oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2018 ( 2 )

2017 ( 2 )

2016 ( 2 )

2015 ( 40 )

Custom range...

Search Results: 1 - 10 of 807 matches for " Yasar Guneri Sahin "
All listed articles are free for downloading (OA Articles)
Page 1 /807
Display every page Item
Animals as Mobile Biological Sensors for Forest Fire Detection
Yasar Guneri Sahin
Sensors , 2007, DOI: 10.3390/s7123084
Abstract: This paper proposes a mobile biological sensor system that can assist in earlydetection of forest fires one of the most dreaded natural disasters on the earth. The main ideapresented in this paper is to utilize animals with sensors as Mobile Biological Sensors(MBS). The devices used in this system are animals which are native animals living inforests, sensors (thermo and radiation sensors with GPS features) that measure thetemperature and transmit the location of the MBS, access points for wireless communicationand a central computer system which classifies of animal actions. The system offers twodifferent methods, firstly: access points continuously receive data about animals’ locationusing GPS at certain time intervals and the gathered data is then classified and checked tosee if there is a sudden movement (panic) of the animal groups: this method is called animalbehavior classification (ABC). The second method can be defined as thermal detection(TD): the access points get the temperature values from the MBS devices and send the datato a central computer to check for instant changes in the temperatures. This system may beused for many purposes other than fire detection, namely animal tracking, poachingprevention and detecting instantaneous animal death.
Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors
Yasar Guneri Sahin,Tuncay Ercan
Sensors , 2008, DOI: 10.3390/s8074365
Abstract: Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.
Early Forest Fire Detection Using Radio-Acoustic Sounding System
Yasar Guneri Sahin,Turker Ince
Sensors , 2009, DOI: 10.3390/s90301485
Abstract: Automated early fire detection systems have recently received a significant amount of attention due to their importance in protecting the global environment. Some emergent technologies such as ground-based, satellite-based remote sensing and distributed sensor networks systems have been used to detect forest fires in the early stages. In this study, a radio-acoustic sounding system with fine space and time resolution capabilities for continuous monitoring and early detection of forest fires is proposed. Simulations show that remote thermal mapping of a particular forest region by the proposed system could be a potential solution to the problem of early detection of forest fires.
Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors
Yasar Guneri Sahin,Tuncay Ercan
Sensors , 2008,
Abstract: Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.
How to Select the Best Method For Database Applications, Database Independent Platform or Not?
Halil Ibrahim Bulbul,Yasar Guneri Sahin
Journal of Applied Sciences , 2007,
Abstract: Software developers generally want to create software that could run with many different DBMSs (database independent platform). But, this idea sometimes may not be implemented to real world applications. The key point is that, it is too hard to decide which method (dependent to specific DBMS or independent from DBMS) should be selected. Each method has particular advantages and disadvantages. Actually, the decision is depended on some restrictions that are related to money, human resources, duration of project, etc. In addition, one of the most important factors is the choice of CASE tool that will be used for the software project. This study addresses how a decision should be made as to which method will be convenient for a specific application. Furthermore, possible development scenarios, that may be used in the project has been presented and some coefficient factors were found which help the developers to see which method may be more appropriate for the application.
(DynaDBEdit): Dynamic Database Textbox Field and Validator for Web and Application Software
Yasar Guneri Sahin,Halil Ibrahim Bulbul
Journal of Applied Sciences , 2007,
Abstract: When the database tables are concerned, alterations in the structure of table attributes have a direct impact on the edit fields those are used in database application software (e.g., Web pages, application software). In case when any of the attributes are changed, it becomes necessary for software or Web pages to be recompiled following the changes made in edit fields. This process of recompilation is a long and costly operation, which means a temporary pause for transactions. For this reason, that it causes important loss in financial sector. Besides, the maxim of the software engineering is that the final product should require the least updating. This study offers an object and component that aims to remove the necessity for the recompilation of application software following the amendments made in the attributes. This component is a contribution to software development and maintenance for it is capable of automatically obtaining the data of domain for the attributes in database tables and controlling the data entrance process. Moreover, it is also a contribution for the users and practitioners in the sense that it reduces the time required to correct the errors and to ensure data coherency database integrity.
Face Matrix: A Quick Search and Indexing Method for Suspect Recognition in Police Departments
Yasar Guneri Sahin,Samsun Mustafa Basarici,Tuncay Ercan
Information Technology Journal , 2007,
Abstract: This study presents an indexing and a quick sort method that could be used to find the possible matching guilty pictures from the police database by using a tracing software and eyewitness descriptions about the suspected guilty profile. It is well known that databases located in the police departments have a large amount of prerecorded convicted guilty pictures. Searching a picture from database for recognition is very hard and it may take too much time. In addition to this, it can also require to track many redundant pictures to find the correct guilty. There is, of course, no guarantee that Photofit (robot picture) is included in database. Therefore police departments have difficult problems to recognize exact guilty using Photofits described by eyewitness. In this paper, a matrix construction using particular distances on face has been demonstrated. In order to find these certain points on the face, a new point selection schema and some existing recognition methods are presented. Finally, three different determinant values of this matrix are computed and are used for picture indexing in the database. In the test environment, the system results 30 different matches with the predefined Photofits by using this indexing algorithm together with a face tracing software and a patch program, proving that the tracking time for redundant pictures is reduced.
Integrated pest management of potatoes  [PDF]
Yasar Alptekin
Agricultural Sciences (AS) , 2011, DOI: 10.4236/as.2011.23039
Abstract: The potato (Solanum tuberosum L.) is the most important dicotyledonous source of human food. It ranks fifth major food crop of the world, exceed only by the grasses such as wheat, rice, maize, and barley. It is characteristically a crop of the cool, temperate regions or of elevation of approximately 2,000 m or more in the tropics. It requires cool nights and well drained soil with adequate moisture and does not produce well in low altitude, warm, tropical environment. Commercial production of most potatoes is primarily through vegetative propagation by means of lateral buds formed on the tuber, a modified stem. Trough such vegetative propagation, many diseases are transmitted from generation to generation. Suppression of such diseases and reduction of yield losses due to disease are a necessary part of increasing the food supply. The principles, strategies, and tactics of plant disease management are important to preventing yield losses. Integrated pest management (IPM) may supply effective control of the potato pests including aphids (vector of some viruses), Verticillium wilt blackleg, bacterial ring rot, Rhizoctonia, Phytophthora infestans (late blight) and several weeds (night shades, pigweeds, lambs quarters, and annual grasses). It includes regular inspection for healthy seed or nursery, crop production, correct identification of the problem, cultural practices (crop rotation, sanitation etc.), biological control, soil fumigation (if necessary), seed or nursery stock treatment and disinfestations of cutting tools. In this review, pest management methods of potatoes included in IPM was summarized.
A comparison of epidural anesthesia and lumbar plexus-sciatic nerve blocks for knee surgery
Horasanli, Eyup;Gamli, Mehmet;Pala, Yasar;Erol, Mustafa;Sahin, Fazilet;Dikmen, Bayazit;
Clinics , 2010, DOI: 10.1590/S1807-59322010000100006
Abstract: objectives: the efficacy of combined lumbar plexus-sciatic nerve blocks was compared to epidural anesthesia in patients undergoing total knee surgery. patients and methods: the study included 80 american society of anesthesiologists (asa) physical status i-iii patients (age range 18 to 65) undergoing knee surgery. the patients were randomly divided into one of two groups. epidural anesthesia was performed in the epidural anesthesia (ea) group (n=40), and the lumbar plexus and sciatic nerves were blockedin the lumbar plexus-sciatic nerve blocks (lpsb) group (n=40). for each patient, onset of sensory and motor block, degree of motor block, sign of sensory block in the contralateral lower limb for the lumbar plexus-sciatic nerve blocks group, success in providing adequate anesthesia, hemodynamic changes, time of first analgesic request, and patient and surgeon satisfaction with the anesthetic technique were recorded. results: one patient in the epidural anesthesia group and three patients in the lumbar plexus-sciatic nerve blocks group required general anesthesia due to failed block. there were no significant differences between the two groups regarding the success of providing adequate anesthesia. eight patients in the lumbar plexus-sciatic nerve blocks group developed contralateral spread. the onset of sensory-motor block and the time of the first analgesic request were significantly later in the lumbar plexus-sciatic nerve blocks group than in the epidural anesthesia group. although there were no significant differences regarding patient satisfaction with the anesthetic technique between the two groups, surgeon satisfaction was significantly higher in the lumbar plexus-sciatic nerve blocks group than in the epidural anesthesia group. conclusion: the lumbar plexus -sciatic nerve blocks provide effective unilateral anesthesia and may offer a beneficial alternative to epidural anesthesia in patients undergoing total knee surgery.
Effect of preoperative immunonutrition and other nutrition models on cellular immune parameters
Yusuf Gunerhan, Neset Koksal, Umit Yasar Sahin, Mehmet Ali Uzun, Emel Ek?ioglu-Demiralp
World Journal of Gastroenterology , 2009,
Abstract: AIM: To evaluate the effects of preoperative immunonutrition and other nutrition models on the cellular immunity parameters of patients with gastrointestinal tumors before surgical intervention. In addition, effects on postoperative complications were examined.METHODS: Patients with gastrointestinal tumors were randomized into 3 groups. The immunonutrition group received a combination of arginine, fatty acids and nucleotides. The second and third group received normal nutrition and standard enteral nutrition, respectively. Nutrition protocols were administered for 7 d prior to the operation. Nutritional parameters, in particular prealbumin levels and lymphocyte subpopulations (CD4+, CD8+, CD16+/56+, and CD69 cells) were evaluated before and after the nutrition protocols. Groups were compared in terms of postoperative complications and duration of hospital stay.RESULTS: Of the 42 patients who completed the study, 16 received immunonutrition, 13 received normal nutrition and 13 received standard enteral nutrition. prealbumin values were low in every group, but this parameter was improved after the nutritional protocol only in the immunonutrition group (13.64 ± 8.83 vs 15.98 ± 8.66, P = 0.037). Groups were similar in terms of CD4+, CD16+/56, and CD69+ prior to the nutritional protocol; whereas CD8+ was higher in the standard nutrition group compared to the immunonutrition group. After nutritional protocols, none of the groups had an increase in their lymphocyte subpopulations. Also, groups did not differ in terms of postoperative complications and postoperative durations of hospital stay.CONCLUSION: Preoperative immunonutrition provided a significant increase in prealbumin levels, while it did not significantly alter T lymphocyte subpopulation counts, the rate of postoperative complications and the duration of hospital stay.
Page 1 /807
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.