Sefer Kurnaz

ORCID: 0000-0002-7666-2639
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • IoT and Edge/Fog Computing
  • Smart Grid Energy Management
  • Advanced Malware Detection Techniques
  • Robotic Path Planning Algorithms
  • Anomaly Detection Techniques and Applications
  • Advanced Technologies and Applied Computing
  • Adaptive Control of Nonlinear Systems
  • Advanced Optical Network Technologies
  • IoT-based Smart Home Systems
  • Energy Efficient Wireless Sensor Networks
  • Space exploration and regulation
  • Optical Wireless Communication Technologies
  • Microgrid Control and Optimization
  • Antenna Design and Analysis
  • Spacecraft Design and Technology
  • Internet Traffic Analysis and Secure E-voting
  • Artificial Intelligence in Healthcare
  • Optical Network Technologies
  • Vehicular Ad Hoc Networks (VANETs)
  • Antenna Design and Optimization
  • Energy Harvesting in Wireless Networks
  • Blockchain Technology Applications and Security
  • Digital Media Forensic Detection
  • Online Learning and Analytics

Altınbaş University
2018-2025

İstanbul Esenyurt Üniversitesi
2017-2018

Turkish Air Force Academy
2003-2011

United States Air Force Academy
2007

Thousands of licensed drugs are now available to patients. The Warnings and Precautions section a medication's label was created identify characterize severe or clinically significant adverse reactions other potential safety issues. This method gathers patient's gender, age, pregnancy status, current health suggested involves data collecting analysis. We visited DINTO, DrugBank, RxNorm, the FDA while gathering data. Test findings showed instrument accurate (96%) efficient.

10.1109/ismsit56059.2022.9932652 article EN 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) 2022-10-20

Earth observation (EO) satellites offer significant potential in wildfire detection and assessment due to their ability provide fine spatial, temporal, spectral resolutions. Over the past decade, satellite data have been systematically utilized monitor dynamics evaluate impacts, leading substantial advancements management strategies. The present study contributes this field by enhancing frequency accuracy of through advanced techniques for detecting, classifying, segmenting wildfires using...

10.3390/fire8020036 article EN cc-by Fire 2025-01-21

This study investigates the enhancement of automated driving and command control through speech recognition using a Deep Neural Network (DNN). The method depends on some sequential stages such as noise removal, feature extraction from audio file, their classification neural network. In proposed approach, variables that affect results in hidden layers were extracted stored vector to classify them issue most influential ones for feedback network increase accuracy result. result was 93% terms...

10.3390/electronics14030496 article EN Electronics 2025-01-25

Mobile ad-hoc wireless networks give us the high probability and properties to create networks, without any central management or infrastructure, independent temporary network, that is means wide ubiquitous networks. The intermediate nodes should be able communicate between them send receive data with ability using at time anywhere, mobility of node source destination gives unstable topology maybe connection will break often. Therefore, strategies design depend on path routing protocol...

10.1109/hora49412.2020.9152845 article EN 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) 2020-06-01

The detection of deepfake images and videos is a critical concern in social communication due to the widespread utilization techniques. prevalence these methods poses risks trust authenticity across various domains, emphasizing importance identifying fake faces for security preventing socio-political issues. In digital media era, deep learning outperforms traditional image processing detection, underscoring its significance. This research introduces an innovative approach detecting by...

10.3390/electronics13091662 article EN Electronics 2024-04-25

Java card is a system that can allow the programming and improvement of smart technology by incorporating java language into virtual machine, it also introduces concept applets as mean implementing various management protection measures on data, but new security challenges to stage, in this paper, we implement scheme based honey encryption overcome threat brute force attacks denial service password authentication.

10.1109/hora49412.2020.9152936 article EN 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) 2020-06-01

The security aspect of processes and methodologies in the information communication technology era is main part. should a key priority secret exchange between two parties. In order to ensure information, there are some strategies that used, they include steganography, watermark, cryptography. cryptography, secrete message converted into unintelligible text, but existence noticed, on other hand, watermarking steganography involve hiding way its presence cannot be noticed. Presently, design...

10.1109/aca52198.2021.9626807 article EN 2021-07-25

The area of interest in intelligent transport is vehicle communication for researchers and the automotive industry. In this article, performance various routing protocols a scenario has been observed using NS3 network simulator. Performance measurement metrics include Average Good put BSM PDR. AODV appears to be good protocol low-density vehicles but OLSR beats other high-density scenario.

10.1109/hora49412.2020.9152903 article EN 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) 2020-06-01

The urgent demand for clean and renewable energy sources has led to the emergence of microgrid (MG) concept. MGs are small grids connecting various micro-sources, such as diesel, photovoltaic wind, fuel cells. They operate flexibly, connected grid, standalone, in clusters. In AC MG control, a hierarchical system consists three levels: primary, secondary, tertiary. It monitors ensures stability, power quality, sharing based on specifications governing protocols. Various challenging transient...

10.3390/en16247953 article EN cc-by Energies 2023-12-07

The advantages of optical wireless communication in space are its fast speed, large capacity, lack Electro-Magnetic Interference (EMI), high level security, and broad bandwidth. OWC offers an advantage over microwave because the relay function laser-based reduces system time. To achieve long distances required for Geostationary Earth Orbit (GEO) communication, this paper designs implements 8-channel, Dual Polarization Differential Quadratic Phase Shift Keying (DP-DQPSK) Wavelength Division...

10.1049/icp.2023.1772 article EN IET conference proceedings. 2023-09-05

The potential for service continuity across uncovered and under-covered regions, ubiquity, scalability are all offered by Satellite Communication (SC) the recent decade. However, to take advantage of these benefits, it is necessary address several obstacles first. This because management resource, control security network, efficient utilization spectrum, satellite-based communication networks more difficult accomplish than those Terrestrial Networks (TNs). Thereby, Artificial Intelligence...

10.1063/5.0192068 article EN AIP conference proceedings 2024-01-01

As the Internet of Things (IoT) continues to proliferate, demand for efficient and secure data processing at network edge has grown exponentially. Fog computing, a paradigm that extends cloud capabilities network, plays pivotal role in meeting these requirements. In this context, reliable trustworthy forwarding is paramount importance. This paper presents an innovative mechanism designed ensure trustworthiness context MQTT (Message Queuing Telemetry Transport), widely adopted IoT...

10.3390/electronics13142715 article EN Electronics 2024-07-11

This study introduces novel stochastic distributed cooperative control (SDCC) in the context of island microgrids (MGs). A proportional resonant (PR) controller and virtual impedance droop stationary reference frames are employed cooperation with averaging secondary optimized by dragonfly algorithm (DA). The suggested approach demonstrates capability to achieve mean-square synchronization for voltage frequency restoration generators (DGs) ensure efficient active power sharing. Therefore, a...

10.3390/en16227675 article EN cc-by Energies 2023-11-20
Coming Soon ...