Browsing by Author "Hassanpour, R."
Now showing 1 - 8 of 8
- Results Per Page
- Sort Options
Article Citation - Scopus: 5Active defense strategy against jamming attack in wireless sensor networks(Modern Education and Computer Science Press, 2019) Al-Shai, N.F.A.; Hassanpour, R.Wireless Sensor Networks WSNs are being utilized increasingly nowadays due to their ability to collect data from stationary, moving, reachable or unreachable fields. Progressive developments in WSN techniques add efficiency, reliability and better power management possibility, but they are still vulnerable and sensitive to security threats. The most effective threat to WSN is DOS attacks, which are detectable but in many cases unpreventable yet. An authentication-based defensive approach against DOS attack combined with jamming attack that prevents transferring data between attacked nodes in a cluster and cluster head node is proposed in this study. The proposed method encompasses developing an algorithm with ability to bypass attacked path via alternative safe one under control of cluster head to mitigate the False Node Excluding DOS due to jamming attack. The proposed method has been experimentally tested against similar methods from the literature with arbitrary study cases. Our proposed algorithm shows promising results in mitigating False Node Exclusion DOS (FNEDOS) attack where a full recovery of the attacked node is achieved in case of isolated nodes, and improvement between 36% and 52% is obtained when the attack affects a group of nodes at proxim © 2019 MECS.Conference Object Citation - Scopus: 0An Rsvp Model for Opnet Simulator With An Integrated Qos Architecture(Caltek s.r.l., 2009) Özyer, S.T.; Hassanpour, Reza; Hassanpour, R.; 18980; Yazılım MühendisliğiResource Reservation Protocol (RSVP) allows Internet real-time applications to request a specific end-to-end Quality of service (QoS) for data stream before they start transmitting data. In this paper firstly an overview of RSVP is presented. After that the different quality of services available and the relation between QoS and RSVP have been explained. The fundamentals of RSVP as a protocol is discussed. The performance issues and benchmarking for planned portion architecture at the department of Computer Engineering, Çankaya University has been given next. The experimental results and discussions conclude this paper. In this paper, OPNET network simulation tool has been used. Under given architecture and protocol, performance of quality of service implications has been carried out.Article Citation - WoS: 20Citation - Scopus: 22Computerized detection and segmentation of mitochondria on electron microscope images(Wiley, 2012) Hassanpour, Reza; Mumcuoglu, E. U.; Hassanpour, R.; Taşel, Faris Serdar; Tasel, S. F.; Perkins, G.; Martone, M. E.; Gurcan, M. N.; 55346; Yazılım Mühendisliği; Bilgisayar MühendisliğiMitochondrial function plays an important role in the regulation of cellular life and death, including disease states. Disturbance in mitochondrial function and distribution can be accompanied by significant morphological alterations. Electron microscopy tomography (EMT) is a powerful technique to study the 3D structure of mitochondria, but the automatic detection and segmentation of mitochondria in EMT volumes has been challenging due to the presence of subcellular structures and imaging artifacts. Therefore, the interpretation, measurement and analysis of mitochondrial distribution and features have been time consuming, and development of specialized software tools is very important for high-throughput analyses needed to expedite the myriad studies on cellular events. Typically, mitochondrial EMT volumes are segmented manually using special software tools. Automatic contour extraction on large images with multiple mitochondria and many other subcellular structures is still an unaddressed problem. The purpose of this work is to develop computer algorithms to detect and segment both fully and partially seen mitochondria on electron microscopy images. The detection method relies on mitochondria's approximately elliptical shape and double membrane boundary. Initial detection results are first refined using active contours. Then, our seed point selection method automatically selects reliable seed points along the contour, and segmentation is finalized by automatically incorporating a live-wire graph search algorithm between these seed points. In our evaluations on four images containing multiple mitochondria, 52 ellipses are detected among which 42 are true and 10 are false detections. After false ellipses are eliminated manually, 14 out of 15 fully seen mitochondria and 4 out of 7 partially seen mitochondria are successfully detected. When compared with the segmentation of a trained reader, 91% Dice similarity coefficient was achieved with an average 4.9 nm boundary error.Conference Object Citation - Scopus: 11Delaunay Triangulation Based 3D Human Face Modeling From Uncalibrated İmages(IEEE Computer Society, 2004) Hassanpour, R.; Hassanpour, Reza; Atalay, V.; 48646; Yazılım MühendisliğiIn this paper, we describe an algorithm for generating three dimensional models of human faces from uncalibrated images. Input images are taken by a camera generally with a small rotation around a single axis which may cause degenerate solutions during auto-calibration. We describe a solution to this problem by a priori assumptions on the camera. To generate a specific person's head, a generic human head model is deformed according to the 3D coordinates of points obtained by reconstructing the scene using images calibrated with our algorithm. The deformation process is based on a physical based massless spring model and it requires local re-triangulation in the area with high curvatures. This is achieved by locally applying Delaunay traingulation method. However, there may occur degeneracies in Delaunay triangulation such as encroaching of edges. We describe an algorithm for removing the degeneracies during triangulation by modifying the definition of the Delaunay cavity. This algorithm has also the effect of preserving the curavature in the face area. We have compared the models generated with our algorithm with the models obtained using cyberscanners. The RMS geometric error in these comparisons are less than 1.8 x 10-2. © 2004 IEEE.Article Citation - Scopus: 0Human face identification using M-PCA augmented with Gabor Wavelet(2005) Karaömeroǧlu, B.; Hassanpour, Reza; Hassanpour, R.; Yazılım MühendisliğiIn this paper, a specialized version of PCA augmented with Gabor Wavelet Transform is proposed for face identification. Firstly, to cope with the variations due to illumination and facial expression changes 2D Gabor Wavelet Transform is applied; then for reducing a large set of correlated variables to a small number of uncorrelated components the PCA approach is used with some modifications. Based on the effect of the illumination, facial expression and occluding objects such as eye glasses and facial hair, performance of the proposed algorithm is compared with the other algorithms.Article Citation - WoS: 106Citation - Scopus: 130Hybrid Expert Systems: A Survey of Current Approaches and Applications(Pergamon-elsevier Science Ltd, 2012) Sahin, S.; Hassanpour, Reza; Tolun, M. R.; Hassanpour, R.; 1863; Yazılım MühendisliğiThis paper is a statistical analysis of hybrid expert system approaches and their applications but more specifically connectionist and neuro-fuzzy system oriented articles are considered. The current survey of hybrid expert systems is based on the classification of articles from 1988 to 2010. Present analysis includes 91 articles from related academic journals, conference proceedings and literature reviews. Our results show an increase in the number of recent publications which is an indication of gaining popularity on the part of hybrid expert systems. This increase in the articles is mainly in neuro-fuzzy and rough neural expert systems' areas. We also observe that many new industrial applications are developed using hybrid expert systems recently. (C) 2011 Elsevier Ltd. All rights reserved.Conference Object Citation - Scopus: 0Spam mail filtering using Bayesian classifier and heuristics(2006) Eş, Sinan; Eş, S.; Aşkun, A.R.; Hassanpour, Reza; Hassanpour, R.; 56475; Bilgisayar Mühendisliği; Yazılım MühendisliğiCommercials and virus infected files transferred by electronic mails (e-mail) have been a main source of time and resource loss during the past decade and email filtering as a binary text classification problem has attracted the attention of many researchers recently. In this study, we have tried to find a filtering solution which is able to automatically classify emails into spam and legitimate categories. In order to automatically and efficiently classify emails as spam or legitimate we took advantage of some Bayesian stochastic algorithms and machine learning based heuristic methods. Our approach includes some novel ideas from Information Retrieval.Conference Object Citation - Scopus: 18Vision-based hand gesture recognition for human computer interaction: A review(2008) Hassanpour, R.; Hassanpour, Reza; Wong, S.; Shahbahrami, A.; Yazılım MühendisliğiEvolution of user interfaces shapes the change in the human-computer interaction. With the rapid emergence of threedimensional (3-D) applications; the need for a new type of interaction device arises as traditional devices such as mouse, keyboard, and joystick become inefficient and cumbersome within these virtual environments. Intuitive and naturalness characteristics of "Hand Gestures" in human computer interaction have been the driving force and motivation to develop an interaction device which can replace current unwieldy tools. This study is a survey on the methods of analyzing, modeling and recognizing hand gestures in the context of human-computer interaction. Taxonomy of the methods based on the applications that they have been developed for and the approaches that they have used to represent gestures is presented. Direction of future developments is also discussed. © 2008 IADIS.