Emir Öztürk

Emir Öztürk
Trakya University · Department of Computer Science

PhD

About

24
Publications
2,487
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
16
Citations
Citations since 2016
16 Research Items
14 Citations
20162017201820192020202120220123456
20162017201820192020202120220123456
20162017201820192020202120220123456
20162017201820192020202120220123456
Additional affiliations
February 2021 - present
Trakya University
Position
  • Assist. Prof
September 2010 - February 2021
Trakya University
Position
  • Research Assistant
Education
February 2013 - November 2018
Yildiz Technical University
Field of study
  • Computer Science
September 2010 - August 2012
Trakya University
Field of study
  • Computer Science
September 2006 - July 2010
Trakya University
Field of study
  • Computer Science

Publications

Publications (24)
Article
B-Tree based text indexes used in MongoDB are slow compared to different structures such as inverted indexes. In this study, it has been shown that the full-text search speed can be increased significantly by indexing a structure in which each different word in the text is included only once. The Multi-Stream Word-Based Compression Algorithm (MWCA)...
Article
Full-text available
Using data compression algorithms in data transmission and storage provides advantages in terms of time and storage cost. There are several methods for compressing texts created in natural language which is one of the most produced data types. Many traditional methods are not successful in compressing short texts. Compressing short texts requires d...
Conference Paper
Full-text available
Still images have a significant share in the data created today. These images take up a lot of space in their raw form. Image compression algorithms provide a much smaller representation of images in order to solve this problem. The JPEG group offered many alternatives to the JPEG algorithm, which became insufficient due to the increase in resoluti...
Article
Full-text available
It has become a necessity to use compression algorithms in image data. One of the most used image compression algorithms, JPEG performs lossy compression on an image and the loss varies according to the given quality factor. At low quality factor values, the file size gets smaller and artifacts become noticeable. In high quality factors, quality of...
Article
Huge amount of data is shared online with the development of technology and internet. This development provides various potential to users. Although, securing the data on the digital platform has been one of the most important issues. Various methods have been developed for data security. Encryption and steganography are the most used ones. These a...
Article
In this article, we present a novel word-based lossless compression algorithm for text files using a semi-static model. We named this method the ‘Multi-stream word-based compression algorithm (MWCA)’ because it stores the compressed forms of the words in three individual streams depending on their frequencies in the text and stores two dictionaries...
Article
Full-text available
Compressing image files after splitting them into certain number of parts can increase compression ratio. Acquired compression ratio can also be increased by compressing each part of the image using different algorithms, because each algorithm gives different compression ratios on different complexity values. In this study, statistical compression...
Article
In this study, the authors propose new methods using a divide-and-conquer strategy to generate n × n binary matrices (for composite n) with a high/maximum branch number and the same Hamming weight in each row and column. They introduce new types of binary matrices: namely, ( BHwC ) t, m and ( BCwC ) q, m types, which are a combination of Hadamard a...
Article
In this paper, we propose a new method to generate n × n binary matrices (for n = k·2t where k and t are positive integers) with a maximum/high of branch numbers and a minimum number of fixed points by using 2t×2t Hadamard (almost) maximum distance separable matrices and k × k cyclic binary matrix groups. By using the proposed method, we generate n...
Conference Paper
Full-text available
İki boyutlu durağan görüntülerin sayısal ortamda saklanırken kayıplı veya kayıpsız sıkıştırma yöntemlerinin kullanılmasıyla daha az yer kaplamalarını sağlamak mümkündür. Bunun için fotoğraf türündeki görüntülerde etkili olan JPEG, JPEG2000 ve JPEG XR veya karmaşıklığın (entropinin) az olduğu görüntülerde iyi sonuç veren GIF ve PNG gibi yöntemler ku...
Conference Paper
Full-text available
Teknolojinin gelişmesiyle birlikte dijital ortamdaki verilerin güvenliğini sağlamak gerekliliği ortaya çıkmıştır. Bilgi güvenliği sağlamak amacıyla genellikle şifreleme teknikleri ve steganografi teknikleri kullanılmaktadır. Bu iki yöntem tek başlarına kullanılabildikleri gibi güvenliği arttırmak amacıyla birlikte de kullanılabilmektedir. Şifreleme...

Network

Cited By