Kondakçı, Süleyman

Loading...
Profile Picture
Name Variants
Kondakcı, Süleyman
Kondakci, Suleyman
Job Title
Email Address
suley.kondakci@gmail.com
Main Affiliation
05.05. Computer Engineering
Status
Former Staff
Website
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID

Sustainable Development Goals

NO POVERTY1
NO POVERTY
0
Research Products
ZERO HUNGER2
ZERO HUNGER
0
Research Products
GOOD HEALTH AND WELL-BEING3
GOOD HEALTH AND WELL-BEING
3
Research Products
QUALITY EDUCATION4
QUALITY EDUCATION
0
Research Products
GENDER EQUALITY5
GENDER EQUALITY
0
Research Products
CLEAN WATER AND SANITATION6
CLEAN WATER AND SANITATION
0
Research Products
AFFORDABLE AND CLEAN ENERGY7
AFFORDABLE AND CLEAN ENERGY
1
Research Products
DECENT WORK AND ECONOMIC GROWTH8
DECENT WORK AND ECONOMIC GROWTH
0
Research Products
INDUSTRY, INNOVATION AND INFRASTRUCTURE9
INDUSTRY, INNOVATION AND INFRASTRUCTURE
1
Research Products
REDUCED INEQUALITIES10
REDUCED INEQUALITIES
0
Research Products
SUSTAINABLE CITIES AND COMMUNITIES11
SUSTAINABLE CITIES AND COMMUNITIES
0
Research Products
RESPONSIBLE CONSUMPTION AND PRODUCTION12
RESPONSIBLE CONSUMPTION AND PRODUCTION
0
Research Products
CLIMATE ACTION13
CLIMATE ACTION
0
Research Products
LIFE BELOW WATER14
LIFE BELOW WATER
0
Research Products
LIFE ON LAND15
LIFE ON LAND
0
Research Products
PEACE, JUSTICE AND STRONG INSTITUTIONS16
PEACE, JUSTICE AND STRONG INSTITUTIONS
1
Research Products
PARTNERSHIPS FOR THE GOALS17
PARTNERSHIPS FOR THE GOALS
0
Research Products
Documents

24

Citations

184

h-index

8

Documents

12

Citations

83

Scholarly Output

22

Articles

8

Views / Downloads

5/10

Supervised MSc Theses

1

Supervised PhD Theses

0

WoS Citation Count

53

Scopus Citation Count

175

Patents

0

Projects

0

WoS Citations per Publication

2.41

Scopus Citations per Publication

7.95

Open Access Source

5

Supervised Theses

1

JournalCount
Security of Information and Networks - Proceedings of the 1st International Conference on Security of Information and Networks, SIN 20073
Securıty And Communıcatıon Networks2
ACM International Conference Proceeding Series1
Bilgisayar Bilimleri ve Mühendisliği Dergisi1
BMC Cancer1
Current Page: 1 / 4

Scopus Quartile Distribution

Competency Cloud

GCRIS Competency Cloud

Scholarly Output Search Results

Now showing 1 - 10 of 22
  • Master Thesis
    Internet-Aided Smart Irrigation and Fertilization System
    (İzmir Ekonomi Üniversitesi, 2018) Yenikaya, Muhammed Akif; Kondakcı, Süleyman
    Bu çalışmada; tarlalarda ve seralarda kullanılmakta olan sulama ve gübreleme otomasyon sistemlerinde verimliliği artırmaya yönelik akıllı bir otomatik toprak bakım sistemin geliştirilmesi, uygulanması amaçlanmıştır. Hedeflenen sistem gereken en az maliyet ile sulama ve gübreleme işlemlerini otomatik olarak gerçekleştirmektedir. Tarla ve seralardaki toprağın; nem ve pH değerlerini denetleyerek, aynı zamanda internet üzerinden merkezi bir sisteme komutlar göndererek gübreleme ve sulanması yapılabilmektedir. Merkezi sistem sürekli olarak toprak değerlerini sensörlerle gözetleyerek toprağın ihtiyaç duyduğu metaryaller ile otomatik ve optimal bir ölçüde toprağı beslemeyi amaçlamaktadır. Bu amaçla kullanılabilecek yazılım ve donanımdan oluşan bir sistem internet üzerinden kontrol edilebilecek şekilde tasarlanmıştır. Üzerinde çalışılan sistemler arasındaki iletişim, internet teknolojisi kullanılarak sağlanmıştır. Gereken su ve gübre tespitinin ardından depo içerisinde gübreleme değerleri istediğimiz şekilde ayarlanarak, her bir bölge için kullanılacak valfler sayesinde toprağa otomatik olarak dağıtılması sağlanmıştır. Ayrıca, otomasyon sisteminin web ara yüzü sayesinde, ölçme bilgilerine kolaylıkla gerçek zamanlı erişilebilmesi mümkün olmuştur.
  • Article
    Nesnelerin İnterneti (ıot) Tabanlı Akıllı Sulama ve Gübreleme Sistemi
    (2022) Güvenoğlu, Erdal; Yenikaya, Muhammed Akif; Kondakcı, Süleyman
    Bu çalışmada, tarımda kullanılan otomatik sulama ve gübreleme sistemlerinde verimliliğin artırılması için IoT tabanlı akıllı toprak bakım sisteminin geliştirilmesi ve uygulanması amaçlanmaktadır. Geliştirmeyi hedeflediğimiz sistem, sulama ve gübreleme işlemlerini otomatik olarak en düşük maliyetle gerçekleştirmektedir. Tarla ve seralarda toprak değerleri kontrol edilerek ve kontrol merkezi ile internet üzerinden haberleşerek gübreleme ve sulama yapılabilmektedir. Kontrol merkezi, sensörler ile toprak değerlerini sürekli gözlemleyerek ihtiyacı olan çalışma ile toprağı otomatik olarak optimum düzeyde beslemektedir. Bu amaçla kullanılan yazılım ve donanımları içeren bir sistem, internet üzerinden yönetilebilecek şekilde tasarlanmıştır.
  • Article
    Citation - WoS: 4
    Citation - Scopus: 4
    Intelligent Network Security Assessment With Modeling and Analysis of Attack Patterns
    (Wiley-Hindawi, 2012) Kondakçı, Süleyman
    This paper presents a new concept for information security assessments while promoting several areas of its application. Threat generation, attack pattern analysis, quantitative risk computation, and network security monitoring locally or remotely are the major application areas of this concept. Instead of testing assets one by one, by applying separate repetitive attacks and assessments, the presented system generates and executes attacks once on a sample group, composes assessment data, and uses the data for the assessment of an entire network. This unique approach can be used as a model to guide the development of tool-based assessment systems, intelligent network security analysis, monitoring systems, and also as a complementary function in information security test and evaluation laboratories. Copyright (C) 2012 John Wiley & Sons, Ltd.
  • Article
    Citation - Scopus: 25
    Is Cancer a Pure Growth Curve or Does It Follow a Kinetics of Dynamical Structural Transformation?
    (BioMed Central Ltd., 2017) González M.M.; Joa J.A.G.; Cabrales L.E.B.; Pupo A.E.B.; Schneider B.; Kondakçı, Süleyman; Ciria H.M.C.
    Background: Unperturbed tumor growth kinetics is one of the more studied cancer topics; however, it is poorly understood. Mathematical modeling is a useful tool to elucidate new mechanisms involved in tumor growth kinetics, which can be relevant to understand cancer genesis and select the most suitable treatment. Methods: The classical Kolmogorov-Johnson-Mehl-Avrami as well as the modified Kolmogorov-Johnson-Mehl-Avrami models to describe unperturbed fibrosarcoma Sa-37 tumor growth are used and compared with the Gompertz modified and Logistic models. Viable tumor cells (1×105) are inoculated to 28 BALB/c male mice. Results: Modified Gompertz, Logistic, Kolmogorov-Johnson-Mehl-Avrami classical and modified Kolmogorov-Johnson-Mehl-Avrami models fit well to the experimental data and agree with one another. A jump in the time behaviors of the instantaneous slopes of classical and modified Kolmogorov-Johnson-Mehl-Avrami models and high values of these instantaneous slopes at very early stages of tumor growth kinetics are observed. Conclusions: The modified Kolmogorov-Johnson-Mehl-Avrami equation can be used to describe unperturbed fibrosarcoma Sa-37 tumor growth. It reveals that diffusion-controlled nucleation/growth and impingement mechanisms are involved in tumor growth kinetics. On the other hand, tumor development kinetics reveals dynamical structural transformations rather than a pure growth curve. Tumor fractal property prevails during entire TGK. © 2017 The Author(s).
  • Conference Object
    Obscurity of Network Security Course Curriculum
    (2011) Kondakçı, Süleyman
    Information security courses have become an important part of Computer Science curricula over the past decade, however, related course syllabi are becoming distorted with the enormity of ad hoc topics. Talking about the buffer overflow, which when technically considered, complies with the information overflow and obscurity pushed onto young minds. Many of us try to train young dogs using old tricks that are mostly based on badly formed and cryptic specifications. There exist a variety of curricula being used for cryptography courses, however, topic areas covering information security in general seem to be rather indistinct and theoretically focused. Due to lack of appropriate prerequisite knowledge and instructional approaches active involvement of multidisciplinary students is much harder to realize. This article presents a generic framework for designing and assessing a curriculum that results in a prerequisite course set and a course syllabus needed for a modern Information Security course. © 2011 ACM.
  • Conference Object
    Citation - Scopus: 29
    Network Security Risk Assessment Using Bayesian Belief Networks
    (2010) Kondakçı, Süleyman
    This paper presents a causal assessment model based on Bayesian Belief Networks to analyze and quantify information security risks caused by various threat sources. The proposed model can be applied to a variety of information security evaluation tasks, risk assessment, software development projects, IT products, and other decision making systems. This unique concept can also be used for the determination of joint risk propagation and interdependence structures within computer networks, information systems, and other engineering tasks in general. By this manner, we can facilitate the determination of probabilistic outputs caused by some precalculated input probabilities or by marginal/joint probabilities found so far within the chain of an interdependence structure. © 2010 IEEE.
  • Conference Object
    Secure Patient Monitoring and Self-Management Using Brain Expression Interpreter
    (2013) Kondakçı, Süleyman; Doruk, Emre
    This article presents a brief description of an experimental system designed for self-managing and monitoring of patients having difficulties in verbal communication. A vital role of the proposed system is to engage individuals to be effective self-managers of their own health. Technology-based interventions to support self-management across the spectrum of chronic diseases have the potential to reach a broader population of patients. We believe that studies featuring extensive research of self-management of patients with different chronic conditions are needed to explore the interaction of technology-based interventions. © 2013 Springer Science+Business Media.
  • Conference Object
    Citation - Scopus: 6
    A Composite Network Security Assessment
    (2008) Kondakçı, Süleyman
    This paper presents a new concept of security assessment methodology while promoting several areas of its application. Attack pattern analysis, network security monitoring locally or remotely are the major application areas of this concept. Instead of testing each asset or a network node separately by applying repetitive attacks and assessments, the composite system generates and executes attacks once, composes risk data, and uses the risk data for the entire network in order to perform the overall assessment. This unique approach can be used as a model to guide development of intrusion detection systems, intelligent network security analysis, monitoring systems, and also as a complementary function in information security test and evaluation laboratories. © 2008 IEEE.
  • Article
    Citation - WoS: 9
    Citation - Scopus: 17
    Analysis of Information Security Reliability: a Tutorial
    (Elsevier Sci Ltd, 2015) Kondakçı, Süleyman
    This article presents a concise reliability analysis of network security abstracted from stochastic modeling, reliability, and queuing theories. Network security analysis is composed of threats, their impacts, and recovery of the failed systems. A unique framework with a collection of the key reliability models is presented here to guide the determination of the system reliability based on the strength of malicious acts and performance of the recovery processes. A unique model, called Attack-obstacle model, is also proposed here for analyzing systems with immunity growth features. Most computer science curricula do not contain courses in reliability modeling applicable to different areas of computer engineering. Hence, the topic of reliability analysis is often too diffuse to most computer engineers and researchers dealing with network security. This work is thus aimed at shedding some light on this issue, which can be useful in identifying models, their assumptions and practical parameters for estimating the reliability of threatened systems and for assessing the performance of recovery facilities. It can also be useful for the classification of processes and states regarding the reliability of information systems. Systems with stochastic behaviors undergoing queue operations and random state transitions can also benefit from the approaches presented here. (C) 2014 Elsevier Ltd. All rights reserved.
  • Conference Object
    Citation - Scopus: 1
    Implementation and Performance Evaluation of the Rsep Protocol on Arm and Intel Platforms
    (2010) Kondakçı, Süleyman; Yilmaz G.
    We present performance evaluation of two low level implementations of the RSEP protocol. The implementations are realized both in Java and C++ languages, while the test and evaluations are performed on two different CPU architectures, ARM and Intel ®. RSEP [21] is a security evaluation protocol used to assess security of remote systems over open and insecure networks such as the Internet. RSEP protocol provides an alternative approach to security test and evaluation, which mainly consists of a secure communication protocol, back-end services, and a variety of remote evaluation agents. Secure evaluation of remote entities/assets is a challenging issue with several important requirements such as interoperability, security, robustness, time-efficiency, and ease of applicability. Mobile agents running on hand-held ARM devices and Intel platforms perform the remote evaluation independent of time and location. Copyright 2010 ACM.