Arşiv logosu
  • Türkçe
  • English
  • Giriş
    Yeni kullanıcı mısınız? Kayıt için tıklayın. Şifrenizi mi unuttunuz?
Arşiv logosu
  • Koleksiyonlar
  • Sistem İçeriği
  • Analiz
  • Talep/Soru
  • Türkçe
  • English
  • Giriş
    Yeni kullanıcı mısınız? Kayıt için tıklayın. Şifrenizi mi unuttunuz?
  1. Ana Sayfa
  2. Yazara Göre Listele

Yazar "Uçan, Osman Nuri" seçeneğine göre listele

Listeleniyor 1 - 20 / 121
Sayfa Başına Sonuç
Sıralama seçenekleri
  • Yükleniyor...
    Küçük Resim
    Öğe
    3D Face Anti-Spoofing With Dense Squeeze and Excitation Network and Neighborhood-Aware Kernel Adaptation Scheme
    (IEEE, 2025) Hussein, Mohammed Kareem Hussein; Uçan, Osman Nuri
    Face anti-spoofing is a critical challenge in biometric security systems, where sophisticated spoofing techniques pose significant threats. To enhance the effectiveness and efficiency of the methods employed for face anti-spoofing, this paper presents a new lightweight 3D face anti-spoofing framework characterized by several advanced mechanisms. To this purpose, the proposed architecture introduces DenseNet, a Squeeze and Excitation mechanism, and a new computational component called Neighborhood-Aware Kernel Adaptation (NAKA) that adaptively modifies 3D convolution kernels according to spatial proximity. Initially, an adaptive thresholding-based wavelet decomposition is employed for image denoising, followed by cross-channel attention to improve feature learning. Finally, Multiple Instance Learning (MIL) is used to address face anti-spoofing for the first time by modeling the spatial and temporal variations across facial areas. We validate our framework on two publicly available datasets: CelebA-Spoof and CASIA-SURF. We compared the performance of our proposed framework with several state-of-the-art methods using Classification accuracy, Precision, Recall, F1-score, ACER, APCER, and BPCER. Our model realizes 99.62% on the CelebA-Spoof and 99.86% on CASIA-SURF datasets. The proposed approach realized superior results in terms of high classification accuracy (99.62% and 99.86%), precision (99.85% and 99.83%), recall (99.39% and 99.84%), F-score (99.62% and 99.84%), ACER (0.0038/ 0.0014), FPR (0.0015/ 0.0013), APCER (0.0015/0.0016), and BPCER (0.0061/0.0013). These results are compared with 10 state-of-the-art methods to show the effectiveness of our approach in outperforming existing methods. The global comparative results reveal that the proposed approach is relatively effective in determining masked and true face scans.
  • Yükleniyor...
    Küçük Resim
    Öğe
    A bidirectional LSTM-RNN and GRU method to exon prediction using splice-site mapping
    (2022) Canatalay, Peren Jerfi; Uçan, Osman Nuri
    Deep Learning techniques (DL) significantly improved the accuracy of predictions and classifications of deoxyribonucleic acid (DNA). On the other hand, identifying and predicting splice sites in eukaryotes is difficult due to many erroneous discoveries. To address this issue, we propose a deep learning model for recognizing and anticipating splice sites in eukaryotic DNA sequences based on a bidirectional Long Short-Term Memory (LSTM) Recurrent Neural Network (RNN) and Gated recurrent unit (GRU). The non-coding introns of the gene are spliced out, and the coding exons are joined during the splicing of the original mRNA transcript. This bidirectional LSTM-RNN-GRU model incorporates intron features in order of their length constraints, beginning with splice site donor (GT) and ending with splice site acceptor (AG). The performance of the model improves as the number of training epochs grows. The best level of accuracy for this model is 96.1 percent.
  • [ X ]
    Öğe
    A grasshopper optimizer approach for feature selection and optimizing SVM parameters utilizing real biomedical data sets
    (Springer London Ltd, 2019) Ibrahim, Hadeel Tariq; Mazher, Wamidh Jalil; Uçan, Osman Nuri; Bayat, Oğuz
    Support vector machines (SVM) are one of the important techniques used to solve classifications problems efficiently. Setting support vector machine kernel factors affects the classification performance. Feature selection is a powerful technique to solve dimensionality problems. In this paper, we optimized SVM factors and chose features using a Grasshopper Optimization Algorithm (GOA). GOA is a new heuristic optimization algorithm inspired by grasshoppers searching for food. It approved its ability to solve real-world problems with anonymous search space. We applied the proposed GOA + SVM approach on biomedical data sets for Iraqi cancer patients in 2010-2012 and for University of California Irvine data sets.
  • Yükleniyor...
    Küçük Resim
    Öğe
    A heuristic approach for optimal planning and operation of distribution systems
    (Hindawi Ltd, 2018) Alzaidi, Khalid Mohammed Saffer; Bayat, Oğuz; Uçan, Osman Nuri
    The efficient planning and operation of power distribution systems are becoming increasingly significant with the integration of renewable energy options into power distribution networks. Keeping voltage magnitudes within permissible ranges is vital; hence, control devices, such as tap changers, voltage regulators, and capacitors, are used in power distribution systems. This study presents an optimization model that is based on three heuristic approaches, namely, particle swarm optimization, imperialist competitive algorithm, and moth flame optimization, for solving the voltage deviation problem. Two different load profiles are used to test the three modified algorithms on IEEE 123- and IEEE 13-bus test systems. The proposed optimization model uses three different cases: Case 1, changing the tap positions of the regulators; Case 2, changing the capacitor sizes; and Case 3, integrating Cases 1 and 2 and changing the locations of the capacitors. The numerical results of the optimization model using the three heuristic algorithms are given for the two specified load profiles.
  • Yükleniyor...
    Küçük Resim
    Öğe
    A hybrid local search-genetic algorithm for simultaneous placement of DG units and shunt capacitors in radial distribution systems
    (Ieee-Inst Electrical Electronics Engineers Inc, 2020) Almabsout, Emad Ali; El-Sehiemy, Ragab A.; Uçan, Osman Nuri; Bayat, Oğuz
    Controlling active/reactive power in distribution systems has a great impact on its performance. The placement of distributed generators (DGs) and shunt capacitors (SCs) are the most popular mechanisms to improve the distribution system performance. In this line, this paper proposes an enhanced genetic algorithm (EGA) that combines the merits of genetic algorithm and local search to find the optimal placement and capacity of the simultaneous allocation of DGs/SCs in the radial systems. Incorporating local search scheme enhances the search space capability and increases the exploration rate for finding the global solution. The proposed procedure aims at minimizing both total real power losses and the total voltage deviation in order to enhance the distribution system performance. To prove the proposed algorithm ability and scalability, three standard test systems, IEEE 33 bus, 69 bus, and 119-bus test distribution networks, are considered. The simulation results show that the proposed EGA can efficiently search for the optimal solutions of the problem and outperforms the other existing algorithms in the literature. Moreover, an economic based cost analysis is provided for light, shoulder and heavy loading levels. It was proven, the proposed EGA leads to significant improvements in the technical and economic points of view.
  • Yükleniyor...
    Küçük Resim
    Öğe
    A multi-branched hybrid perceptron network for DDoS attack detection using dynamic feature adaptation and multi-instance learning
    (Institute of Electrical and Electronics Engineers Inc., 2024) Al-Khayyat, Ali Tariq Kalil; Uçan, Osman Nuri
    The increasing sophistication and frequency of Distributed Denial of Service (DDoS) attacks necessitate advanced detection systems. These attacks leave networks vulnerable to disruptions, resource overload, security breaches, and financial losses. Conventional detection systems suffer from high false positive rates, lower flexibility, and an inability to adapt dynamically to trending attack patterns. To address these limitations, our proposed work introduces a novel approach to tackling these challenges by merging a multi-branched hybrid perceptron network with dynamic feature adaptation and multi-instance learning. Our methodology features three key innovations: (1) Multi-Branched Hybrid Perceptron architecture, (2) Dynamic Feature Adaption, and (3) Dynamic Attention-Weighted Feature Fusion to improve feature representation and merging process. The proposed study was validated on three testing datasets: (1) UNSW-NB15, (2) CIC-IDS 2017, and (3) CIC-IDS 2018, and the results were compared with various state-of-the-approaches. The experimental results show that our model significantly outperforms existing methods. On UNSW-NB15, the model achieves an accuracy of 96.02% with a precision of 0.965, a recall of 0.963, and an F1-score of 0.9645. For CIC-IDS 2017, it reaches a near-perfect accuracy of 99.99% with all metrics at 1.00. On CIC-IDS 2018, the model performs with an accuracy of 99.96% and perfect precision, recall, and F1-scores of 1.00. Time complexity analysis shows that while the proposed intrusion detection framework takes 21.6 seconds on CIC-IDS 2017, 30.0 seconds on CSE-CIC-IDS2018, and 15.5 seconds on UNSW-NB15, it remains competitive with high performance. Despite its higher time complexity on UNSW-NB15, MHHPN provides superior detection capabilities, making it practical for real-time use in complicated and extensive networks.
  • [ X ]
    Öğe
    A novel approach for ensuring location privacy using sentiment analysis and analysis for health-care and Its effects on humans health
    (Amer Scientific Publishers, 2020) Ali, Bassam S.; Uçan, Osman Nuri; Bayat, Oğuz
    Twitter is the free report benefit for given important to as far as possible to 150 typescripts that may include script, pictures, videotapes and hyper-links. Persons sharing news, ideas and info to supports or agonists media. The most petrify theme is the persecution of ladies occurring a rounds the world. Individual's persecution of women of the web-based life to dependably impart utilizing coded words or to setting up their indirections nearness. This paper offering a novel procedure for feelings research on the maltreatment of women connected tweets and to organizing the suppositions with their geo-zones. The information mining calculations, for example, Bolster Vector Machine, Irregular Woodland, Sacking, Choice Trees and Most extreme Entropy are applying for extremity's based characterization of mistreatment of ladies related Tweets. The outcomes are looking at and exhibiting.
  • [ X ]
    Öğe
    A novel energy-conscious threshold-based data Transmission routing protocol for wireless body area network (NEAT)
    (Institute of Electrical and Electronics Engineers Inc., 2020) Ibrahim, Abdullahi Abdu; Salawudeen, Ahmed Tijani; Uçan, Osman Nuri; Okorie, Patrick Ubeh
    In today's age of wireless communication, Wireless Body Area Network (WBAN) which is an extension of the conventional Wireless Sensor Network (WSN) is attracting immense interest in academia as well as industry. This is due to its importance in providing smart heath care service. One of the major research issues are Quality-of-Service (QoS) provision and energy efficiency improvement. Since sensor nodes are highly resource constrained in terms of battery and it is impractical to recharge and replace them, it is imperative to develop techniques/routing protocols or other solutions in other to augment the battery life. For that reason, NEAT routing algorithm which is an improvement on RE-ATTMPT and CEMob protocols is proposed in this paper. NEAT prioritize data into low-emergency, high-emergency and regular-data. Unlike similar protocols, NEAT ignores the communication of regular-data and transmit high-emergency data via direct communication and low-emergency data is compared with the formerly sensed low-emergency data and if it is different, it is transmitted, otherwise it is not transmitted thus leading to significant energy saving. Simulation results obtained by MATLAB prove that NEAT protocol outperforms RE-ATTMPT and CEMob in terms of network lifetime and throughput. © 2020 IEEE.
  • [ X ]
    Öğe
    A study of scalable solutions for smart contracts performance
    (Institute of Electrical and Electronics Engineers Inc., 2024) Alsalim, Mohammed Sabah Hameed; Uçan, Osman Nuri
    The emergence of blockchain technology has ushered in a transformative era of decentralized and trustless systems, challenging conventional centralized models reliant on intermediaries. At the core of this revolution lies the concept of smart contracts, self-executing agreements encoded on a blockchain, automating contractual processes without intermediaries. Smart contracts offer numerous advantages, including automation, cost reduction, transparency, and enhanced security. However, their widespread adoption faces challenges, with a paramount one being the limitation of scalability within blockchain networks. This paper studies existing scalable solution of blockchain, compares the existing techniques and discusses the best scalable solution depending on the requirement of the system. It assesses existing research, case studies and unlocking the full potential of smart contracts in the realm of blockchain technology.
  • [ X ]
    Öğe
    A survey on privacy and policy aspects of blockchain technology
    (IEEE, 2022) Mahmood, Mohammed Thakir; Uçan, Osman Nuri; Ibrahim, Abdullahi Abdu
    From financial transactions to digital voting systems, identity management, and asset monitoring, blockchain technology is increasingly being developed for use in a wide range of applications. The problem of security and privacy in the blockchain ecosystem, which is now a hot topic in the blockchain community, is discussed in this study. The survey’s goal was to investigate this issue by considering several sorts of assaults on the blockchain network in relation to the algorithms offered. Following a preliminary literature assessment, it appears that some attention has been paid to the first use case; however the second use case, to the best of my knowledge, deserves more attention when blockchain is used to investigate it. However, due to the subsequent government mandated secrecy around the implementation of DES, and the distrust of the academic community because of this, a movement was spawned that put a premium on individual privacy and decentralized control. This movement brought together the top minds in encryption and spawned the technology we know of as blockchain today. This survey paper also explores the genesis of encryption, its early adoption, and the government meddling which eventually spawned a movement which gave birth to the ideas behind blockchain. It also closes with a demonstration of blockchain technology used in a novel way to refactor the traditional design paradigms of databases.
  • [ X ]
    Öğe
    A systematic mapping study on touch classification
    (Int Journal Computer Science & Network Security-Ijcsns, 2018) Fleh, Saad Q.; Bayat, Oğuz; Al-Azawi, Saad; Uçan, Osman Nuri
    One of the basic interpersonal methods to communicate emotions is through touch. Social touch classification is one of the leading research which has great potential for more improvement. Social touch classification can be beneficial in the much scientific application such as robotics, human-robot interaction, etc.. Each person has the ability to interact with the environment and with other people via touch sensors that are speared over human soma. These touch sensors provide us with the important information about objects such as size, shape, position, surface and their movement. Therefore, the touch system plays the main role in human life from early days. The small gesture can express strong emotion, from the comforting experience of being touched by one's spouse, to the discomfort caused by a touch from a stranger. This paper presents and explains a systematic mapping study on social touch gesture recognition. From various digital libraries, 938 papers in total are collected. After applying three filters, 49 papers as primary studies related to the main topic are selected as listed in Appendix (A). The selected papers classified with respect to several facets. The results provide an overview of the existing relevant studies that are reported in the literature, highlight the focused areas and research gaps.
  • Yükleniyor...
    Küçük Resim
    Öğe
    Accuracy enhancement of brain epilepsy detection by using of machine learning algorithms
    (Altınbaş Üniversitesi, 2020) Al-Dahhan, Rand Natiq; Uçan, Osman Nuri
    Data has gained vital role in science and engineering applications; the proper data analysis has made it possible to boost the economical worthiness of those applications. Machine learning tools are used to classify the big data in order to discover the hidden patterns in them. That may lead to noteworthy advantages that related to future prediction of the data. The resultant information can be used to enhance the practical systems in such way only the profitable thing can be come on then. In other way, it helps to prevent any unpleasant occurrence that may harm the company or the organization. A brain epilepsy disease prediction system is implemented using four different algorithms namely: Naive Bayes algorithm, K-Nearest Neighbours algorithm, Random Forest algorithm and Long Short Term Memory Neural Network. The performance metrics are also initiate in order to evaluate the difference in prediction performance of the four tools. The accuracy of prediction the disease was recorded more likely 33.035, 95, 61.195 and 96.79 for the Naïve Bays, Random Forest, K-Nearest Neighbour and Long Short Term Neural Network.
  • [ X ]
    Öğe
    Achieving optical fiber transmission of over 60 W of electrical power and optical data
    (Institute of Electrical and Electronics Engineers Inc., 2023) Al-Hadeethi, Alaa Tareq; Uçan, Osman Nuri; Mohammed, Alaa Hamid
    For future mobile communication networks, optically powered remote antenna modules are shown with simultaneous transmission of over 60 watts of electric power and optical data over an optical fibre. As the temperature rises over the set point, the light source undergoes modulation, causing a shift in wavelength. Fibre Bragg Grating Sensors are presented in this study, along with an examination of their design for use in measuring and monitoring powerline temperature change over a certain temperature range. In this piece, we enhance the link design to extract a greater feed light power from the double-clad fibre output, which in turn increases the provided electric power via power-over-fiber connection. Furthermore, we employ a bespoke photovoltaic power converter that directly converts optical power into electric power to increase the electric power for running remote antenna units. The photovoltaic power converter has an efficiency of more than 50% and can absorb feed light of more than 20 W. Up to 43.7 W of electrical power may be sent over the fibre optic cable thanks to the improved design of the power-over-fiber connection and the use of the solar power converter. Power-over-fiber with optical data transfers utilising a single optical fibre has been demonstrated for the first time at this altitude, according to the scientists.
  • Yükleniyor...
    Küçük Resim
    Öğe
    Adaptive video transmission over communication networks
    (Altınbaş Üniversitesi, 2019) Göse, Ersin; Uçan, Osman Nuri; Nafea, Ghaidq Nassr; Bayat, Oğuz
    This paper is to minimize video bitrate and keeping the high resolution video file manageable. This process is achieved by using new generation of Advanced Video Coders (AVC). Such process can be done at one level encoder or multi levels of encoders by means of transcoding, where reformatting the content to be streamed on channel is called transcoding. The goal is concerned of encoder processes that can be used to achieve transcoding. The codec used for compression of video is H.264, a standard for providing high definition video at substantially low complicity and lower bit rates. The x264 Library is used for encoding H.264 AVC, undergirds some of the most profiles for broadcasting and streaming operations over wired and wireless channels, including different applications. When a technique of bit-rate control is incorporated with the encoder, more reliable and qualified system for low bitrate video streaming over constant bit rate communication channel is achieved, where output rate of the video encoder is controlled by feedback based on the buffer level. Where the most effective parameters such as skip frame, QP, cycle length (Gop), etc. are configured and it used as a rate control tools to test the streaming coded bit rate and the decoded video quality. Testing scenarios use many different videos with QCIF, CIF, and HD formats encoded under main profile. JM19 reference software is used for implementing and testing the standards.
  • [ X ]
    Öğe
    Advanced Anomaly Detection Framework Using CNN-Grid Autoencoder Integration and Recursive Fuzzy Feature Selection Approach
    (Institute of Electrical and Electronics Engineers Inc., 2025) Al-Dulaimi, Reem Talal; Kurnaz Türkben, Ayça; Hussein, Mohammed Kareem; Tariq Kalil Al-Khayyat, Ali; Uçan, Osman Nuri
    Network intrusion poses a significant threat to data privacy and security in shared networks, often leading to cyber-attacks that compromise both system integrity and user data. Today's digital environment is seeing an increase in unauthorized actions, such as credential theft, illegal access, and data tampering. Despite the availability of various intrusion detection methodologies, accurately identifying and mitigating such threats remains a critical challenge. To address this issue, this paper proposes an automated attack classification model designed to enhance classification accuracy while minimizing errors based on input parameters. The proposed approach presents an innovative system for detecting network intrusions based on deep learning that integrates a fuzzy optimization method. The methodology begins with data pre-processing, including data cleansing and temporal smoothing, followed by feature extraction using Grid Convolutional Neural Networks (Grid-CNN). Optimal features are selected through a recursive multi-level fuzzy optimization algorithm. Finally, attack classification is performed using the SoftMax layer of the Grid-CNN architecture. The model is evaluated on the UNSW-NB15 dataset, with performance metrics including accuracy, precision, recall, and F1 score. Experimental results demonstrate that the proposed model achieves an accuracy of 96.02%, outperforming existing models in terms of both accuracy and robustness. This study highlights the potential of deep learning and fuzzy optimization in enhancing network intrusion.
  • [ X ]
    Öğe
    AIoT in healthcare: a systematic mapping study
    (Institute of Electrical and Electronics Engineers Inc., 2022) Ibrahim, Hadeel Tariq; Mazher, Wamidh Jalil; Uçan, Osman Nuri
    he Internet of Things (IoT) infrastructure and artificial intelligence (AI) technologies are combined to create artificial intelligence of things (AIoT). AIoT in healthcare is a key factor in enabling physicians' offices and hospitals as well as giving patients access to superior scientific facilities. To this end, we conduct a Systematic Mapping Study (SMS) to provide critical information about various applications of AIoT in healthcare. The primary goals of this research are to provide an overview of AIoT research in healthcare and to categorize AIoT research based on annual number of publications, publication venues, and journal distribution. We present some AIoT techniques used in healthcare fields in nine well-known online libraries (IEEE, Springer, Elsevier, MDPI, Taylor and Francis, Hindawi, Wiley online lib., ACM and Google). Initially, we used a number of research questions related to the issue, and when we applied them, 71 studies were produced.
  • [ X ]
    Öğe
    An adapting soft computing model for intrusion detection system
    (Wiley, 2021) Alsaadi, Husam Ibrahiem Husain; ALmuttari, Rafah M.; Uçan, Osman Nuri; Bayat, Oğuz
    Network security in smart cities has become a key problem in the rapid development of computer networks over the past few years. Intrusion detection systems play a fundamental part in the integrity, confidentiality, and resource accessibility among the multiple network security policies. The classification of the genuineness of packets is main object of the presents research work, the soft computing has applied to classify the genuineness of packets. The complexity of soft computing is greatly reduced if the numbers of features in a dataset are reduced. Managing and analysis of the dimensionality reduction is novelty of the proposed model. The existence of uncertainty and the imprecise nature of the intrusions appear to create suitable fuzzy logic systems for such structures. The neural-fuzzy algorithm is one of the effective methods that incorporate fuzzy logic systems into adaptive and analysis capacities. In this research work, soft computing fuzzy logic system is proposed to enhance network security through intrusion detection. Three network datasets are demonstrated to test and estimate the proposed system. Feature selection has used to remove irrelevant features from entire network data which are obstacle classification processes. The Information Gain method was applied to select importance features for detection intrusion. Adaptive Neuro-Fuzzy Inference System (ANFIS) is further used to process the significant features of the classification network data as normal or attacks packets. Two functions named Jang's Neuro-fuzzy and faster-scaled conjugate gradient (SCG) based on the ANFIS system. Obviously, the experimental results demonstrate the proposed system has attained higher precision in detecting normal or attack. The experimental results have suggested that the proposed system results are better in accuracy and time process for classification compared with the existing models. The Overall Results show that the proposed system can be able to detect various intrusions efficiently and effectively.
  • [ X ]
    Öğe
    An efficient multi-objective memetic genetic algorithm for medical image handling and health safety to support systems in medical internet of things
    (Amer Scientific Publishers, 2020) Safi, Hayder H.; Uçan, Osman Nuri; Bayat, Oğuz
    Over the most recent couple of decades, the Evolutionary Algorithms (EA) have been considered as a typical dynamic research zone in the field of medicinal picture preparing and wellbeing administrations. This is a direct result of the presence of numerous streamlining issues in this field which can be comprehended utilizing developmental calculations. Besides, numerous certifiable streamlining issues in the restorative picture handling and wellbeing administrations have more than one target work, and for the most part the issue goals are in struggle with one another. The traditional multi-objective transformative calculations perform well when the streamlining issue has less than three goal functions, where the execution of these calculations altogether degrades when the improvement issue has high number of destinations. To deal with this issue, there is a requirement for growing new versatile transformative streamlining mechanisms which can handle the high target capacities in the medicinal picture preparing and wellbeing administrations advancement issues. In this paper, we propose a new developmental calculation dependent on the NSGA-II calculation to productively take care of the many-target enhancement issues. The proposed calculation adds three plans to improve the capacity of NSGA-II calculation when managing with high objective dimensional streamlining issues. Another productive arranging strategy, savvy file and straightforward nearby pursuit are utilized to accelerate the solutions combination procedure to the POF and upgrade the decent variety of the arrangements. The proposed calculation is contrasted and the cutting edge multi-target advancement calculations utilizing five DTLZ test issues. The outcomes demonstrate that our proposed calculation essentially beats alternate calculations when the quantity of target capacities is high. Moreover, we applied our proposed algorithm on medical imaging health problem which is the melanoma recognition problem to enhance the early detection of melanoma disease.
  • [ X ]
    Öğe
    Automatic Identification of Dental Implant Brands with Deep Learning Algorithms
    (University Press Erlangen, 2025) Yüce, H.; Açıkgöz, G.; Al-Jumaili, S.; Uçan, Osman Nuri; Uçan, G. Özlü; Dere, K. A.
    Objectives: To reduce the problems arising from the inability to identify dental implant brands, this study aims to classify various dental implant brands using deep learning algorithms on panoramic radiographs. Methods: Images of four different dental implant systems (NucleOSS, Medentika, Nobel, and Implance) were used from a total of 5,375 cropped panoramic radiographs. To enhance image clarity and reduce blurriness, the Contrast Limited Adaptive Histogram Equalization (CLAHE) filter was applied. GoogleNet, ResNet-18, VGG16, and ShuffleNet deep learning algorithms were utilized to classify the four different dental implant systems. To evaluate the classification performance of the algorithms, ROC curves and confusion matrices were generated. Based on these confusion matrices, accuracy, precision, sensitivity, and F1 score were calculated. The Z-test was used to compare the performance metrics across different algorithms. Results: The accuracy rates of the deep learning algorithms were obtained as 96.00% for GoogleNet, 84.40% for ResNet-18, 98.90% for VGG16, and 84.80% for ShuffleNet. A statistically significant difference was found between the accuracy rate of the VGG16 algorithm and those of GoogleNet, ShuffleNet, and ResNet-18 (p < 0.001, p < 0.001, and p < 0.001, respectively). Conclusions: With the achievement of high accuracy rates, deep learning algorithms are considered a valuable and powerful method for identifying dental implant brands.
  • Yükleniyor...
    Küçük Resim
    Öğe
    Boosting Multiverse Optimizer by Simulated Annealing for Dimensionality Reduction
    (Airlangga University, 2025) Mutlag, Wamidh K.; Mazher, Wamidh Jalil; Ibrahim, Hadeel Tariq; Uçan, Osman Nuri
    Background: Because of The Multi-Verse Optimizer (MVO) has gained popularity in feature selection due to its strong global and local search capabilities. However, its effectiveness diminishes when tackling high-dimensional datasets due to the exponential growth of the search space and a tendency for premature convergence. Objective: This study aims to enhance MVO’s performance by integrating it with the Simulated Annealing Algorithm (SAA), creating a hybrid model that improves search convergence and optimizes feature selection efficiency. Methods: A High-level Relay Hybrid (HRH) architecture is proposed, where MVO identifies promising regions of the feature space and passes them to SAA for local refinement. The resulting MVOSA-FS model was evaluated on ten high-dimensional benchmark datasets from the Arizona State University (ASU) repository. Support Vector Machine (SVM) classifiers were used to assess the classification accuracy. MVOSA-FS achieved superior performance compared to six state-of-the-art feature selection algorithms: Atom Search Optimization (ASO), Equilibrium Optimizer (EO), Emperor Penguin Optimizer (EPO), Monarch Butterfly Optimization (MBO), Satin Bowerbird Optimizer (SBO), and Sine Cosine Algorithm (SCA). Results: The proposed model yielded the lowest average classification error rate (1.45%), smallest standard deviation (0.008), and most compact feature subset (0.91%). The hybrid MVOSA-FS model effectively balances exploration and exploitation, delivering robust and scalable performance in feature selection for high-dimensional data. Conclusion: This hybridization approach demonstrates improved classification accuracy and reduced computational burden.
  • «
  • 1 (current)
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • »

| Altınbaş Üniversitesi | Kütüphane | Açık Erişim Politikası | Rehber | OAI-PMH |

Bu site Creative Commons Alıntı-Gayri Ticari-Türetilemez 4.0 Uluslararası Lisansı ile korunmaktadır.


Altınbaş Üniversitesi, İstanbul, TÜRKİYE
İçerikte herhangi bir hata görürseniz lütfen bize bildirin

DSpace 7.6.1, Powered by İdeal DSpace

DSpace yazılımı telif hakkı © 2002-2025 LYRASIS

  • Çerez Ayarları
  • Gizlilik Politikası
  • Son Kullanıcı Sözleşmesi
  • Geri Bildirim