Emir Öztürk

Emir Öztürk
Verified
Emir verified their affiliation via an institutional email.
Verified
Emir verified their affiliation via an institutional email.
  • PhD
  • Assistant Professor at Trakya University

About

32
Publications
5,106
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
55
Citations
Current institution
Trakya University
Current position
  • Assistant Professor
Additional affiliations
February 2021 - present
Trakya University
Position
  • Assist. Prof
September 2010 - February 2021
Trakya University
Position
  • Research Assistant
Education
February 2013 - November 2018
Yıldız Technical University
Field of study
  • Computer Science
September 2010 - August 2012
Trakya University
Field of study
  • Computer Science
September 2006 - July 2010
Trakya University
Field of study
  • Computer Science

Publications

Publications (32)
Article
Full-text available
Background/Objectives: Accurate localization of fractured endodontic instruments (FEIs) in periapical radiographs (PAs) remains a significant challenge. This study aimed to evaluate the performance of YOLOv8 and Mask R-CNN in detecting FEIs and root canal treatments (RCTs) and compare their diagnostic capabilities with those of experienced endodont...
Article
Full-text available
Learning-based data compression methods have gained significant attention in recent years. Although these methods achieve higher compression ratios compared to traditional techniques, their slow processing times make them less suitable for compressing large datasets, and they are generally more effective for short texts rather than longer ones. In...
Article
Full-text available
It is important to save space storing the generated data. To achieve this, compression algorithms are used. Stored data is compressed once but accessed many times to search on it. For this reason, the biggest disadvantage of compressed data is that it needs to be decompressed when it will be used. This disadvantage can be eliminated by using a fast...
Article
Full-text available
In this study, a steganography method based on BERT transformer model is proposed for hiding text data in cover text. The aim is to hide information by replacing specific words within the text using BERT’s masked language modeling (MLM) feature. In this study, two models, fine-tuned for English and Turkish, are utilized to perform steganography on...
Article
The complexity and dimensions of deep learning models are increasing. Along with the growing complexity, vector databases have been proposed to store high-dimensional data required by the models. Vector databases aim to store high-dimensional vectors and perform similarity calculations on these vectors. In this study, the insertion and query perfor...
Article
E-learning has experienced a surge in popularity, particularly during and after the COVID-19 pandemic. Online learning has proven to be a vital tool for students and educators to continue academic activities while adhering to social distancing guidelines and during the times of natural disasters that disrupt the conventional learning environments....
Conference Paper
After using clean water, giving it back to nature causes environmental pollution. Treatment processes are used to clean the used wastewater. The water passed through various processes is cleaned and given to the environment. Some organizations are in charge of providing and cleaning water in collective settlements. However, the inspection is carrie...
Article
Full-text available
B-Tree based text indexes used in MongoDB are slow compared to different structures such as inverted indexes. In this study, it has been shown that the full-text search speed can be increased significantly by indexing a structure in which each different word in the text is included only once. The Multi-Stream Word-Based Compression Algorithm (MWCA)...
Article
Full-text available
Using data compression algorithms in data transmission and storage provides advantages in terms of time and storage cost. There are several methods for compressing texts created in natural language which is one of the most produced data types. Many traditional methods are not successful in compressing short texts. Compressing short texts requires d...
Conference Paper
Full-text available
Still images have a significant share in the data created today. These images take up a lot of space in their raw form. Image compression algorithms provide a much smaller representation of images in order to solve this problem. The JPEG group offered many alternatives to the JPEG algorithm, which became insufficient due to the increase in resoluti...
Article
Full-text available
It has become a necessity to use compression algorithms in image data. One of the most used image compression algorithms, JPEG performs lossy compression on an image and the loss varies according to the given quality factor. At low quality factor values, the file size gets smaller and artifacts become noticeable. In high quality factors, quality of...
Article
Huge amount of data is shared online with the development of technology and internet. This development provides various potential to users. Although, securing the data on the digital platform has been one of the most important issues. Various methods have been developed for data security. Encryption and steganography are the most used ones. These a...
Article
Full-text available
In this article, we present a novel word-based lossless compression algorithm for text files using a semi-static model. We named this method the ‘Multi-stream word-based compression algorithm (MWCA)’ because it stores the compressed forms of the words in three individual streams depending on their frequencies in the text and stores two dictionaries...
Article
Full-text available
Compressing image files after splitting them into certain number of parts can increase compression ratio. Acquired compression ratio can also be increased by compressing each part of the image using different algorithms, because each algorithm gives different compression ratios on different complexity values. In this study, statistical compression...
Article
In this study, the authors propose new methods using a divide-and-conquer strategy to generate n × n binary matrices (for composite n) with a high/maximum branch number and the same Hamming weight in each row and column. They introduce new types of binary matrices: namely, ( BHwC ) t, m and ( BCwC ) q, m types, which are a combination of Hadamard a...
Article
In this paper, we propose a new method to generate n × n binary matrices (for n = k·2t where k and t are positive integers) with a maximum/high of branch numbers and a minimum number of fixed points by using 2t×2t Hadamard (almost) maximum distance separable matrices and k × k cyclic binary matrix groups. By using the proposed method, we generate n...
Conference Paper
Full-text available
İki boyutlu durağan görüntülerin sayısal ortamda saklanırken kayıplı veya kayıpsız sıkıştırma yöntemlerinin kullanılmasıyla daha az yer kaplamalarını sağlamak mümkündür. Bunun için fotoğraf türündeki görüntülerde etkili olan JPEG, JPEG2000 ve JPEG XR veya karmaşıklığın (entropinin) az olduğu görüntülerde iyi sonuç veren GIF ve PNG gibi yöntemler ku...
Conference Paper
Full-text available
Teknolojinin gelişmesiyle birlikte dijital ortamdaki verilerin güvenliğini sağlamak gerekliliği ortaya çıkmıştır. Bilgi güvenliği sağlamak amacıyla genellikle şifreleme teknikleri ve steganografi teknikleri kullanılmaktadır. Bu iki yöntem tek başlarına kullanılabildikleri gibi güvenliği arttırmak amacıyla birlikte de kullanılabilmektedir. Şifreleme...

Network

Cited By