18 results
Search Results
Now showing 1 - 10 of 18
Conference Object Citation - Scopus: 1A Framework for Fuzzy Video Content Extraction, Storage and Retrieval(2010) Koyuncu,M.; Yilmaz,T.; Yildirim,Y.; Yazici,A.This study presents a new comprehensive framework for semantic content extraction from raw video, storage of the extracted data and retrieval of the stored data. Objects, spatial relations between objects, events and temporal relations between events, which are considered as semantic contents of the video, are extracted automatically to a certain extend with the developed approach. Extraction process is supported by manual annotation when automatic extraction is not satisfactory. The extracted information is stored in an intelligent fuzzy object-oriented database in which the database is enhanced with a fuzzy knowledge-based system. Domain specific deduction rules can be defined to derive new information about semantic contents of the video. The database is also supported by an access structure to increase retrieval efficiency. The proposed framework is capable of handling uncertain data arising from annotation process or video nature. © 2010 IEEE.Conference Object Citation - Scopus: 2Secure Communication Tests Carried Out With Next Generation Narrow Band Terminal in Satellite and Local Area Networks(2013) Dilli,O.; Koyuncu,M.; Akcam,N.; Oguslu,E.Communication becomes more and more important day by day and especially secure communication from one end to the other holds a vital place in our daily life. Developed countries which are aware of this fact has started to carry out serious studies on secure communication from one end to the other. One of the most important studies is the project which appeared as FNBDT (Future Narrow Band Digital Terminal) at first and was renamed as SCIP (Secure Communication Interoperability Protocol) later on. © 2013 IEEE.Conference Object A Component-Based Object Detection Method Extended With a Fuzzy Inference Engine(Institute of Electrical and Electronics Engineers Inc., 2015) Koyuncu,M.; Cetinkaya,B.In this paper, we propose a component-based object detection method extended with the fuzzy inference technique. The proposed method detects constituent components of a complex object instead of a whole object in images. For component detection, multiple multi-class support vector machines (SVM) are used in parallel. Each SVM classifies the candidate component using a different low-level image feature. The obtained results are fused to reach a decision about the component. Then, a fuzzy object extractor determines the whole object considering the detected components and their geometric configurations. The fuzzy object extractor is a fuzzy inference engine which tests various combinations of detected components and their fuzzified directions and distances. The initial tests yield promising results and encourage further studies to extend proposed method. © 2015 IEEE.Conference Object Citation - Scopus: 2Comparison of Qos Architectures for Voip Traffics in Ipv4 and Ipv6(Institute of Electrical and Electronics Engineers Inc., 2017) Al-Fayyadh,H.; Koyuncu,M.The Internet has become an integral part of human's life with an ever increasing number of applications and services that it provides to its customers. Both the numbers of Internet users and services provided by the Internet continue to rise tremendously. Quality of Service (QoS) is the ability of a network to provide better services for the users to divide the bandwidth according to the needs of different applications. With an increase in demand for multimedia applications like video streaming, VoIP and video conferencing, larger bandwidth requirement increases drastically since such applications are very sensitive to delay, packet loss, and jitter. IPv6 has new features which are designed to improve QoS supported by IPv4, as well as other improvements. This paper gives a comparative analysis of QoS architectures, namely Integrated Services (IntServ) and Differentiated Services (DiffServ), which are examined to see their effects for Voice over IP (VoIP) in IPv4 and IPv6 environments. For comparisons, OPNET Modeler is used for network modeling and testing. The obtained test results show the importance of IPv6 to support multimedia applications on the Internet. © 2016 IEEE.Conference Object Citation - Scopus: 7Slim-Tree and Bitmatrix Index Structures in Image Retrieval System Using Mpeg-7 Descriptors(2008) Açar,E.; Arslan,S.; Yazici,A.; Koyuncu,M.Content-based retrieval of multimedia data has still been an active research area. The efficient retrieval in natural images has been proven a difficult task for content-based image retrieval systems. In this paper, we present a system that adapts two different index structures, namely Slim-Tree and BitMatrix, for efficient retrieval of images based on multidimensional low-level features such as color, texture and shape. These index structures also use metric space. We use MPEG-7 Descriptors extracted from images to represent these features and store them in a native XML database. The low-level features; Color Layout (CL), Dominant Color (DC), Edge Histogram (EH) and Region Shape (RS) are used in Slim-Tree and BitMatrix and aggregated by Ordered Weighted Averaging (OWA) method to find final similarity between any two objects. The experiments included in the paper are in the subject of index construction and update, query response time and retrieval effectiveness using ANMRR performance metric and precision/recall scores. The experimental results strengthen the case that uses BitMatrix along with Ordered Weighted Averaging method in content-based image retrieval systems. ©2008 IEEE.Conference Object Citation - Scopus: 2Host Based Dynamic Throughput Maximization Model for Ieee 802.11 Wlan(2010) Koyuncu,M.; Gercek,M.K.; Ercan,T.As the demand for uninterrupted Internet access grows, the popularity of wireless communication increases. However, wireless communication has some problems compared to conventional wired communication. Especially, if widely used Wireless Local Area Network (WLAN) applications are taken into consideration, it becomes an important issue to balance the load among available access points. It is impossible to balance the load when wireless hosts associate with an access point by using the classical approach of Received Signal Strength Index (RSSI). Some solutions containing a central server, requiring a specific brand of access point or protocol revisions have been proposed previously, but none of them has been favored as a generally accepted solution. In this study, a proposal which is central server free and requires no modifications to the existing infrastructure is presented. The proposed model is based on a dynamic determination of the least loaded access point to associate with, in order to balance load and maximize throughput. © Springer-Verlag Berlin Heidelberg 2010.Conference Object Citation - Scopus: 1Optimal energy efficient routing in wireless sensor networks with link asymmetry(2012) Ozyer,S.T.; Tavli,B.; Koyuncu,M.In Wireless Sensor Networks (WSNs), link unidirectionality is an unavoidable phenomenon. The existence of unidirectional links can be attributed to several physical factors induced by the transceiver characteristics as well as other environmental phenomena. Transmission power heterogeneity is the dominant paradigm that leads to unidirectionality. In this study, we investigate the effects of transmission power heterogeneity on the lifetime of WSNs through a novel Linear Programming (LP) framework both for networks that utilize only bidirectional links and for those that can use unidirectional links in addition to bidirectional links. Our results show that transmission power heterogeneity can lead to more than 25 % decrease in network lifetime for protocols that can operate only on bidirectional links when compared to a network without any heterogeneity. However, if the use of unidirectional links is also enabled then, the decrease in network lifetime is at most 12 %. © 2012 IEEE.Conference Object Security Requirements in Iot Environments(Springer Science and Business Media Deutschland GmbH, 2022) Binglaw,F.; Koyuncu,M.; Pusatlı,T.The Internet of Things (IoT) is a relatively new concept as it connects things (or objects) that do not have high computational power. The IoT helps these things see, listen, and take action by interoperating with minimal human intervention to make people’s lives easier. However, these systems are vulnerable to attacks and security threats that could potentially undermine consumer confidence in them. For this reason, it is critical to understand the characteristics of IoT security and their requirements before starting to discuss how to protect them. In this scope, the present work reviews the importance of security in IoT applications, factors that restrict the use of traditional security methods to protect IoTs, and the basic requirements necessary to judge them as secure environments. © 2022, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.Conference Object Host Based Dynamic Throughput Maximization Model for Ieee 802.11 Wlan(2010) Koyuncu,M.; Gercek,M.K.; Ercan,T.As the demand for uninterrupted Internet access grows, the popularity of wireless communication increases. However, wireless communication has some problems compared to conventional wired communication. Especially, if widely used Wireless Local Area Network (WLAN) applications are taken into consideration, it becomes an important issue to balance the load among available access points. It is impossible to balance the load when wireless hosts associate with an access point by using the classical approach of Received Signal Strength Index (RSSI). Some solutions containing a central server, requiring a specific brand of access point or protocol revisions have been proposed previously, but none of them has been favored as a generally accepted solution. In this study, a proposal which is central server free and requires no modifications to the existing infrastructure is presented. The proposed model is based on a dynamic determination of the least loaded access point to associate with, in order to balance load and maximize throughput. © Springer-Verlag Berlin Heidelberg 2010.Conference Object Slim-Tree and Bitmatrix Index Structures in Image Retrieval System Using Mpeg-7 Descriptors(2008) Açar,E.; Arslan,S.; Yazici,A.; Koyuncu,M.Content-based retrieval of multimedia data has still been an active research area. The efficient retrieval in natural images has been proven a difficult task for content-based image retrieval systems. In this paper, we present a system that adapts two different index structures, namely Slim-Tree and BitMatrix, for efficient retrieval of images based on multidimensional low-level features such as color, texture and shape. These index structures also use metric space. We use MPEG-7 Descriptors extracted from images to represent these features and store them in a native XML database. The low-level features; Color Layout (CL), Dominant Color (DC), Edge Histogram (EH) and Region Shape (RS) are used in Slim-Tree and BitMatrix and aggregated by Ordered Weighted Averaging (OWA) method to find final similarity between any two objects. The experiments included in the paper are in the subject of index construction and update, query response time and retrieval effectiveness using ANMRR performance metric and precision/recall scores. The experimental results strengthen the case that uses BitMatrix along with Ordered Weighted Averaging method in content-based image retrieval systems. ©2008 IEEE.

