Abdul Zaim - Academia.edu (original) (raw)

Papers by Abdul Zaim

Research paper thumbnail of LWE: An Energy-Efficient Lightweight Encryption Algorithm for Medical Sensors and IoT Devices

Electrica, 2020

In today's world, systems generate and exchange digital data frequently and face a much broader r... more In today's world, systems generate and exchange digital data frequently and face a much broader range of threats than in the past. Within the context of this unsafe ecosystem, it is crucial to protect the data in a quick and secure way. In this paper, it is proposed that a lightweight block cipher algorithm called LWE in the purpose of having an encryption algorithm that is light enough for restricted/limited hardware environments and secure enough to endure primal cryptanalysis attacks. The length of blocks to be encrypted is set to 64 bits and the key length is defined as 64 bits. It is targeted for IoT systems with low-end microcontrollers and body sensor area devices. The performance and security aspects of LWE are evaluated with well-known algorithms and it is observed that LWE can establish a basic security baseline for transmitting raw data without creating a heavy load on the network infrastructure.

Research paper thumbnail of Deep Learning Approaches for Phantom Movement Recognition

2019 Medical Technologies Congress (TIPTEKNO)

Phantom limb pain has a negative effect on the life of individuals as a frequent consequence of l... more Phantom limb pain has a negative effect on the life of individuals as a frequent consequence of limb amputation. The movement ability on the lost extremity can still be maintained after the amputation or deafferentation, which is called the phantom movement. The detection of these movements makes sense for cybertherapy and prosthetic control for amputees. In this paper, we employed several deep learning approaches to recognize phantom movements of the three different amputation regions including above-elbow, below-knee and above-knee. We created a dataset that contains 25 healthy and 16 amputee participants' surface electromyography (sEMG) readings via a wearable device with 2-channel EMG sensors. We compared the results of three different deep learning methods, respectively, Multilayer Perceptron, Convolutional Neural Network, and Recurrent Neural Network with the accuracies of two well-known shallow methods, k Nearest Neighbor and Random Forest. Our experiments indicate, Convolutional Neural Network-based model achieved an accuracy of 74.48% in recognizing phantom movements of amputees.

Research paper thumbnail of Flow Characteristics of Traffic Flow at Signalized Intersections and Performance Comparison using Queueing Theory

2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), 2020

Queueing theory deals with creating mathematical models for waiting and queueing events. These de... more Queueing theory deals with creating mathematical models for waiting and queueing events. These determine the performance values of waiting lines, such as queue length, occupancy rate, waiting time, arrival, and service rates. Estimation or detection of these issues provide benefits for problems, such as, the design of road structures, length of turn lanes, number of lanes at intersections, number of box offices and traffic signal timing. Queueing models are created with some determinations or assumptions, such as arrival patterns, departure characteristics and service discipline of the vehicles coming to the system. In this study, firstly a queuing model was created with some assumptions, then the arrival and departure distributions of the data were examined, and a new queue model was determined based on the results. According to the distribution of the data collected from signalized intersection, the model was renewed, and the performance of the queuing was obtained. The results according to M/M/1, M/G/1 and G/G/1 models are compared.

Research paper thumbnail of Multicasting over OBS WDM Networks

In this study, we present a new protocol structure for multicasting on OBS networks. We investiga... more In this study, we present a new protocol structure for multicasting on OBS networks. We investigate the performance on Just Enough Time (JET) and Just In Time (JIT) between multicast and unicast traffic. We examine behaviors of data and control planes of the network. We also study how to add and remove a client or a node from a constructed multicast tree. The results show that our proposed multicast protocol structure produces low multicast traffic join request drop rates.

Research paper thumbnail of MOBILE VISUAL ACUITY ASSESSMENT APPLICATION: AcuMob

Istanbul University - Journal of Electrical and Electronics Engineering, 2017

This paper presents a mobile healthcare (mHealth) system for estimation of visual impairment that... more This paper presents a mobile healthcare (mHealth) system for estimation of visual impairment that provides easiness by specifying the degree of an eye as orthoscopes. Our proposed system called AcuMob which is an Android based mobile application aimed to be used by patients who have myopia. In the crowd society, our proposed app will be implemented faster than the traditional ophthalmologic examination treatments as an alternative. Because AcuMob can be used in everywhere in any time slot, it is offered in the area where the ophthalmologist is not available. The system is developed with using Xamarin framework and voice commands are used to interact with mobile app. Some preferable letters that are suggested by the ophthalmologists were used in the system. The letter categories are specified according to letters’ sizes. In the start-up screen, the biggest letter is demonstrated and if the user responds correct answer, the letter’s size is being smaller. However, if the user says wro...

Research paper thumbnail of Android İşletim Sistemlerinde Zaman Tabanlı İzin Yaklaşımı ile Saldırı Önleme Sistemi

Haliç Üniversitesi Fen Bilimleri Dergisi, 2021

Research paper thumbnail of Smart Cities and Data Analytics for Intelligent Transportation Systems: An Analytical Model for Scheduling Phases and Traffic Lights at Signalized Intersections

Applied Sciences, 2021

This paper is intended to improve the performance of signalized intersections, one of the most im... more This paper is intended to improve the performance of signalized intersections, one of the most important systems of traffic control explained within the scope of smart transportation systems. These structures, which have the main role in ensuring the order and flow of traffic, are alternative systems depending on the different methods and techniques used. Determining the operation principles of these systems requires an extremely careful and planned study, considering their important role. Performance outputs obtained from the queue analyses made in previous studies formed the input of this study. The most important techniques are used in the effective control of intersections, such as signal timing: in particular, the use of effective green time and order of the transitions between phases. In this research, a traffic-sensitive signalized intersection control system was designed with the suggested methods against these two problems. The sample intersections were selected from three ...

Research paper thumbnail of Extended early update for host identity protocol with movement prediction

Over last decades, there have been great advance in wireless and mobile communications. The revea... more Over last decades, there have been great advance in wireless and mobile communications. The revealing of heterogeneous networks also increased the importance of cooperation of different technologies. Mobility managements also became an important issue of wireless and mobile networks. Handoff management is of most important part of mobility management issue regarding these technologies. Mobile IP is the well-known protocol in order to cope with mobility since years. Recently, there are also new contributions about mobility management by IETF and IRTF such as Host Identity Protocol (HIP) to replace Mobile IP in terms of managing mobility. The basic idea of HIP is based on the idea of separation the role of IP addresses for location and identification of a mobile node in the network. In this study, our motivation is to extend our previously proposed handover management method that we named "early update for host identity protocol (eHIP)". We propose to introduce the idea of s...

Research paper thumbnail of Slotlanmış Optik Çoğuşma ve Paket Anahtarlama Teknikleri *

In this paper, the architectures of Slotted Optical Burst Switching and Slotted Optical Packet Sw... more In this paper, the architectures of Slotted Optical Burst Switching and Slotted Optical Packet Switching networks are examined. Slotted Optical Burst Switching and Slotted Optical Packet Switching techniques are analyzed. Moreover, the improvement studies for networks that these techniques are used are mentioned.

Research paper thumbnail of Optical Wdm Networks and Multicasting

Bandwidth usage increases day by day and the need for new technologies emerges for devoloping the... more Bandwidth usage increases day by day and the need for new technologies emerges for devoloping the efficiency. Wavelength Division Multiplexing (WDM) is the most spectacular one of these presented network technologies to be able to use optical fibers. In addition to that, multicasting the network traffic also draws attention for ensuring the growing traffic demand. In multicasting, the transmission is performed between the source node and many destination nodes. The packet delivery is not accomplished by flooding or sending the copies of the packets, thus bandwidth capacity is used as ideally as possible. The packet is sent by the source to the network and the network forwards it to the corresponding destinations.Thus, the number of video conferencing, internet based education and stock information distribution like multicast service based applications gradually increase, in time. This type of point to multipoint transmissions need huge amount of bandwidth in the network and also an ...

Research paper thumbnail of Türkiye ve dünyada teknopark uygulamaları: Teknopark İstanbul Örneği

Research paper thumbnail of Mobil Cihazlarda Güvenlik Tehditler Temel Stratejiler

Tuketici elektroniginin gunumuzdeki en yaygin hali mobil cihazlarin kullanimidir. Bu alandaki tek... more Tuketici elektroniginin gunumuzdeki en yaygin hali mobil cihazlarin kullanimidir. Bu alandaki teknolojik gelismeler, hayatimizin her alanina etki edecek sekilde artmakta ve yasamimiza yon vermektedir. Artik bilgisayarlarla ayni donanimsal ozelliklere sahip olabilen mobil cihazlarin kullanimi sadece iletisim amaciyla kalmayip, internet kullanimi, is, hobi ve saglik alanlarindaki uygulamalari ile zenginlemistir. Pek cok farkli alana ozel uygulamalarin ortak yonu, kullanici bilgilerinin islemesi, bu bilgilerin farkli ortamlara iletmesi ve depolamasi gibi faaliyetleri icermesidir. Artan kullanim orani ile bilgi ve iletisim guvenligine daha fazla ihtiyac duyulmaya baslanan bu cihazlara yonelik yapilan saldirilar karsisinda tasinan bilgilerin guvenliginin saglanmasi gerekliligi ortaya cikmaktadir. Mobil cihazlardaki guvenlik aciklari ve kotucul yazilim barindiran uygulamalarin son kullanici tarafindan yuklemesi ile kisisel bilgi ve haberlesme guvenligini tehdit eden durumlar olusmaktadir....

Research paper thumbnail of Detecting TCP Flood DDoS Attack by Anomaly Detection based on Machine Learning Algorithms

2021 6th International Conference on Computer Science and Engineering (UBMK), 2021

The comfort area created by the fact that people can access everything via the internet has led t... more The comfort area created by the fact that people can access everything via the internet has led to an increase in the rate of internet use in recent years. The rise of concepts such as 5G, Internet of Things(IoT), Cloud/Edge/Fog Computing shows that this usage will increase day by day. While this increase brings convenience to humanity, it also increases the appetite of malicious people. Cyber attacks are increasing day by day and many individual or corporate users are harmed. In this study, it is aimed to detect Distributed Denial of Service(DDoS) attacks, which are the most common and most harmful of the bullying we mentioned. We focused on detecting TCP-Flood attacks, which is one of the most preferred DDoS attack types, using various machine learning algorithms. The part that made this job difficult and different was the targeting of real-time detection.

Research paper thumbnail of A Model for Talent Management and Career Planning

Educational Sciences: Theory & Practice, 2015

This paper discusses a talent management and career planning system designed based on the perform... more This paper discusses a talent management and career planning system designed based on the performance and qualifications of a group of interns working for an emerging social media company located in Istanbul. The proposed model is dynamic, comparative, and perceptional in constructing a talent pool for an organization. This system was developed based on structured questions precisely designed to evaluate the employees in different categories. Evaluations by the supervisors combined with the employees' self-evaluations represented performance; previous experiences represented qualifications. Depending on the high and low scores for performance and qualifications, four evaluation segments were proposed: star, rising star, backbone, and iceberg. Employees who had high performance and high qualification scores were classified as "stars" and constituted the talent pool. Employees in other segments needed performance development, qualification development, or both. This paper further provides detailed discussions explaining how employees can address the identified performance or qualification deficiencies and take paths toward improvement, which forms the career planning aspect of this system.

Research paper thumbnail of A traffic performance evaluation for low-earth orbit satellite communication systems

Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing Connecting the World Wirelessly - IWCMC '09, 2009

All communication systems must be controlled by strong traffic management architectures. In such ... more All communication systems must be controlled by strong traffic management architectures. In such systems, many calls are transmitted through many nodes. In this way, a call is blocked if the system is overloaded or the link between the current nodes is deactivated. In this study, we analyze and control the traffic of our sample communication system under different criteria to avoid these problems. We consider low-earth orbit (LEO) satellite systems, because satellites become a vital requirement for today's dense communication areas. We present a mathematical model to calculate call blocking probabilities (CBPs) with a new traffic density function which is based on coverage areas and current time slots. We also use the channel numbers of the links between satellites in CBP formulas to specify the communication lines and to mean different delivery buses for the calls. Then we compare the results under different CBP values.

Research paper thumbnail of An Integrative Comparison of Energy Efficient Routing Protocols in Wireless Sensor Network

Wireless Sensor Network, 2012

Many advances have been made in sensor technologies which are as varied as the applications; and ... more Many advances have been made in sensor technologies which are as varied as the applications; and many more are in progress. It has been reasonable to design and develop small size sensor nodes of low cost and low power. In this work, we have explored some energy-efficient routing protocols (LEACH, Directed Diffusion, Gossiping and EESR) and their expansions (enhancements), and furthermore, their tactics specific to wireless sensor network, such as data aggregation and in-network processing, clustering, different node role assignment, and data-centric methods. After that we have compared these explored routing protocols based on different metrics that affect the specific application requirements and WSN in general.

Research paper thumbnail of Half cycling dynamic bandwidth allocation with prediction on EPON

Proceedings - IEEE Symposium on Computers and Communications, 2012

This study is about a prediction approach for our previous dynamic bandwidth allocation algorithm... more This study is about a prediction approach for our previous dynamic bandwidth allocation algorithm for Ethernet Passive Optical Networks (EPON). Our previous work (hcDBA) is based on half cycle timing for bandwidth allocation. That can be handled as a middle way between online and offline bandwidth allocation schemes. In PONs, prediction is used for bandwidth allocation to grant loaded nodes with early responses. However, due to the versatile nature of data traffic, prediction algorithms have a handicap to provide a better solution in classical approaches. In this study, a novel prediction approach integrated with hcDBA algorithm described. Performance comparison of hcDBA with & without prediction and IPACT algorithm is given. According to the simulation results, prediction on hcDBA seems to give some performance improvements in terms of access-delay.

Research paper thumbnail of A Comprehensive Analysis of Android Security and Proposed Solutions

International Journal of Computer Network and Information Security, 2014

The increasing popularity of smart devices have led users to complete all of their daily work wit... more The increasing popularity of smart devices have led users to complete all of their daily work with these devices. Users are now able to shop online, share information with the applications that they install on their smart devices. Installed applications gain access to various sensitive information, such as the user's contact list, phone number, location. However, there is no control mechanism in place that can check whether these applications are safe to install. Therefore, applications are installed according to the users' decisions, without any limitations or warnings. As a result, users become the target of malicious applications, and the personal security and privacy are compromised. In this study, we investigate the security solutions that aim to protect the privacy and security of Android users. We reveal the shortcomings of mobile security solutions and shed light on the research community. Additionally, we present the taxonomy of Android-based mobile security solutions.

Research paper thumbnail of Implementation of Variants in Component Based Software Production

Lecture Notes in Electrical Engineering, 2014

We created and implemented an algebraic framework to automatically generate component variants ou... more We created and implemented an algebraic framework to automatically generate component variants out of specifications. In this paper we provide the definition of this approach with its operators and operands, and show how expressions can be parsed, translated and processed for production of component variants. We created a Java application which is widely based on sets, to show the approach can be implemented properly and efficiently.

Research paper thumbnail of Evaluation of call blocking probabilities in LEO satellite networks

International Journal of Satellite Communications and Networking, 2009

ABSTRACT In this paper, we present a new method for calculating call blocking probabilities (CBPs... more ABSTRACT In this paper, we present a new method for calculating call blocking probabilities (CBPs) in a low Earth orbit satellite network that carries voice calls. The calculation of the CBPs uses the Erlang-B formula, but the traffic intensity has been modified to take into the time and location in which the calls are made. Copyright © 2009 John Wiley & Sons, Ltd.

Research paper thumbnail of LWE: An Energy-Efficient Lightweight Encryption Algorithm for Medical Sensors and IoT Devices

Electrica, 2020

In today's world, systems generate and exchange digital data frequently and face a much broader r... more In today's world, systems generate and exchange digital data frequently and face a much broader range of threats than in the past. Within the context of this unsafe ecosystem, it is crucial to protect the data in a quick and secure way. In this paper, it is proposed that a lightweight block cipher algorithm called LWE in the purpose of having an encryption algorithm that is light enough for restricted/limited hardware environments and secure enough to endure primal cryptanalysis attacks. The length of blocks to be encrypted is set to 64 bits and the key length is defined as 64 bits. It is targeted for IoT systems with low-end microcontrollers and body sensor area devices. The performance and security aspects of LWE are evaluated with well-known algorithms and it is observed that LWE can establish a basic security baseline for transmitting raw data without creating a heavy load on the network infrastructure.

Research paper thumbnail of Deep Learning Approaches for Phantom Movement Recognition

2019 Medical Technologies Congress (TIPTEKNO)

Phantom limb pain has a negative effect on the life of individuals as a frequent consequence of l... more Phantom limb pain has a negative effect on the life of individuals as a frequent consequence of limb amputation. The movement ability on the lost extremity can still be maintained after the amputation or deafferentation, which is called the phantom movement. The detection of these movements makes sense for cybertherapy and prosthetic control for amputees. In this paper, we employed several deep learning approaches to recognize phantom movements of the three different amputation regions including above-elbow, below-knee and above-knee. We created a dataset that contains 25 healthy and 16 amputee participants' surface electromyography (sEMG) readings via a wearable device with 2-channel EMG sensors. We compared the results of three different deep learning methods, respectively, Multilayer Perceptron, Convolutional Neural Network, and Recurrent Neural Network with the accuracies of two well-known shallow methods, k Nearest Neighbor and Random Forest. Our experiments indicate, Convolutional Neural Network-based model achieved an accuracy of 74.48% in recognizing phantom movements of amputees.

Research paper thumbnail of Flow Characteristics of Traffic Flow at Signalized Intersections and Performance Comparison using Queueing Theory

2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), 2020

Queueing theory deals with creating mathematical models for waiting and queueing events. These de... more Queueing theory deals with creating mathematical models for waiting and queueing events. These determine the performance values of waiting lines, such as queue length, occupancy rate, waiting time, arrival, and service rates. Estimation or detection of these issues provide benefits for problems, such as, the design of road structures, length of turn lanes, number of lanes at intersections, number of box offices and traffic signal timing. Queueing models are created with some determinations or assumptions, such as arrival patterns, departure characteristics and service discipline of the vehicles coming to the system. In this study, firstly a queuing model was created with some assumptions, then the arrival and departure distributions of the data were examined, and a new queue model was determined based on the results. According to the distribution of the data collected from signalized intersection, the model was renewed, and the performance of the queuing was obtained. The results according to M/M/1, M/G/1 and G/G/1 models are compared.

Research paper thumbnail of Multicasting over OBS WDM Networks

In this study, we present a new protocol structure for multicasting on OBS networks. We investiga... more In this study, we present a new protocol structure for multicasting on OBS networks. We investigate the performance on Just Enough Time (JET) and Just In Time (JIT) between multicast and unicast traffic. We examine behaviors of data and control planes of the network. We also study how to add and remove a client or a node from a constructed multicast tree. The results show that our proposed multicast protocol structure produces low multicast traffic join request drop rates.

Research paper thumbnail of MOBILE VISUAL ACUITY ASSESSMENT APPLICATION: AcuMob

Istanbul University - Journal of Electrical and Electronics Engineering, 2017

This paper presents a mobile healthcare (mHealth) system for estimation of visual impairment that... more This paper presents a mobile healthcare (mHealth) system for estimation of visual impairment that provides easiness by specifying the degree of an eye as orthoscopes. Our proposed system called AcuMob which is an Android based mobile application aimed to be used by patients who have myopia. In the crowd society, our proposed app will be implemented faster than the traditional ophthalmologic examination treatments as an alternative. Because AcuMob can be used in everywhere in any time slot, it is offered in the area where the ophthalmologist is not available. The system is developed with using Xamarin framework and voice commands are used to interact with mobile app. Some preferable letters that are suggested by the ophthalmologists were used in the system. The letter categories are specified according to letters’ sizes. In the start-up screen, the biggest letter is demonstrated and if the user responds correct answer, the letter’s size is being smaller. However, if the user says wro...

Research paper thumbnail of Android İşletim Sistemlerinde Zaman Tabanlı İzin Yaklaşımı ile Saldırı Önleme Sistemi

Haliç Üniversitesi Fen Bilimleri Dergisi, 2021

Research paper thumbnail of Smart Cities and Data Analytics for Intelligent Transportation Systems: An Analytical Model for Scheduling Phases and Traffic Lights at Signalized Intersections

Applied Sciences, 2021

This paper is intended to improve the performance of signalized intersections, one of the most im... more This paper is intended to improve the performance of signalized intersections, one of the most important systems of traffic control explained within the scope of smart transportation systems. These structures, which have the main role in ensuring the order and flow of traffic, are alternative systems depending on the different methods and techniques used. Determining the operation principles of these systems requires an extremely careful and planned study, considering their important role. Performance outputs obtained from the queue analyses made in previous studies formed the input of this study. The most important techniques are used in the effective control of intersections, such as signal timing: in particular, the use of effective green time and order of the transitions between phases. In this research, a traffic-sensitive signalized intersection control system was designed with the suggested methods against these two problems. The sample intersections were selected from three ...

Research paper thumbnail of Extended early update for host identity protocol with movement prediction

Over last decades, there have been great advance in wireless and mobile communications. The revea... more Over last decades, there have been great advance in wireless and mobile communications. The revealing of heterogeneous networks also increased the importance of cooperation of different technologies. Mobility managements also became an important issue of wireless and mobile networks. Handoff management is of most important part of mobility management issue regarding these technologies. Mobile IP is the well-known protocol in order to cope with mobility since years. Recently, there are also new contributions about mobility management by IETF and IRTF such as Host Identity Protocol (HIP) to replace Mobile IP in terms of managing mobility. The basic idea of HIP is based on the idea of separation the role of IP addresses for location and identification of a mobile node in the network. In this study, our motivation is to extend our previously proposed handover management method that we named "early update for host identity protocol (eHIP)". We propose to introduce the idea of s...

Research paper thumbnail of Slotlanmış Optik Çoğuşma ve Paket Anahtarlama Teknikleri *

In this paper, the architectures of Slotted Optical Burst Switching and Slotted Optical Packet Sw... more In this paper, the architectures of Slotted Optical Burst Switching and Slotted Optical Packet Switching networks are examined. Slotted Optical Burst Switching and Slotted Optical Packet Switching techniques are analyzed. Moreover, the improvement studies for networks that these techniques are used are mentioned.

Research paper thumbnail of Optical Wdm Networks and Multicasting

Bandwidth usage increases day by day and the need for new technologies emerges for devoloping the... more Bandwidth usage increases day by day and the need for new technologies emerges for devoloping the efficiency. Wavelength Division Multiplexing (WDM) is the most spectacular one of these presented network technologies to be able to use optical fibers. In addition to that, multicasting the network traffic also draws attention for ensuring the growing traffic demand. In multicasting, the transmission is performed between the source node and many destination nodes. The packet delivery is not accomplished by flooding or sending the copies of the packets, thus bandwidth capacity is used as ideally as possible. The packet is sent by the source to the network and the network forwards it to the corresponding destinations.Thus, the number of video conferencing, internet based education and stock information distribution like multicast service based applications gradually increase, in time. This type of point to multipoint transmissions need huge amount of bandwidth in the network and also an ...

Research paper thumbnail of Türkiye ve dünyada teknopark uygulamaları: Teknopark İstanbul Örneği

Research paper thumbnail of Mobil Cihazlarda Güvenlik Tehditler Temel Stratejiler

Tuketici elektroniginin gunumuzdeki en yaygin hali mobil cihazlarin kullanimidir. Bu alandaki tek... more Tuketici elektroniginin gunumuzdeki en yaygin hali mobil cihazlarin kullanimidir. Bu alandaki teknolojik gelismeler, hayatimizin her alanina etki edecek sekilde artmakta ve yasamimiza yon vermektedir. Artik bilgisayarlarla ayni donanimsal ozelliklere sahip olabilen mobil cihazlarin kullanimi sadece iletisim amaciyla kalmayip, internet kullanimi, is, hobi ve saglik alanlarindaki uygulamalari ile zenginlemistir. Pek cok farkli alana ozel uygulamalarin ortak yonu, kullanici bilgilerinin islemesi, bu bilgilerin farkli ortamlara iletmesi ve depolamasi gibi faaliyetleri icermesidir. Artan kullanim orani ile bilgi ve iletisim guvenligine daha fazla ihtiyac duyulmaya baslanan bu cihazlara yonelik yapilan saldirilar karsisinda tasinan bilgilerin guvenliginin saglanmasi gerekliligi ortaya cikmaktadir. Mobil cihazlardaki guvenlik aciklari ve kotucul yazilim barindiran uygulamalarin son kullanici tarafindan yuklemesi ile kisisel bilgi ve haberlesme guvenligini tehdit eden durumlar olusmaktadir....

Research paper thumbnail of Detecting TCP Flood DDoS Attack by Anomaly Detection based on Machine Learning Algorithms

2021 6th International Conference on Computer Science and Engineering (UBMK), 2021

The comfort area created by the fact that people can access everything via the internet has led t... more The comfort area created by the fact that people can access everything via the internet has led to an increase in the rate of internet use in recent years. The rise of concepts such as 5G, Internet of Things(IoT), Cloud/Edge/Fog Computing shows that this usage will increase day by day. While this increase brings convenience to humanity, it also increases the appetite of malicious people. Cyber attacks are increasing day by day and many individual or corporate users are harmed. In this study, it is aimed to detect Distributed Denial of Service(DDoS) attacks, which are the most common and most harmful of the bullying we mentioned. We focused on detecting TCP-Flood attacks, which is one of the most preferred DDoS attack types, using various machine learning algorithms. The part that made this job difficult and different was the targeting of real-time detection.

Research paper thumbnail of A Model for Talent Management and Career Planning

Educational Sciences: Theory & Practice, 2015

This paper discusses a talent management and career planning system designed based on the perform... more This paper discusses a talent management and career planning system designed based on the performance and qualifications of a group of interns working for an emerging social media company located in Istanbul. The proposed model is dynamic, comparative, and perceptional in constructing a talent pool for an organization. This system was developed based on structured questions precisely designed to evaluate the employees in different categories. Evaluations by the supervisors combined with the employees' self-evaluations represented performance; previous experiences represented qualifications. Depending on the high and low scores for performance and qualifications, four evaluation segments were proposed: star, rising star, backbone, and iceberg. Employees who had high performance and high qualification scores were classified as "stars" and constituted the talent pool. Employees in other segments needed performance development, qualification development, or both. This paper further provides detailed discussions explaining how employees can address the identified performance or qualification deficiencies and take paths toward improvement, which forms the career planning aspect of this system.

Research paper thumbnail of A traffic performance evaluation for low-earth orbit satellite communication systems

Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing Connecting the World Wirelessly - IWCMC '09, 2009

All communication systems must be controlled by strong traffic management architectures. In such ... more All communication systems must be controlled by strong traffic management architectures. In such systems, many calls are transmitted through many nodes. In this way, a call is blocked if the system is overloaded or the link between the current nodes is deactivated. In this study, we analyze and control the traffic of our sample communication system under different criteria to avoid these problems. We consider low-earth orbit (LEO) satellite systems, because satellites become a vital requirement for today's dense communication areas. We present a mathematical model to calculate call blocking probabilities (CBPs) with a new traffic density function which is based on coverage areas and current time slots. We also use the channel numbers of the links between satellites in CBP formulas to specify the communication lines and to mean different delivery buses for the calls. Then we compare the results under different CBP values.

Research paper thumbnail of An Integrative Comparison of Energy Efficient Routing Protocols in Wireless Sensor Network

Wireless Sensor Network, 2012

Many advances have been made in sensor technologies which are as varied as the applications; and ... more Many advances have been made in sensor technologies which are as varied as the applications; and many more are in progress. It has been reasonable to design and develop small size sensor nodes of low cost and low power. In this work, we have explored some energy-efficient routing protocols (LEACH, Directed Diffusion, Gossiping and EESR) and their expansions (enhancements), and furthermore, their tactics specific to wireless sensor network, such as data aggregation and in-network processing, clustering, different node role assignment, and data-centric methods. After that we have compared these explored routing protocols based on different metrics that affect the specific application requirements and WSN in general.

Research paper thumbnail of Half cycling dynamic bandwidth allocation with prediction on EPON

Proceedings - IEEE Symposium on Computers and Communications, 2012

This study is about a prediction approach for our previous dynamic bandwidth allocation algorithm... more This study is about a prediction approach for our previous dynamic bandwidth allocation algorithm for Ethernet Passive Optical Networks (EPON). Our previous work (hcDBA) is based on half cycle timing for bandwidth allocation. That can be handled as a middle way between online and offline bandwidth allocation schemes. In PONs, prediction is used for bandwidth allocation to grant loaded nodes with early responses. However, due to the versatile nature of data traffic, prediction algorithms have a handicap to provide a better solution in classical approaches. In this study, a novel prediction approach integrated with hcDBA algorithm described. Performance comparison of hcDBA with & without prediction and IPACT algorithm is given. According to the simulation results, prediction on hcDBA seems to give some performance improvements in terms of access-delay.

Research paper thumbnail of A Comprehensive Analysis of Android Security and Proposed Solutions

International Journal of Computer Network and Information Security, 2014

The increasing popularity of smart devices have led users to complete all of their daily work wit... more The increasing popularity of smart devices have led users to complete all of their daily work with these devices. Users are now able to shop online, share information with the applications that they install on their smart devices. Installed applications gain access to various sensitive information, such as the user's contact list, phone number, location. However, there is no control mechanism in place that can check whether these applications are safe to install. Therefore, applications are installed according to the users' decisions, without any limitations or warnings. As a result, users become the target of malicious applications, and the personal security and privacy are compromised. In this study, we investigate the security solutions that aim to protect the privacy and security of Android users. We reveal the shortcomings of mobile security solutions and shed light on the research community. Additionally, we present the taxonomy of Android-based mobile security solutions.

Research paper thumbnail of Implementation of Variants in Component Based Software Production

Lecture Notes in Electrical Engineering, 2014

We created and implemented an algebraic framework to automatically generate component variants ou... more We created and implemented an algebraic framework to automatically generate component variants out of specifications. In this paper we provide the definition of this approach with its operators and operands, and show how expressions can be parsed, translated and processed for production of component variants. We created a Java application which is widely based on sets, to show the approach can be implemented properly and efficiently.

Research paper thumbnail of Evaluation of call blocking probabilities in LEO satellite networks

International Journal of Satellite Communications and Networking, 2009

ABSTRACT In this paper, we present a new method for calculating call blocking probabilities (CBPs... more ABSTRACT In this paper, we present a new method for calculating call blocking probabilities (CBPs) in a low Earth orbit satellite network that carries voice calls. The calculation of the CBPs uses the Erlang-B formula, but the traffic intensity has been modified to take into the time and location in which the calls are made. Copyright © 2009 John Wiley & Sons, Ltd.