Kemal Ozkan

Kemal Ozkan
Eskisehir Osmangazi University | ESOGU · Department of Computer Engineering

About

81
Publications
9,623
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
309
Citations

Publications

Publications (81)
Article
Full-text available
This study presents a novel Quaternion-based link prediction method to be used in different recommendation systems. The method performs Quaternion algebra-based computations while making use of expressive and wide-ranged learning properties of the Hamilton products. The proposed key capabilities rely on link prediction to boost performance in top-N...
Article
Full-text available
Early fault detection and real-time condition monitoring systems have become quite significant for today’s modern industrial systems. In a high volume of manufacturing facilities, fleets of equipment are expected to operate uninterrupted for days or weeks. Any unplanned interruptions to equipment uptime could jeopardize manufacturers’ cycle time, c...
Article
The integration of Industry 4.0 concepts into today’s manufacturing settings has introduced new technology tools that have already started providing companies an increased level of efficiency in certain operations. Autonomous Transfer Vehicles (ATV) are one of these new tools that are popular in today’s manufacturing settings. As these tools become...
Article
Chlorine content is one of the most important parameters in Refuse Derived Fuels (RDFs) used as a fuel in cement kilns. The main problem with the use of RDF is that chlorine in the waste weakens the cement, increases the risk of corrosion in the kiln and forms toxic gas emissions. Alternative fuels containing high amounts of chlorine, such as plast...
Article
Hem ülkesel hem de dünyanın önemli bir besin kaynağı olan domates bitkisinin hastalıklarının önceden belirlenmesi önemlidir. Bu çalışmada literatürdeki standart veri setlerine ilaveten toplanan saha verileri kullanarak yaygın olan alternaria ve mildiyö hastalıkların tespiti için bir yöntem önerilmiştir. Derin öğrenmede sıklıkla kullanılan Resnet50...
Article
Full-text available
Deep learning (DL) techniques have been gaining ground for intelligent equipment/process fault diagnosis applications. However, employing DL methods for such applications comes with its technical challenges. The DL methods are utilized to extract features from raw data automatically, which leads up to its own complications in data preprocessing and...
Article
The pyrolysis process enables the transformation of plastic waste into products such as oil, solid residue, and gas at temperatures of around 300–900 °C by thermal decomposition. Conversion of such waste into valuable products depends on various factors, such as raw material composition, temperature, heating rate, residence time, and catalyst. From...
Article
Full-text available
Maintenance planning is critical for efficient operations of manufacturing systems. While unnecessary maintenance causes waste of money and time, skipping necessary maintenance can also cause unexpected down times in production. Predictive maintenance activities which focus on both detection and classification of equipment faults at an early stage...
Chapter
Images that widely exist on e-commerce sites, social networks, and many other applications are one of the most important information resources integrated into the recently deployed image-based recommender systems. In the latest studies, researchers have jointly considered ratings and images to generate recommendations, many of which are still restr...
Conference Paper
This paper proposes a Quaternion-based link prediction method, a novel representation learning method for recommendation purposes. The proposed algorithm depends on and computation with Quaternion algebra, benefiting from the expressiveness and rich representation learning capability of the Hamilton products. The proposed method depends on a link p...
Article
Full-text available
To facilitate the quality assessment of wheat cultivars, diverse imaging tools and techniques have been applied in order to omit the expert decision, which can cause failure in the identification of the wheat cultivar's label and its quality simultaneously. To minimize the risks caused by the expert's decision, a promising framework for identificat...
Article
In this study, an automated system for classification of leaf species based on the global and local features is presented by concentrating on a smart and unorthodox decision system. The utilized global features consist of 11 features and are separated into two categories: gross shape features (7) and moment based features (4), respectively. In case...
Article
Full-text available
ÖZET: Bu çalışma Ülkesel Ekmeklik Buğday Alım Bareminde kırmızı ve beyaz sert ekmeklik buğday grubunundaki buğdayların cinslerinin belirlenmesi üzerinedir. Bu amaçla tane fiziksel, protein miktar, protein kalitesi ve gluten reolojik özelliklerini içeren kapsamlı laboratuvar testleri uygulayarak ülkesel baremde yer alan 8 kırmızı-sert ve 2 beyaz-ser...
Chapter
In this study, the concept of Common Vector Approach (CVA) is adopted for image gradients computation in terms of revealing edge maps stated on images. Firstly, noise stated on image is smoothed by Gaussian filtering, secondly gradient map computation using CVA is carried out, then the angle and direction maps are obtained from the gradient map and...
Article
Background modelling is a fundamental step for several real-time computer vision applications that requires security systems and monitoring. An accurate background model helps to detect the activity of moving objects in the video. In this work, the authors have developed a new subspace-based background-modelling algorithm using the concept of commo...
Chapter
Recommender systems are drawing increasing attention with several unresolved issues. These systems depend on personal user preferences on items via ratings and recommend items based on choices of similar users. A graph-based recommender system that has ratings of users on items can be shown as a bipartite graph in which vertices match users and ite...
Article
Refuse Derived Fuel (RDF) makes an increasingly important contribution to sustainable waste management as an energy source in cement kilns. The most important parameter of RDF in an evaluation of its performance as a fuel is Higher Heating Value (HHV). The two methods of HHV determination are the direct method and the indirect method. The direct me...
Article
Despite being a challenging research field with many unresolved problems, recommender systems are getting more popular in recent years. These systems rely on the personal preferences of users on items given in the form of ratings and return the preferable items based on choices of like-minded users. In this study, a graph-based recommender system u...
Poster
Full-text available
Technological advances bring about the spread of malware. Cyber security plays an important role against malware. Studies are trying to develop various alternative approaches to combating and identifying malware. In this study, a recommended approach is to use machine learning techniques to detect malware. Within the scope of this study, the succes...
Conference Paper
Full-text available
Bu çalışma, temel olarak süne zararlılarının buğday üzerindeki etkilerine odaklanmaktadır. Süne zararlısına uğramış buğday ile yüksek kaliteli buğday arasındaki en belirgin özellik şekil farklılıklarıdır. Bu nedenle, bu çalışmada, Fourier dönüşümünün açı bilgisine dayanan bir şekil tanıma yöntemi önerilmiştir. Önerilen tanımlayıcının performansı Mp...
Article
BACKGROUND Sustainable management of agricultural resources requires effort in order to integrate the cutting‐edge science with the detection of phenological observations on crops as well as the identification tasks. Proper taxonomy detection provides the explicit cost and quality of wheat kernels, thereby, helping experts to make correct decisions...
Preprint
Full-text available
Background modelling is a fundamental step for several real-time computer vision applications that requires security systems and monitoring. An accurate background model helps detecting activity of moving objects in the video. In this work, we have developed a new subspace based background modelling algorithm using the concept of Common Vector Appr...
Article
Full-text available
Speech denoising may improve intelligibility of speech and hearing comfort in voice communication/recognition applications in noisy environments. It can also be used to enhance old recordings. Most speech enhancement methods are intrusive and cause some loss in the signal component while removing noise. In this paper, we propose a method based on c...
Article
Change detection with background subtraction process remains to be an unresolved issue and attracts research interest due to challenges encountered on static and dynamic scenes. The key challenge is about how to update dynamically changing backgrounds from frames with an adaptive and self-regulated feedback mechanism. In order to achieve this, we p...
Article
Full-text available
Adaptive image denoising algorithms rely on an error function that measure the distance between an estimated result and expectations. Selection of the error function and its parameters are crucial for a successful denoising implementation. In this paper, a method for determining close-to-optimal parameters for a bell-shaped error function is evalua...
Article
For surveillance system, the background subtraction plays an important role for moving object detection with an algorithm embedded in the camera. Since the existence algorithms cannot satisfy the good accuracy on complex backgrounds including illumination change and dynamic objects, we have put forward the concept of Common Vector Approach (CVA) as...
Article
Dementias are termed as neuropsychiatric disorders. Brain images of dementia patients can be obtained through magnetic resonance imaging systems. The relevant disease can be diagnosed by examining critical regions of those images. Certain brain characteristics such as the cortical volume, the thickness, and the surface area may vary among dementia...
Conference Paper
Full-text available
In this paper, we propose a new speech enhancement method using the common vector approach. Common vector approach is a subspace method used in recognition applications. In the proposed method, we separate the noisy speech data into magnitude and phase in frequency domain. And also magnitude data is separated into common and difference parts using...
Conference Paper
Dementias are termed as neuropsychiatric disorders. Brain images of dementia patients can be obtained through magnetic resonance imaging systems. The relevant disease can be diagnosed by examining critical regions of those images. Certain brain characteristics such as the cortical volume, the thickness, and the surface area may vary among dementia...
Article
An advanced driver assistance system (ADAS) is the premium technology for autonomous driving. It uses data from vision/camera systems, data from in vehicle sensors, and data from vehicle-to-vehicle (V2V) or Vehicle-to-Infrastructure (V2I) communication systems. The next generation systems even autonomous vehicles are expected to use the V2V informa...
Conference Paper
Multispectral image fusion has attracted much attention in the area of computer vision based image processing for remote sensing, industrial automation, surveillance, medical and defense applications. The process carried out in image fusion is combining useful information stated on different channels related to the same scene. Since the proposed im...
Conference Paper
Brains of patients with dementia show physical differences according to disease types and phases. Physical characteristics of brains such as cortical thickness and volumes of some parts have a significant effect on determining the type of the disease. Magnetic resonance imaging devices create visual files which contain patient information appropria...
Conference Paper
With increasing use of communication via digital signal speech data in real world applications, noise reduction in speech data became an important requirement. Traffic, crowd and such uncontrollable environmental parameters can be accounted for the background noise in speech data. One of the speech denoising approaches is to measure noise character...
Article
Full-text available
In this study, a new approach to edge detection on images, corrupted with Gaussian and impulsive noise, is presented. The concept, under the decomposition of image with its principal component being an analysis on local pixel grouping for noise suppression, called LPGPCA based denoising, is adopted in order to obtain noiseless gradient maps for edg...
Article
Full-text available
In the field of machine learning, which values / data labeling or recognition is done by pattern recognition. Visual object classification is an example of pattern recognition, which attempts prompt to assign each object to one of a given set of object classes. The basic elements of the process of pattern recognition, feature extraction, feature se...
Conference Paper
As a complicated and troublesome research area, the edge detection is a fundamental step in terms of some image processing tasks including segmentation, compression and registration. In this study, we present a new approach for edge linking by applying the concept of the PCA on different types of images to determine the attractive edge segments. To...
Conference Paper
Full-text available
Machine learning algorithms builds a model based on train data which is assumed as number of instances between different classes are nearly equal. In real world problems usually data sets are unbalanced and this can cause seriously negative effect on built model. Researches on imbalance data sets focus on over-sampling minority class or under-sampl...
Article
In this paper, we proposed a speech signal denoising method using common vector approach (CVA) for very noisy signals. Based on CVA, classes are constructed from windowed speech samples/vectors according to their characteristics and denoising is performed on difference vectors. Speech signal is then reconstructed using denoised patches. Size of win...
Article
Edge detection is the most fundamental step in terms of the high-level image processing. In order to find an edge detection method that has efficient computation time, sensing to noise as minimum level and attaining the skeleton of image, so that various edge detection methods have been developed in edge detection area. In this study, in order to o...
Article
Common vector approach (CVA) is an increasingly popular classification method in recognition problems where probability of having the dimensionality of the problem higher than the number of data items is not zero. In CVA, common component of the members of classes is separated from the discriminating difference parts and used to determine whether a...
Article
In this paper, an information fusion algorithm – MSME-CVAED – is proposed for multi-scale and multi-expert edge detection. Well-known operators, called experts, have been applied to distinct scales derived by smoothing the gray image with Gaussian functions having different variance values. Common characteristics of edge points are processed to mer...
Article
Since recycling of materials is widely assumed to be environmentally and economically beneficial, reliable sorting and processing of waste packaging materials such as plastics is very important for recycling with high efficiency. An automated system that can quickly categorize these materials is certainly needed for obtaining maximum classification...
Conference Paper
Edge detection is most popular problem in image analysis. To develop an edge detection method that has efficient computation time, sensing to noise as minimum level and extracting meaningful edges from the image, so that many crowded edge detection algorithms have emerged in this area. The different derivative operators and possible different scale...
Conference Paper
The most widely used in the field of visual object recognition descriptive features are shape based features. Identify objects in the image, contour and region shape descriptors based on two main topics to be examined. In order to describe objects with lesser number of descriptors, linear or cubic curves are fitted to the contours of the objects. T...
Conference Paper
In this study, we present a new contour-based corner detection method based on the turning angle curvature computed from the contour gradients of the image. In general, curvature is computed with the pixel locations of the extracted image contours. In most contour extraction methods, the image gradient information is already computed. The proposed...
Conference Paper
Contour polygonal approximation is usually defined as a set of selected dominant points, which describes a polygon and best represents the original contour. This paper presents a novel algorithm for dominant point detection via suboptimal optimization method. The proposed algorithm does not require an input parameter The experimental results show t...
Conference Paper
One of the most visually descriptive features for images is the contour of the object(s). In order to describe objects with lesser number of descriptors, linear or cubic curves are fitted to the contours of the objects. The end points of these finite length curves are usually meaningful spots on the contours. In the work presented here, edges are f...
Article
Contours are the most common feature used in the shape detection and recognition applications. Contours in digital images constitute of consecutive pixels, thus they can be represented with chain codes by encoding the relative positions of the pixels forming that contour. Sharp transitions on chain coded contour information correspond to the corner...
Article
Shape contours are one of the most widely used featur es in the shape detection and recognition applications. A contour can be represented by the chain code which is obtained by coding the relative directions of the elements which form that contour. Sharp transitions in a chain code of a shape contour correspond to the notches and corners that the...
Article
Maintaining a balance between fidelity, over-smoothing and stability in iterative restoration of noisy and blurred images is a difficult task that researchers need to handle. We proposed a very simple yet effective method to combine l1 and l2 norms in order to both reduce over-blurring around edges and perform effective denoising within flat areas...
Article
It is natural and almost inevitable to obtain images that are overly smooth and noisier than possible best out of image sensors. Blurring is generally noticeable in the regions containing edges and appears as softening effect by averaging. It is important to restore and enhance blurred and noisy images in many imaging applications. In this study, a...
Conference Paper
Most image registration algorithms assume that the images to be registered are sourced from a single camera and captured with relatively short time in between while the camera or the scene is doing a simple and definable movement on the image plane. It is also assumed that images are generated or can be generated from a higher resolution (or contin...
Conference Paper
Image processing applications, although not very obvious to be easily noticed, find their way into our daily life in almost every field. Many military, medical and commercial applications aim for high resolution images, however the resolution of the image sensors continue to be main limiting obstacle in front. The solution is to develop techniques...
Article
Super-resolution applications require sub-pixel registrations of low resolution images to be almost exact due to the deterioration caused by inaccurate image registration. A linear-least-squares technique is proposed to refine sub-pixel translation parameters, which can be employed when the images are registered but just where there is not enough s...
Conference Paper
Modified subgradient method has been employed to solve super-resolution restoration problem. The technique uses augmented Lagrangians for nonconvex minimization problems with equality constraints. The subgradient of the constructed dual function is used for a measure. Initial results on comparative studies have shown that the technique is very prom...
Article
It is imperative for imaging model in super-resolution image restoration algorithms to be a good representative of the reality, so that the possible degradations can be corrected. Blur is an important and common degradation. Accurate estimation of the amount of blur has significant effect on the results. Most researchers treat blur as a separate fu...
Article
Full-text available
ZET : Veri saklama teknolojilerindeki hızlı gelişmelere rağmen görüntü verisinin saklanması ve/veya taşınması önemini yitirmemiştir. Görüntünün kodlanması ve sıkıştırılması konusundaki çalışmalar yoğun bir şekilde devam etmektedir. Yapılan çalışmalar daha fazla sıkıştırma oranı ve daha iyi bir görüntü kalitesini yakalamak içindir. Video görüntü diz...

Network

Cited By

Projects

Project (1)
Project
This project primarily focuses on seeking state-of-the-art fault detection techniques and their implementations for maintenance activities in today’s conventional industry