
Ömer KasımDumlupinar University · Engineering
Ömer Kasım
Doctor of Philosophy
About
35
Publications
8,901
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
261
Citations
Introduction
Skills and Expertise
Publications
Publications (35)
The fulfillment of agile models is crucial for ensuring that a software development project's tasks are completed efficiently and collaboratively. The definitions of the project architecture are usually performed in these models. Factors such as delivery time, cost and maintenance are determined. In traditional methods, project stages are carried o...
The identification of the tampered images is the research area of digital forensics, which defines the manipulation in the image. This is easily performed by forgers without the permission of the owners of the images. The misuse of these images in digital content is a significant problem for privacy. There are some studies on the detection of the f...
Early diagnosis of the diabetic retinopathy is important in preventing vision loss. The intense workload of the experts and the long time analysis of the fundus images necessitate a fully automatic early diagnosis system. For this purpose, a new strategy, which applies preprocessed images to Mobilenet transfer learning and motivated by the ensemble...
This article explores the detection of Attention Deficit Hyperactivity Disorder, a neurobehavioral disorder, from electroencephalography signals. Due to the unstable behavior of electroencephalography signals caused by complex neuronal activity in the brain, frequency analysis methods are required to extract the hidden patterns. In this study, the...
The implementation of software development strategies while developing a software is important for a project's roadmap. In traditional methods, the project is defined before the start of the project, delivery times and costs are determined. After each of the project development stages is completed, another development stage is started. However, com...
The increase in the use of Internet of Things (IOT) devices operating online has led to an increase in cyber-attacks with these devices. One of the uncontrolled attacks carried out with a botnet is User Datagram Protocol (UDP) flooding. It is necessary to develop an effective method to detect abnormal UDP flooding traffic IOT devices that are compr...
Domain Name System flood attacks are generally carried out in the application layer with the user datagram protocol. This type of attack is a vulnerability that concerns almost all web assets of web services. Various studies provide different security solutions to handle these attacks, but cyber-attackers find some unique approaches to exploit Doma...
Artifacts in electroencephalography (EEG) signals have negative effects on the analysis of the EEG signals. Although a number of techniques were developed to remove artifacts, new methods still need to be developed to remove artifacts with high accuracy and minimal data loss from EEG signals. In this context, there has been an increasing trend to c...
In this article, an innovative hybrid deep learning model which consists of convolutional neural network architecture that improves with long short term memory cells is used to recognize domain name system flood attacks. The proposed model provides a comprehensive solution for direct detection of domain system flood attacks without label coding, no...
It is important to ensure the privacy and security of the medical images that are produced with electronic health records. Security is ensured by encrypting and transmitting the electronic health records, and privacy is provided according to the integrity of the data and the decryption of data with the user role. Both the security and privacy of me...
This article explores the detection of Attention Deficit Hyperactivity Disorder (ADHD), a neurobehavioral disorder, from electroencephalography (EEG) signals. Due to the unstable behavior of EEG signals caused by complex neuronal activity in the brain, frequency analysis methods are required to extract the hidden patterns. In this study, the featur...
Electronic medical records, one of the sensitive data, are stored in public or private cloud service providers. Cloud systems provide security with firewall and intrusion detection systems, and these systems ensure privacy with access control and end-to-end encryption. However, while sending data to the cloud system, attackers can capture the data...
Studies on brain biometrics have shown that electroencephalogram (EEG) signals encourage more secure authentication. The uniqueness, persistence, universality and robustness of EEG signals against fraud attacks offer potential for highly secure biometric systems. However, more studies are needed to improve collectibility, stability, performance, an...
Cyber attackers target unconscious users with phishing methods is a serious threat to cyber security. It is important to quickly detect benign web pages according to legitimate ones. Despite the successful detection of phishing in the studies suggested in the literature, the problems of high false positive rate after the web page request is process...
Pain is a natural stimulation to protect the whole body. An overreaction to pain can damage the tissues. Therefore, it is important to know the angle at which pain is felt when routinely measuring joint range of motion during the first examination. Detection of pain with the change in characteristics of electroencephalogram signals at the moments w...
Cardiotocography (CTG) is used for monitoring the fetal heart rate signals during pregnancy. Evaluation of these signals by specialists provides information about fetal status. When a clinical decision support system is introduced with a system that can automatically classify these signals, it is more sensitive for experts to examine CTG data. In t...
Cardiotocography (CTG) is used for monitoring the fetal heart rate signals during pregnancy. Evaluation of these signals by specialists provides information about fetal status. When a clinical decision support system is introduced with a system that can automatically classify these signals, it is more sensitive for experts to examine CTG data. In t...
Sensitive data including identity information, passwords, financial and business processes belonging to the user are kept in the databases. These data can be obtained by attackers with malicious code added to SQL queries. The malicious and clean SQL queries are taken from OWASP dataset to ensure that the proposed approach effective and practical. T...
Direct Current (DC) motors are widely used in industrial systems due to their high torque. In ensuring the stability and productivity of a system, it is important that the DC motor within the automation system reaches the reference speed value quickly and its speed remains constant under load. In this study, it is aimed to keep the speed value of D...
This study includes investigating the presence of tumor regions in Magnetic Resonance Imaging (MRI) slices. Since the MRI taken from a patient consists of many slices, it may take time for experts to review these images. The aim of the study is to evaluate the specialist's MRI slices more quickly. The image of each MRI slice taken from the patient...
Electroencephalography (EEG) signal artefacts cause some problems in processing and analysis of EEG signals. There are several options in the literature to identify artefacts in signal areas. However, high accuracy level in artefact detection was not achieved with these methods. New methods are needed to increase the level of accuracy. Semantic seg...
The number of devices connected to the Internet is increasing day by day. This increase causes cyber-attacks to be larger and more complex. It is important to sdetect the anomalies rapidly when there is a cyber-attack. In detecting anomalies, high false positive rate is obtained by using feature extraction based on statistical calculations and mach...
Frequency Analysis of Brain MR Image
IOT temelli geliştirilen sistemler uzaktan izleme ya da kontrol amacıyla kullanılmaktadır. Gerçek zamanlı olarak uzaktan kontrol edilen sistemlerden birisi de seralardaki bitkilerin verimli ve ortam koşullarına uygun yetiştirilmesine yöneliktir. Sera içerisinde yetiştirilecek bitkilerin verimliliğini arttırmak amacıyla iklimlendirme kontrolü yapılm...
Dynamic applications such as e-commerce, blogs, forums, e-governance, e-banking and portals that are in these platforms have become a part of our lives. However, a tremendous increase in the use of dynamic web and mobile applications has resulted in security vulnerabilities originating from the Hypertext Markup Language (HTML) coding system. Site-t...
Manyetik rezonans görüntülerinden yola çıkılarak tümörlü bölgeler tespit edilmektedir. Tümör tespitinin yapıldığı bölgelerden birisi de beyin bölgesidir. Uzmanlar kesin teşhis koyabilmek için beyin MR görüntülerine ait dilimleri incelemektedir. Yoğun bir tempoda yapılan bu işlemler bütününde hızlı bir şekilde sonuca gitmek mümkün olmamaktadır. Bütü...
In recent years, as a result of the technological development, there has been a significance improvement on the computer interface. Electroencephalogram (EEG) signals are widely used in Brain Computer Interface (BCI) methods. By using EEG data, the imagination of movement with physical motion can be classified. In this study, EEG data of a 21-years...
Kan yapisinin analiziyle hastaliklarin teshisinin konulmasi islemi, mikroskop yardimiyla morfolojik incelemeye dayanir. Hematoloji uzmanlari, preparatta bulunan lokosit hucrelerinin yapisini ve sayisini inceleyerek morfolojik incelemeyi gerceklestirirler. Bu islemler yogun bir tempoda, boyama ve isiklandirma icin ayri bir caba sarf etmeksizin yapil...
Diagnosis of diseases which are related to disorders of the leukocyte's structure is based on morphological examination methods. At the end of this examination, leukocyte's numbers, disorders and types of them are determined by hematology specialists without an intense pace for staining and lighting effort. Therefore, this process causes the loss o...
The blood smear analysis has an important role in definite diagnosis of leukemia disease. The WBC's shapes and numbers in a smear area are examined by Hematology experts to diagnose leukemia. The smear stain process and microscope luminance are blinked because of the intense working tempo. At this scheme, unnoticed information about cells can be re...