Browsing by Author "Akbas, Ayhan"
Now showing 1 - 6 of 6
- Results Per Page
- Sort Options
Article Citation - WoS: 2Citation - Scopus: 8Human Identification Using Palm Print Images Based on Deep Learning Methods and Gray Wolf Optimization Algorithm(Springer London Ltd, 2024) Alshakree, Firas; Akbas, Ayhan; Rahebi, Javad; 01. Abdullah Gül UniversityPalm print identification is a biometric technique that relies on the distinctive characteristics of a person's palm print to distinguish and authenticate their identity. The unique pattern of ridges, lines, and other features present on the palm allows for the identification of an individual. The ridges and lines on the palm are formed during embryonic development and remain relatively unchanged throughout a person's lifetime, making palm prints an ideal candidate for biometric identification. Using deep learning networks, such as GoogLeNet, SqueezeNet, and AlexNet combined with gray wolf optimization, we achieved to extract and analyze the unique features of a person's palm print to create a digital representation that can be used for identification purposes with a high degree of accuracy. To this end, two well-known datasets, the Hong Kong Polytechnic University dataset and the Tongji Contactless dataset, were used for testing and evaluation. The recognition rate of the proposed method was compared with other existing methods such as principal component analysis, including local binary pattern and Laplacian of Gaussian-Gabor transform. The results demonstrate that the proposed method outperforms other methods with a recognition rate of 96.72%. These findings show that the combination of deep learning and gray wolf optimization can effectively improve the accuracy of human identification using palm print images.Article Human identification using palm print images based on deep learning methods and gray wolf optimization algorithm(SPRINGER, 2024) Alshakree, Firas; Akbas, Ayhan; Rahebi, Javad; 0000-0002-6425-104X; AGÜ, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü; Akbas, Ayhan; 01. Abdullah Gül UniversityPalm print identification is a biometric technique that relies on the distinctive characteristics of a person’s palm print to distinguish and authenticate their identity. The unique pattern of ridges, lines, and other features present on the palm allows for the identification of an individual. The ridges and lines on the palm are formed during embryonic development and remain relatively unchanged throughout a person’s lifetime, making palm prints an ideal candidate for biometric identification. Using deep learning networks, such as GoogLeNet, SqueezeNet, and AlexNet combined with gray wolf optimization, we achieved to extract and analyze the unique features of a person’s palm print to create a digital representation that can be used for identification purposes with a high degree of accuracy. To this end, two well-known datasets, the Hong Kong Polytechnic University dataset and the Tongji Contactless dataset, were used for testing and evaluation. The recognition rate of the proposed method was compared with other existing methods such as principal component analysis, including local binary pattern and Laplacian of Gaussian-Gabor transform. The results demonstrate that the proposed method outperforms other methods with a recognition rate of 96.72%. These findings show that the combination of deep learning and gray wolf optimization can effectively improve the accuracy of human identification using palm print images.Article Citation - WoS: 13Citation - Scopus: 19Machine Learning Approaches for Underwater Sensor Network Parameter Prediction(Elsevier, 2023) Uyan, Osman Gokhan; Akbas, Ayhan; Gungor, Vehbi Cagri; 01. Abdullah Gül UniversityUnderwater Acoustic Sensor Networks (UASNs) have recently attracted scientists due to its wide range of real -world applications. However, there are design challenges in UASNs, such as limited network lifetime and low communication reliability provoked by the constrained battery supply of sensors and harsh channel conditions in the underwater environments. To meet communication reliability requirements, packet-duplication and multi -path routing algorithms have been recommended in the literature. Furthermore, underwater sensors may convey sensitive data, which must be masked to avoid eavesdropping attempts. To improve network security, cryptographic encryption is the most widely used method. Nevertheless, data encryption needs computations to cipher the data, which consumes extra energy, resulting in a cutback in the life span of the network. To address these challenges, an optimization model has been proposed to evaluate the impacts of multi-path routing, packet duplication, encryption, and data fragmentation on the lifetime of the UASNs. However, the solution time of the proposed optimization model is quite high, and sometimes it cannot come up with feasible solutions. To this end, in this study, different regression and neural network methods have been proposed to predict network param-eters and energy consumptions of underwater nodes as supplementary methods to optimization models. Per-formance evaluations show that the proposed methods yield remarkably accurate predictions and can be used for energy consumption prediction in UASNs.Article Citation - WoS: 1Machine Learning Based Network Intrusion Detection With Hybrid Frequent Item Set Mining(Gazi Univ, 2024) Firat, Murat; Bakal, Gokhan; Akbas, Ayhan; 01. Abdullah Gül University; 02. 04. Bilgisayar Mühendisliği; 02. Mühendislik FakültesiWith the development and expansion of computer networks day by day and the diversity of software developed, the damage that possible attacks can cause is increasing beyond the predictions. Intrusion Detection Systems (STS/IDS) are one of the practical defense tools against these potential attacks that are constantly growing and diversifying. Thus, one of the emerging methods among researchers is to train these systems with various artificial intelligence methods to detect subsequent attacks in real time and take the necessary precautions. However, the ultimate goal is to propose a hybrid feature selection approach to improve the classification performance. The raw dataset originally enclosed 85 descriptor features (attributes) for classification. These attributes are extracted using CICFlowMeter from a PCAP file where network traffic is recorded for data curation. In this study, classical feature selection methods and frequent item set mining approaches were employed in feature selection for constructing a hybrid model. We aimed to examine the effect of the proposed hybrid feature selection approach on the classification task for the network traffic data containing ordinary and attack records. The outcomes demonstrate that the proposed method gained nearly 3% improvement when applied with the Logistic Regression algorithm on classifying more than 225,000 records.Article Citation - WoS: 9Citation - Scopus: 10A Reliable and Secure Multi-Path Routing Strategy for Underwater Acoustic Sensor Networks(Elsevier, 2022) Uyan, Osman Gokhan; Akbas, Ayhan; Gungor, Vehbi Cagri; 01. Abdullah Gül UniversityUnderwater Acoustic Sensor Networks (UASNs) have nowadays become an attractive topic in scientific studies and commercial applications. An important challenge in UASN's design is the limited network lifetime and low reliability caused by the limited battery energy of sensor nodes and harsh channel conditions in underwater environments. In addition, sensor nodes may generate sensitive data, which needs to be concealed. To this end, cryptographic encryption is a commonly used method to cipher a data before transmission to maintain security. However, encryption methods require additional computation and extra energy, which causes a decrease in the network lifetime. To this end, transmitting fragmented data through multiple paths can be used as a security countermeasure, in conjunction with encryption against silent listening attacks. To address these challenges, in this study, an optimization framework has been developed to analyze the effects of multi-path routing, packet duplication, encryption and data fragmentation on network lifetime. In addition to an optimal solution, Simulated Annealing, Golden Section Search and Genetic Algorithm-based heuristic methods have been developed. Performance results show that the proposed approach jointly solves the problem of UASN lifetime maximization, while providing network reliability and security.Article Citation - WoS: 15Citation - Scopus: 16Stacking Ensemble Learning-Based Wireless Sensor Network Deployment Parameter Estimation(Springer Heidelberg, 2023) Akbas, Ayhan; Buyrukoglu, Selim; 0000-0002-6425-104X; AGÜ, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü; Akbas, Ayhan; 01. Abdullah Gül UniversityIn wireless sensor network projects, it is generally desired to cover the area to be monitored at a given cost and to achieve the maximum useful network lifetime. In the deployment of the wireless sensors, it is necessary to know in advance how many sensor nodes will be required, how much the distance between the nodes should be, etc., or what the transmit power level should be, etc. depending on the channel parameters of the area. This necessitates accurate calculation of variables such as maximum network lifetime, communication channel parameters, number of nodes to be used, and distance between nodes. As numbers reach to the order of hundreds, calculation tends to a NP hard problem to solve. At this point, we employed both single-based and stacked ensemble-based machine learning models to speed up the parameter estimations with highly accurate outcomes. Adaboost was superior over other models (Elastic Net, SVR) in single-based models. Stacked ensemble models achieved best results for the WSN parameter prediction compared to single-based models.
