
Emir Öztürk- PhD
- Assistant Professor at Trakya University
Emir Öztürk
- PhD
- Assistant Professor at Trakya University
About
32
Publications
5,106
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
55
Citations
Introduction
Current institution
Additional affiliations
February 2021 - present
September 2010 - February 2021
Education
February 2013 - November 2018
September 2010 - August 2012
September 2006 - July 2010
Publications
Publications (32)
Background/Objectives: Accurate localization of fractured endodontic instruments (FEIs) in periapical radiographs (PAs) remains a significant challenge. This study aimed to evaluate the performance of YOLOv8 and Mask R-CNN in detecting FEIs and root canal treatments (RCTs) and compare their diagnostic capabilities with those of experienced endodont...
Learning-based data compression methods have gained significant attention in recent years. Although these methods achieve higher compression ratios compared to traditional techniques, their slow processing times make them less suitable for compressing large datasets, and they are generally more effective for short texts rather than longer ones. In...
It is important to save space storing the generated data. To achieve this, compression algorithms are used. Stored data is compressed once but accessed many times to search on it. For this reason, the biggest disadvantage of compressed data is that it needs to be decompressed when it will be used. This disadvantage can be eliminated by using a fast...
In this study, a steganography method based on BERT transformer model is proposed for hiding text data in cover text. The aim is to hide information by replacing specific words within the text using BERT’s masked language modeling (MLM) feature. In this study, two models, fine-tuned for English and Turkish, are utilized to perform steganography on...
The complexity and dimensions of deep learning models are increasing. Along with the growing complexity, vector databases have been proposed to store high-dimensional data required by the models. Vector databases aim to store high-dimensional vectors and perform similarity calculations on these vectors. In this study, the insertion and query perfor...
E-learning has experienced a surge in popularity, particularly during and after the COVID-19 pandemic. Online learning has proven to be a vital tool for students and educators to continue academic activities while adhering to social distancing guidelines and during the times of natural disasters that disrupt the conventional learning environments....
After using clean water, giving it back to nature causes environmental pollution. Treatment processes are used to clean the used wastewater. The water passed through various processes is cleaned and given to the environment. Some organizations are in charge of providing and cleaning water in collective settlements. However, the inspection is carrie...
B-Tree based text indexes used in MongoDB are slow compared to different structures such as inverted indexes. In this study, it has been shown that the full-text search speed can be increased significantly by indexing a structure in which each different word in the text is included only once. The Multi-Stream Word-Based Compression Algorithm (MWCA)...
Using data compression algorithms in data transmission and storage provides advantages in terms of time and storage cost. There are
several methods for compressing texts created in natural language which is one of the most produced data types. Many traditional
methods are not successful in compressing short texts. Compressing short texts requires d...
Still images have a significant share in the data created today. These images take up a lot of space in their raw form. Image compression algorithms provide a much smaller representation of images in order to solve this problem. The JPEG group offered many alternatives to the JPEG algorithm, which became insufficient due to the increase in resoluti...
It has become a necessity to use compression algorithms in image data. One of the most used image compression algorithms, JPEG performs lossy compression on an image and the loss varies according to the given quality factor. At low quality factor values, the file size gets smaller and artifacts become noticeable. In high quality factors, quality of...
Huge amount of data is shared online with the development of technology and internet. This development provides various potential to users. Although, securing the data on the digital platform has been one of the most important issues. Various methods have been developed for data security. Encryption and steganography are the most used ones. These a...
In this article, we present a novel word-based lossless compression algorithm for text files using a semi-static model. We named this method the ‘Multi-stream word-based compression algorithm (MWCA)’ because it stores the compressed forms of the words in three individual streams depending on their frequencies in the text and stores two dictionaries...
Compressing image files after splitting them into certain number of parts can increase compression ratio. Acquired compression ratio can also be increased by compressing each part of the image using different algorithms, because each algorithm gives different compression ratios on different complexity values. In this study, statistical compression...
In this study, the authors propose new methods using a divide-and-conquer strategy to generate n × n binary matrices (for composite n) with a high/maximum branch number and the same Hamming weight in each row and column. They introduce new types of binary matrices: namely, ( BHwC ) t, m and ( BCwC ) q, m types, which are a combination of Hadamard a...
In this paper, we propose a new method to generate n × n binary matrices (for n = k·2t where k and t are positive integers) with a maximum/high of branch numbers and a minimum number of fixed points by using 2t×2t Hadamard (almost) maximum distance separable matrices and k × k cyclic binary matrix groups. By using the proposed method, we generate n...
İki boyutlu durağan görüntülerin sayısal ortamda saklanırken kayıplı veya kayıpsız sıkıştırma yöntemlerinin kullanılmasıyla daha az yer kaplamalarını sağlamak mümkündür. Bunun için fotoğraf türündeki görüntülerde etkili olan JPEG, JPEG2000 ve JPEG XR veya karmaşıklığın (entropinin) az olduğu görüntülerde iyi sonuç veren GIF ve PNG gibi yöntemler ku...
Teknolojinin gelişmesiyle birlikte dijital ortamdaki verilerin güvenliğini sağlamak gerekliliği ortaya çıkmıştır. Bilgi güvenliği sağlamak amacıyla genellikle şifreleme teknikleri ve steganografi teknikleri kullanılmaktadır. Bu iki yöntem tek başlarına kullanılabildikleri gibi güvenliği arttırmak amacıyla birlikte de kullanılabilmektedir. Şifreleme...