Pub Date : 2021-08-31DOI: 10.35377/saucis.04.02.953902
K. Ayan, Selim Seker, Abdal Kasule
{"title":"A Curve Fitting Modelling Approach to Forecast Long-Term Electrical Energy Consumption: Case Study of Turkey","authors":"K. Ayan, Selim Seker, Abdal Kasule","doi":"10.35377/saucis.04.02.953902","DOIUrl":"https://doi.org/10.35377/saucis.04.02.953902","url":null,"abstract":"","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133211381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-08-31DOI: 10.35377/saucis.04.02.874860
Ferhat Arat, Sercan Demirci
The Internet of Things (IoT) refers to smart devices with limited resources that connect to the Internet and transmit data. Routing is an important process in this structure, which can be described as the general frame of wireless sensor networks (WSNs). The Routing Protocol for Low-Power and Lossy Networks (RPL) is recommended by the Internet Engineering Task Force (IETF) to provide communication in resource-constrained networks and is designed for routing in IoT. Basically, it is the Internet Protocol Version 6 (IPv6) protocol developed based on the energy consumed by devices. The algorithm has an important place in the performance of the IoT network. In this paper, the performance of the RPL under different objective functions (OFs) is examined. OFs are symbolized and defined by detailed equations. This study provides an experimental analysis of the RPL algorithm. An overview of the RPL algorithm is also included. Finally, the RPL algorithm is simulated by a custom simulator which is performing on the application layer, created using the Python programming language. The algorithm’s behaviour in terms of different OFs such as throughput maximization, energy efficiency maximization and energy consumption minimization was observed and the results were evaluated under different parameters such as packet size, number of nodes and different signal-to-noise ratio (SNR) values. Our experimental results may be useful for both researchers and practitioners working in related fields.
{"title":"Experimental Analysis of Energy Efficient and QoS Aware Objective Functions for RPL Algorithm in IoT Networks","authors":"Ferhat Arat, Sercan Demirci","doi":"10.35377/saucis.04.02.874860","DOIUrl":"https://doi.org/10.35377/saucis.04.02.874860","url":null,"abstract":"The Internet of Things (IoT) refers to smart devices with limited resources that connect to the Internet and transmit data. Routing is an important process in this structure, which can be described as the general frame of wireless sensor networks (WSNs). The Routing Protocol for Low-Power and Lossy Networks (RPL) is recommended by the Internet Engineering Task Force (IETF) to provide communication in resource-constrained networks and is designed for routing in IoT. Basically, it is the Internet Protocol Version 6 (IPv6) protocol developed based on the energy consumed by devices. The algorithm has an important place in the performance of the IoT network. In this paper, the performance of the RPL under different objective functions (OFs) is examined. OFs are symbolized and defined by detailed equations. This study provides an experimental analysis of the RPL algorithm. An overview of the RPL algorithm is also included. Finally, the RPL algorithm is simulated by a custom simulator which is performing on the application layer, created using the Python programming language. The algorithm’s behaviour in terms of different OFs such as throughput maximization, energy efficiency maximization and energy consumption minimization was observed and the results were evaluated under different parameters such as packet size, number of nodes and different signal-to-noise ratio (SNR) values. Our experimental results may be useful for both researchers and practitioners working in related fields.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131730073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-08-31DOI: 10.35377/saucis.04.02.895764
Ahmet Ali Süzen, Burhan Duman
Recently, serious damages have occurred in e-commerce applications due to rapidly increasing data leaks and end-user vulnerabilities. Although the source of the vulnerabilities is different, attacks result in the theft of unsafe data. In particular, the theft of credit card information reveals a financial loss. In this study, a blockchain-based secure storage model has been developed in order to prevent the theft of credit card information in e-commerce applications as a result of a possible data leak. In the sample e-commerce application developed with ASP.NET, data other than credit cards are stored. Credit card data is transmitted to the blockchain over the API with SSL protection in the e-commerce application. The blockchain model was developed using MongoDB with the BigchainDB framework. The data in each block of the blockchain is encrypted with Advanced Encryption Standard (AES) 256 bits. The data integrity of the block is provided by the SHA256 algorithm. it is aimed to protect credit card data from a possible data leak with the proposed BigchainDB-based blockchain model.
{"title":"Blockchain-Based Secure Credit Card Storage System for E-Commerce","authors":"Ahmet Ali Süzen, Burhan Duman","doi":"10.35377/saucis.04.02.895764","DOIUrl":"https://doi.org/10.35377/saucis.04.02.895764","url":null,"abstract":"Recently, serious damages have occurred in e-commerce applications due to rapidly increasing data leaks and end-user vulnerabilities. Although the source of the vulnerabilities is different, attacks result in the theft of unsafe data. In particular, the theft of credit card information reveals a financial loss. In this study, a blockchain-based secure storage model has been developed in order to prevent the theft of credit card information in e-commerce applications as a result of a possible data leak. In the sample e-commerce application developed with ASP.NET, data other than credit cards are stored. Credit card data is transmitted to the blockchain over the API with SSL protection in the e-commerce application. The blockchain model was developed using MongoDB with the BigchainDB framework. The data in each block of the blockchain is encrypted with Advanced Encryption Standard (AES) 256 bits. The data integrity of the block is provided by the SHA256 algorithm. it is aimed to protect credit card data from a possible data leak with the proposed BigchainDB-based blockchain model.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128520274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-08-31DOI: 10.35377/saucis.04.02.866409
V. Kılıç
{"title":"Deep Gated Recurrent Unit for Smartphone-Based Image Captioning","authors":"V. Kılıç","doi":"10.35377/saucis.04.02.866409","DOIUrl":"https://doi.org/10.35377/saucis.04.02.866409","url":null,"abstract":"","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116457640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-08-02DOI: 10.35377/saucis.04.02.932709
Semih Aktaş, Hande Alemdar
The next generation mobile networks have to provide high data rates, extremely low latency, and support high connection density. To meet these requirements, the number of base stations will have to increase and this increase will lead to an energy consumption issue. Therefore “green” approaches to the network operation will gain importance. Reducing the energy consumption of base stations is essential for going green and also it helps service providers to reduce operational expenses. However, achieving energy savings without degrading the quality of service is a huge challenge. In order to address this issue, we propose a machine learning based intelligent solution that also incorporates a network simulator. We develop a reinforcement-based learning model by using deep deterministic policy gradient algorithm. Our model update frequently the policy of network switches in a way that, packet be forwarded to base stations with an optimized power level. The policies taken by the network controller are evaluated with a network simulator to ensure the energy consumption reduction and quality of service balance. The reinforcement learning model allows us to constantly learn and adapt to the changing situations in the dynamic network environment, hence having a more robust and realistic intelligent network management policy set. Our results demonstrate that energy efficiency can be enhanced by 32% and 67% in dense and sparse scenarios, respectively.
{"title":"Base Station Power Optimization for Green Networks Using Reinforcement Learning","authors":"Semih Aktaş, Hande Alemdar","doi":"10.35377/saucis.04.02.932709","DOIUrl":"https://doi.org/10.35377/saucis.04.02.932709","url":null,"abstract":"The next generation mobile networks have to provide high data rates, extremely low latency, and support high connection density. To meet these requirements, the number of base stations will have to increase and this increase will lead to an energy consumption issue. Therefore “green” approaches to the network operation will gain importance. Reducing the energy consumption of base stations is essential for going green and also it helps service providers to reduce operational expenses. However, achieving energy savings without degrading the quality of service is a huge challenge. In order to address this issue, we propose a machine learning based intelligent solution that also incorporates a network simulator. We develop a reinforcement-based learning model by using deep deterministic policy gradient algorithm. Our model update frequently the policy of network switches in a way that, packet be forwarded to base stations with an optimized power level. The policies taken by the network controller are evaluated with a network simulator to ensure the energy consumption reduction and quality of service balance. The reinforcement learning model allows us to constantly learn and adapt to the changing situations in the dynamic network environment, hence having a more robust and realistic intelligent network management policy set. Our results demonstrate that energy efficiency can be enhanced by 32% and 67% in dense and sparse scenarios, respectively.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126922278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-25DOI: 10.35377/SAUCIS.04.01.763070
M. Tosun, H. Aksoy
Electric energy passes through many stages from production to usage, and many electrical connections take place at these stages. Electrical connections are quite important for system safety and electrical energy quality. In this study, current-temperature relationship in the cable was investigated in cable joints made with screw connection terminals, depending on torque applied to screw. In numerical solution of the problem, Comsol Multiphysics program based on Finite Element Method was used first, the screw-conductor interface was investigated based on applied torque, and then electrical-thermal analysis was performed on this geometry. Experimental studies were carried out to demonstrate accuracy of digital model, and conductors and terminals used in household installations were taken into account in these studies. Amount of deformation of conductors depending on torque applied to screw and its effect to current carrying capacity of these terminals having screw connection were investigated. In this study, the appropriate torque value is 0.4 Nm, and the maximum temperature value is 45 oC on contact surface. Also, it has been shown that the optimum torque value to be applied in the copper conductor cable joint with 1.5 mm2 cross section area is 0.4 Nm.
{"title":"Electrical-Thermal-Mechanical Analysis of Cable Connection with Screw-Connected Terminal Strips Using Finite Element Method","authors":"M. Tosun, H. Aksoy","doi":"10.35377/SAUCIS.04.01.763070","DOIUrl":"https://doi.org/10.35377/SAUCIS.04.01.763070","url":null,"abstract":"Electric energy passes through many stages from production to usage, and many electrical connections take place at these stages. Electrical connections are quite important for system safety and electrical energy quality. In this study, current-temperature relationship in the cable was investigated in cable joints made with screw connection terminals, depending on torque applied to screw. In numerical solution of the problem, Comsol Multiphysics program based on Finite Element Method was used first, the screw-conductor interface was investigated based on applied torque, and then electrical-thermal analysis was performed on this geometry. Experimental studies were carried out to demonstrate accuracy of digital model, and conductors and terminals used in household installations were taken into account in these studies. Amount of deformation of conductors depending on torque applied to screw and its effect to current carrying capacity of these terminals having screw connection were investigated. In this study, the appropriate torque value is 0.4 Nm, and the maximum temperature value is 45 oC on contact surface. Also, it has been shown that the optimum torque value to be applied in the copper conductor cable joint with 1.5 mm2 cross section area is 0.4 Nm.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133231301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-05DOI: 10.35377/SAUCIS.04.01.863190
H. Cebeci, Y. Korkut
In the academic field and as well as the application field, substantial attention has been drawn to coping with disasters. Since natural dangers causing a large proportion of disasters cannot be avoided, attempts to combat disasters have centered on preventing hazards from evolving into disasters through measures and restructuring works taken before, during, and after the disaster. There are many players involved in the disaster management process and many factors are influential in the effectiveness of this process. Among these factors, deciding the critical ones offers significant advantages, particularly in terms of practical studies. Concentrating on a single stakeholder in deciding the factors crucial to the success of this management structure, which has many stakeholders, can cause to ignoring the significant viewpoints of other stakeholder groups. Accordingly, for the evaluation of several success factors achieved as a result of a thorough and systematic literature review, the purpose of our study is to develop a common critical success factor model that will represent both the viewpoints of operational experts and academic experts, who constitute the stakeholders of this domain. Analytical Hierarchy Process (AHP) is utilized to determine the opinions of field experts while the text mining method was used to determine the perspectives of academics. In the study, therefore, a new AHP model assisted by text mining is introduced. Socio-cultural factors were brought to light by the analysis results of the suggested model. It has been determined by the results of the study that these two perspectives are overlapped largely in the organizational field and relatively in socio-cultural, environmental, and legal fields.
{"title":"Determination Of The Critical Success Factors In Disaster Management Through The Text Mining Assisted Ahp Approach","authors":"H. Cebeci, Y. Korkut","doi":"10.35377/SAUCIS.04.01.863190","DOIUrl":"https://doi.org/10.35377/SAUCIS.04.01.863190","url":null,"abstract":"In the academic field and as well as the application field, substantial attention has been drawn to coping with disasters. Since natural dangers causing a large proportion of disasters cannot be avoided, attempts to combat disasters have centered on preventing hazards from evolving into disasters through measures and restructuring works taken before, during, and after the disaster. There are many players involved in the disaster management process and many factors are influential in the effectiveness of this process. Among these factors, deciding the critical ones offers significant advantages, particularly in terms of practical studies. Concentrating on a single stakeholder in deciding the factors crucial to the success of this management structure, which has many stakeholders, can cause to ignoring the significant viewpoints of other stakeholder groups. Accordingly, for the evaluation of several success factors achieved as a result of a thorough and systematic literature review, the purpose of our study is to develop a common critical success factor model that will represent both the viewpoints of operational experts and academic experts, who constitute the stakeholders of this domain. Analytical Hierarchy Process (AHP) is utilized to determine the opinions of field experts while the text mining method was used to determine the perspectives of academics. In the study, therefore, a new AHP model assisted by text mining is introduced. Socio-cultural factors were brought to light by the analysis results of the suggested model. It has been determined by the results of the study that these two perspectives are overlapped largely in the organizational field and relatively in socio-cultural, environmental, and legal fields.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129200244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-30DOI: 10.35377/saucis.03.03.757459
Mustafa Tanrıverdi
Today, many services are provided through web applications and the number of these applications is increasing rapidly. Nowadays, most users use their username and password to login to web applications. Many of these users also use the same login information in different applications. This causes a major security vulnerability for applications and users. As a solution to these weaknesses in the field of authentication, there have been many developments in recent years. Some of these studies have been third party identity authentication systems like Google and Facebook. Since this method also contains potential risks, studies have been conducted on the TwoFactor Authentication (2FA) method for more security. In parallel with the innovations that emerge every day, methods should be used in the field of authentication. In these times, blockchain technology offers solutions that make life easier in many areas thanks to its distributed, transparent, secure and immutable structure. In this study, blockchain based single sign-on (SSO) authentication system was developed and implemented for web applications. In this system, a public address and a private key are defined on the private blockchain network for users and this information is used for the 2FA method through the developed mobile application. Detailed information was given about the proposed system and technologies used in the study.
{"title":"Design and Implementation of Blockchain Based Single Sign-On Authentication System for Web Applications","authors":"Mustafa Tanrıverdi","doi":"10.35377/saucis.03.03.757459","DOIUrl":"https://doi.org/10.35377/saucis.03.03.757459","url":null,"abstract":"Today, many services are provided through web applications and the number of these applications is increasing rapidly. Nowadays, most users use their username and password to login to web applications. Many of these users also use the same login information in different applications. This causes a major security vulnerability for applications and users. As a solution to these weaknesses in the field of authentication, there have been many developments in recent years. Some of these studies have been third party identity authentication systems like Google and Facebook. Since this method also contains potential risks, studies have been conducted on the TwoFactor Authentication (2FA) method for more security. In parallel with the innovations that emerge every day, methods should be used in the field of authentication. In these times, blockchain technology offers solutions that make life easier in many areas thanks to its distributed, transparent, secure and immutable structure. In this study, blockchain based single sign-on (SSO) authentication system was developed and implemented for web applications. In this system, a public address and a private key are defined on the private blockchain network for users and this information is used for the 2FA method through the developed mobile application. Detailed information was given about the proposed system and technologies used in the study.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117321936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-30DOI: 10.35377/saucis.03.03.735463
Turgut Dogan
Due to rapid development of the technology, the usage of mobile telephones and short message services (SMS) have become widespread. Thus, the number of spam SMS messages has dramatically increased and the significance of identifying and filtering of suchlike messages raised. Moreover, since they have also risk to steal users’ personal information; the problem of identifying and filtering of Spam SMS messages stays popular in terms of also information and data security. In this study, the classification performances of five different term weighting methods on three different datasets containing SMS messages categorized as Spam and legitimate are compared by using two classifiers for corresponding problem. The results obtained showed that reasonable weighting of SMS contents plays an important role in identifying of spam SMS messages. On the other hand, it can be expressed that real classification potential of term weighting schemes reflected betterly the with feature vectors created by using fifty and higher number of terms on especially Turkish and English SMS message datasets. In addition, it has been observed that value ranges of the classification results of obtained from term weighting methods on Turkish SMS message dataset is wider for than ones obtained in English SMS message datasets.
{"title":"On Term Weighting for Spam SMS Filtering","authors":"Turgut Dogan","doi":"10.35377/saucis.03.03.735463","DOIUrl":"https://doi.org/10.35377/saucis.03.03.735463","url":null,"abstract":"Due to rapid development of the technology, the usage of mobile telephones and short message services (SMS) have become widespread. Thus, the number of spam SMS messages has dramatically increased and the significance of identifying and filtering of suchlike messages raised. Moreover, since they have also risk to steal users’ personal information; the problem of identifying and filtering of Spam SMS messages stays popular in terms of also information and data security. In this study, the classification performances of five different term weighting methods on three different datasets containing SMS messages categorized as Spam and legitimate are compared by using two classifiers for corresponding problem. The results obtained showed that reasonable weighting of SMS contents plays an important role in identifying of spam SMS messages. On the other hand, it can be expressed that real classification potential of term weighting schemes reflected betterly the with feature vectors created by using fifty and higher number of terms on especially Turkish and English SMS message datasets. In addition, it has been observed that value ranges of the classification results of obtained from term weighting methods on Turkish SMS message dataset is wider for than ones obtained in English SMS message datasets.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116684719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-30DOI: 10.35377/saucis.03.03.785749
B. Aksoy, O. Salman
Today, with the rapidly advancing technology, the importance of image processing techniques is increasing. Image processing is used in many areas from facial recognition to plant disease identification. One of the important image processing stages is the filtering stage used for smoothing images and object detection. Among these filtering techniques, basic filtering techniques such as mean, median and Gaussian are used in image processing. However, these filtering techniques are known to be insufficient to achieve the desired results in some cases. In this study, a new hybrid filtering approach named Mean-Median-Gaussian (MMG) is presented using these three basic filtering techniques. It has been demonstrated that the obtained MMG hybrid algorithm gives more successful results than these three basic filtering techniques in smoothing the images and determining the boundary lines.
{"title":"A New Hybrid Filter Approach for Image Processing","authors":"B. Aksoy, O. Salman","doi":"10.35377/saucis.03.03.785749","DOIUrl":"https://doi.org/10.35377/saucis.03.03.785749","url":null,"abstract":"Today, with the rapidly advancing technology, the importance of image processing techniques is increasing. Image processing is used in many areas from facial recognition to plant disease identification. One of the important image processing stages is the filtering stage used for smoothing images and object detection. Among these filtering techniques, basic filtering techniques such as mean, median and Gaussian are used in image processing. However, these filtering techniques are known to be insufficient to achieve the desired results in some cases. In this study, a new hybrid filtering approach named Mean-Median-Gaussian (MMG) is presented using these three basic filtering techniques. It has been demonstrated that the obtained MMG hybrid algorithm gives more successful results than these three basic filtering techniques in smoothing the images and determining the boundary lines.","PeriodicalId":257636,"journal":{"name":"Sakarya University Journal of Computer and Information Sciences","volume":"27 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132089403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}