Ali Buldu
Marmara University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ali Buldu.
Journal of Industrial Textiles | 2016
Kazim Yildiz; Ali Buldu; Mustafa Demetgul
In this study, fabric defects have been detected and classified from a video recording captured during the quality control process. Fabric quality control system prototype has been manufactured and a thermal camera was located on the quality control machine. The defective areas on the fabric surface were detected using the heat difference occurring between the defective and defect-free zones. Gray level co-occurrence matrix is used for feature extraction for defective images. The defective images are classified by k-nearest neighbor algorithm. The image processing stage consists of wavelet, threshold, and morphological operations. The defects have been classified with an average accuracy rate of 96%. In addition, the location of the defect has been identified and the defect type and location are recorded during the process via specially designed image processing interface. According to the experimental results, the proposed method works effectively.
Journal of The Textile Institute | 2015
Kazim Yildiz; Ali Buldu; Mustafa Demetgul; Zehra Yildiz
During the fabric production process, many defects can be occurred stemming from the unevenness in spinning, weaving, finishing processes, or from the raw materials. The fabric quality control process for the detection of these defects is carried out by specialist operators. In this paper, a new method based on the use of thermal camera for detecting these defects from the textile fabric images is presented. For identification process of defective area, fabric images were obtained by a thermal camera during the fabric flow in quality control machine that was specially designed for this experiment. Defective and defect-free regions on fabric surface were determined by thermal camera due to the thermal differences. The mentioned thermal defect detection system will eliminate the worker usage for fabric quality control process, thus it will provide a cost-effective and competitive manufacturing.
global engineering education conference | 2017
Ayse Yayla; Hayriye Korkmaz; Ali Buldu
This paper presents a web-based interface for disabled students. When the curriculum of engineering faculties are examined, it can be seen that practice takes important place and learning outcomes of the courses is mostly depend on hand ability. In particular, the implementing and testing the electronic circuits in both real and simulated environments requires using hands. The developed hands-free interface enables the students to design DC circuits including adjustable batteries and resistors. Students can design the circuits, run the simulation and observe the results by speaking. Thus, the huge gap between the disabled students and circuit design can be closed. The circuit diagrams are designed in accordance with the mesh current method and user can design multi-loop circuits. The interface uses Web Speech API (WSA) speech recognition technology to transform the speech into text. Chrome is the only browser that can support WSA. Adobe Flash was used to visualize the circuit and Symbolic Circuit Analysis in MatLab (SCAM) program was used for circuit analysis and calculations.
Security and Communication Networks | 2016
Kazim Yildiz; Ali Buldu; Hasan Saritas
An elliptic curve coding technique application is proposed in this study. It is one of the asymmetric coding techniques and so crucial in todays world. The application codes messages between two different console screens by using elliptical curve coding technique. It is created by using C# with the class of Crypto Next Generation CNG which brings into consideration the messaging system as four different security levels. The aim is to use the necessary additional security precautions when using asymmetric techniques. Cryptography techniques are not used for connection, and messaging occurs in security level 1. Security level 2 describes the public channel for the connection between two console screens which is used for sending and receiving key pair; then messaging occurs. Public channel for the connection between two console screens is used for sending and receiving signed key pair and encrypted data; then messaging occurs in security level 3. Security level 4 is the safest one. A private channel for the connection between two console screens is used for sending and receiving a signed key pair and encrypted data, and then messaging occurs. In addition, Advanced Encryption Standard AES technique is used in applications which is one of the symmetric cryptographic techniques for encrypting data. Copyright
Measurement & Control | 2016
Ali Buldu; Kazim Yildiz
This study involves a circuit which is made in order to prevent traffic accidents caused by tiredness of the driver and sleepiness. Infrared light emitting diode and infrared phototransistor are used to track driver’s body values during vehicle driving. The pulse value, which can increase or decrease directly proportional to the heart rate, can be controlled with the help of this infrared light emitting diode and infrared phototransistor. Peripheral interface controller is used in the construction of the system. The blood pressure was transformed to an electronic signal with infrared receiver and infrared transmitter by checking the heartbeats. This electronic signal was processed with peripheral interface controller and the system was constructed. In application, the pulse rate of the driver is continuously measured, and these values are shown on a small display permanently. It is installed on a portable steering wheel which can be used in the automotive industry. The process of waking the driver up can be made by raising the voice of music and with the vibration of the seat.
The Anthropologist | 2014
Ozgur Can Karaduman; Suleyman Kaygisiz; Ali Buldu; Kazim Yildiz; Daghan Cetinol
Abstract In this study, an application has been developed in the Eclipse environment for android that is used to locate the stolen mobile devices with turned on status. If an user send a Short Message Service (SMS) to our device from another phone as soon as we notice that our device is stolen, the designed application, which the name of “Secand” was given by us, will detect the password within this SMS and understand that our phone is stolen. Our application must be continuously running in the background in order to detect this incoming SMS. After our application detects the password within SMS, it will retrieve Global Positioning System (GPS) coordinates of our device and send these coordinates to us via SMS. Secand must have all GPS and SMS related authorizations for all of these operations. If it is assumed that the thief is on the move after the first GPS coordinates are sent, our application must send the coordinates of device in certain frequencies. This range of time can be set by the user. Such details can be activated optionally by the user after Secand application is installed to the device.
Procedia - Social and Behavioral Sciences | 2010
Emre Durdağı; Ali Buldu
Procedia - Social and Behavioral Sciences | 2010
Ali Buldu; Kerem Üçgün
Computer Applications in Engineering Education | 2009
Ali Buldu; Hayriye Korkmaz
Pamukkale University Journal of Engineering Sciences | 2017
Kazim Yildiz; Ali Buldu