Tora, Hakan

Loading...
Profile Picture
Name Variants
Tora,H.
T., Hakan
Tora, Hakan
H., Tora
H.,Tora
T.,Hakan
Hakan, Tora
Job Title
Doktor Öğretim Üyesi
Email Address
hakan.tora@atilim.edu.tr
Main Affiliation
Airframe and Powerplant Maintenance
Status
Former Staff
Website
ORCID ID
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID

Sustainable Development Goals

2

ZERO HUNGER
ZERO HUNGER Logo

0

Research Products

14

LIFE BELOW WATER
LIFE BELOW WATER Logo

1

Research Products

17

PARTNERSHIPS FOR THE GOALS
PARTNERSHIPS FOR THE GOALS Logo

1

Research Products

5

GENDER EQUALITY
GENDER EQUALITY Logo

0

Research Products

16

PEACE, JUSTICE AND STRONG INSTITUTIONS
PEACE, JUSTICE AND STRONG INSTITUTIONS Logo

0

Research Products

8

DECENT WORK AND ECONOMIC GROWTH
DECENT WORK AND ECONOMIC GROWTH Logo

0

Research Products

4

QUALITY EDUCATION
QUALITY EDUCATION Logo

0

Research Products

6

CLEAN WATER AND SANITATION
CLEAN WATER AND SANITATION Logo

0

Research Products

7

AFFORDABLE AND CLEAN ENERGY
AFFORDABLE AND CLEAN ENERGY Logo

2

Research Products

10

REDUCED INEQUALITIES
REDUCED INEQUALITIES Logo

0

Research Products

11

SUSTAINABLE CITIES AND COMMUNITIES
SUSTAINABLE CITIES AND COMMUNITIES Logo

1

Research Products

9

INDUSTRY, INNOVATION AND INFRASTRUCTURE
INDUSTRY, INNOVATION AND INFRASTRUCTURE Logo

0

Research Products

1

NO POVERTY
NO POVERTY Logo

0

Research Products

3

GOOD HEALTH AND WELL-BEING
GOOD HEALTH AND WELL-BEING Logo

1

Research Products

12

RESPONSIBLE CONSUMPTION AND PRODUCTION
RESPONSIBLE CONSUMPTION AND PRODUCTION Logo

0

Research Products

13

CLIMATE ACTION
CLIMATE ACTION Logo

2

Research Products

15

LIFE ON LAND
LIFE ON LAND Logo

0

Research Products
This researcher does not have a Scopus ID.
This researcher does not have a WoS ID.
Scholarly Output

57

Articles

11

Views / Downloads

2/0

Supervised MSc Theses

14

Supervised PhD Theses

5

WoS Citation Count

57

Scopus Citation Count

88

WoS h-index

5

Scopus h-index

5

Patents

0

Projects

0

WoS Citations per Publication

1.00

Scopus Citations per Publication

1.54

Open Access Source

7

Supervised Theses

19

Google Analytics Visitor Traffic

JournalCount
2014 22nd Signal Processing and Communications Applications Conference, SIU 2014 - Proceedings -- 2014 22nd Signal Processing and Communications Applications Conference, SIU 2014 -- 23 April 2014 through 25 April 2014 -- Trabzon -- 1060533
22nd IEEE Signal Processing and Communications Applications Conference (SIU) -- APR 23-25, 2014 -- Karadeniz Teknik Univ, Trabzon, TURKEY3
ICECS 2017 - 24th IEEE International Conference on Electronics, Circuits and Systems -- 24th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2017 -- 5 December 2017 through 8 December 2017 -- Batumi -- 1346752
24th IEEE International Conference on Electronics, Circuits and Systems (ICECS) -- DEC 05-08, 2017 -- Batumi, GEORGIA2
24th Signal Processing and Communication Application Conference (SIU) -- MAY 16-19, 2016 -- Zonguldak, TURKEY2
Current Page: 1 / 6

Scopus Quartile Distribution

Competency Cloud

GCRIS Competency Cloud

Scholarly Output Search Results

Now showing 1 - 1 of 1
  • Article
    Citation - WoS: 13
    Citation - Scopus: 16
    A Novel Data Encryption Method Using an Interlaced Chaotic Transform
    (Pergamon-elsevier Science Ltd, 2024) Gokcay, Erhan; Tora, Hakan
    We present a novel data encryption approach that utilizes a cascaded chaotic map application. The chaotic map used in both permutation and diffusion is Arnold's Cat Map (ACM), where the transformation is periodic and the encrypted data can be recovered. The original format of ACM is a two-dimensional mapping, and therefore it is suitable to randomize the pixel locations in an image. Since the values of pixels stay intact during the transformation, the process cannot encrypt an image, and known-text attacks can be used to get back the transformation matrix. The proposed approach uses ACM to shuffle the positions and values of two-dimensional data in an interlaced and nested process. This combination extends the period of the transformation, which is significantly longer than the period of the initial transformation. Furthermore, the nested process's possible combinations vastly expand the key space. At the same time, the interlaced pixel and value transformation makes the encryption highly resistant to any known-text attacks. The encrypted data passes all random-data tests proposed by the National Institute of Standards and Technology. Any type of data, including ASCII text, can be encrypted so long as it can be rearranged into a two-dimensional format.