Asaf Varol | Firat University (original) (raw)

Papers by Asaf Varol

Research paper thumbnail of Developing Additional Features into Ilias Learning Management System

Original scientific paper Electronic learning (e-learning) has changed learning and teaching desi... more Original scientific paper Electronic learning (e-learning) has changed learning and teaching design round the world, it have been advanced by educational institutes with large efforts. Learning Management System (LMS) is one of the significant web based invention to e-learning platform. One of the LMS is ILIAS, which is a web based LMS, advanced by using best open source technology PHP, MySQL and Apache is used as web server. ILIAS is sophisticated in German but it also supports multiple languages including English. The aim of the research is to learn more about ILIAS, examine ILIAS to search for missing feature in ILIAS. Thus, the goals of the study will be writing codes to add three missing features to ILIAS. Those features are: Date filter for e-mails, Move E-mails to Folders by Drag and Drop and Text formatting editor for message content.

Research paper thumbnail of Bilgi güvenliği ve RSA şifreleme algoritmasının incelenmesi

Bilgi güvenliği, bilgilerin güvenliğini sağlamak amacı ile yürütülen her türlü çaba ya da faaliye... more Bilgi güvenliği, bilgilerin güvenliğini sağlamak amacı ile yürütülen her türlü çaba ya da faaliyet olarak tanımlanmaktadır. Bilginin korunmasında gizlilik, bütünlük ve kullanılabilirlik hedefleri esastır. Bu esasların sağlanabilmesi için, bilginin uygun bir şifreleme tekniğiyle anlaşılamaz hale getirilmesi gereklidir.Bu çalışmada, günümüzde özellikle bankacılık sistemlerinde sayısal verileri şifrelemede kullanılan RSA algoritması incelenmiştir. Ayrıca nesne tabanlı bir programlama dili kullanılarak RSA algoritmasının çalışmasını gösteren yeni bir ara yüz tasarımı gerçekleştirilmiştir.Information security is described as the all sorts of actions and efforts to ensure the safety of the information. Targeting privacy, integrity and employability is the principal of the securing information. In order to provide these bases, information has to be encoded to an unknown structure. In this study, the RSA encoding algorithm, which is especially employed in banking systems, is investigated. M...

Research paper thumbnail of Forecasting Foreign Visitors Arrivals Using Hybrid Model and Monte Carlo Simulation

International Journal of Information Technology & Decision Making

The tourism industry is one of the important revenue sectors in today’s world. Millions of visits... more The tourism industry is one of the important revenue sectors in today’s world. Millions of visits are made monthly to different countries across the planet. Some countries host more tourists than others, depending on the availability of factors that would fascinate visitors. Tourism demand can be affected by different factors, which may include government policies, insecurity, political motive, etc. Being an important sector, policymakers/governments are keen on models that would provide an insight into the inherent dynamics of tourism in their country. Especially in forecasting future tourist arrivals, as it will greatly assist in decision making. Several tourism demand models have been presented in the literature. The best practice is to have a model that would account for uncertainty in estimations. In this paper, an ANN-Polynomial-Fourier series model is implemented to capture and forecast tourist data for Turkey, Japan, Malaysia, and Singapore. The proposed model is a combinati...

Research paper thumbnail of A Novel Deep Feature Extraction Engineering for Subtypes of Breast Cancer Diagnosis: A Transfer Learning Approach

2022 10th International Symposium on Digital Forensics and Security (ISDFS)

Feature extraction from histological images is a challenging part of computer-aided detection of ... more Feature extraction from histological images is a challenging part of computer-aided detection of breast cancer. For this research, we present a novel technique for deep feature extraction for breast cancer diagnosis subtypes based on a transfer learning approach using the BreaKhis dataset. This approach consists of five phases: feature extraction, concatenation, transformation, selection, and classification. In the first phase, nineteen pre-trained convolutional neural networks were used as feature extractors to extract features from the input images. A Support Vector Machine was used at the feature extraction phase to calculate the misclassification rate of each feature generated by the pre-trained networks used. The feature extraction results showed that the two networks achieved the highest accuracy on the dataset and outperformed the other networks. The two networks considered were selected and connected to create the DRNet model, combining the pre-trained networks ResNet50 and DenseNet201. The extracted features were decomposed into five sub-hand low-level features using a multilevel discrete wavelet transform in the transformation phase. An iterative neighborhood component analyzer was used to select the minimum number of features needed in the classification phase. A cubic support vector machine was used as a classifier in the final phase. Average classification accuracy of 98.61%, 98.04%, 97.68%, and 97.71% for the 40×, 100×, 200×, and 400× magnification levels, respectively, was achieved.

Research paper thumbnail of Sosyal Ağlarda Güvenlik: Bitlis Eren ve Fırat Üniversitelerinde Gerçekleştirilen Bir Alan Çalışması

Türkiye Bilişim Vakfı Bilgisayar Bilimleri ve Mühendisliği Dergisi, Jun 24, 2016

Research paper thumbnail of İnovasyon 2023 AR-GE ve İnovasyon Sempozyumu (Fırat Üniversitesi) Sempozyum Bildiri Kitabı

by Lokman Dogan, Mine Halis, Mehmet Karahan, Nurcan YÜcel, Tekin erdoğan, yunus santur, Yasin DALGIÇ, İlhan Tabur, İlhan Ege, Ahmet Kibar Çetin, Asaf Varol, Tayfun Yıldız, and Zafer AYKANAT

Değerli arkadaşlar sisteme yüklenen "Girişimciliğin Dinamikleri: Ülke Kurumsal Yapısının Girişimc... more Değerli arkadaşlar sisteme yüklenen "Girişimciliğin Dinamikleri: Ülke Kurumsal Yapısının Girişimciliğin Yoğunluğuna Etkisine Dair Ampirik Bir İnceleme" isimli bildiri, Tübitak tarafından desteklenen ve Fırat Üniversitesinde 24-25 Nisan tarihleri arasında düzenlenen "İnovasyon 2023 AR-GE ve İnovasyon Sempozyumunda" bildiri olarak sunulmuştur.

Research paper thumbnail of Review of evidence analysis and reporting phases in digital forensics process

2017 International Conference on Computer Science and Engineering (UBMK)

This paper reviews digital forensic phases and problems in evidence analysis phase and smart meth... more This paper reviews digital forensic phases and problems in evidence analysis phase and smart methods in this area. Among these phases, studies on the evidence analysis phase are examined. In the analysis of electronic evidences, use of smart methods and their development will contribute to information technology law and improvement of digital forensic devices. Effective evidence analysis both provides easiness for digital forensic experts and helps jurists tor accurate decisions. In this paper, digital forensic process and smart methods used in evidence analysis are examined. This literature survey discussed which new methods can be added to this process.

Research paper thumbnail of Performance Analysis of Deep Approaches on Airbnb Sentiment Reviews

2022 10th International Symposium on Digital Forensics and Security (ISDFS)

Research paper thumbnail of Risks of Digital Transformation: Review of Machine Learning Algorithms in Credit Card Fraud Detection

2021 2nd International Informatics and Software Engineering Conference (IISEC), 2021

In addition to the advantages of the digital world, there are also disadvantages, which can harm ... more In addition to the advantages of the digital world, there are also disadvantages, which can harm people. With the spread of credit cards with the digital transformation, banks have become the targets of malicious hackers. In this study, firstly, information about artificial intelligence and digital transformation is given. In related studies, some machine learning methods such as Random Forest, Naive Bayes, K-Nearest Neighbor, Logistic Regression, Support Vector Machines, Decision Tree, Artificial Neural Networks, Multilayer Perceptron and Ensemble Learning have been used to detect credit card fraud and their algorithm performance has been demonstrated.

Research paper thumbnail of CD24, not CD47, negatively impacts upon response to PD‐1/L1 inhibitors in non–small‐cell lung cancer with PD‐L1 tumor proportion score  50

Cancer Science, 2020

This is an open access article under the terms of the Creative Commons Attribution-NonCommercial ... more This is an open access article under the terms of the Creative Commons Attribution-NonCommercial License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited and is not used for commercial purposes.

Research paper thumbnail of Mobile Technologies for Mobile Learning: Developmental Process Review

A different dimension have come to the education with becoming widespread and cheapening of mobil... more A different dimension have come to the education with becoming widespread and cheapening of mobile devices and the development of wireless technologies, mobile devices have begun to be used in education and the concept of mobile learning has emerged. Mobile phones, smartphones, handhelds, tablets, laptop computers and wearable technologies are the main devices and categories used in mobile learning. It is observed that rapid technological developments in mobile devices have resulted in a rapid development in software technologies for mobile devices. Augmented reality applications, new generation game engines and personal developable applications for wearable technology show the size of mobile technology reached as the software. It is seen that mobile network and wireless communication technologies are also developed in line with the pace of mobile and software technology. All these mobile technologies allows mobile learning to be most appropriate for the learner. In addition, these ...

Research paper thumbnail of A Game Development for Android Devices Based on Brain Computer Interface Flying Brain

International Conference on Advances in Applied science and Environmental Technology - ASET 2015, 2015

The brain produces weak electrical signals that can be measured from the skull. Electroencephalog... more The brain produces weak electrical signals that can be measured from the skull. Electroencephalography (EEG) is a method that provides monitoring electrical activity of the brain with the electrical methods. Brain Computer Interface (BCI) is a system that converts the electrical signals produced by the brain to the signals that can be interpreted by a computer or an electronic system. In the last decades, brain signals could be measured with systems requiring high costs, but nowadays, many EEG devices are available for personal use. These EEG devices and systems have their signal transformation methods. These EEG devices and their SDKs are available for developers and EEG devices are used for purposes such as playing game, psychological relief, monitoring body by daily users. In this study, 'Flying Brain ' game has been developed as BCI based and development stages have been discussed. NeuroSky Mindwave Mobile has been used as EEG device. The game is controlled by attention and meditation measurements obtained by converting the signals received from the user. In the game, the opportunities consist in case of high attention and meditation that will allow players to gain extra points. Consequently, the BCI game was interpreted in terms of Human-Computer Interaction and improvements can be made for BCI based games were discussed.

Research paper thumbnail of The Most Common Vulnerabilities and Open Source Prevention Software

To store data and information on digital media and be accessible via the internet, makes the life... more To store data and information on digital media and be accessible via the internet, makes the life easy. Lots of user save or share personal information on digital platforms which are defined as local or public source. Banks, government agencies, commercial organizations also store and operate institutional customers’ information on digital systems. An account information of a customer, a secret project that a company working on, an official secret which saved on a digital platform also attract the attention of attacker. Therefore the concept of information security has been put forward. In the first part of this study; information, information security, privacy, availability, data integrity, the importance of information security; data theft and the reasons of it have been described. Other parts, describe the most common types of malwares, web application security risks and the open source intrusion detection and prevention software that can be used against risks and

Research paper thumbnail of Eyematch: An Eye Localization Method For Frontal Face Images

2019 1st International Informatics and Software Engineering Conference (UBMYK), 2019

In this paper, a novel approach to detect iris from images which contains frontal faces is propos... more In this paper, a novel approach to detect iris from images which contains frontal faces is proposed. The approach can be used for real time eye detection from cheap web cameras or other kind of cameras. First face region is detected by using haar cascades for frontal faces than possible eye region chosen from the face region. The eye regions reduced with the foreknowledge which is eyes are darker. Reduced image used with a tailored template matching algorithm to determine where eye really is.

Research paper thumbnail of İzi̇nli̇ Sağlik Personeli̇ne Katki Ödenmesi̇ndeki̇ Bazi Çeli̇şki̇ler Ve Tam Gün Yasasi

Ulkemizde ayni konularda yururlukte olan mevzuat coklugu ve celiskili hukumleri nedeniyle idari m... more Ulkemizde ayni konularda yururlukte olan mevzuat coklugu ve celiskili hukumleri nedeniyle idari mahkemelerde ve Danistay’da farkli kararlar alinabilmekte, bunun sonucunda da mahkeme kararlarini uygulayan kurum ve kisiler tereddutler yasayabilmektedir. Universitelere bagli Doner Sermaye Isletmelerinin katki payi dagitimlarinda, performans hesaplamalarinda ve izinlerinin uygulanmasinda celiskiler yasanabilmektedir. Diger taraftan 30 Ocak 2010 tarihinde Resmi Gazetede yayimlanan ve kamuoyunda Tam Gun Yasasi olarak bilinen mevzuatta bazi ifade eksiklikleri yer almistir. Bu calismada Universite Doner Sermaye Isletmeleri tarafindan katki, performans, ek odeme isimleri altinda yapilan odemelerde; mevzuat celiskilerinden ve karar vericilerin farkli dusuncelerinden kaynaklanan sorunlar ele alinacak, tam gun yasasindaki ifade eksiklikleri vurgulanacak ve cozum onerileri sunulacaktir.

Research paper thumbnail of 2.8. Fuzzy Equivalence of Classical Controllers

This paper concerns the exact equivalence of second order linear discrete controllers. The equiva... more This paper concerns the exact equivalence of second order linear discrete controllers. The equivalence principal automatically produces a systematic design procedure for the Fuzzy Controllers. The equivalence of the linear controllers can also be used to implement a nonlinear control behaviour by piecewise linear approximation. Another merit of the equivalence principle is that it provides an opportunity to have a fair comparison between linear and fuzzy controllers.

Research paper thumbnail of A New Approach for Lip Recognition

International journal of engineering research and technology, 2017

There are many biometric recognition opportunities such as fingerprints, face, eye iris, vein, et... more There are many biometric recognition opportunities such as fingerprints, face, eye iris, vein, etc. that can be used for determining a person’s identity. In the last decade, many papers have been published on biometric recognitions using lip location and its movements, but there are some difficulties and limitations initiated while using these biometric features for accurate and appropriate identifications. As a respond to these challenges, this theoretical and implemental research has been conducted. Innovations in lip-recognition usually incorporate lip localization and detection, highlight extraction, reading technique, and a combination of these strategies as well as the arrangement of the mouth. This research has investigated the features used for lip segmentation, techniques used for lip localization, lip recognition model, speech database, and mouth classification including the various applications of lip recognition technology. In addition, the research discusses the difficu...

Research paper thumbnail of A research on estimation of emotion using EEG signals and brain computer interfaces

The brain produces weak electrical signals that can be measured from the skull. Electroencephalog... more The brain produces weak electrical signals that can be measured from the skull. Electroencephalography (EEG) is a method that provides monitoring electrical activity of the brain with the electrical methods. Brain Computer Interface (BCI) is a system that converts the electrical signals produced by the brain to the signals that can be interpreted by a computer or an electronic system. Brain Computer Interface aims to produce the result on developed computer systems rather than creating a response in the body from the signals sent by the brain. Emotion is defined as a psychophysiological change in the mood of a person that emerges by interaction with biochemical and environmental effects. There are many methods on emotion recognition research. These include voice recognition, recognition with mimics, and so on. However, face expression or tone of voice does not always represent feelings. Skin conductivity, skin temperature changes, blood pressure, heartbeat are also used for emotion ...

Research paper thumbnail of Predicting Student’s Final Graduation CGPA Using Data Mining and Regression Methods: A Case Study of Kano Informatics Institute

2020 8th International Symposium on Digital Forensics and Security (ISDFS), 2020

Data mining and regression techniques are important methods that we can use to predict students’ ... more Data mining and regression techniques are important methods that we can use to predict students’ performance to inform decision making. This study uses five regression techniques to analyse students’ first-year cumulative grade point average (CGPA) and predict their final graduation CGPA. The data set used in this study is that of programming and software development students at Kano Informatics Institute. The results and the grades obtained by 163 students forms the sample data used in the study. The forecast error, mean forecast error and mean absolute forecast error are all calculated. Dickey–Fuller’s stationary t-test is performed for all the regressions analysis values using the Python programming language to determine the mean and if the data is centred on the mean. We use the stationary t-test to test the null and alternative Dickey–Fuller’s hypotheses to compare our P-values and critical values for all regressions analyses done. The results show that the P-values obtained fo...

Research paper thumbnail of Easymatch- An Eye Localization Method for Frontal Face Images Using Facial Landmarks

Tehnicki vjesnik - Technical Gazette, 2020

Eye detection algorithms are being used in many fields such as camera applications for entertainm... more Eye detection algorithms are being used in many fields such as camera applications for entertainment and commercial purposes, gaze detection applications, computer-human interaction applications, and eye recognition applications for security, etc. Successful and fast eye detection is an essential step for all these applications in order to achieve good results. There are many eye detection methods in the literature, and most of them rely on the Viola-Jones method to detect the face before localizing eyes. In this paper, a straightforward approach to detect eyes from images which contain a frontal face is proposed. The approach can be used for real-time eye detection using cheap web cameras or other cameras. First, face landmarks are detected from the image, and by utilizing these landmarks; the eye region is determined. The eye radius is estimated by utilizing eye corners. Then, reduced input images are tested with a tailored matching algorithm which does not need image reduction to determine where the eye is.

Research paper thumbnail of Developing Additional Features into Ilias Learning Management System

Original scientific paper Electronic learning (e-learning) has changed learning and teaching desi... more Original scientific paper Electronic learning (e-learning) has changed learning and teaching design round the world, it have been advanced by educational institutes with large efforts. Learning Management System (LMS) is one of the significant web based invention to e-learning platform. One of the LMS is ILIAS, which is a web based LMS, advanced by using best open source technology PHP, MySQL and Apache is used as web server. ILIAS is sophisticated in German but it also supports multiple languages including English. The aim of the research is to learn more about ILIAS, examine ILIAS to search for missing feature in ILIAS. Thus, the goals of the study will be writing codes to add three missing features to ILIAS. Those features are: Date filter for e-mails, Move E-mails to Folders by Drag and Drop and Text formatting editor for message content.

Research paper thumbnail of Bilgi güvenliği ve RSA şifreleme algoritmasının incelenmesi

Bilgi güvenliği, bilgilerin güvenliğini sağlamak amacı ile yürütülen her türlü çaba ya da faaliye... more Bilgi güvenliği, bilgilerin güvenliğini sağlamak amacı ile yürütülen her türlü çaba ya da faaliyet olarak tanımlanmaktadır. Bilginin korunmasında gizlilik, bütünlük ve kullanılabilirlik hedefleri esastır. Bu esasların sağlanabilmesi için, bilginin uygun bir şifreleme tekniğiyle anlaşılamaz hale getirilmesi gereklidir.Bu çalışmada, günümüzde özellikle bankacılık sistemlerinde sayısal verileri şifrelemede kullanılan RSA algoritması incelenmiştir. Ayrıca nesne tabanlı bir programlama dili kullanılarak RSA algoritmasının çalışmasını gösteren yeni bir ara yüz tasarımı gerçekleştirilmiştir.Information security is described as the all sorts of actions and efforts to ensure the safety of the information. Targeting privacy, integrity and employability is the principal of the securing information. In order to provide these bases, information has to be encoded to an unknown structure. In this study, the RSA encoding algorithm, which is especially employed in banking systems, is investigated. M...

Research paper thumbnail of Forecasting Foreign Visitors Arrivals Using Hybrid Model and Monte Carlo Simulation

International Journal of Information Technology & Decision Making

The tourism industry is one of the important revenue sectors in today’s world. Millions of visits... more The tourism industry is one of the important revenue sectors in today’s world. Millions of visits are made monthly to different countries across the planet. Some countries host more tourists than others, depending on the availability of factors that would fascinate visitors. Tourism demand can be affected by different factors, which may include government policies, insecurity, political motive, etc. Being an important sector, policymakers/governments are keen on models that would provide an insight into the inherent dynamics of tourism in their country. Especially in forecasting future tourist arrivals, as it will greatly assist in decision making. Several tourism demand models have been presented in the literature. The best practice is to have a model that would account for uncertainty in estimations. In this paper, an ANN-Polynomial-Fourier series model is implemented to capture and forecast tourist data for Turkey, Japan, Malaysia, and Singapore. The proposed model is a combinati...

Research paper thumbnail of A Novel Deep Feature Extraction Engineering for Subtypes of Breast Cancer Diagnosis: A Transfer Learning Approach

2022 10th International Symposium on Digital Forensics and Security (ISDFS)

Feature extraction from histological images is a challenging part of computer-aided detection of ... more Feature extraction from histological images is a challenging part of computer-aided detection of breast cancer. For this research, we present a novel technique for deep feature extraction for breast cancer diagnosis subtypes based on a transfer learning approach using the BreaKhis dataset. This approach consists of five phases: feature extraction, concatenation, transformation, selection, and classification. In the first phase, nineteen pre-trained convolutional neural networks were used as feature extractors to extract features from the input images. A Support Vector Machine was used at the feature extraction phase to calculate the misclassification rate of each feature generated by the pre-trained networks used. The feature extraction results showed that the two networks achieved the highest accuracy on the dataset and outperformed the other networks. The two networks considered were selected and connected to create the DRNet model, combining the pre-trained networks ResNet50 and DenseNet201. The extracted features were decomposed into five sub-hand low-level features using a multilevel discrete wavelet transform in the transformation phase. An iterative neighborhood component analyzer was used to select the minimum number of features needed in the classification phase. A cubic support vector machine was used as a classifier in the final phase. Average classification accuracy of 98.61%, 98.04%, 97.68%, and 97.71% for the 40×, 100×, 200×, and 400× magnification levels, respectively, was achieved.

Research paper thumbnail of Sosyal Ağlarda Güvenlik: Bitlis Eren ve Fırat Üniversitelerinde Gerçekleştirilen Bir Alan Çalışması

Türkiye Bilişim Vakfı Bilgisayar Bilimleri ve Mühendisliği Dergisi, Jun 24, 2016

Research paper thumbnail of İnovasyon 2023 AR-GE ve İnovasyon Sempozyumu (Fırat Üniversitesi) Sempozyum Bildiri Kitabı

by Lokman Dogan, Mine Halis, Mehmet Karahan, Nurcan YÜcel, Tekin erdoğan, yunus santur, Yasin DALGIÇ, İlhan Tabur, İlhan Ege, Ahmet Kibar Çetin, Asaf Varol, Tayfun Yıldız, and Zafer AYKANAT

Değerli arkadaşlar sisteme yüklenen "Girişimciliğin Dinamikleri: Ülke Kurumsal Yapısının Girişimc... more Değerli arkadaşlar sisteme yüklenen "Girişimciliğin Dinamikleri: Ülke Kurumsal Yapısının Girişimciliğin Yoğunluğuna Etkisine Dair Ampirik Bir İnceleme" isimli bildiri, Tübitak tarafından desteklenen ve Fırat Üniversitesinde 24-25 Nisan tarihleri arasında düzenlenen "İnovasyon 2023 AR-GE ve İnovasyon Sempozyumunda" bildiri olarak sunulmuştur.

Research paper thumbnail of Review of evidence analysis and reporting phases in digital forensics process

2017 International Conference on Computer Science and Engineering (UBMK)

This paper reviews digital forensic phases and problems in evidence analysis phase and smart meth... more This paper reviews digital forensic phases and problems in evidence analysis phase and smart methods in this area. Among these phases, studies on the evidence analysis phase are examined. In the analysis of electronic evidences, use of smart methods and their development will contribute to information technology law and improvement of digital forensic devices. Effective evidence analysis both provides easiness for digital forensic experts and helps jurists tor accurate decisions. In this paper, digital forensic process and smart methods used in evidence analysis are examined. This literature survey discussed which new methods can be added to this process.

Research paper thumbnail of Performance Analysis of Deep Approaches on Airbnb Sentiment Reviews

2022 10th International Symposium on Digital Forensics and Security (ISDFS)

Research paper thumbnail of Risks of Digital Transformation: Review of Machine Learning Algorithms in Credit Card Fraud Detection

2021 2nd International Informatics and Software Engineering Conference (IISEC), 2021

In addition to the advantages of the digital world, there are also disadvantages, which can harm ... more In addition to the advantages of the digital world, there are also disadvantages, which can harm people. With the spread of credit cards with the digital transformation, banks have become the targets of malicious hackers. In this study, firstly, information about artificial intelligence and digital transformation is given. In related studies, some machine learning methods such as Random Forest, Naive Bayes, K-Nearest Neighbor, Logistic Regression, Support Vector Machines, Decision Tree, Artificial Neural Networks, Multilayer Perceptron and Ensemble Learning have been used to detect credit card fraud and their algorithm performance has been demonstrated.

Research paper thumbnail of CD24, not CD47, negatively impacts upon response to PD‐1/L1 inhibitors in non–small‐cell lung cancer with PD‐L1 tumor proportion score  50

Cancer Science, 2020

This is an open access article under the terms of the Creative Commons Attribution-NonCommercial ... more This is an open access article under the terms of the Creative Commons Attribution-NonCommercial License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited and is not used for commercial purposes.

Research paper thumbnail of Mobile Technologies for Mobile Learning: Developmental Process Review

A different dimension have come to the education with becoming widespread and cheapening of mobil... more A different dimension have come to the education with becoming widespread and cheapening of mobile devices and the development of wireless technologies, mobile devices have begun to be used in education and the concept of mobile learning has emerged. Mobile phones, smartphones, handhelds, tablets, laptop computers and wearable technologies are the main devices and categories used in mobile learning. It is observed that rapid technological developments in mobile devices have resulted in a rapid development in software technologies for mobile devices. Augmented reality applications, new generation game engines and personal developable applications for wearable technology show the size of mobile technology reached as the software. It is seen that mobile network and wireless communication technologies are also developed in line with the pace of mobile and software technology. All these mobile technologies allows mobile learning to be most appropriate for the learner. In addition, these ...

Research paper thumbnail of A Game Development for Android Devices Based on Brain Computer Interface Flying Brain

International Conference on Advances in Applied science and Environmental Technology - ASET 2015, 2015

The brain produces weak electrical signals that can be measured from the skull. Electroencephalog... more The brain produces weak electrical signals that can be measured from the skull. Electroencephalography (EEG) is a method that provides monitoring electrical activity of the brain with the electrical methods. Brain Computer Interface (BCI) is a system that converts the electrical signals produced by the brain to the signals that can be interpreted by a computer or an electronic system. In the last decades, brain signals could be measured with systems requiring high costs, but nowadays, many EEG devices are available for personal use. These EEG devices and systems have their signal transformation methods. These EEG devices and their SDKs are available for developers and EEG devices are used for purposes such as playing game, psychological relief, monitoring body by daily users. In this study, 'Flying Brain ' game has been developed as BCI based and development stages have been discussed. NeuroSky Mindwave Mobile has been used as EEG device. The game is controlled by attention and meditation measurements obtained by converting the signals received from the user. In the game, the opportunities consist in case of high attention and meditation that will allow players to gain extra points. Consequently, the BCI game was interpreted in terms of Human-Computer Interaction and improvements can be made for BCI based games were discussed.

Research paper thumbnail of The Most Common Vulnerabilities and Open Source Prevention Software

To store data and information on digital media and be accessible via the internet, makes the life... more To store data and information on digital media and be accessible via the internet, makes the life easy. Lots of user save or share personal information on digital platforms which are defined as local or public source. Banks, government agencies, commercial organizations also store and operate institutional customers’ information on digital systems. An account information of a customer, a secret project that a company working on, an official secret which saved on a digital platform also attract the attention of attacker. Therefore the concept of information security has been put forward. In the first part of this study; information, information security, privacy, availability, data integrity, the importance of information security; data theft and the reasons of it have been described. Other parts, describe the most common types of malwares, web application security risks and the open source intrusion detection and prevention software that can be used against risks and

Research paper thumbnail of Eyematch: An Eye Localization Method For Frontal Face Images

2019 1st International Informatics and Software Engineering Conference (UBMYK), 2019

In this paper, a novel approach to detect iris from images which contains frontal faces is propos... more In this paper, a novel approach to detect iris from images which contains frontal faces is proposed. The approach can be used for real time eye detection from cheap web cameras or other kind of cameras. First face region is detected by using haar cascades for frontal faces than possible eye region chosen from the face region. The eye regions reduced with the foreknowledge which is eyes are darker. Reduced image used with a tailored template matching algorithm to determine where eye really is.

Research paper thumbnail of İzi̇nli̇ Sağlik Personeli̇ne Katki Ödenmesi̇ndeki̇ Bazi Çeli̇şki̇ler Ve Tam Gün Yasasi

Ulkemizde ayni konularda yururlukte olan mevzuat coklugu ve celiskili hukumleri nedeniyle idari m... more Ulkemizde ayni konularda yururlukte olan mevzuat coklugu ve celiskili hukumleri nedeniyle idari mahkemelerde ve Danistay’da farkli kararlar alinabilmekte, bunun sonucunda da mahkeme kararlarini uygulayan kurum ve kisiler tereddutler yasayabilmektedir. Universitelere bagli Doner Sermaye Isletmelerinin katki payi dagitimlarinda, performans hesaplamalarinda ve izinlerinin uygulanmasinda celiskiler yasanabilmektedir. Diger taraftan 30 Ocak 2010 tarihinde Resmi Gazetede yayimlanan ve kamuoyunda Tam Gun Yasasi olarak bilinen mevzuatta bazi ifade eksiklikleri yer almistir. Bu calismada Universite Doner Sermaye Isletmeleri tarafindan katki, performans, ek odeme isimleri altinda yapilan odemelerde; mevzuat celiskilerinden ve karar vericilerin farkli dusuncelerinden kaynaklanan sorunlar ele alinacak, tam gun yasasindaki ifade eksiklikleri vurgulanacak ve cozum onerileri sunulacaktir.

Research paper thumbnail of 2.8. Fuzzy Equivalence of Classical Controllers

This paper concerns the exact equivalence of second order linear discrete controllers. The equiva... more This paper concerns the exact equivalence of second order linear discrete controllers. The equivalence principal automatically produces a systematic design procedure for the Fuzzy Controllers. The equivalence of the linear controllers can also be used to implement a nonlinear control behaviour by piecewise linear approximation. Another merit of the equivalence principle is that it provides an opportunity to have a fair comparison between linear and fuzzy controllers.

Research paper thumbnail of A New Approach for Lip Recognition

International journal of engineering research and technology, 2017

There are many biometric recognition opportunities such as fingerprints, face, eye iris, vein, et... more There are many biometric recognition opportunities such as fingerprints, face, eye iris, vein, etc. that can be used for determining a person’s identity. In the last decade, many papers have been published on biometric recognitions using lip location and its movements, but there are some difficulties and limitations initiated while using these biometric features for accurate and appropriate identifications. As a respond to these challenges, this theoretical and implemental research has been conducted. Innovations in lip-recognition usually incorporate lip localization and detection, highlight extraction, reading technique, and a combination of these strategies as well as the arrangement of the mouth. This research has investigated the features used for lip segmentation, techniques used for lip localization, lip recognition model, speech database, and mouth classification including the various applications of lip recognition technology. In addition, the research discusses the difficu...

Research paper thumbnail of A research on estimation of emotion using EEG signals and brain computer interfaces

The brain produces weak electrical signals that can be measured from the skull. Electroencephalog... more The brain produces weak electrical signals that can be measured from the skull. Electroencephalography (EEG) is a method that provides monitoring electrical activity of the brain with the electrical methods. Brain Computer Interface (BCI) is a system that converts the electrical signals produced by the brain to the signals that can be interpreted by a computer or an electronic system. Brain Computer Interface aims to produce the result on developed computer systems rather than creating a response in the body from the signals sent by the brain. Emotion is defined as a psychophysiological change in the mood of a person that emerges by interaction with biochemical and environmental effects. There are many methods on emotion recognition research. These include voice recognition, recognition with mimics, and so on. However, face expression or tone of voice does not always represent feelings. Skin conductivity, skin temperature changes, blood pressure, heartbeat are also used for emotion ...

Research paper thumbnail of Predicting Student’s Final Graduation CGPA Using Data Mining and Regression Methods: A Case Study of Kano Informatics Institute

2020 8th International Symposium on Digital Forensics and Security (ISDFS), 2020

Data mining and regression techniques are important methods that we can use to predict students’ ... more Data mining and regression techniques are important methods that we can use to predict students’ performance to inform decision making. This study uses five regression techniques to analyse students’ first-year cumulative grade point average (CGPA) and predict their final graduation CGPA. The data set used in this study is that of programming and software development students at Kano Informatics Institute. The results and the grades obtained by 163 students forms the sample data used in the study. The forecast error, mean forecast error and mean absolute forecast error are all calculated. Dickey–Fuller’s stationary t-test is performed for all the regressions analysis values using the Python programming language to determine the mean and if the data is centred on the mean. We use the stationary t-test to test the null and alternative Dickey–Fuller’s hypotheses to compare our P-values and critical values for all regressions analyses done. The results show that the P-values obtained fo...

Research paper thumbnail of Easymatch- An Eye Localization Method for Frontal Face Images Using Facial Landmarks

Tehnicki vjesnik - Technical Gazette, 2020

Eye detection algorithms are being used in many fields such as camera applications for entertainm... more Eye detection algorithms are being used in many fields such as camera applications for entertainment and commercial purposes, gaze detection applications, computer-human interaction applications, and eye recognition applications for security, etc. Successful and fast eye detection is an essential step for all these applications in order to achieve good results. There are many eye detection methods in the literature, and most of them rely on the Viola-Jones method to detect the face before localizing eyes. In this paper, a straightforward approach to detect eyes from images which contain a frontal face is proposed. The approach can be used for real-time eye detection using cheap web cameras or other cameras. First, face landmarks are detected from the image, and by utilizing these landmarks; the eye region is determined. The eye radius is estimated by utilizing eye corners. Then, reduced input images are tested with a tailored matching algorithm which does not need image reduction to determine where the eye is.