Yapay Zeka : Problemler-Yöntemler-Algoritmalar V Nabiyev Baskı, Seçkin Yayınevi, Ankara, 792 s, 2005 | 518* | 2005 |
Automatic age classification with LBP A Gunay, VV Nabiyev 2008 23rd international symposium on computer and information sciences, 1-4, 2008 | 247 | 2008 |
Yapay zeka: insan-bilgisayar etkileşimi VV Nabiyev Seçkin Yayıncılık, 2012 | 159 | 2012 |
Medical image security and EPR hiding using Shamir's secret sharing scheme M Ulutas, G Ulutas, VV Nabiyev Journal of Systems and Software 84 (3), 341-353, 2011 | 140 | 2011 |
Down syndrome recognition using local binary patterns and statistical evaluation of the system B Kurt, V Nabiyev Expert Systems with Applications 38 (7), 8690-8695, 2011 | 97 | 2011 |
Medical images enhancement by using anisotropic filter and clahe B Kurt, VV Nabiyev, K Turhan 2012 International symposium on innovations in intelligent systems and …, 2012 | 64 | 2012 |
A novel automatic suspicious mass regions identification using Havrda & Charvat entropy and Otsu's N thresholding B Kurt, VV Nabiyev, K Turhan Computer methods and programs in biomedicine 114 (3), 349-360, 2014 | 51 | 2014 |
A new approach based on Bezier curves to solve path planning problems for mobile robots Z Duraklı, V Nabiyev Journal of computational science 58, 101540, 2022 | 50 | 2022 |
Invertible secret image sharing for gray level and dithered cover images M Ulutas, G Ulutas, VV Nabiyev Journal of Systems and Software 86 (2), 485-500, 2013 | 46 | 2013 |
Secret image sharing scheme with adaptive authentication strength G Ulutas, M Ulutas, VV Nabiyev Pattern Recognition Letters 34 (3), 283-291, 2013 | 45 | 2013 |
A new copy move forgery detection technique with automatic threshold determination B Ustubioglu, G Ulutas, M Ulutas, VV Nabiyev AEU-International Journal of Electronics and Communications 70 (8), 1076-1087, 2016 | 41 | 2016 |
Frame duplication/mirroring detection method with binary features G Ulutas, B Ustubioglu, M Ulutas, V Nabiyev IET Image Processing 11 (5), 333-342, 2017 | 39 | 2017 |
Gender identification of a speaker using MFCC and GMM E Yücesoy, VV Nabiyev 2013 8th International Conference on Electrical and Electronics Engineering …, 2013 | 36 | 2013 |
Frame duplication detection based on bow model G Ulutas, B Ustubioglu, M Ulutas, VV Nabiyev Multimedia Systems 24, 549-567, 2018 | 35 | 2018 |
Medical image tamper detection based on passive image authentication G Ulutas, A Ustubioglu, B Ustubioglu, V V Nabiyev, M Ulutas Journal of digital imaging 30, 695-709, 2017 | 35 | 2017 |
A new approach with score-level fusion for the classification of a speaker age and gender E Yücesoy, VV Nabiyev Computers & Electrical Engineering 53, 29-39, 2016 | 31 | 2016 |
A new secret image sharing technique based on Asmuth Bloom's scheme M Ulutas, VV Nabiyev, G Ulutas 2009 International conference on application of information and …, 2009 | 31 | 2009 |
Algoritmalar: Teoriden uygulamalara VV Nabiyev Seçkin Yayıncılık, 2011 | 30* | 2011 |
Trajectory planning using high order polynomials under acceleration constraint H Barghi Jond, V V Nabiyev, R Benveniste Journal of Optimization in Industrial Engineering 10 (21), 1-6, 2016 | 28 | 2016 |
An artificial intelligence-based distance education system: Artimat V Nabıyev, H Karal, S Arslan, AK Erumıt, A Cebı Turkish Online Journal of Distance Education 14 (2), 81-98, 2013 | 28 | 2013 |