Papers by Najdavan Kako
Review on Image Segmentation Methods Using Deep Learning
2022 4th International Conference on Advanced Science and Engineering (ICOASE), Sep 21, 2022

Peripapillary Atrophy Segmentation and Classification Methodologies for Glaucoma Image Detection: A Review
Current Medical Imaging Formerly Current Medical Imaging Reviews
: Information-based image processing and computer vision methods are utilized in several healthca... more : Information-based image processing and computer vision methods are utilized in several healthcare organizations to diagnose diseases. The irregularities in the visual system are identified over fundus images shaped over a fundus camera. Among ophthalmology diseases, glaucoma is measured as the most common case that can lead to neurodegenerative illness. The unsuitable fluid pressure inside the eye within the visual system is described as the major cause of those diseases. Glaucoma has no symptoms in the early stages, and if it is not treated, it may result in total blindness. Diagnosing glaucoma at an early stage may prevent permanent blindness. Manual inspection of the human eye may be a solution, but it depends on the skills of the individuals involved. The auto diagnosis of glaucoma by applying a consolidation of computer vision, artificial intelligence, and image processing can aid in the ban and detection of those diseases. In this review article, we aim to introduce a review of the numerous approaches based on peripapillary atrophy segmentation and classification that can detect these diseases, as well as details about the publicly available image benchmarks, datasets, and measurement of performance. The review article introduces the demonstrated research of numerous available study models that objectively diagnose glaucoma via peripapillary atrophy from the lowest level of feature extraction to the current direction based on deep learning. The advantages and disadvantages of each method are addressed in detail, and tabular descriptions are included to highlight the results of each category. Moreover, the frameworks of each approach and fundus image datasets are provided. The improved reporting of our study would help in providing possible future work directions to diagnose glaucoma in conclusion.

A Novel Hybrid Bird Mating Optimizer with Differential Evolution for Engineering Design Optimization Problems
Recent Trends in Information and Communication Technology
This paper presents the hybridization of the Bird Mating Optimizer (BMO) with the Differential Ev... more This paper presents the hybridization of the Bird Mating Optimizer (BMO) with the Differential Evolution (DE) approach. BMO is a new meta-heuristic algorithm that still suffers from some drawbacks, namely the convergence speed, the poor solution quality and trapping into local optima. To overcome these insufficient, a novel BMO-DE algorithm is proposed. BMO-DE has been implemented on some standard engineering design optimization problems reported in the specialized literature and are considered to be constrained optimization ones. The original BMO was basically proposed to solve unconstrained optimization problems. Accordingly, a penalty function method has been adopted to handle the different constraints. Experimental results show that the proposed method can put forward better solutions when compared to other state-of-the-art meta-heuristic algorithms that address such a kind of problems. Therefore, this method is a powerful and promising technique for solving this kind of problems as it is executed with a low number of objective function evaluations and comes out with excellent outputs.

The clustered deep learning systems practice deep neural model networks with a cluster pooled res... more The clustered deep learning systems practice deep neural model networks with a cluster pooled resources aid. Distributed profound learning systems engineers should make multiple choices to process their diverse workloads successfully in their selected environment. Combined with the cluster bandwidth constraints, the abundance of GPU-based deep learning, the ever-greater size of data sets, and deep neural network models would entail developing high-quality models by distributed, profound learning systems designers. Because of their extensive lists of features and architectural deviations, it is not easy to compare distributed deep learning systems side by side. By examining the overall properties of deep learning models and how these workloads can be expanded into a cluster to carry out collective algorithm testing, the fundamental principles at work are shed when training a deep neural network in an isolated machinery cluster. Different techniques been addressed which are used by to...

A New Hybrid Method for Global Optimization Based on the Bird Mating Optimizer and the Differential Evolution
2021 7th International Engineering Conference “Research & Innovation amid Global Pandemic" (IEC), 2021
Nature-inspired algorithms are often used by several diverse areas of engineering and science due... more Nature-inspired algorithms are often used by several diverse areas of engineering and science due to their easiness and versatility. Because metaheuristics operate by structurally changing and improving an established problem, they can often be extended to any optimization issues. The recent creation of metaheuristic algorithms has rendered them effective tools for solving NP problems. This paper presents a hybrid meta-heuristic method based on the Differential Evolution and Bird Mating Optimizer techniques to solve problems of global optimization. Bird Mating Optimizer is a novel method and is inspired by mating behavior of birds. Bird Mating Optimizer has some drawbacks such as producing poor results, trapping into local optima and slow convergence speed. Therefore, to conquer these insufficient it is hybridized with Differential Evolution approach. Differential Evolution technique is utilized to retain a preferable balance between both searches local and global. The performance a...

A Novel Hybrid Bird Mating Optimizer with Differential Evolution for Engineering Design Optimization Problems
International Conference of Reliable Information and Communication Technology IRICT, 2017
This paper presents the hybridization of the Bird Mating Optimizer (BMO) with the Differential Ev... more This paper presents the hybridization of the Bird Mating Optimizer (BMO) with the Differential Evolution (DE) approach. BMO is a new meta-heuristic algorithm that still suffers from some drawbacks, namely the convergence speed, the poor solution quality and trapping into local optima. To overcome these insufficient, a novel BMO-DE algorithm is proposed. BMO-DE has been implemented on some standard engineering design optimization problems reported in the specialized literature and are considered to be constrained optimization ones. The original BMO was basically proposed to solve unconstrained optimization problems. Accordingly, a penalty function method has been adopted to handle the different constraints. Experimental results show that the proposed method can put forward better solutions when compared to other state-of-the-art meta-heuristic algorithms that address such a kind of problems. Therefore, this method is a powerful and promising technique for solving this kind of problem...

In recent years, it has been argued and experimentally shown that ion channel noise in neurons ca... more In recent years, it has been argued and experimentally shown that ion channel noise in neurons can have profound effects on the neuron's dynamical behavior. Most profoundly, ion channel noise was seen to be able to cause spontaneous firing and stochastic resonance. It was recently found by (Güler, 2011) that a non-trivially persistent cross correlation takes place between the transmembrane voltage fluctuations and the component of open channel fluctuations attributed to the gate multiplicity. This non-trivial phenomenon was found to play a major augmentative role for the elevation of excitability and spontaneous firing in the small size cell. In addition, the same phenomenon was found to significantly enhance the spike coherence. More recently, Fox and Lu's stochastic Hodgkin-Huxley equations were extended by incorporating colored noise terms into the conductances therein, to obtain formalism capable of capturing the addressed cross correlations (Güler, 2013). In this thesis, statistics of the coefficient of variation, obtained from the colored stochastic Hodgkin-Huxley equations, was studied. Our investigation reveals that the colored noise term enhances the agreement with the microscopic simulation results.
Effect of Colored Noise on Neuron Membrane Size Using Stochastic Hodgkin-Huxley Equations
2021 7th International Engineering Conference “Research & Innovation amid Global Pandemic" (IEC)
IEC2018 Proceedings Book
The most important concern in different data communication and transmission is to secure this dat... more The most important concern in different data communication and transmission is to secure this data for every county individually. To transmit data through unsecure channel we need to use cryptographic algorithms, Kurdish language spoken by more than five million people. Unfortunately, there is no use of this language alphabet in data encryption and decryption. The purpose of this paper is to introduce the Kurdish alphabet usage in cryptography with a new symmetric algorithm which consist of 34 letters with using its ASCII Unicode and distributing the keys over the secure channel to decipher the text. This is the first attempt to apply an algorithm on the Kurdish characters.

New symmetric key cipher capable of digraph to single letter conversion utilizing binary system
Indonesian Journal of Electrical Engineering and Computer Science
In this paper, a new Playfair cipher built on bits level symmetric key cryptographic was proposed... more In this paper, a new Playfair cipher built on bits level symmetric key cryptographic was proposed for the purpose of converting pairs of letters (digraphs) into single letters. The proposed algorithm is capable to overcome many of the shortcoming and vulnerabilities that exist in the current classical version of Playfair algorithm. The Playfair cipher is exceedingly complex than a classical substitution cipher, but still simple to hack using automated tactics. It is famous as a digraph cipher because two letters are exchanged by other two letters. This destroys any solo letter occurrence statistics, but the digraph statistics still unaffected (frequencies of two letters). Unluckily letter pairs have a flatter distribution than the one letter frequencies, so this intricacy matters for solving the code using pen and paper procedures. The suggested encryption process is conducted as follows; letters are first arranged in a spiral manner in Polybius square, afterwards, each pair will be...
IEC2018 Proceedings Book, 2018
The most important concern in different data communication and transmission is to secure this dat... more The most important concern in different data communication and transmission is to secure this data for every county individually. To transmit data through unsecure channel we need to use cryptographic algorithms, Kurdish language spoken by more than five million people. Unfortunately, there is no use of this language alphabet in data encryption and decryption. The purpose of this paper is to introduce the Kurdish alphabet usage in cryptography with a new symmetric algorithm which consist of 34 letters with using its ASCII Unicode and distributing the keys over the secure channel to decipher the text. This is the first attempt to apply an algorithm on the Kurdish characters.
4th International Engineering Conference on Developments in Civil & Computer Engineering Applications (IEC2018), 2018
The most important concern in different data communication and transmission is to secure this dat... more The most important concern in different data communication and transmission is to secure this data for every county individually. To transmit data through unsecure channel we need to use cryptographic algorithms, Kurdish language spoken by more than five million people. Unfortunately, there is no use of this language alphabet in data encryption and decryption. The purpose of this paper is to introduce the Kurdish alphabet usage in cryptography with a new symmetric algorithm which consist of 34 letters with using its ASCII Unicode and distributing the keys over the secure channel to decipher the text. This is the first attempt to apply an algorithm on the Kurdish characters.

Indonesian Journal of Electrical Engineering and Computer Science, 2020
In this paper, a new Playfair cipher built on bits level symmetric key cryptographic was proposed... more In this paper, a new Playfair cipher built on bits level symmetric key cryptographic was proposed for the purpose of converting pairs of letters (digraphs) into single letters. The proposed algorithm is capable to overcome many of the shortcoming and vulnerabilities that exist in the current classical version of Playfair algorithm. The Playfair cipher is exceedingly complex than a classical substitution cipher, but still simple to hack using automated tactics. It is famous as a digraph cipher because two letters are exchanged by other two letters. This destroys any solo letter occurrence statistics, but the digraph statistics still unaffected (frequencies of two letters). Unluckily letter pairs have a flatter distribution than the one letter frequencies, so this intricacy matters for solving the code using pen and paper procedures. The suggested encryption process is conducted as follows; letters are first arranged in a spiral manner in Polybius square, afterwards, each pair will be replaced utilizing before-after technique if we are arranging pairs horizontally and down-up technique (vertically). The former process produces pairs of Plaintext that will be converted to binary bit stream then will be divided over blocks with stable sizes. Bits of these blocks are taken from pairs then fit them into square matrix of suitable order to put the concept of row-wise and revers row-wise matrix. Bits of this matrix are split into 2x2 square matrixes. The sub-matrixes are formed 8 bits. Here the XNOR operation is taken into consideration for bitwise operation to generate the keys for decryption and produce the cipher-text.

Turkish Journal of Computer and Mathematics Education, 2021
The clustered deep learning systems practice deep neural model networks with a cluster pooled res... more The clustered deep learning systems practice deep neural model networks with a cluster pooled resources aid. Distributed profound learning systems engineers should make multiple choices to process their diverse workloads successfully in their selected environment. Combined with the cluster bandwidth constraints, the abundance of GPU-based deep learning, the ever-greater size of data sets, and deep neural network models would entail developing high-quality models by distributed, profound learning systems designers. Because of their extensive lists of features and architectural deviations, it is not easy to compare distributed deep learning systems side by side. By examining the overall properties of deep learning models and how these workloads can be expanded into a cluster to carry out collective algorithm testing, the fundamental principles at work are shed when training a deep neural network in an isolated machinery cluster. Different techniques been addressed which are used by today's distributed deep learning systems and discuss their consequences. In order to conceptualize and compare deep-level structures, different methods have been developed by previous works to deep-level systems spread DDLS. Indeed, this paper addressed them to be more clearance for the readers.
Thesis Chapters by Najdavan Kako

Eastern Mediterranean University Institutional Repository, 2013
In recent years, it has been argued and experimentally shown that ion channel noise in neurons ca... more In recent years, it has been argued and experimentally shown that ion channel noise in neurons can have profound effects on the neuron’s dynamical behavior. Most profoundly, ion channel noise was seen to be able to cause spontaneous firing and stochastic resonance.
It was recently found by (Güler, 2011) that a non-trivially persistent cross correlation takes place between the transmembrane voltage fluctuations and the component of open channel fluctuations attributed to the gate multiplicity. This non-trivial phenomenon was found to play a major augmentative role for the elevation of excitability and spontaneous firing in the small size cell. In addition, the same phenomenon was found to significantly enhance the spike coherence. More recently, Fox and Lu’s stochastic Hodgkin-Huxley equations were extended by incorporating colored noise terms into the conductances therein, to obtain formalism capable of capturing the addressed cross correlations (Güler, 2013).
In this thesis, statistics of the coefficient of variation, obtained from the colored stochastic Hodgkin-Huxley equations, was studied. Our investigation reveals that the colored noise term enhances the agreement with the microscopic simulation results.
Uploads
Papers by Najdavan Kako
Thesis Chapters by Najdavan Kako
It was recently found by (Güler, 2011) that a non-trivially persistent cross correlation takes place between the transmembrane voltage fluctuations and the component of open channel fluctuations attributed to the gate multiplicity. This non-trivial phenomenon was found to play a major augmentative role for the elevation of excitability and spontaneous firing in the small size cell. In addition, the same phenomenon was found to significantly enhance the spike coherence. More recently, Fox and Lu’s stochastic Hodgkin-Huxley equations were extended by incorporating colored noise terms into the conductances therein, to obtain formalism capable of capturing the addressed cross correlations (Güler, 2013).
In this thesis, statistics of the coefficient of variation, obtained from the colored stochastic Hodgkin-Huxley equations, was studied. Our investigation reveals that the colored noise term enhances the agreement with the microscopic simulation results.