Browsing by Author "Sahin, Yasar Guneri"
Now showing 1 - 10 of 10
- Results Per Page
- Sort Options
Conference Object Citation - Scopus: 1A combined technology for wildfire detection using HS/RF(IEEE, 2009) Graeme Hanssen; Yasar Guneri Sahin; Hanssen, Graeme; Sahin, Yasar GuneriThis paper addresses an effective early detection system of wildfires using high resolution images from low-light sensitive cameras linked to an innovative HS/RF (High Speed/Radio Frequency) communications grid. Using data compression techniques a data-stream and signal management application combined with OFDM data transmission the HS/RF enables "broadband speed" wireless communications. This obviates the need for expensive FO cabled infrastructure in remote locations meaning the proposed system is relatively inexpensive to deploy. In terms of forestry management the HS/RF system exhibits dual advantages, because the video-stream provides real images on the ground there should be a reduction in false-alarms and a reduction in the decisions-time to enable a rapid response. Systems processes and specialized hardware required to support operational details are also described. © 2009 IEEE. © 2010 Elsevier B.V. All rights reserved.Conference Object Citation - WoS: 3Citation - Scopus: 4A novel mobile epilepsy warning system(SPRINGER-VERLAG BERLIN, 2006) Ahmet Alkan; Yasar Guneri Sahin; Bekir Karlik; Alkan, Ahmet; Karlik, Bekir; Sahin, Yasar Guneri; A Sattar; BH KangThis paper presents a new design of mobile epilepsy warning system for medical application in telemedical environment. Mobile Epilepsy Warning System (MEWS) consists of a wig with a cap equipped with sensors to get Electroencephalogram (EEG) signals a collector which is used for converting signals to data Global Positioning System (GPS) a Personal Digital Assistant (PDA) which has Global System for Mobile (GSM) module and execute Artificial Neural Network (ANN) software to test current patient EEG data with pre-learned data and a calling center for patient assistance or support. The system works as individual sensors obtain EEG signals from patient who has epilepsy and establishes a communication between the patient and Calling Center (CC) in case of an epileptic attack. MEWS learning process has artificial neural network classifier which consists of Multi Layered Perceptron (MLP) neural networks structure and back-propagation training algorithm.Article Citation - WoS: 5Citation - Scopus: 7Detection of hidden hostile/terrorist groups in harsh territories by using animals as mobile biological sensors(MDPI, 2008) Yasar Guneri Sahin; Tuncay Ercan; Ercan, Tuncay; Sahin, Yasar GuneriTerrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq Afghanistan and Turkey regular forces cannot reach these hostile/terrorist groups the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations detection of terrorist and hostile groups in their hiding places such as caves lairs etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh rugged and mountainous countries. To assist these forces commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices improving communications for data transfer from the source and developing better ways to monitor and detect threats terrorist ability to carry out attacks can be severely disrupted.Article Citation - WoS: 5Citation - Scopus: 8Distance education techniques to assist skills of tourist guides(IEEE COMPUTER SOC LEARNING TECHNOLOGY TASK FORCE, 2007) Yasar Guneri Sahin; Sabah Balta; Balta, Sabah; Sahin, Yasar GuneriThis study is a presentation of the usage of distance education technologies in a bid to support face to face education of tourist guide candidates during the training tour. The laws require tourist guide candidates to successfully complete their internship tour and get a certificate. Since the time in this internship period is limited and there are restricting factors such as transportation accommodation, many of the tourism places couldn't be included in this internship period. Besides the lack of experienced and competent guides in the visited places is also another negative factor reducing the quality and efficiency of the training. Technological support of the training of tourist guide candidates would effectively reduce the negativities of traditional education methods. Thus benefiting from computer technologies and audiovisual systems during the internship of tourist guide candidates would result in an increase in the effectiveness and usefulness of the training tour and would make it possible to visit more places in a shorter period. This study is a presentation on how distance education method could be implemented and an attempt to show the benefits could be obtained from implementation of these methods along with the possible problems that are predicted to arise.Article (DynaDBEdit): Dynamic database textbox field and validator for web and application software(Asian Network for Scientific Information 308-Lasani Town Sargodha Road Faisalabad, 2007) Yasar Guneri Sahin; Halil Ibrahim Ibrahim Bulbul; Sahin, Yasar Guneri; Bulbul, Halil IbrahimWhen the database tables are concerned alterations in the structure of table attributes have a direct impact on the edit fields those are used in database application software (e.g. Web pages application software). In case when any of the attributes are changed it becomes necessary for software or Web pages to be recompiled following the changes made in edit fields. This process of recompilation is a long and costly operation which means a temporary pause for transactions. For this reason that it causes important loss in financial sector. Besides the maxim of the software engineering is that the final product should require the least updating. This study offers an object and component that aims to remove the necessity for the recompilation of application software following the amendments made in the attributes. This component is a contribution to software development and maintenance for it is capable of automatically obtaining the data of domain for the attributes in database tables and controlling the data entrance process. Moreover it is also a contribution for the users and practitioners in the sense that it reduces the time required to correct the errors and to ensure data coherency database integrity. © 2007 Asian Network for Scientific Information. © 2018 Elsevier B.V. All rights reserved.Article Citation - Scopus: 3Face matrix: A quick search and indexing method for suspect recognition in police departments(Asian Network for Scientific Information, 2007) Yasar Guneri Sahin; Samsun Mustafa Basarici; Tuncay Ercan; Ercan, Tuncay; Sahin, Yasar Guneri; Basarici, Samsun MustafaThis study presents an indexing and a quick sort method that could be used to find the possible matching guilty pictures from the police database by using a tracing software and eyewitness descriptions about the suspected guilty profile. It is well known that databases located in the police departments have a large amount of prerecorded convicted guilty pictures. Searching a picture from database for recognition is very hard and it may take too much time. In addition to this it can also require to track many redundant pictures to find the correct guilty. There is of course no guarantee that Photofit (robot picture) is included in database. Therefore police departments have difficult problems to recognize exact guilty using Photofits described by eyewitness. In this paper a matrix construction using particular distances on face has been demonstrated. In order to find these certain points on the face a new point selection schema and some existing recognition methods are presented. Finally three different determinant values of this matrix are computed and are used for picture indexing in the database. In the test environment the system results 30 different matches with the predefined Photofits by using this indexing algorithm together with a face tracing software and a patch program proving that the tracking time for redundant pictures is reduced. © 2007 Asian Network for Scientific Information. © 2018 Elsevier B.V. All rights reserved.Article Citation - Scopus: 1How to select the best method for database applications database independent platform or not?(Asian Network for Scientific Information 308-Lasani Town Sargodha Road Faisalabad, 2007) Halil Ibrahim Ibrahim Bulbul; Yasar Guneri Sahin; Sahin, Yasar Guneri; Bulbul, Halil IbrahimSoftware developers generally want to create software that could run with many different DBMSs (database independent platform). But this idea sometimes may not be implemented to real world applications. The key point is that it is too hard to decide which method (dependent to specific DBMS or independent from DBMS) should be selected. Each method has particular advantages and disadvantages. Actually the decision is depended on some restrictions that are related to money human resources duration of project etc. In addition one of the most important factors is the choice of CASE tool that will be used for the software project. This study addresses how a decision should be made as to which method will be convenient for a specific application. Furthermore possible development scenarios that may be used in the project has been presented and some coefficient factor were found which help the developers to see which method may be more appropriate for the application. © 2007 Asian Network for Scientific Information. © 2018 Elsevier B.V. All rights reserved.Article Citation - WoS: 1Citation - Scopus: 1Software-assisted preparation and assessment of individual education plans for disabled individuals(CURRENT SCIENCE ASSN, 2006) Yasar Guneri Sahin; Sahin, Yasar GuneriThis article deals with the use of a computer software in special education. Preparation of Individual Education Plan (IEP) and assessment of predefined IEP are the most important stages in the area of special education for teaching individuals with learning disabilities. A special application software which was developed for this purpose is used to demonstrate the applicability of a database-integrated information processing system to alleviate the burden on educators. The software allows preparation of individualized education programmes based on predefined objectives and behaviours and assessment of school and family trainings of students. The software has a user-friendly interface and its design includes graphical tools.Conference Object The Use of Information Technologies in Special Education for Preparation of Individual Education Programs(WORLD ACAD SCI ENG & TECH-WASET, 2005) Yasar Guneri Sahin; Mehmet Cudi Okur; Sahin, Yasar Guneri; Okur, Mehmet Cudi; C ArdilIn this presentation we discuss the use of information technologies in the area of special education for teaching individuals with learning disabilities. Application software which was developed for this purpose is used to demonstrate the applicability of a database integrated information processing system to alleviate the burden of educators. The software allows the preparation of individualized education programs based on the predefined objectives goals and behaviors.Article Citation - WoS: 24Citation - Scopus: 35The use of internet resources by university students during their course projects elicitation: A case study(Turkish Online Journal Educational Tech-Tojet, 2010) Yasar Guneri Sahin; Sabah Balta; Tuncay Ercan; Ercan, Tuncay; Balta, Sabah; Sahin, Yasar GuneriAlthough technology is a very important useful and indispensable part of the life effective and appropriate usage of it still needs to be improved in education. This study presents the way university students gather their course project requirements during the project elicitation phase how they access the Internet and other resources and their trends in the literature review using the Internet. Furthermore the diversity of Internet resources which are used for homework and course projects studies and the reliability and accessibility of these resources have also been investigated and assessed. In addition the results obtained from the study have been discussed and evaluated the academic resources accessibility and usability in universities have been assessed and their importance discussed. The internet resources have been divided into sub categories according to their accessibility and reliability. Finally the effects of reliable and limited accessible internet resources and unreliable and unlimited internet resources on university students' out-of-class works and projects have been presented and discussed. © The Turkish Online Journal of Educational Technology. © 2010 Elsevier B.V. All rights reserved.

