Şahin Işık

Şahin Işık
Anadolu University · Department of Computer Engineering

About

40
Publications
8,728
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
339
Citations

Publications

Publications (40)
Article
In this paper, an information fusion algorithm – MSME-CVAED – is proposed for multi-scale and multi-expert edge detection. Well-known operators, called experts, have been applied to distinct scales derived by smoothing the gray image with Gaussian functions having different variance values. Common characteristics of edge points are processed to mer...
Chapter
During the outbreak of the COVID-19 pandemic, it is important to improve early diagnosis using effective ways in order to lower the risks and further spread of the viruses as early as possible. This is also important when it comes to appropriate treatments and the reduction of mortality rates. In this respect, computer tomography (CT) scanning is a...
Article
This study presents an effective and innovative solution to overcome the security issues/problems in public places. As an alternative video surveillance system, the proposed method detects and localizes gun and knife objects from videos in real-time. In connection with Convolutional Neural Network (CNN) based object detection, the Faster R-CNN stru...
Article
Full-text available
To facilitate the quality assessment of wheat cultivars, diverse imaging tools and techniques have been applied in order to omit the expert decision, which can cause failure in the identification of the wheat cultivar's label and its quality simultaneously. To minimize the risks caused by the expert's decision, a promising framework for identificat...
Article
In this study, an automated system for classification of leaf species based on the global and local features is presented by concentrating on a smart and unorthodox decision system. The utilized global features consist of 11 features and are separated into two categories: gross shape features (7) and moment based features (4), respectively. In case...
Article
In this study, we have provided an alternative solution to spam and legitimate email classification problem. The different deep learning architectures are applied on two feature selection methods, including the Mutual Information (MI) and Weighted Mutual Information (WMI). Firstly, feature selection methods including WMI and MI are applied to reduc...
Article
This paper presents a viable alternative solution for dominant point detection predicated on the comparison of suboptimal feature selection methods. Suboptimal feature selection methods are utilized as standard criteria to identify dominant points. Considering that all of the combinations of points comprise many sets, an algorithm that eliminates s...
Chapter
In this study, the concept of Common Vector Approach (CVA) is adopted for image gradients computation in terms of revealing edge maps stated on images. Firstly, noise stated on image is smoothed by Gaussian filtering, secondly gradient map computation using CVA is carried out, then the angle and direction maps are obtained from the gradient map and...
Article
Background modelling is a fundamental step for several real-time computer vision applications that requires security systems and monitoring. An accurate background model helps to detect the activity of moving objects in the video. In this work, the authors have developed a new subspace-based background-modelling algorithm using the concept of commo...
Article
Refuse Derived Fuel (RDF) makes an increasingly important contribution to sustainable waste management as an energy source in cement kilns. The most important parameter of RDF in an evaluation of its performance as a fuel is Higher Heating Value (HHV). The two methods of HHV determination are the direct method and the indirect method. The direct me...
Article
BACKGROUND Sustainable management of agricultural resources requires effort in order to integrate the cutting‐edge science with the detection of phenological observations on crops as well as the identification tasks. Proper taxonomy detection provides the explicit cost and quality of wheat kernels, thereby, helping experts to make correct decisions...
Article
This study analyzes the effectiveness of various loss functions on performance improvement for Single Image Super-Resolution (SISR) using Convolutional Neural Network (CNN) models by surrogating the reconstructive map between Low Resolution (LR) and High Resolution (HR) images with convolutional filters. In total, eight loss functions are separatel...
Article
We propose an information fusion algorithm-common matrix approach-based edge detection-for edge detection in multispectral images based on a tensor projection approach. In order to merge the edge information situated on different spectral bands, the concept of the common matrix approach is enhanced for each band to project a tensor of gradients ont...
Preprint
Full-text available
Background modelling is a fundamental step for several real-time computer vision applications that requires security systems and monitoring. An accurate background model helps detecting activity of moving objects in the video. In this work, we have developed a new subspace based background modelling algorithm using the concept of Common Vector Appr...
Article
Change detection with background subtraction process remains to be an unresolved issue and attracts research interest due to challenges encountered on static and dynamic scenes. The key challenge is about how to update dynamically changing backgrounds from frames with an adaptive and self-regulated feedback mechanism. In order to achieve this, we p...
Article
For surveillance system, the background subtraction plays an important role for moving object detection with an algorithm embedded in the camera. Since the existence algorithms cannot satisfy the good accuracy on complex backgrounds including illumination change and dynamic objects, we have put forward the concept of Common Vector Approach (CVA) as...
Conference Paper
Multispectral image fusion has attracted much attention in the area of computer vision based image processing for remote sensing, industrial automation, surveillance, medical and defense applications. The process carried out in image fusion is combining useful information stated on different channels related to the same scene. Since the proposed im...
Conference Paper
With increasing use of communication via digital signal speech data in real world applications, noise reduction in speech data became an important requirement. Traffic, crowd and such uncontrollable environmental parameters can be accounted for the background noise in speech data. One of the speech denoising approaches is to measure noise character...
Article
Full-text available
In this study, a new approach to edge detection on images, corrupted with Gaussian and impulsive noise, is presented. The concept, under the decomposition of image with its principal component being an analysis on local pixel grouping for noise suppression, called LPGPCA based denoising, is adopted in order to obtain noiseless gradient maps for edg...
Article
Full-text available
In the field of machine learning, which values / data labeling or recognition is done by pattern recognition. Visual object classification is an example of pattern recognition, which attempts prompt to assign each object to one of a given set of object classes. The basic elements of the process of pattern recognition, feature extraction, feature se...
Conference Paper
As a complicated and troublesome research area, the edge detection is a fundamental step in terms of some image processing tasks including segmentation, compression and registration. In this study, we present a new approach for edge linking by applying the concept of the PCA on different types of images to determine the attractive edge segments. To...
Article
Edge detection is the most fundamental step in terms of the high-level image processing. In order to find an edge detection method that has efficient computation time, sensing to noise as minimum level and attaining the skeleton of image, so that various edge detection methods have been developed in edge detection area. In this study, in order to o...
Article
Since recycling of materials is widely assumed to be environmentally and economically beneficial, reliable sorting and processing of waste packaging materials such as plastics is very important for recycling with high efficiency. An automated system that can quickly categorize these materials is certainly needed for obtaining maximum classification...
Conference Paper
In this study, the effect of dimension for a feature vector on the classification of Turkish e-mails as spam or legitimate is investigated. Although hundreds of experimental studies are achieved especially for English, which is a non-agglutinative language, the number of efforts for Turkish, which is one of the most popular agglutinative languages...
Conference Paper
In this study, the assessment of three different feature selection methods including Information Gain (IG), Gini Index (GI), and CHI square (CHI2) is made by utilizing two popular pattern classifiers, namely Artificial Neural Network (ANN) and Decision Tree (DT), on the classification of Turkish e-mails. The feature vectors are constructed by the b...
Conference Paper
Edge detection is most popular problem in image analysis. To develop an edge detection method that has efficient computation time, sensing to noise as minimum level and extracting meaningful edges from the image, so that many crowded edge detection algorithms have emerged in this area. The different derivative operators and possible different scale...
Article
Full-text available
Comparison of feature detectors and descriptors and assessing their performance is very important in computer vision. In this study, we evaluate the performance of seven combination of well-known detectors and descriptors which are SIFT with SIFT, SURF with SURF, MSER with SIFT, BRISK with FREAK, BRISK with BRISK, ORB with ORB and FAST with BRIEF....

Network

Cited By

Projects

Projects (2)
Project
1-Sharing & recommending publications. 2-Connecting with colleagues. 3-Seeking new collaborations. 4-Obtaining statistics and metrics on use of uploaded publications. 5-Asking questions of researchers around the world that have the same set of interests. 6-Job seeking or recruitment. 7- Journal Invitations (Editorial Board, Reviewer) 8- Call for papers 9- International Conferences
Project
The project output will be able to automatically generate the actual model from the studied tomography images of the liver, automatically identify and calculate hepatic artery, portal vein, total volume, and malignant volume information. There will also be an advanced 3D imager software that can simulate the surgical intervention and calculate and visualize the total volume, portal vein, hepatic artery volume and length to remain after the operation.