Yazar "Karadogan, Ismail" seçeneğine göre listele
Listeleniyor 1 - 3 / 3
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Detection of Covert Timing Channels with Machine Learning Methods Using Different Window Sizes(Ieee, 2019) Karadogan, Ismail; Karci, AliIn this study, delays between data packets were read by using different window sizes to detect data transmitted from covert timing channel in computer networks, and feature vectors were extracted from them and detection of hidden data by some classification algorithms was achieved with high performance rate.Öğe Load Flow Optimization of 154 kV Malatya Transmission Line Using Differential Evolution Algorithm(Ieee, 2017) Akdag, Ozan; Karadogan, Ismail; Okumus, Fatih; Yeroglu, Celaleddin; Karci, AliAmplitude, phase angle, active and reactive powers flowing in each busbar of a power system can be seen by performing a load flow analysis. From these data, it is possible to determine the voltage drop, the distribution of the forces, the loading of the equipment and the losses of the related power system. Then, Active power losses can be reduced by making improvements at the points where losses are present in the power system. Power losses can be reduced by reactive power compensation considerably. In this study, Differential Evolution (DE) algorithm is used to determine the values of the capacitor groups to be added to the corresponding busbar to reduce the losses of 154 kV transmission system. The optimum load flow is ensured by optimizing a transmission system with the developed algorithm.Öğe NOVEL NETWORK STEGANOGRAPHY APPROACHES FOR CONFIDENTIAL TRANSMISSION OF INFORMATION(Ieee, 2017) Karadogan, Ismail; Das, Resul; Karci, AliIn this paper, two different packet timing and IP ID based network steganography approaches have been proposed to provide confidential transmission of information. In the proposed packet timing approach, it is seen that the bandwidth is higher than the previous methods. The proposed IP ID field based approach has been found to be more effective than previous methods in ensuring the uniqueness of the ID field and is suitable for sending confidential data over the Internet. In addition, comprehensive information on this study was presented by examining methods of information hiding, hidden channels and secret data transmission in the network environment.