Şengül, Gökhan
Loading...
Name Variants
Gokhan, Sengul
Sengul, Gokhan
Sengul,G.
Gökhan, Şengül
Engul G.
Şengül G.
Şengül, Gökhan
G.,Sengul
Sengul, G.
S.,Gokhan
Sengul G.
Ş., Gökhan
G.,Şengül
G., Sengul
Şengül,G.
G., Şengül
S., Gokhan
Ş.,Gökhan
Sengul, Gokhan
Sengul,G.
Gökhan, Şengül
Engul G.
Şengül G.
Şengül, Gökhan
G.,Sengul
Sengul, G.
S.,Gokhan
Sengul G.
Ş., Gökhan
G.,Şengül
G., Sengul
Şengül,G.
G., Şengül
S., Gokhan
Ş.,Gökhan
Job Title
Profesor Doktor
Email Address
gokhan.sengul@atilim.edu.tr
ORCID ID
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID
Scholarly Output
81
Articles
51
Citation Count
128
Supervised Theses
10
80 results
Scholarly Output Search Results
Now showing 1 - 10 of 80
Article Citation Count: 0Analysis of Turkey's Institutional Open Repositories: An Example of Dokuz Eylul University Institutional Open Repository(Turkish Librarians Assoc, 2012) Erturk, Korhan Levent; Sengul, Gokhan; Information Systems Engineering; Computer EngineeringAfter the declaration of the Budapest Open Access Initiative in 2001, institutional open repositories are known as the most important tool of the self archiving, which is also known as green road. There are 26 institutional repositories, which are all compatible to international standards. All the institutional open repositories of Turkey mentioned before are listed in international open archive directories. In this study institutional open repository of Dokuz Eylul University is examined and institutional open repositories of Turkey are discussed.Conference Object Citation Count: 2Haptic user interface integration for 3D game engines(Springer Verlag, 2014) Sengul,G.; Çaǧiltay,N.E.; Özçelik,E.; Tuner,E.; Erol,B.; Computer Engineering; English Translation and InterpretationTouch and feel senses of human beings provide important information about the environment. When those senses are integrated with the eyesight, we may get all the necessary information about the environment. In terms of human-computer-interaction, the eyesight information is provided by visual displays. On the other hand, touch and feel senses are provided by means of special devices called "haptic" devices. Haptic devices are used in many fields such as computer-aided design, distance-surgery operations, medical simulation environments, training simulators for both military and medical applications, etc. Besides the touch and sense feelings haptic devices also provide force-feedbacks, which allows designing a realistic environment in virtual reality applications. Haptic devices can be categorized into three classes: tactile devices, kinesthetic devices and hybrid devices. Tactile devices simulate skin to create contact sensations. Kinesthetic devices apply forces to guide or inhibit body movement, and hybrid devices attempt to combine tactile and kinesthetic feedback. Among these kinesthetic devices exerts controlled forces on the human body, and it is the most suitable type for the applications such as surgical simulations. The education environments that require skill-based improvements, the touch and feel senses are very important. In some cases providing such educational environment is very expensive, risky and may also consist of some ethical issues. For example, surgical education is one of these fields. The traditional education is provided in operating room on real patients. This type of education is very expensive, requires long time periods, and does not allow any error-and-try type of experiences. It is stressfully for both the educators and the learners. Additionally there are several ethical considerations. Simulation environments supported by such haptic user interfaces provide an alternative and safer educational alternative. There are several studies showing some evidences of educational benefits of this type of education (Tsuda et al 2009; Sutherland et al 2006). Similarly, this technology can also be successfully integrated to the physical rehabilitation process of some diseases requiring motor skill improvements (Kampiopiotis & Theodorakou, 2003). Hence, today simulation environments are providing several opportunities for creating low cost and more effective training and educational environment. Today, combining three dimensional (3D) simulation environments with these haptic interfaces is an important feature for advancing current human-computer interaction. On the other hand haptic devices do not provide a full simulation environment for the interaction and it is necessary to enhance the environment by software environments. Game engines provide high flexibility to create 3-D simulation environments. Unity3D is one of the tools that provides a game engine and physics engine for creating better 3D simulation environments. In the literature there are many studies combining these two technologies to create several educational and training environments. However, in the literature, there are not many researches showing how these two technologies can be integrated to create simulation environment by providing haptic interfaces as well. There are several issues that need to be handled for creating such integration. First of all the haptic devices control libraries need to be integrated to the game engine. Second, the game engine simulation representations and real-time interaction features need to be coordinately represented by the haptic device degree of freedom and force-feedback speed and features. In this study, the integration architecture of Unity 3D game engine and the PHANToM Haptic device for creating a surgical education simulation environment is provided. The methods used for building this integration and handling the synchronization problems are also described. The algorithms developed for creating a better synchronization and user feedback such as providing a smooth feeling and force feedback for the haptic interaction are also provided. We believe that, this study will be helpful for the people who are creating simulation environment by using Unity3D technology and PHANToM haptic interfaces. © 2014 Springer International Publishing.Article Citation Count: 0Determination of measurement noise, conductivity errors and electrode mislocalization effects to somatosensory dipole localization.(Allied Acad, 2012) Sengul, G.; Baysal, U.; Computer EngineeringCalculating the spatial locations, directions and magnitudes of electrically active sources of human brain by using the measured scalp potentials is known as source localization. An accurate source localization method requires not only EEG data but also the 3-D positions and number of measurement electrodes, the numerical head model of the patient/subject and the conductivities of the layers used in the head model. In this study we computationally determined the effect of noise, conductivity errors and electrode mislocalizations for electrical sources located in somatosensory cortex. We first randomly selected 1000 electric sources in somatosensory cortex, and for these sources we simulated the surface potentials by using average conductivities given in the literature and 3-D positions of the electrodes. We then added random noise to measurements and by using noisy data; we tried to calculate the positions of the dipoles by using different electrode positions or different conductivity values. The estimated electrical sources and original ones are compared and by this way the effect of measurement noise, electrode mislocalizations and conductivity errors to somatosensory dipole localization is investigated. We conclude that for an accurate somatosensory source localization method, we need noiseless measurements, accurate conductivity values of scalp and skull layers and the accurate knowledge of 3-D positions of measurement sensors.Article Citation Count: 0The Effect of Statistically Constrained Minimum Mean Square Estimation Algorithm Which is Used For Human Head Tissue Conductivity Estimation to Source Localization(Journal Neurological Sciences, 2012) Sengul, Gokhan; Baysal, Ugur; Computer EngineeringDetermining the electrical active regions of human brain by using EEG and/or MEG data is known as "EEG/MEG bioelectromagnetic inverse problem" or "source localization". A typical source localization system intakes not only EEG/MEG data but also geometry information of subject/patient, a priori information about the electrically active sources, the number and 3-D positions of measurement electrodes and conductivities/resistivities of the tissues in the head model. In this study we investigated the conductivity estimation performance previously proposed Statistically Constrainted Minimum Mean Square Error Estimation (MiMSEE) algorithm by simulation studies and we also investigated the effect of the estimation to source localization activities. In simulation studies we used a three-layered (composed of scalp, skull and brain regions) realistic head model to estimate 100 different conductivity distributions in vivo. As a result we found that the proposed algorithm estimates the conductivity of scalp with an average error of 23%, the conductivity of skull with an average error of 40% and finally the conductivity of brain with an average error of 17%. In the second part of the study we compared the source localization errors for two cases: one, when the average conductivities of tissues given in the literature are used, and second when the subject-specific conductivity estimation is performed with MiMSEE algorithm. The results showed 10.1 mm localization error is obtained when the average conductivities given in the literature are used and 2.7 mm localization is obtained when subject-specific conductivity estimation is performed with MiMSEE algorithm. The results shows that the localization error is reduced by 73.07% when subject-specific conductivity estimation is performed with MiMSEE algorithm. We conclude that using the conductivities obtained from MiMSEE algorithm reduces the source localization error and we recommend to perform subject-specific conductivity estimation for source localization applications.Article Citation Count: 0Comparative Analysis of Programming Languages Utilized in Artificial Intelligence Applications: Features, Performance, and Suitability(Prof.Dr. İskender AKKURT, 2024) Türkmen,G.; Sezen,A.; Şengül,G.; Computer EngineeringThis study presents a detailed comparative analysis of the foremost programming languages employed in Artificial Intelligence (AI) applications: Python, R, Java, and Julia. These languages are analysed for their performance, features, ease of use, scalability, library support, and their applicability to various AI tasks such as machine learning, data analysis, and scientific computing. Each language is evaluated based on syntax and readability, execution speed, library ecosystem, and integration with external tools. The analysis incorporates a use case of code writing for a linear regression task. The aim of this research is to guide AI practitioners, researchers, and developers in choosing the most appropriate programming language for their specific needs, optimizing both the development process and the performance of AI applications. The findings also highlight the ongoing evolution and community support for these languages, influencing long-term sustainability and adaptability in the rapidly advancing field of AI. This comparative assessment contributes to a deeper understanding of how programming languages can enhance or constrain the development and implementation of AI technologies. © IJCESEN.Article DETERMINATION AND IDENTIFICATION OF DANGEROUSLY LANE CHANGING VEHICLES IN TRAFFIC BY IMAGE PROCESSING TECHNIQUES(International Journal of Scientific Research in Information Systems and Engineering, 2017) Şengül, Gökhan; Karakaya, Murat; Bostan, Atila; Computer EngineeringDue to increase of vehicle usage all around the world, the importance of safety driving in traffic is increasing. All of the countries around the world are taking actions to increase the safety driving habitats and decrease the number of traffic accidents. One of the applied precautions is to put necessary automatic auditing mechanisms into service for controlling the drivers as they drive since reckless drivers may not obey many traffic rules. In this study, image and video processing based methods are applied to identify the dangerously lane changing vehicles/drivers in the traffic. The proposed method focuses on to detect three different violations in traffic: the vehicles frequently changing traffic lanes, the vehicles changing lanes when it is forbidden, and the vehicles overtaking the other vehicles using the right lanes instead of left one. The proposed method is based on the image and video processing techniques. It first detects the vehicles in video sequences, then tracks the vehicles in the following frames and determines the lane changes of the vehicles. In the vehicle detection phase an image subtraction method is used. In the vehicle tracking phase, Kalman filtering tracking algorithm is used. After determining the lane changes of the vehicles/drivers, a rule based decision system is used to find out the vehicles/drivers improperly changing lanes and those vehicles are marked on the video. The proposed method is tested on the videos captured from real traffic environments and promising results are obtained.Article Citation Count: 5A Study on the Performance of Magnetic Material Identification System by SIFT-BRISK and Neural Network Methods(Ieee-inst Electrical Electronics Engineers inc, 2015) Ege, Yavuz; Nazlibilek, Sedat; Kakilli, Adnan; Citak, Hakan; Kalender, Osman; Karacor, Deniz; Sengul, Gokhan; Computer Engineering; Department of Mechatronics EngineeringIndustry requires low-cost, low-power consumption, and autonomous remote sensing systems for detecting and identifying magnetic materials. Magnetic anomaly detection is one of the methods that meet these requirements. This paper aims to detect and identify magnetic materials by the use of magnetic anomalies of the Earth's magnetic field created by some buried materials. A new measurement system that can determine the images of the upper surfaces of buried magnetic materials is developed. The system consists of a platform whose position is automatically controlled in x-axis and y-axis and a KMZ51 anisotropic magneto-resistive sensor assembly with 24 sensors mounted on the platform. A new identification system based on scale-invariant feature transform (SIFT)-binary robust invariant scalable keypoints (BRISKs) as keypoint and descriptor, respectively, is developed for identification by matching the similar images of magnetic anomalies. The results are compared by the conventional principal component analysis and neural net algorithms. On the six selected samples and the combinations of these samples, 100% correct classification rates were obtained.Conference Object Citation Count: 0Deep Learning and Current Trends in Machine Learning(Ieee, 2018) Bostan, Atila; Sengul, Gokhan; Tirkes, Guzin; Ekin, Cansu; Karakaya, Murat; Computer EngineeringAcademic interest and commercial attention can be used to identify how much potential a novel technology may have. Since the prospective advantages in it may help solving some problems that are not solved yet or improving the performance of readily available ones. In this study, we have investigated the Web of Science (WOS) indexing service database for the publications on Deep Learning (DL), Machine Learning (ML), Convolutional Neural Networks (CNN), and Image Processing to reveal out the current trend. The figures indicate the strong potential in DL approach especially in image processing domain.Conference Object Citation Count: 0A fully automatic photogrammetric system design using a 1.3 MP web camera to determine EEG electrode positions;(2010) Şengül,G.; Baysal,U.; Computer EngineeringIn this study a fully automatic fotogrammetric system is designed to determine the EEG electrode positions in 3D. The proposed system uses a 1.3 MP web camera rotating over the subject's head. The camera is driven by a step motor. The camera takes photos in every 7.20 angles during the rotation. In order to realize full automation, electrodes are labeled by colored circular markers and an electrode identification algorithm is develeoped for full automation. The proposed method is tested by using a realistic head phantom carrying 25 electrodes. The positions of the test electrodes are also measured by a conventional 3-D digitizer. The measurements are repeated 3 times for repeatibility purposes. It is found that 3-d digitizer localizes the electrodes with an average error of 8.46 mm, 7.63 mm and 8.32 mm, while the proposed system localizes the electrodes with an average error of 1.76 mm, 1.42 mm and 1.53 mm. ©2010 IEEE.Article Citation Count: 5An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)(Cairo Univ, Fac Computers & information, 2022) Mojisola, Falowo O.; Misra, Sanjay; Febisola, C. Falayi; Abayomi-Alli, Olusola; Sengul, Gokhan; Computer EngineeringThe recent innovations in network application and the internet have made data and network security the major role in data communication system development. Cryptography is one of the outstanding and powerful tools for ensuring data and network security. In cryptography, randomization of encrypted data increases the security level as well as the Computational Complexity of cryptographic algorithms involved. This research study provides encryption algorithms that bring confidentiality and integrity based on two algorithms. The encryption algorithms include a well-known RSA algorithm (1024 key length) with an enhanced bit insertion algorithm to enhance the security of RSA against different attacks. The security classical RSA has depreciated irrespective of the size of the key length due to the development in computing technology and hacking system. Due to these lapses, we have tried to improve on the contribution of the paper by enhancing the security of RSA against different attacks and also increasing diffusion degree without increasing the key length. The security analysis of the study was compared with classical RSA of 1024 key length using mathematical evaluation proofs, the experimental results generated were compared with classical RSA of 1024 key length using avalanche effect in (%) and computational complexity as performance evaluation metrics. The results show that RBMRSA is better than classical RSA in terms of security but at the cost of execution time. (C) 2022 THE AUTHORS. Published by Elsevier B.V. on behalf of Faculty of Computers and Information, Cairo University.