Search Results - "Ergin, Semih"
-
1
A new feature extraction framework based on wavelets for breast cancer diagnosis
Published in Computers in biology and medicine (01-08-2014)“…Abstract This paper investigates a pattern recognition framework in order to determine and classify breast cancer cases. Initially, a two-class separation…”
Get full text
Journal Article -
2
Block-Based Noisy/Clean Classification of Images Using the Common Vector Approach
Published in Circuits, systems, and signal processing (01-03-2020)“…In this paper, a novel method is proposed to determine noisy blocks of an image. Three different threshold values for noisy/clean classification of the blocks…”
Get full text
Journal Article -
3
Necessary Conditions for Successful Application of Intra- and Inter-class Common Vector Classifiers
Published in Arabian journal for science and engineering (2011) (2022)“…In this study, classification performances and inherent characteristics of two variations of the common vector approach (CVA), namely the mutual CVA and the…”
Get full text
Journal Article -
4
A survey on ECG analysis
Published in Biomedical signal processing and control (01-05-2018)“…The electrocardiogram (ECG) signal basically corresponds to the electrical activity of the heart. In the literature, the ECG signal has been analyzed and…”
Get full text
Journal Article -
5
Indifference subspace of deep features for lung nodule classification from CT images
Published in Expert systems with applications (01-03-2025)“…Deep learning (DL) has made substantial contributions to automated diagnoses in biomedical imaging, with various architectures extensively used for critical…”
Get full text
Journal Article -
6
A new classification scheme of plastic wastes based upon recycling labels
Published in Waste management (Elmsford) (01-01-2015)“…•PET, HPDE or PP types of plastics are considered.•An automated classification of plastic bottles based on the feature extraction and classification methods is…”
Get full text
Journal Article -
7
Neural network representations for the inter- and intra-class common vector classifiers
Published in Digital signal processing (01-10-2023)“…Common Vector Approach (CVA) is a known linear regression-based classifier, which also enables an extension to inter-class discrimination, known as the…”
Get full text
Journal Article -
8
Are deep learning classification results obtained on CT scans fair and interpretable?
Published in Australasian physical & engineering sciences in medicine (01-09-2024)“…Following the great success of various deep learning methods in image and object classification, the biomedical image processing society is also overwhelmed…”
Get full text
Journal Article -
9
A New Feature Ensemble with a Multistage Classification Scheme for Breast Cancer Diagnosis
Published in Journal of healthcare engineering (01-01-2017)“…A new and effective feature ensemble with a multistage classification is proposed to be implemented in a computer-aided diagnosis (CAD) system for breast…”
Get full text
Journal Article -
10
Two Pseudo-Common Vectors for Pattern Recognition
Published in Arabian journal for science and engineering (2011) (01-12-2020)“…In this paper, the mathematical model used in finding the common vectors of classes in pattern recognition problems is reconsidered to obtain possible…”
Get full text
Journal Article -
11
-
12
-
13
On the realization of common matrix classifier using covariance tensors
Published in Digital signal processing (01-06-2015)“…Due to the growing interest in image classifiers, the concept of native two dimensional (2-D) classifiers continues to attract researchers in the field of…”
Get full text
Journal Article -
14
A new implementation of common matrix approach using third-order tensors for face recognition
Published in Expert systems with applications (01-04-2011)“…► CMA is effectively used in pattern recognition problems. ► Since CMA considers the recognition problem as separate class subspace, CMA is adapted very…”
Get full text
Journal Article -
15
Use of center of gravity with the common vector approach in isolated word recognition
Published in Expert systems with applications (01-04-2011)“…► The COG method determines the point around which the momentum through the word is balanced. ► The COG method is superior to the endpoint detection method in…”
Get full text
Journal Article -
16
The assessment of feature selection methods on agglutinative language for spam email detection: A special case for Turkish
Published in 2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings (01-06-2014)“…In this study, the assessment of three different feature selection methods including Information Gain (IG), Gini Index (GI), and CHI square (CHI2) is made by…”
Get full text
Conference Proceeding -
17
Are Deep Learning Classification Results Obtained on CT Scans Fair and Interpretable?
Published 22-09-2023“…Following the great success of various deep learning methods in image and object classification, the biomedical image processing society is also overwhelmed…”
Get full text
Journal Article -
18
The investigation on the effect of feature vector dimension for spam email detection with a new framework
Published in 2014 9th Iberian Conference on Information Systems and Technologies (CISTI) (01-06-2014)“…In this study, the effect of dimension for a feature vector on the classification of Turkish e-mails as spam or legitimate is investigated. Although hundreds…”
Get full text
Conference Proceeding -
19
A feature selection analysis in breast cancer diagnosis
Published in 2015 Medical Technologies National Conference (TIPTEKNO) (01-10-2015)“…In this paper, it is aimed to design a computer aided diagnosis system for breast cancer diagnosis and a mamogram dataset prepared during the Image Retrieval…”
Get full text
Conference Proceeding -
20
ECG based biometric authentication using ensemble of features
Published in 2014 9th Iberian Conference on Information Systems and Technologies (CISTI) (01-06-2014)“…In this work, the efficacy of various features on electrocardiogram (ECG) based biometric authentication process is thoroughly examined. In particular, the…”
Get full text
Conference Proceeding