Kondakçı, Süleyman

Loading...
Profile Picture
Name Variants
Kondakcı, Süleyman
Kondakci, Suleyman
Job Title
Email Address
suley.kondakci@gmail.com
Main Affiliation
05.05. Computer Engineering
Status
Former Staff
Website
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID

Sustainable Development Goals

11

SUSTAINABLE CITIES AND COMMUNITIES
SUSTAINABLE CITIES AND COMMUNITIES Logo

0

Research Products

4

QUALITY EDUCATION
QUALITY EDUCATION Logo

0

Research Products

8

DECENT WORK AND ECONOMIC GROWTH
DECENT WORK AND ECONOMIC GROWTH Logo

0

Research Products

12

RESPONSIBLE CONSUMPTION AND PRODUCTION
RESPONSIBLE CONSUMPTION AND PRODUCTION Logo

0

Research Products

9

INDUSTRY, INNOVATION AND INFRASTRUCTURE
INDUSTRY, INNOVATION AND INFRASTRUCTURE Logo

1

Research Products

15

LIFE ON LAND
LIFE ON LAND Logo

0

Research Products

6

CLEAN WATER AND SANITATION
CLEAN WATER AND SANITATION Logo

0

Research Products

1

NO POVERTY
NO POVERTY Logo

0

Research Products

7

AFFORDABLE AND CLEAN ENERGY
AFFORDABLE AND CLEAN ENERGY Logo

1

Research Products

10

REDUCED INEQUALITIES
REDUCED INEQUALITIES Logo

0

Research Products

14

LIFE BELOW WATER
LIFE BELOW WATER Logo

0

Research Products

2

ZERO HUNGER
ZERO HUNGER Logo

0

Research Products

13

CLIMATE ACTION
CLIMATE ACTION Logo

0

Research Products

5

GENDER EQUALITY
GENDER EQUALITY Logo

0

Research Products

16

PEACE, JUSTICE AND STRONG INSTITUTIONS
PEACE, JUSTICE AND STRONG INSTITUTIONS Logo

1

Research Products

17

PARTNERSHIPS FOR THE GOALS
PARTNERSHIPS FOR THE GOALS Logo

0

Research Products

3

GOOD HEALTH AND WELL-BEING
GOOD HEALTH AND WELL-BEING Logo

3

Research Products
Documents

24

Citations

184

h-index

8

Documents

12

Citations

83

Scholarly Output

22

Articles

8

Views / Downloads

5/10

Supervised MSc Theses

1

Supervised PhD Theses

0

WoS Citation Count

53

Scopus Citation Count

175

WoS h-index

4

Scopus h-index

8

Patents

0

Projects

0

WoS Citations per Publication

2.41

Scopus Citations per Publication

7.95

Open Access Source

5

Supervised Theses

1

Google Analytics Visitor Traffic

JournalCount
Security of Information and Networks - Proceedings of the 1st International Conference on Security of Information and Networks, SIN 20073
Securıty And Communıcatıon Networks2
ACM International Conference Proceeding Series1
Bilgisayar Bilimleri ve Mühendisliği Dergisi1
BMC Cancer1
Current Page: 1 / 4

Scopus Quartile Distribution

Competency Cloud

GCRIS Competency Cloud

Scholarly Output Search Results

Now showing 1 - 10 of 22
  • Master Thesis
    Internet-Aided Smart Irrigation and Fertilization System
    (İzmir Ekonomi Üniversitesi, 2018) Yenikaya, Muhammed Akif; Kondakcı, Süleyman
    Bu çalışmada; tarlalarda ve seralarda kullanılmakta olan sulama ve gübreleme otomasyon sistemlerinde verimliliği artırmaya yönelik akıllı bir otomatik toprak bakım sistemin geliştirilmesi, uygulanması amaçlanmıştır. Hedeflenen sistem gereken en az maliyet ile sulama ve gübreleme işlemlerini otomatik olarak gerçekleştirmektedir. Tarla ve seralardaki toprağın; nem ve pH değerlerini denetleyerek, aynı zamanda internet üzerinden merkezi bir sisteme komutlar göndererek gübreleme ve sulanması yapılabilmektedir. Merkezi sistem sürekli olarak toprak değerlerini sensörlerle gözetleyerek toprağın ihtiyaç duyduğu metaryaller ile otomatik ve optimal bir ölçüde toprağı beslemeyi amaçlamaktadır. Bu amaçla kullanılabilecek yazılım ve donanımdan oluşan bir sistem internet üzerinden kontrol edilebilecek şekilde tasarlanmıştır. Üzerinde çalışılan sistemler arasındaki iletişim, internet teknolojisi kullanılarak sağlanmıştır. Gereken su ve gübre tespitinin ardından depo içerisinde gübreleme değerleri istediğimiz şekilde ayarlanarak, her bir bölge için kullanılacak valfler sayesinde toprağa otomatik olarak dağıtılması sağlanmıştır. Ayrıca, otomasyon sisteminin web ara yüzü sayesinde, ölçme bilgilerine kolaylıkla gerçek zamanlı erişilebilmesi mümkün olmuştur.
  • Article
    Citation - WoS: 4
    Citation - Scopus: 4
    Intelligent Network Security Assessment With Modeling and Analysis of Attack Patterns
    (Wiley-Hindawi, 2012) Kondakçı, Süleyman
    This paper presents a new concept for information security assessments while promoting several areas of its application. Threat generation, attack pattern analysis, quantitative risk computation, and network security monitoring locally or remotely are the major application areas of this concept. Instead of testing assets one by one, by applying separate repetitive attacks and assessments, the presented system generates and executes attacks once on a sample group, composes assessment data, and uses the data for the assessment of an entire network. This unique approach can be used as a model to guide the development of tool-based assessment systems, intelligent network security analysis, monitoring systems, and also as a complementary function in information security test and evaluation laboratories. Copyright (C) 2012 John Wiley & Sons, Ltd.
  • Conference Object
    Can Random Noise Injection Eliminate Noise?: Simulation and Hardware Implementation
    (SciTePress, 2014) Kondakçı, Süleyman
    Noise, found in all types of instrumentation and signal processing systems, has been a great challenge to tackle, especially, in biomedical signal processing tasks. Often, low-frequency and low power measurement signals are used in biomedical signal applications. This work is aimed at modeling and developing a simple, efficient, and inexpensive front end signal conditioner applying the cowpox approach to low-power analog signal measurements. We focus here on the simulation and implementation of a signal conditioner for the evaluation of its feasibility and efficiency based on the cost and accuracy constraints. As briefly outlined below, this article can serve as a model for facilitating the construction of semi-digital filters that can be applied to denoising of signals with low-frequency and very weak amplitude levels.
  • Article
    Citation - WoS: 18
    Citation - Scopus: 27
    Epidemic State Analysis of Computers Under Malware Attacks
    (Elsevier, 2008) Kondakçı, Süleyman
    This paper presents a stochastic model of analyzing epidemic states of computers that are infected by malicious codes. The model is based on a finite-Markovian process. The methodology presented here is unique and simple to determine the state probabilities of susceptible populations in general. Although the emphasis is on a computer-based infection model, it can be applied to various types of epidemiology. The simple epidemic model [D. Daley, J. Gani, Epidemic Modeling, an Introduction, Cambridge University Press, Cambridge, UK, 1999.] has its limitations; it has only one state transition, which goes from susceptible to infected, and hence infected forever. This paper will show that the states are recurrent. A healthy but susceptible node can become infected by a virus, can then become a transmitter, and can also return to a healthy state. Efficient mitigation approaches and optimal system reliability depend on accurately determined parameters for failure-rate and repair-rate of attacked systems. The model presented here is useful in determining state transition dynamics for estimating infection and recovery rates of susceptible systems. Thus, our model can complement the existing worm propagation models for bias-corrections and fine-tuning of worm's dynamics. Another major contribution of this paper is to promote further studies in determining performance criteria regarding the costs of mitigation and the improved system availability. (C) 2008 Elsevier B.V. All rights reserved.
  • Article
    Citation - Scopus: 25
    Is Cancer a Pure Growth Curve or Does It Follow a Kinetics of Dynamical Structural Transformation?
    (BioMed Central Ltd., 2017) González M.M.; Joa J.A.G.; Cabrales L.E.B.; Pupo A.E.B.; Schneider B.; Kondakçı, Süleyman; Ciria H.M.C.
    Background: Unperturbed tumor growth kinetics is one of the more studied cancer topics; however, it is poorly understood. Mathematical modeling is a useful tool to elucidate new mechanisms involved in tumor growth kinetics, which can be relevant to understand cancer genesis and select the most suitable treatment. Methods: The classical Kolmogorov-Johnson-Mehl-Avrami as well as the modified Kolmogorov-Johnson-Mehl-Avrami models to describe unperturbed fibrosarcoma Sa-37 tumor growth are used and compared with the Gompertz modified and Logistic models. Viable tumor cells (1×105) are inoculated to 28 BALB/c male mice. Results: Modified Gompertz, Logistic, Kolmogorov-Johnson-Mehl-Avrami classical and modified Kolmogorov-Johnson-Mehl-Avrami models fit well to the experimental data and agree with one another. A jump in the time behaviors of the instantaneous slopes of classical and modified Kolmogorov-Johnson-Mehl-Avrami models and high values of these instantaneous slopes at very early stages of tumor growth kinetics are observed. Conclusions: The modified Kolmogorov-Johnson-Mehl-Avrami equation can be used to describe unperturbed fibrosarcoma Sa-37 tumor growth. It reveals that diffusion-controlled nucleation/growth and impingement mechanisms are involved in tumor growth kinetics. On the other hand, tumor development kinetics reveals dynamical structural transformations rather than a pure growth curve. Tumor fractal property prevails during entire TGK. © 2017 The Author(s).
  • Article
    Nesnelerin İnterneti (ıot) Tabanlı Akıllı Sulama ve Gübreleme Sistemi
    (2022) Güvenoğlu, Erdal; Yenikaya, Muhammed Akif; Kondakcı, Süleyman
    Bu çalışmada, tarımda kullanılan otomatik sulama ve gübreleme sistemlerinde verimliliğin artırılması için IoT tabanlı akıllı toprak bakım sisteminin geliştirilmesi ve uygulanması amaçlanmaktadır. Geliştirmeyi hedeflediğimiz sistem, sulama ve gübreleme işlemlerini otomatik olarak en düşük maliyetle gerçekleştirmektedir. Tarla ve seralarda toprak değerleri kontrol edilerek ve kontrol merkezi ile internet üzerinden haberleşerek gübreleme ve sulama yapılabilmektedir. Kontrol merkezi, sensörler ile toprak değerlerini sürekli gözlemleyerek ihtiyacı olan çalışma ile toprağı otomatik olarak optimum düzeyde beslemektedir. Bu amaçla kullanılan yazılım ve donanımları içeren bir sistem, internet üzerinden yönetilebilecek şekilde tasarlanmıştır.
  • Conference Object
    Citation - Scopus: 1
    Daris: a Probabilistic Model for Dependency Analysis of Risks in Information Security
    (Tafford Publishing, 2008) Kondakçı, Süleyman
    This paper presents an abstract concept of security planning processes using a simple probabilistic model to express conditional risk factors. This analytical work emphasizes relationships related to major security planning phases. The work discusses the chain of logical events that describe dependence in risk propagation. This unique work can provide a guidance for security planning and risk management applicable to various engineering fields. Especially, for security education, we need to provide approaches that are theoretically sound as well as practical and realistic. The risk analysis method provided by DARIS can also provide a theoretical basis in education of information security. © 2008 Atilla Elçi.
  • Conference Object
    Citation - Scopus: 29
    Network Security Risk Assessment Using Bayesian Belief Networks
    (2010) Kondakçı, Süleyman
    This paper presents a causal assessment model based on Bayesian Belief Networks to analyze and quantify information security risks caused by various threat sources. The proposed model can be applied to a variety of information security evaluation tasks, risk assessment, software development projects, IT products, and other decision making systems. This unique concept can also be used for the determination of joint risk propagation and interdependence structures within computer networks, information systems, and other engineering tasks in general. By this manner, we can facilitate the determination of probabilistic outputs caused by some precalculated input probabilities or by marginal/joint probabilities found so far within the chain of an interdependence structure. © 2010 IEEE.
  • Conference Object
    Secure Patient Monitoring and Self-Management Using Brain Expression Interpreter
    (2013) Kondakçı, Süleyman; Doruk, Emre
    This article presents a brief description of an experimental system designed for self-managing and monitoring of patients having difficulties in verbal communication. A vital role of the proposed system is to engage individuals to be effective self-managers of their own health. Technology-based interventions to support self-management across the spectrum of chronic diseases have the potential to reach a broader population of patients. We believe that studies featuring extensive research of self-management of patients with different chronic conditions are needed to explore the interaction of technology-based interventions. © 2013 Springer Science+Business Media.
  • Conference Object
    Citation - Scopus: 6
    A Composite Network Security Assessment
    (2008) Kondakçı, Süleyman
    This paper presents a new concept of security assessment methodology while promoting several areas of its application. Attack pattern analysis, network security monitoring locally or remotely are the major application areas of this concept. Instead of testing each asset or a network node separately by applying repetitive attacks and assessments, the composite system generates and executes attacks once, composes risk data, and uses the risk data for the entire network in order to perform the overall assessment. This unique approach can be used as a model to guide development of intrusion detection systems, intelligent network security analysis, monitoring systems, and also as a complementary function in information security test and evaluation laboratories. © 2008 IEEE.