Murat Taskiran

Murat Taskiran
Yildiz Technical University · Department of Electronics and Communications Engineering

Doctor of Engineering
Biometric System, Time Series Prediction, Deep Neural Networks

About

30
Publications
6,587
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
250
Citations
Citations since 2017
28 Research Items
250 Citations
2017201820192020202120222023020406080100
2017201820192020202120222023020406080100
2017201820192020202120222023020406080100
2017201820192020202120222023020406080100
Education
September 2016 - January 2022
Yildiz Technical University
Field of study
  • Electronics
January 2014 - June 2016
Yildiz Technical University
Field of study
  • Electronics

Publications

Publications (30)
Conference Paper
Full-text available
In this work, we focused on liveness detection for facial recognition system's spoofing via fake face movement. We have developed a pupil direction observing system for anti-spoofing in face recognition systems using a basic hardware equipment. Firstly, eye area is being extracted from real time camera by using Haar-Cascade Classifier with speciall...
Conference Paper
Full-text available
In this work, an offline signature identification system based on Histogram of Oriented Gradients (HOG) vector features is designed. Handwritten signature images are collected at Yildiz Technical University, from 15 people, 40 samples from each. Before the HOG feature extraction, size fixing and noise reduction processes are applied to all signatur...
Conference Paper
Full-text available
Deaf people use sign languages to communicate with other people in the community. Although the sign language is known to hearing-impaired people due to its widespread use among hearing-impaired people, the sign language is not known much by other people. In this article, we have developed a real-time sign language recognition system for people who...
Article
Biometric systems have the goal of measuring and analyzing the unique physical or behavioral characteristics of an individual. The main feature of biometric systems is the use of bodily structures with distinctive characteristics. In the literature, there are biometric systems that use physiological features (fingerprint, iris, palm print, face, et...
Article
Background and Objective: Diabetes mellitus is a chronic disease that requires regular monitoring of blood glucose in the circulatory system. If the amount of glucose in the blood is not regulated constantly, this may have vital consequences for the individual. For this reason, there are many studies in the literature that perform blood glucose (BG...
Conference Paper
The widespread use of the Unmanned Aerial Vehicles (UAVs) in many fields of industry such as defense, entertainment and transportation in recent years has led researchers to carry out many studies on UAV controls. One of the most popular of these study topics is the prediction of the instantaneous power consumption of UAVs during flight. In this st...
Article
With the recent technological developments, auxiliary smart systems have started to be used in many issues that are important in people's lives. One of these issues is that parents ensure the safety of their toddlers. Toddlers tend to reach objects that may be dangerous to them at home because of their natural curiosity. For this reason, parents' i...
Conference Paper
Diabetes is a chronic disease that causes high blood glucose levels and requires constant monitoring. In recent years, as an alternative to invasive continuous blood glucose measurement, studies have been made for monitoring of the disease by predicting blood glucose levels. In the studies conducted for this purpose in the literature, the models ar...
Conference Paper
With the development of technology, the condition analysis of industrial machines over sensor data has become more commonly used. These developments have made the processing and interpretation of sensor data a new problem to be solved. In this study, Long Short Term Memory (LSTM) and WaveNet are used to produce solutions for predicting remaining us...
Article
Full-text available
Although recent deep‐learning‐based face recognition methods give remarkable accuracies on large databases, their performance has been shown to degrade under adverse conditions (e.g. severe illumination and contrast variations; blur and noise). Under such conditions, soft‐biometric features such as facial dynamics are expected to increase the perfo...
Article
Various images and videos are uploaded every day on Instagram. Shared images include tobacco products and can be encouraging for young people when they are accessible. In this study, it is aimed to classify tobacco products with various convolutional neural networks (CNNs) and to limit the access of young users to these classified tobacco products...
Article
Full-text available
In recent years, due to its non-volatile memory, non-locality, and weak singularity features, fractional calculations have begun to take place frequently in artificial neural network implementations and learning algorithms. Therefore, there is a need for circuit element implementations providing fractional function behaviors for the physical realiz...
Article
Full-text available
Purpose In this work, a true random number generator is designed by sampling the double-scroll analog continuous-time chaotic circuit signals. Methodology A Chua circuit based on memristance simulator is designed to obtain a non-linear term for a chaotic dynamic system. It is implemented on the board by using commercially available integrated circ...
Preprint
BACKGROUND Various images and videos are uploaded every day or even every second on Instagram. These publicly available images are easily accessible as a result of uncontrolled Internet use by young people and children. Shared images include tobacco products and can be encouraging for young people and children when they are accessible. OBJECTIVE I...
Article
Full-text available
Fingerprint recognition is one of the most common biometric recognition systems that includes feature extraction and decision modules. In this work, these modules are achieved via artificial neural networks and image processing operations. The aim of the work is to define a new method that requires less computational load and storage capacity, can...
Article
Full-text available
Son yıllarda biyometrik sistemlerin günlük hayatımızda yaygınlaşması ile birlikte biyometrik verilerin güvenli bir şekilde gönderilmesi ve kullanıcı dışında herhangi bir şahıs tarafından ele geçirilememesi amacıyla biyometrik veri güvenliği üzerindeki çalışmalar hızla artmaktadır. Bu çalışmada şifreleme yöntemlerinden olan Gelişmiş Şifreleme Standa...
Article
Full-text available
Effort on biometric data security in recent years in order to secure the transmission of biometric data along with the spread of biometric systems and can not be seized by any person other than the user is increasing rapidly. In this work, Advanced Encryption Standard (AES) and RSA (Rivest, Shamir, Adleman) algorithms were intended to ensure the se...
Article
Full-text available
In this study, the well-known chaotic circuit, Muthuswamy-Chua circuit, is used with a different memristor element and obtained a new chaotic attractor. equilibrium points, lyapunov exponents, phase portraits and bifurcation diagrams of the new ODE system is analysed mathematically. Obtained chaotic signals are sampled by a low-frequency sampling c...
Article
Full-text available
Sign Language is a language that allows individuals with hearing or speech impairment to communicate with themselves and their surroundings and has the feature of not being a universal language. This language, which is not universal, is suitable for image processing as it is expressed by hand signals in general terms. In this study, firstly, we per...
Conference Paper
Full-text available
MLP which is one of the most commonly used classifier, is a feed-forward, supervised neural network topology. Back propagation algorithm is used for minimizing the error between network output and the target value. According to classification process, MLP structure and learning parameters, which are used in back propagation algorithm, are needed to...

Network

Cited By

Projects

Projects (15)
Project
Smart Building Sensitive to Daily Sentiment (SUSTAIN)
Project
MTHelper
Project
Kimlik Bilgilerinin Otomatik Algılanması Için Yapay Zeka ve Görüntü Isleme Temelli Model Gelistirme