![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Refik Samet
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Timucin Koroglu
, Refik Samet
:
Can There Be a Two Way Hash Function? IEEE Access 12: 18358-18386 (2024) - [j20]Ali Hamid Farea
, Omar Hussain Alhazmi
, Refik Samet, Mehmet Serdar Güzel
:
AI-Powered Integrated With Encoding Mechanism Enhancing Privacy, Security, and Performance for IoT Ecosystem. IEEE Access 12: 121368-121386 (2024) - [j19]Mohamed Traoré
, Emrah Hancer
, Refik Samet
, Zeynep Yildirim, Nooshin Nemati
:
CompSegNet: An enhanced U-shaped architecture for nuclei segmentation in H&E histopathology images. Biomed. Signal Process. Control. 97: 106699 (2024) - 2023
- [j18]Emrah Hancer
, Mohamed Traoré
, Refik Samet
, Zeynep Yildirim
, Nooshin Nemati
:
An imbalance-aware nuclei segmentation methodology for H&E stained histopathology images. Biomed. Signal Process. Control. 83: 104720 (2023) - [c14]Mohammed Majid Msallam
, Refik Samet:
An Advanced Rivest Cipher 4 Algorithm to Transfer Fast and Secure Data Using Li-Fi Technology. ICSET 2023: 194-199 - [c13]Zeynep Yildirim, Refik Samet, Emrah Hancer, Nooshin Nemati, Mohamed Traoré Mali:
Gland Segmentation in H&E Histopathological Images using U-Net with Attention Module. IPTA 2023: 1-6 - 2022
- [j17]Serhat Tural
, Refik Samet
, Semra Aydin, Mohamed Traoré
:
Deep Learning Based Classification of Military Cartridge Cases and Defect Segmentation. IEEE Access 10: 74961-74976 (2022) - [c12]Zeynep Yildirim, Emrah Hançer, Refik Samet, Mohamed Traoré Mali
, Nooshin Nemati:
Effect of Color Normalization on Nuclei Segmentation Problem in H&E Stained Histopathology Images. SIU 2022: 1-4 - [d1]Serhat Tural, Refik Samet, Semra Aydin, Mohamed Traoré:
SURFACE OF CARTRIDGE CASES. IEEE DataPort, 2022 - 2021
- [j16]Merve Ozkan-Okay
, Ömer Aslan
, Recep Eryigit
, Refik Samet
:
SABADT: Hybrid Intrusion Detection Approach for Cyber Attacks Identification in WLAN. IEEE Access 9: 157639-157653 (2021) - [j15]Merve Ozkan-Okay
, Refik Samet
, Ömer Aslan
, Deepti Gupta
:
A Comprehensive Systematic Literature Review on Intrusion Detection Systems. IEEE Access 9: 157727-157760 (2021) - [c11]Erkan Sengönül
, Refik Samet
:
The Effect of Background Subtraction on Abnormal Event Detection in Video Surveillance. SIU 2021: 1-4 - 2020
- [j14]Ömer Aslan
, Refik Samet
:
A Comprehensive Review on Malware Detection Approaches. IEEE Access 8: 6249-6271 (2020) - [j13]Ömer Aslan
, Refik Samet
, Ömer Özgür Tanriöver
:
Using a Subtractive Center Behavioral Model to Detect Malware. Secur. Commun. Networks 2020: 7501894:1-7501894:17 (2020)
2010 – 2019
- 2019
- [j12]Kemal Batuhan Baskurt, Refik Samet
:
Video synopsis: A survey. Comput. Vis. Image Underst. 181: 26-38 (2019) - 2018
- [j11]Kemal Batuhan Baskurt
, Refik Samet
:
Long-term multiobject tracking using alternative correlation filters. Turkish J. Electr. Eng. Comput. Sci. 26(5): 2246-2259 (2018) - [j10]Semra Aydin, Refik Samet
, Ömer Faruk Bay:
Real-time parallel image processing applications on multicore CPUs with OpenMP and GPGPU with CUDA. J. Supercomput. 74(6): 2255-2275 (2018) - 2017
- [j9]Refik Samet
, Nermin Samet
:
Analysis of Relationship Between Modes of Intercomputer Communications and Fault Types in Redundant Computer Systems. Trans. Comput. Sci. 29: 1-32 (2017) - [c10]Ömer Aslan
, Refik Samet
:
Investigation of Possibilities to Detect Malware Using Existing Tools. AICCSA 2017: 1277-1284 - [c9]Ömer Aslan
, Refik Samet
:
Mitigating Cyber Security Attacks by Being Aware of Vulnerabilities and Bugs. CW 2017: 222-225 - [c8]Refik Samet
, Muhammed Tanriverdi:
Face Recognition-Based Mobile Automatic Classroom Attendance Management System. CW 2017: 253-256 - [c7]Kemal Batuhan Baskurt, Refik Samet
:
Robust object tracking using alternative correlation filters. SIU 2017: 1-4 - 2016
- [j8]Vitaliy Mezhuyev
, Refik Samet
:
Metamodeling Methodology for Modeling Cyber-Physical Systems. Cybern. Syst. 47(4): 277-289 (2016) - [j7]Refik Samet
, Ghulam Sakhi Shokouh, Kemal Batuhan Baskurt:
An Efficient Pose Tolerant Face Recognition Approach. Trans. Comput. Sci. 26: 161-172 (2016) - 2014
- [c6]Refik Samet
, Ghulam Sakhi Shokouh, Jianjun Li:
A Novel Pose Tolerant Face Recognition Approach. CW 2014: 308-312 - [c5]Emrah Hancer
, Refik Samet
, Dervis Karaboga
:
A hybrid method to the reconstruction of contour lines from scanned topographic maps. ISIE 2014: 930-933 - 2013
- [c4]Haitao Li, Jianjun Li, Ghulam Sakhi Shokouh, Refik Samet
:
A Low Complexity Algorithm for H.264/AVC Intra Prediction. CW 2013: 77-81 - [c3]Vitaliy Mezhuyev
, Refik Samet
:
Geometrical Meta-Metamodel for Cyber-Physical Modelling. CW 2013: 89-93 - 2012
- [j6]Refik Samet
, Emrah Hancer
:
A new approach to the reconstruction of contour lines extracted from topographic maps. J. Vis. Commun. Image Represent. 23(4): 642-647 (2012) - [c2]Refik Samet
, Sahin Emrah Amrahov
, Ali Hikmet Ziroglu:
Fuzzy Rule-Based Image Segmentation technique for rock thin section images. IPTA 2012: 402-406 - 2011
- [j5]Refik Samet
:
Recovery Device for Real-Time Dual-Redundant Computer Systems. IEEE Trans. Dependable Secur. Comput. 8(3): 391-403 (2011) - 2010
- [j4]Refik Samet
:
Choosing between Design Options for Real-Time Computers Tolerating a Single Fault. J. Circuits Syst. Comput. 19(5): 1041-1068 (2010)
2000 – 2009
- 2009
- [j3]Refik Samet
:
Design and implementation of highly reliable dual-computer systems. Comput. Secur. 28(7): 710-722 (2009) - [j2]Refik Samet
:
Fault-tolerant procedures for redundant computer systems. Qual. Reliab. Eng. Int. 25(1): 41-68 (2009) - [j1]Refik Samet
:
Hardware implementation of fault-tolerance in dual computer systems. Qual. Reliab. Eng. Int. 25(8): 1015-1028 (2009) - 2007
- [c1]Refik Samet
, Emrah Ozsavas:
Optimization of Quadtree Triangulation for Terrain Models. ACIVS 2007: 48-59
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint