In the past 10 years, research has paid off, and finally, line start permanent magnet synchronous motors have begun to be offered on the market as an alternative to AC induction motors. These motors, which are offered on the market with an IE4 efficiency class limits level that is currently tricky to achieve with traditional AC induction motors, are already included in the catalog of many major motor manufacturers.With this study, a detailed literature search was conducted and filtered on the development and improvement of line start permanent magnet synchronous motors. As a result of the study of numerous researches and more than 50 rotor topologies, design trends were identified that are important in the development of such motors. The development steps from the proposed years to the present have been discussed in terms of manufacturability, efficiency and performance.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116878336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932768
D. Ekmekci
Ant Colony Optimization (ACO) is a population-based meta-heuristic method that mimics the foraging behavior of the ant colony in real life. The pheromone approach as the highlight method of the algorithm is the most effective factor in determining the moving of ants. Therefore, the problem of tuning the pheromone trail is an important topic for ACO that deserves attention. In this paper, a novel method which memorizes the solution costs and updates the pheromone trail according to the memorized costs is introduced for updating the pheromone trail in ACO. The performance of the proposed method was simulated on the Travelling Salesman Problem (TSP) and compared with the versions of ACO algorithm.
{"title":"An Ant Colony Optimization Memorizing Better Solutions (ACO-MBS) for Traveling Salesman Problem","authors":"D. Ekmekci","doi":"10.1109/ISMSIT.2019.8932768","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932768","url":null,"abstract":"Ant Colony Optimization (ACO) is a population-based meta-heuristic method that mimics the foraging behavior of the ant colony in real life. The pheromone approach as the highlight method of the algorithm is the most effective factor in determining the moving of ants. Therefore, the problem of tuning the pheromone trail is an important topic for ACO that deserves attention. In this paper, a novel method which memorizes the solution costs and updates the pheromone trail according to the memorized costs is introduced for updating the pheromone trail in ACO. The performance of the proposed method was simulated on the Travelling Salesman Problem (TSP) and compared with the versions of ACO algorithm.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122980877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932932
Hüseyin Polat, Onur Polat, Esra Söğüt, O. A. Erdem
The traditional network used today is unable to meet the increasing needs of technology in terms of management, scaling, and performance criteria. Major developments in information and communication technologies show that the traditional network structure is quite lacking in meeting the current requirements. In order to solve these problems, Software Defined Network (SDN) is capable of responding as it, is flexible, easier to manage and offers a new structure. Software Defined Networks have many advantages over traditional network structure. However, it also brings along many security threats due to its new architecture. For example, the DoS attack, which overloads the controller's processing and communication capacity in the SDN structure, is a significant threat. Mobile Ad Hoc Network (MANET), which is one of the wireless network technologies, is different from SDN technology. MANET is exposed to various attacks such as DoS due to its security vulnerabilities. The aim of the study is to reveal the security problems in SDN structure presented with a new understanding. This is based on the currently used network structures such as MANET. The study consists of two parts. First, DoS attacks against the SDN controller were performed. Different SDN controllers were used for more accurate results. Second, MANET was established and DoS attacks against this network were performed. Different MANET routing protocols were used for more accurate results. According to the scenario, attacks were performed and the performance values of the networks were tested. The reason for using two different networks in this study is to compare the performance values of these networks at the time of attack. According to the test results, both networks were adversely affected by the attacks. It was observed that network performance decreased in MANET structure but there was no network interruption. The SDN controller becomes dysfunctional and collapses as a result of the attack. While the innovations offered by the SDN structure are expected to provide solutions to many problems in traditional networks, there are still many vulnerabilities for network security.
{"title":"Performance Analysis of Between Software Defined Wireless Network and Mobile Ad Hoc Network Under DoS Attack","authors":"Hüseyin Polat, Onur Polat, Esra Söğüt, O. A. Erdem","doi":"10.1109/ISMSIT.2019.8932932","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932932","url":null,"abstract":"The traditional network used today is unable to meet the increasing needs of technology in terms of management, scaling, and performance criteria. Major developments in information and communication technologies show that the traditional network structure is quite lacking in meeting the current requirements. In order to solve these problems, Software Defined Network (SDN) is capable of responding as it, is flexible, easier to manage and offers a new structure. Software Defined Networks have many advantages over traditional network structure. However, it also brings along many security threats due to its new architecture. For example, the DoS attack, which overloads the controller's processing and communication capacity in the SDN structure, is a significant threat. Mobile Ad Hoc Network (MANET), which is one of the wireless network technologies, is different from SDN technology. MANET is exposed to various attacks such as DoS due to its security vulnerabilities. The aim of the study is to reveal the security problems in SDN structure presented with a new understanding. This is based on the currently used network structures such as MANET. The study consists of two parts. First, DoS attacks against the SDN controller were performed. Different SDN controllers were used for more accurate results. Second, MANET was established and DoS attacks against this network were performed. Different MANET routing protocols were used for more accurate results. According to the scenario, attacks were performed and the performance values of the networks were tested. The reason for using two different networks in this study is to compare the performance values of these networks at the time of attack. According to the test results, both networks were adversely affected by the attacks. It was observed that network performance decreased in MANET structure but there was no network interruption. The SDN controller becomes dysfunctional and collapses as a result of the attack. While the innovations offered by the SDN structure are expected to provide solutions to many problems in traditional networks, there are still many vulnerabilities for network security.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126201705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932739
Norah Alnaim, M. Abbod, Abdulrahman Albar
A human gesture is a non-verbal form of communication and is critical in human-robot interactions. Vision-based gesture recognition methods play a key role to detect hand motion and support such interactions. Hand gesture recognition allows a appropriate, and usable interface between users and devices. Hand gestures can be used for various fields which makes it be able to be implemented for communication and further. Hand gesture recognition is not only useful for people who are hearing-impaired or disabled but also for the people who have experienced a stroke, as they need to communicate with other people using different common essential gestures such as the sign of eating, drink, family and, more. In this paper, a system for recognizing hand gesture based on Convolutional Neural Network (CNN) is proposed. The developed method is evaluated and compared between training and testing modes based on several metrics such as execution time, accuracy, sensitivity, specificity, positive and negative predictive value, likelihood and root mean square. Results show that testing accuracy is 99% using CNN and is an effective technique in extracting distinct features and classifying data.
{"title":"Hand Gesture Recognition Using Convolutional Neural Network for People Who Have Experienced A Stroke","authors":"Norah Alnaim, M. Abbod, Abdulrahman Albar","doi":"10.1109/ISMSIT.2019.8932739","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932739","url":null,"abstract":"A human gesture is a non-verbal form of communication and is critical in human-robot interactions. Vision-based gesture recognition methods play a key role to detect hand motion and support such interactions. Hand gesture recognition allows a appropriate, and usable interface between users and devices. Hand gestures can be used for various fields which makes it be able to be implemented for communication and further. Hand gesture recognition is not only useful for people who are hearing-impaired or disabled but also for the people who have experienced a stroke, as they need to communicate with other people using different common essential gestures such as the sign of eating, drink, family and, more. In this paper, a system for recognizing hand gesture based on Convolutional Neural Network (CNN) is proposed. The developed method is evaluated and compared between training and testing modes based on several metrics such as execution time, accuracy, sensitivity, specificity, positive and negative predictive value, likelihood and root mean square. Results show that testing accuracy is 99% using CNN and is an effective technique in extracting distinct features and classifying data.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126463134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932788
Barış Çal
Some elements can be extremely harmful for both environment and human health. If it is not possible to avoid them completely, they must remain at least within the certain limits. This situation is more common especially in electrical and electronic manufacturing due to the usage of leaded alloys in solders and finishes. In this case, European Community, United States, Japan and some other countries have at least approved the use of these chemicals within the maximum limits defined by RoHS (Restriction of the Use of Hazardous Substances) Directives which is 0.1% ppm for lead.RoHS rules came up in the early 2000s became mandatory in Europe, United States and Japan in the field of commercial electronics in the last half of next decade. Manufacturers switched to lead-free solder and component production and usage rapidly as a result of this situation. This rapid transition has brought many question marks and information gaps.Certain industries such as military, aerospace, transportation and space are excluded from RoHS Directives. However, switching of electronic component manufacturer to lead-free technology brings some problems such as finding leaded components and reduced number of leaded product supplier in time for space and similar industries.Reliability is one of the most important and critical factor in space technologies. Lead-free solder alloys and technologies has different properties compared to leaded alloys in terms of process to material. Leaded alloys are highly reliable and traceable compared to lead-free alloys. Reliability level of lead-free alloys should be defined by destructive, non-destructive, accelerated tests and inspections and also a lead-free plan should be prepared if lead-free solder alloys are planning to be used in space technologies
{"title":"Lead-Free Soldering Risks and Reliability Problems in Space Electronics","authors":"Barış Çal","doi":"10.1109/ISMSIT.2019.8932788","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932788","url":null,"abstract":"Some elements can be extremely harmful for both environment and human health. If it is not possible to avoid them completely, they must remain at least within the certain limits. This situation is more common especially in electrical and electronic manufacturing due to the usage of leaded alloys in solders and finishes. In this case, European Community, United States, Japan and some other countries have at least approved the use of these chemicals within the maximum limits defined by RoHS (Restriction of the Use of Hazardous Substances) Directives which is 0.1% ppm for lead.RoHS rules came up in the early 2000s became mandatory in Europe, United States and Japan in the field of commercial electronics in the last half of next decade. Manufacturers switched to lead-free solder and component production and usage rapidly as a result of this situation. This rapid transition has brought many question marks and information gaps.Certain industries such as military, aerospace, transportation and space are excluded from RoHS Directives. However, switching of electronic component manufacturer to lead-free technology brings some problems such as finding leaded components and reduced number of leaded product supplier in time for space and similar industries.Reliability is one of the most important and critical factor in space technologies. Lead-free solder alloys and technologies has different properties compared to leaded alloys in terms of process to material. Leaded alloys are highly reliable and traceable compared to lead-free alloys. Reliability level of lead-free alloys should be defined by destructive, non-destructive, accelerated tests and inspections and also a lead-free plan should be prepared if lead-free solder alloys are planning to be used in space technologies","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126073814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ISMSIT.2019.8932957
Azhar Murzaeva, Buğra Kepçeoğlu, Sercan Demirci
In this survey we aim to outline possible attacks in IoT network and to propose possible solutions for them. Security issues were classified depending on the layers in IoT architecture. Despite of this classification, issues in these layers trigger whole system’s security. Solutions for them are presented, too. Therefore, we emphasized the need for such security solutions for further study.
{"title":"Survey of Network Security Issues and Solutions for the IoT","authors":"Azhar Murzaeva, Buğra Kepçeoğlu, Sercan Demirci","doi":"10.1109/ISMSIT.2019.8932957","DOIUrl":"https://doi.org/10.1109/ISMSIT.2019.8932957","url":null,"abstract":"In this survey we aim to outline possible attacks in IoT network and to propose possible solutions for them. Security issues were classified depending on the layers in IoT architecture. Despite of this classification, issues in these layers trigger whole system’s security. Solutions for them are presented, too. Therefore, we emphasized the need for such security solutions for further study.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126878926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}