Refik Samet
YOU?
Author Swipe
View article: NuSeC: A Dataset for Nuclei Segmentation in Breast Cancer Histopathology Images
NuSeC: A Dataset for Nuclei Segmentation in Breast Cancer Histopathology Images Open
The NuSeC dataset is created by selecting 4 images with the size of 1024*1024 pixels from the slides of each patient among 25 patients. Therefore, there are a total of 100 images in the NuSeC dataset. To carry out a consistent comparative …
View article: MiDeSeC: A Dataset for Mitosis Detection and Segmentation in Breast Cancer Histopathology Images
MiDeSeC: A Dataset for Mitosis Detection and Segmentation in Breast Cancer Histopathology Images Open
The MiDeSeC dataset is created through H&E stained invasive breast carcinoma, no special type (NST) slides of 25 different patients captured at 40x magnification from the Department of Medical Pathology at Ankara University. The slides hav…
View article: Multi-mode secure data communication for real-time robot arm control with Li-Fi technology
Multi-mode secure data communication for real-time robot arm control with Li-Fi technology Open
This work explores the secure data transmission approach to control a robotic arm using Li-Fi technology. Although Li-Fi offers built-in security by keeping the light within the walls of the environment, where it is used, leaks through win…
View article: DEEP LEARNING METHODOLOGIES FOR NUCLEI SEGMENTATION AND MITOSIS DETECTION IN HISTOPATHOLOGICAL IMAGES ANALYSIS
DEEP LEARNING METHODOLOGIES FOR NUCLEI SEGMENTATION AND MITOSIS DETECTION IN HISTOPATHOLOGICAL IMAGES ANALYSIS Open
Histopathological image analysis is a pivotal area of medical research that leverages deep learning to derive quantitative insights from Hematoxylin and Eosin (H\&E) stained images. This study aims to enhance the analysis of H\&E breast ca…
View article: Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance Open
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data, encompassing three pr…
View article: CompSegNet: An enhanced U-shaped architecture for nuclei segmentation in H&E histopathology images
CompSegNet: An enhanced U-shaped architecture for nuclei segmentation in H&E histopathology images Open
In histopathology, nuclei within images hold vital diagnostic information. Automated segmentation of nuclei can alleviate pathologists' workload and enhance diagnostic accuracy. Although U-Net-based methods are prevalent, they face challen…
View article: A Review of Security Methods in Light Fidelity Technology
A Review of Security Methods in Light Fidelity Technology Open
Light fidelity (Li-Fi) technology is a communication technology using visible light. Li-Fi technology solves the problem of radio frequency bandwidth shortage in wireless fidelity (Wi-Fi) and is more secure considering the wall is impenetr…
View article: AI-Powered Integrated With Encoding Mechanism Enhancing Privacy, Security, and Performance for IoT Ecosystem
AI-Powered Integrated With Encoding Mechanism Enhancing Privacy, Security, and Performance for IoT Ecosystem Open
The Internet of Things (IoT) ecosystem presents substantial challenges in terms of privacy and security, rendering it an attractive target for malicious actors. In this context, the literature review highlights the ongoing difficulty in ad…
View article: Can There Be a Two Way Hash Function?
Can There Be a Two Way Hash Function? Open
It is computationally impossible for one-way hash functions to obtain the original data again. In this study, Two Way Hash Function (TWHF) is proposed which provides the security properties of one-way hash functions. TWHF aims to hash/encr…
View article: A Novel Feature Selection Approach to Classify Intrusion Attacks in Network Communications
A Novel Feature Selection Approach to Classify Intrusion Attacks in Network Communications Open
The fast development of communication technologies and computer systems brings several challenges from a security point of view. The increasing number of IoT devices as well as other computing devices make network communications more chall…
View article: A Mitosis Detection and Classification Methodology with YOLOv5 and Fuzzy Classifiers
A Mitosis Detection and Classification Methodology with YOLOv5 and Fuzzy Classifiers Open
Histopathological images are examined by pathologists to diagnose cancer.A major step in classifying nuclei as cancerous or non-cancerous is to detect and classify mitosis.Detecting and classifying mitosis, however, can be challenging due …
View article: An Analysis of Artificial Intelligence Techniques in Surveillance Video Anomaly Detection: A Comprehensive Survey
An Analysis of Artificial Intelligence Techniques in Surveillance Video Anomaly Detection: A Comprehensive Survey Open
Surveillance cameras have recently been utilized to provide physical security services globally in diverse private and public spaces. The number of cameras has been increasing rapidly due to the need for monitoring and recording abnormal e…
View article: A Hybridized Deep Learning Methodology for Mitosis Detection and Classification from Histopathology Images
A Hybridized Deep Learning Methodology for Mitosis Detection and Classification from Histopathology Images Open
Pathologists use histopathological images to diagnose cancer, and one key step in this process is to detect and classify mitosis.Mitosis is the process of cell division, and it is essential for normal tissue growth and repair.However, abno…
View article: Deep Learning Based Classification of Military Cartridge Cases and Defect Segmentation
Deep Learning Based Classification of Military Cartridge Cases and Defect Segmentation Open
The final stage of the production process in the industry is quality control. Quality control answers the question of is there a defect on the surface of the products. Frequently the quality control is performed manually. The disadvantages…
View article: A Comprehensive Systematic Literature Review on Intrusion Detection Systems
A Comprehensive Systematic Literature Review on Intrusion Detection Systems Open
Effectively detecting intrusions in the computer networks still remains problematic. This is because cyber attackers are changing packet contents to disguise the intrusion detection system (IDS) recently. Besides, everyday a lot of new dev…
View article: SABADT: Hybrid Intrusion Detection Approach for Cyber Attacks Identification in WLAN
SABADT: Hybrid Intrusion Detection Approach for Cyber Attacks Identification in WLAN Open
With the advancement of technology, the use of wireless media and devices are increasing every day. In particular, the use of wireless local area networks (WLAN) has increased rapidly in recent years and is expected to increase further. Th…
View article: Using a Subtractive Center Behavioral Model to Detect Malware
Using a Subtractive Center Behavioral Model to Detect Malware Open
In recent years, malware has evolved by using different obfuscation techniques; due to this evolution, the detection of malware has become problematic. Signature-based and traditional behavior-based malware detectors cannot effectively det…
View article: A Comprehensive Review on Malware Detection Approaches
A Comprehensive Review on Malware Detection Approaches Open
According to the recent studies, malicious software (malware) is increasing at an alarming rate, and some malware can hide in the system by using different obfuscation techniques. In order to protect computer systems and the Internet from …
View article: Real-Time Mouth Defects Detection on Military Cartridge Cases
Real-Time Mouth Defects Detection on Military Cartridge Cases Open
A military cartridge includes four elements; case, capsule, ammunition and powder.While manufacturing, defects may occur in the case.These defects should be detected and the defected cases should be separated.Defects could occur in the mou…
View article: Metamodeling Approach for the Design of Cyber-Physical Systems
Metamodeling Approach for the Design of Cyber-Physical Systems Open
Background/Objectives: The design of Cyber-Physical Systems (CPS) needs an approach that allows us to model effectively their heterogeneous components, having both a computational and a physical nature. To contribute to this area, a new me…