Korkmaz, İlker

Loading...
Profile Picture
Name Variants
Korkmaz, I.
Korkmaz, Ilker
Korkmaz I.
Job Title
Email Address
ilker.korkmaz@ieu.edu.tr
Main Affiliation
05.05. Computer Engineering
Status
Current Staff
Website
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID

Sustainable Development Goals

5

GENDER EQUALITY
GENDER EQUALITY Logo

0

Research Products

9

INDUSTRY, INNOVATION AND INFRASTRUCTURE
INDUSTRY, INNOVATION AND INFRASTRUCTURE Logo

2

Research Products

13

CLIMATE ACTION
CLIMATE ACTION Logo

0

Research Products

8

DECENT WORK AND ECONOMIC GROWTH
DECENT WORK AND ECONOMIC GROWTH Logo

0

Research Products

14

LIFE BELOW WATER
LIFE BELOW WATER Logo

0

Research Products

17

PARTNERSHIPS FOR THE GOALS
PARTNERSHIPS FOR THE GOALS Logo

0

Research Products

1

NO POVERTY
NO POVERTY Logo

0

Research Products

2

ZERO HUNGER
ZERO HUNGER Logo

0

Research Products

4

QUALITY EDUCATION
QUALITY EDUCATION Logo

0

Research Products

11

SUSTAINABLE CITIES AND COMMUNITIES
SUSTAINABLE CITIES AND COMMUNITIES Logo

1

Research Products

16

PEACE, JUSTICE AND STRONG INSTITUTIONS
PEACE, JUSTICE AND STRONG INSTITUTIONS Logo

0

Research Products

3

GOOD HEALTH AND WELL-BEING
GOOD HEALTH AND WELL-BEING Logo

0

Research Products

6

CLEAN WATER AND SANITATION
CLEAN WATER AND SANITATION Logo

0

Research Products

12

RESPONSIBLE CONSUMPTION AND PRODUCTION
RESPONSIBLE CONSUMPTION AND PRODUCTION Logo

0

Research Products

10

REDUCED INEQUALITIES
REDUCED INEQUALITIES Logo

0

Research Products

15

LIFE ON LAND
LIFE ON LAND Logo

0

Research Products

7

AFFORDABLE AND CLEAN ENERGY
AFFORDABLE AND CLEAN ENERGY Logo

0

Research Products
Documents

18

Citations

146

h-index

5

Documents

10

Citations

43

Scholarly Output

18

Articles

2

Views / Downloads

25/1129

Supervised MSc Theses

1

Supervised PhD Theses

0

WoS Citation Count

43

Scopus Citation Count

108

WoS h-index

3

Scopus h-index

5

Patents

0

Projects

0

WoS Citations per Publication

2.39

Scopus Citations per Publication

6.00

Open Access Source

0

Supervised Theses

1

JournalCount
Proceedings - 2020 Innovations in Intelligent Systems and Applications Conference, ASYU 20202
2024 Medical Technologies Congress -- OCT 10-12, 2024 -- Bodrum, TURKIYE2
2019 International Symposium on Networks, Computers and Communications, ISNCC 20191
2021 Eıghth Internatıonal Conference on Internet of Thıngs, Systems, Management And Securıty (Iotsms)1
2022 Medıcal Technologıes Congress (Tıptekno'22)1
Current Page: 1 / 3

Scopus Quartile Distribution

Competency Cloud

GCRIS Competency Cloud

Scholarly Output Search Results

Now showing 1 - 10 of 18
  • Conference Object
    Citation - Scopus: 1
    An Energy Conservative Wireless Sensor Network Model for Object Tracking
    (IEEE, 2014) Peynirci, Gokcer; Korkmaz, Ilker; Gurgen, Muharrem
    This study aims to find the relationship between energy consumption level and object tracking success in an object tracking sensor network (OTSN). Convenient use of energy proposes a great challenge for wireless sensor network (WSN) design and the balance between successful object tracking and low energy consumption is a tight one. To address this issue, we propose a new network operation scheme for object tracking, implement this scheme in Network Simulator 2 (ns-2) and present the obtained results of the conducted simulation experiments. The simulation results show that the proposed method can be used to track objects in a WSN network in an energy conservative manner.
  • Book Part
    Citation - Scopus: 2
    A Survey on Security in Wireless Sensor Networks: Attacks and Defense Mechanisms
    (IGI Global, 2013) Korkmaz I.; Dagdeviren O.; Tekbacak F.; Dalkilic M.E.
    Wireless Sensor Network (WSN) is a promising technology that has attracted the interest of research in the last decade. Security is one of the fundamental issues in sensor networks since sensor nodes are very resource constrained. An attacker may modify, insert, and delete new hardware and software components to the system where a single node, a specific part of the sensing area, and the whole network may become inoperable. Thus, the design of early attack detection and defense mechanisms must be carefully considered. In this chapter, the authors survey attacks and their defense mechanisms in WSNs. Attacks are categorized according to the related protocol layer. They also investigate the open research issues and emerging technologies on security in WSNs.
  • Article
    Citation - WoS: 18
    Citation - Scopus: 32
    A Cloud Based and Android Supported Scalable Home Automation System
    (Pergamon-Elsevier Science Ltd, 2015) Korkmaz, Ilker; Metin, Senem Kumova; Gurek, Alper; Gur, Caner; Gurakin, Cagri; Akdeniz, Mustafa
    In this paper, an Android based home automation system that allows multiple users to control the appliances by an Android application or through a web site is presented. The system has three hardware components: a local device to transfer signals to home appliances, a web server to store customer records and support services to the other components, and a mobile smart device running Android application. Distributed cloud platforms and Google services are used to support messaging between the components. The prototype implementation of the proposed system is evaluated based on the criteria considered after the requirement analysis for an adequate home automation system. The paper presents the outcomes of a survey carried out regarding the properties of home automation systems, and also the evaluation results of the experimental tests conducted with volunteers on running prototype. (C) 2014 Elsevier Ltd. All rights reserved.
  • Article
    Citation - WoS: 14
    Citation - Scopus: 21
    A Survey of Agent Technologies for Wireless Sensor Networks
    (Taylor & Francis Ltd, 2011) Dagdeviren, Orhan; Korkmaz, Ilker; Tekbacak, Fatih; Erciyes, Kayhan
    Wireless sensor networks (WSNs) do not have a fixed infrastructure and consist of sensor nodes that perform sensing and communicating tasks. The WSNs have large application spectrum such as habitat monitoring, military surveillance, and target tracking, where sensor nodes may operate distributed in highly dynamic environments. Battery-constrained sensor nodes may aggregate the sensed data, localize themselves, and route the packets in an energy-efficient and decentralized manner to enable running the applications. Agents are capable of independent and autonomous action, so that they can successfully carry out tasks that have been delegated to them, thus agent-based approaches are very suitable to apply as the solution of the problems occurring in WSNs. So far many agent-based approaches were proposed for WSNs. This paper surveys the agent technologies for sensor networks by providing a classification, objectives and costs of these approaches with the open research problems. To the best of our knowledge, this is the first study that covers the intersection of the agent technology and sensor networks from a wide perspective.
  • Conference Object
    Citation - Scopus: 14
    A smart school bus tracking system
    (Institute of Electrical and Electronics Engineers Inc., 2019) Korkmaz I.; Camci A.; Cengiz C.; Dirik D.; Cekci E.; Akbaba F.M.
    The proposed smart school bus tracking system is an easy-to-use software, including both a web-based program and a mobile application, that mainly gives parents, students and school service firms the ability to track accurately the location of their school service vehicles. Such a smart school bus service information system is inevitable within the context of smart city features. The mobile application makes it smarter for kids/students using their school services; also, parents can easily track their kids' buses. In addition, bus service companies can easily register new students and determine the routes of the school buses dynamically. The system provides scalability, flexibility, low cost, security, and reliability. All shared location information and users' private data are stored encrypted; the parents may receive information about their related buses only. The system is based on both web and mobile platforms and it is implemented as an interactive application. © 2019 IEEE.
  • Conference Object
    Effect of Age and Gender on Facial Emotion Recognition
    (Institute of Electrical and Electronics Engineers Inc., 2020) Oguz K.; Korkmaz I.; Korkmaz B.; Akkaya G.; Alici C.; Kilic E.
    New research fields and applications on human computer interaction will emerge based on the recognition of emotions on faces. With such aim, our study evaluates the features extracted from faces to recognize emotions. To increase the success rate of these features, we have run several tests to demonstrate how age and gender affect the results. The artificial neural networks were trained by the apparent regions on the face such as eyes, eyebrows, nose, mouth, and jawline and then the networks are tested with different age and gender groups. According to the results, faces of older people have a lower performance rate of emotion recognition. Then, age and gender based groups are created manually, and we show that performance rates of facial emotion recognition have increased for the networks that are trained using these particular groups. © 2020 IEEE.
  • Master Thesis
    Uçan Tasarsız Ağlar için Doğadan İlham Alan ve Geleneksel Yönlendirme Algoritmalarının Araştırılması
    (2025) Karaküçük, Ömer Hakan; Korkmaz, İlker
    Uçan Tasarsız Ağ (FANET), mobil tasarsız ağların (MANET) özel bir türüdür ve ağ düğümlerinin son derece hareketli insansız hava araçları (İHA) olduğu bir iletişim ağını ifade eder. Doğal afetler, ulusal güvenlik veya terörle mücadele gibi bazı İHA kullanım durumlarının kırılgan ve kritik doğası, paketlerin düğümler veya eşler arasında iletim hızı açısından en doğru yönlendirme algoritmasını seçmenin büyük önemini ortaya koymaktadır. Uçan tasarsız ağlardaki düğümlerin yüksek hareketliliği, FANET'ler için son derece dinamik bir topolojiye yol açar ve amaca uygun bir yönlendirme algoritmasının dikkatlice seçilmesini gerektiren bir ağ yönlendirme zorluğu ortaya çıkarır. Bu bağlamda uygun bir yönlendirme algoritması için örnek olarak, karınca kolonisi optimizasyon metasezgisine dayanan bir sürü zekası optimizasyon algoritması olan AntHocNet verilebilir. Bu tezde, popüler geleneksel yönlendirme algoritmalarından bazıları (AODV, DSDV ve OLSR) ve doğadan ilham alan bir yönlendirme algoritması (AntHocNet), önceden belirlenmiş çeşitli senaryolar çalıştırılarak ns-3 simülasyonları aracılığıyla karşılaştırılmıştır. Önceden belirlenmiş senaryolara dayalı olarak yürütülen simülasyonlar, karşılaştırılan yönlendirme protokollerinin performansının dinamik olarak değişen ağ topolojileri, ağ yükleri ve ağ boyutları altında nasıl etkilendiğine dair araştırma sorularına yanıt aramaktadır. Simülasyon sonuçlarının karşılaştırmalı analizi, doğadan ilham alan yönlendirme protokolü AntHocNet'in hem reaktif yönlendirme protokolü AODV hem de proaktif yönlendirme protokolleri DSDV ve OLSR'nin çok ötesinde performans sunduğunu göstermektedir.
  • Conference Object
    Citation - Scopus: 3
    The Weak and the Strong Password Preferences: a Case Study on Turkish Users
    (2010) Korkmaz I.; Dalkilic M.E.
    Considering the computer authentication, any password shall not only be private to its owner but also be chosen as not to be predicted easily by others. The passwords used in authentication processes of any critical system should be strong as not to be cracked easily. In this context, the strong password choice gets significance for the general system security. This study aims to reveal the proper and improper properties on password preferences via examining the real samples. The method used in this work is first to gather the real passwords in plaintext, then to crack the encrypted forms of them and finally to investigate statistical queries on those passwords in order to distinguish the common weak and strong characteristics As the case study, the experiments are conducted on real passwords of Turkish users in an actively running system. The results of the experiments are categorized for weak and strong passwords. Moreover, the common tendencies on password choice are evaluated. Copyright 2010 ACM.
  • Conference Object
    Citation - Scopus: 3
    A mobile patient monitoring system using RFID
    (2010) Korkmaz I.; Atay C.; Kyparisis G.
    In the last decade, Radio Frequency Identification (RFID) has become popular in so many fields from military to industry applications. RFID tags have been embedded into many various products especially in logistics sector. A tag stores individual information of its attached object and an RFID reader communicates with the tag in radio frequencies to identify the object. This object to be monitored may also be a human. In our work, RFID technology is applied in health care systems. The system supports wireless mobile communication between the RFID tags and readers. Each patient available in the system is inherently mobile and wears a bracelet integrated with a unique tag, and the readers are mobile PDA devices each including a wireless RFID reader card. The proposed application can be used to identify and monitor the patients.
  • Conference Object
    A 2-Hop Coloring-Based Collision Free Infrastructure Design for Wireless Sensor Networks
    (Institute of Electrical and Electronics Engineers Inc., 2016) Korkmaz I.; Dagdeviren O.; Dalkilic M.E.
    This paper mainly proposes a design for a communication infrastructure for Wireless Sensor Networks. The proposed design prevents message collisions by arranging the time schedules to send, receive, forward and overhear packets of the nodes considering 2-hop graph coloring mechanism. The system aims to exclude the compromised nodes in the network using the overhearing mechanism, and copes with recovering the paths of the legitimate nodes using multipath redundancy. The proposed scheduling-based and overhearing supported infrastructure brings the advantage of providing the Sensor Networks with both reliable communication using backup paths and energy conservation by preventing the collisions. © 2016 IEEE.