Engineering Applications https://publish.mersin.edu.tr/index.php/enap en-US myakar@mersin.edu.tr (Prof. Dr. Murat YAKAR) myakar@mersin.edu.tr (Murat Yakar) Sun, 28 Apr 2024 09:48:55 +0000 OJS 3.3.0.6 http://blogs.law.harvard.edu/tech/rss 60 Inter-satellite optical wireless communication (Is-OWC) trends: a review, challenges and opportunities https://publish.mersin.edu.tr/index.php/enap/article/view/1347 <p>Satellite communication has been achieving high-speed transmission for over 50 years. However, alongside these advancements, other IT and telecommunications systems have also improved their performance. As a result, these significant gains are less apparent to the public compared to if this surge in performance had occurred in isolation. Satellite communications serve various purposes, including civilian and military surveillance, telecommunications, object tracking, and space exploration missions. Bulk production of small satellites in clusters can prove beneficial for activities such as wildfire monitoring, research missions, gravity mapping, and water-based investigations due to their size, capacity, and durability limitations. Additionally, communications satellites, enabled by multi-satellite systems, can help study the near-earth environment and facilitate more efficient and cost-effective space exploration. Inter-satellite links have recently gained considerable attention due to their advantages over conventional microwave links in satellite communications. These advantages include the utilization of underutilized and unregulated spectrum availability, large channel bandwidth, lightweight equipment, reduced power and mass requirements, secure transmission, high-speed long-reach links, and cost-effectiveness. After providing a background on satellite communication, we present a brief overview of Inter-Satellite Optical Wireless Communication (Is-OWC) satellite communication systems for various applications. Furthermore, an important aspect in determining satellite applications is the allocation of satellites utilizing Is-OWC links in different orbits. We also explore and compare different orbits based on various aspects. The study highlights the significance of employing advanced modulation techniques to improve the satellite field and achieve higher performance. Additionally, the research explains the importance of utilizing the Ka-band and addresses limitations associated with Is-OWC, such as the Doppler impact, pointing errors between satellites, tracking, and different sources of noise. It emphasizes that Is-OWC links are crucial for providing global coverage for communication purposes.</p> <p> </p> Maan Muataz Abdulwahid, Sefer Kurnaz, Ayça Kurnaz Türkben, Mohammed Raisan Hayal, Ebrahim Eldesoky Elsayed, Davron Aslonqulovich Juraev Copyright (c) 2024 https://creativecommons.org/licenses/by-sa/4.0 https://publish.mersin.edu.tr/index.php/enap/article/view/1347 Wed, 14 Feb 2024 00:00:00 +0000 Enhancing wireless subscriber performance through AODV routing protocol in simulated mobile Ad-hoc networks https://publish.mersin.edu.tr/index.php/enap/article/view/1346 <p>The investigation of impromptu network routing algorithms has been a focal point in exploration of networks associated with Ad-Hoc systems. This study uses the OPNET simulation tool to classify and assess Ad-Hoc networking routing approaches in order to deal with multiple obstacles pertaining to the networking guidelines, which include inadequate adaptation with an elevated management complexity. In particular, the effectiveness of two routing protocols such as the table-driven and the on-demand is being evaluated. The leading on-demand routing protocols are DSR (Dynamic Source Routing) and AODV (Ad Hoc On-Demand Distance Vector), whereas the majority of prevalent table-driven routing protocol is DSDV (Destination Sequenced Distance Vector). These three protocols' capabilities are emulated under conditions of distinctive packet transmission proportions, typical end-to-end interruptions, and routing demands. Based on a constant bitrate source traffic framework, the results of simulations take place across multiple movement speeds (0–25 m/s). Findings within a distributed system featuring 20 arbitrarily positioned terminals demonstrate the use of the on-demand routing system functions optimum in a high-mobility condition.</p> Noorulden Basil, Shaik Hasane Ahammad , Ebrahim Eldesoky Elsayed Copyright (c) 2024 https://creativecommons.org/licenses/by-sa/4.0 https://publish.mersin.edu.tr/index.php/enap/article/view/1346 Wed, 14 Feb 2024 00:00:00 +0000 IP/Resistivity methods for Pb-Zn deposit exploration: A case study in Sudöşeği, (Simav-Kütahya, Türkiye) https://publish.mersin.edu.tr/index.php/enap/article/view/1503 <p>Studying Pb-Zn deposits is highly significant in meeting the global demand for lead and zinc, which are essential elements used in various industries such as battery production and construction. The Sudöşeği region in Simav-Kütahya holds significant potential for the occurrence of lead-zinc (Pb-Zn) mineral deposits. This study employs induced polarization (IP) and resistivity techniques to examine subsurface geological formations and evaluate the probability of a Pb-Zn deposit. Geophysical methods offer valuable insights into variations in electrical conductivity and chargeability, assisting in the identification of minerals. The study identified strong correlations between IP and resistivity patterns and well-established geological features, confirming the efficacy of this integrated approach in mineral exploration. The L 100, L 300, and L 500 profiles exhibited rechargeability values, which suggest the possibility of mineralization. The L 100 profile and L 500 profile exhibited significant potential owing to their exceptional rechargeability values. This case study highlights the significance of IP (Induced Polarization) and resistivity methods in the identification of Pb-Zn (lead-zinc) deposits and the improvement of resource evaluation and extraction strategies.</p> Cihan Yalçın, Hurşit Canlı Copyright (c) 2024 https://creativecommons.org/licenses/by-sa/4.0 https://publish.mersin.edu.tr/index.php/enap/article/view/1503 Thu, 15 Feb 2024 00:00:00 +0000 Revolutionizing engineering education: Leveraging LabVIEW virtual instrumentation in electrical machines real-time control for distance learning https://publish.mersin.edu.tr/index.php/enap/article/view/1168 <p>The rapid developments of science and technology of the last decade have given a fundamental change to the way of conceiving and solving problems in every field of science and in particular in engineering disciplines. Nowadays, Virtual Instruments are becoming an important part of solving engineering problems in particular in the area of Automatic Control of Industrial Processes and Education. Due to the continuously increasing performance and flexibility of PC combined with their cost reduction, virtual instruments are successfully concurring the traditional instruments. In this work, we have created a closed-loop control system for testing the PID controller for a DC motor using the HIL technique and Ziegler-Nichols tuning rule for education purposes.</p> Gentian Dume, Jurgen Metalla Copyright (c) 2024 https://creativecommons.org/licenses/by-sa/4.0 https://publish.mersin.edu.tr/index.php/enap/article/view/1168 Fri, 16 Feb 2024 00:00:00 +0000 Training of information technology personnel through simulations for protection against cyber attacks https://publish.mersin.edu.tr/index.php/enap/article/view/1191 <p class="zetMetin"><span lang="TR">Nowadays, the development of information technology, robotics and artificial intelligence, has brought radical changes in every aspect of people's lives and this has made our lives have a lot of access to contemporary information and technology. These technological developments in many areas of business and telecommunications, in addition to their benefits, have also increased the risks. Users should be very careful when using social networks, various applications and navigating the Internet world because the risk of cyber-attacks by irresponsible persons with malicious intentions is very frequent. So, web applications make it possible for website visitors to record data or access data through the browser, where all this data is stored in the website's database, which is often the target of cyber-attacks where the attacker has read access, attempts to modify and delete data from the database. This paper aims to provide the necessary information about attacks and cyber hygiene, where we will recommend the review and analysis of these attacks using tools from the MetaSploit library which is a framework that makes hacking easier and is also a tool essential for many attackers and defenders. So MetaSploit helps developers and web administrators from this library to keep up with the times and take preventive measures against the tricks of irresponsible people.</span></p> Fatmir Basholli, Besjana Mema , Albina Basholli Copyright (c) 2024 https://creativecommons.org/licenses/by-sa/4.0 https://publish.mersin.edu.tr/index.php/enap/article/view/1191 Fri, 16 Feb 2024 00:00:00 +0000 The role of algebra and its application in modern sciences https://publish.mersin.edu.tr/index.php/enap/article/view/1499 <p>This work deals with the emergence of Algebra and its applications in technical and engineering problems. Algebra becomes important in school when we learn to work with variables, expressions and equations. At first glance, it seems that these are abstract concepts that we will never need in real life. However, in practice, we constantly encounter situations where it is necessary to apply knowledge of algebra to solve problems and make important decisions. One example of algebra being used in everyday life is financial planning. When creating a budget, calculating interest on a loan, or calculating investments, we use algebra to determine optimal strategies and predict future outcomes. Algebra also allows us to solve complex problems related to planning trips or purchasing goods, taking into account our financial capabilities. n addition, algebra has its applications in science and technology. It is the basis for developing algorithms, programming and working with large volumes of data. Thanks to algebra, computers, smartphones, the Internet, and many other technological achievements were created that have become an integral part of our lives.</p> Davron Aslonqulovich Juraev, Murot Nashvandovich Bozorov Copyright (c) 2024 https://creativecommons.org/licenses/by-sa/4.0 https://publish.mersin.edu.tr/index.php/enap/article/view/1499 Fri, 16 Feb 2024 00:00:00 +0000 Health risks from air pollution from vehicles in the city of Tirana https://publish.mersin.edu.tr/index.php/enap/article/view/1182 <p>Air pollution from vehicles in the city of Tirana has become a worrying problem for the health of the residents. In this regard, the challenge for human health remains the improvement of air quality. For this purpose, in the beginning the main elements of air pollution and their sources were treated. Then the effects of the main pollutants on human health were treated, where the most dangerous for the city of Tirana are particles matter, nitrogen oxides and ozone. Then the measurement of pollution for the main pollutants and the ways of determining the air quality were treated, continuing with the assessment of the health risks coming from the main pollutants, where according to the WHO, premature deaths, lost years of life and morbidity are used. In 2020 for Albania, we had 3600 premature deaths from particles matter, 330 from nitrogen dioxide and 310 from ozone. While the lost years of life per 100,000 inhabitants were 1296 for particles, 116 for nitrogen dioxide and 115 for ozone. At the end, discussions on the ways to reduce the health risks associated with the reduction of air pollution from vehicles, are given, by strengthening the technical control of vehicles and the use of efficient methods of cleaning the fuel system and the use of biodiesel and alternative fuels.</p> Asllan Hajderi , Ledia Bozo Copyright (c) 2024 https://creativecommons.org/licenses/by-sa/4.0 https://publish.mersin.edu.tr/index.php/enap/article/view/1182 Fri, 16 Feb 2024 00:00:00 +0000 Chemical profile of wild salvia officinalis population from Kosovo by using CO2 supercritical extraction https://publish.mersin.edu.tr/index.php/enap/article/view/867 <p>This study shows chemical profile of Salvia officinalis L. plants by using CO<sub>2</sub> supercritical extraction method. Samples of sage plants were selected by natural population of Gjilan, Kosovo. Sage samples were obtained in August 2022. The dried and ground plants were subjected of CO<sub>2</sub> supercritical extraction techniques in a modified Clevenger apparatus, to obtain the essential oil of Salvia officinalis plants. Chemical profiles for all sage samples were performed using the GC/FID technique. Capillary column VF-1ms (30 m x 0.33 mm x 0.25 um) was used for the separation and isolation of compounds found in sage plants. In the analyzed chromatograms from sage samples, 30-45 compounds were identified. In the study, the 20 main compounds that make up over 90% of the total identified compounds were considered. Oxygenated monoterpenes were the main group of monoterpenes because of higher values for alpha + beta-Thujones and Camphor. Sesquiterpenes were the second group while bicyclic monoterpenes were third group of terpenes. Percentages of monocyclic, aliphatic and aromatic monoterpenes were found in non-considerable level. Chemical profile of Salvia officinalis plants from Kosovo was the same with other reported studies from Balkan and Mediterranean area.</p> Miranda Misini, Arben Haziri, Fatmir Faiku, Aurel Nuro Copyright (c) 2024 https://creativecommons.org/licenses/by-sa/4.0 https://publish.mersin.edu.tr/index.php/enap/article/view/867 Tue, 27 Feb 2024 00:00:00 +0000 Software engineering methodologies in programming companies in Albania https://publish.mersin.edu.tr/index.php/enap/article/view/1506 <p>Single software development is a systematic engineering process that requires the selection and application of appropriate software development methodologies to ensure project success. Software Engineering (SE) necessitates a set of principles and tools to facilitate the production of high-quality software products. With the continuous evolution of information technologies and software engineering, the development and application methodologies for the Albanian market have also advanced. Our company places significant emphasis on investing in people, infrastructure, methodologies, and modern tools. In recent years, there has been a notable trend toward the adoption of agile methodologies, resulting in a surge in its utilization compared to traditional approaches. This study aims to examine the existing methodologies employed by software companies in Albania and assess their readiness for transitioning to agile methodologies.</p> Blerta Leka, Klesti Hoxha Copyright (c) 2024 https://creativecommons.org/licenses/by-sa/4.0 https://publish.mersin.edu.tr/index.php/enap/article/view/1506 Wed, 20 Mar 2024 00:00:00 +0000 Vulnerability indices of A GLOF-prone community: A case study of Sosot Village, Ghizar District, Gilgit-Baltistan Pakistan https://publish.mersin.edu.tr/index.php/enap/article/view/1349 <p>One of the major impacts of global climate change, GLOF (Glacial Lake outburst flood) has increased in frequency throughout the world due to rise in temperature. Pakistan has also seen this upswing of GLOF in Hindukush-Karakoram-Himalaya region increasing the human and environment susceptibility in affected area. Sosot, a village which has faced some devastating GLOF events in the past, is taken as a case in this study. In 2012, the GLOF event took place which caused monetary damage of around 100 million Pakistan rupees. The detailed analysis shows that high temperature was the most important GLOF triggering factor. At present, despite some social cohesion and education, this progress-oriented community is unable to strengthen economically. The GLOF proneness and recurrence causes loss of infrastructure, livestock, and agriculture. The vulnerability of the village to GLOF is estimated using Flood Vulnerability Index (FVI) based on four components as social component, economic component, environmental and physical factors. The social vulnerability has come out to be 0.506, economic vulnerability is 0.949, environmental vulnerability is 0.613 and the physical vulnerability is 1. The total vulnerability of Sosot village is calculated to be 0.767 which indicates that this village is highly vulnerable to GLOF events. All the components are playing an important role in increasing the vulnerability, but the most important components are economic and physical which are making the village highly vulnerable to GLOF event. Therefore, there is a dire need for suggested structural and non-structural measures to be taken for this community to decrease vulnerability to GLOF. </p> Syed Ali Haider, Fiza Sarwar, Aansa Rukya, Umair Jamil Copyright (c) 2024 https://creativecommons.org/licenses/by-sa/4.0 https://publish.mersin.edu.tr/index.php/enap/article/view/1349 Sun, 28 Apr 2024 00:00:00 +0000