This item is non-discoverable
Bostan, Atila
Loading...
Name Variants
B., Atila
A., Bostan
Bostan,A.
Bostan, Atila
A.,Bostan
B.,Atila
Atila, Bostan
A., Bostan
Bostan,A.
Bostan, Atila
A.,Bostan
B.,Atila
Atila, Bostan
Job Title
Doktor Öğretim Üyesi
Email Address
atila.bostan@atilim.edu.tr
Main Affiliation
Computer Engineering
Status
Former Staff
Website
ORCID ID
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID
Sustainable Development Goals Report Points
SDG data could not be loaded because of an error. Please refresh the page or try again later.

Scholarly Output
33
Articles
16
Citation Count
19
Supervised Theses
6
33 results
Scholarly Output Search Results
Now showing 1 - 10 of 33
Article A Smart Classroom Application: Monitoring and Reporting Attendance Automatically Using Smart Devices(International Journal of Scientific Research in Information Systems and Engineering, 2017) Şengül, Gökhan; Karakaya, Murat; Bostan, Atila; Computer EngineeringFor recording attendance in a classroom, generally instructors collect signatures of the attendees. Then, at the end of the semester, those signatures need to be counted and reported. This process causes waste of time and effort for both instructors and attendees. Besides this process is very error prone. Moreover, in crowded classes, there could be some misuses of this process. In this study, a smart classroom application is proposed and developed in order to monitor the attendance of the students in a classroom environment. In the design, a low-energy Bluetooth device is located at each classroom. Identification number (ID) of the low-energy Bluetooth device and the name/number of the classroom that the device is located are matched and stored in a central database. In addition to this information, the name of the courses given in that classroom and their time tables are also stored in the central database. Thus, in the database, the weekly course schedule of the classrooms is available. In addition to this central database infrastructure, a mobile application is developed that can run on both in mobile phones and smart watches. The users first install the application on their own smart devices. Whenever an attendee enters to a classroom, the smart device and its application interacts with the low-energy Bluetooth device. The student’s identification number (Student ID: SID), the identification number (ID) of the low-energy Bluetooth device located at the class, the day and time of the interaction are sent to the central database by the smart device. Using this information, the name of the attendee and the courses that he/she attended are matched using the SID of the attendee, the ID of the low-energy Bluetooth device, the day and time of the interaction. Those matching information are also stored in the central database. The records in the central database are used to create any automatic reports, i.e. the attendance status, the time and duration of the attendance, and the classroom (course) of the record. The advantage of the proposed system is that it is a fully automatic system that records the presence of the students, generates automatic attendance reports, does not require any extra device except installing a mobile application onto smart phones or smart watches of the student, and can be deployed with a low budget. The proposed system is tested in real classroom environment and it is proven to be operational.Conference Object Citation - Scopus: 2An Undergraduate Curriculum for Deep Learning(Institute of Electrical and Electronics Engineers Inc., 2018) Tirkes,G.; Ekin,C.C.; Engul,G.; Bostan,A.; Karakaya,M.; Computer EngineeringDeep Learning (DL) is an interesting and rapidly developing field of research which has been currently utilized as a part of industry and in many disciplines to address a wide range of problems, from image classification, computer vision, video games, bioinformatics, and handwriting recognition to machine translation. The starting point of this study is the recognition of a big gap between the sector need of specialists in DL technology and the lack of sufficient education provided by the universities. Higher education institutions are the best environment to provide this expertise to the students. However, currently most universities do not provide specifically designed DL courses to their students. Thus, the main objective of this study is to design a novel curriculum including two courses to facilitate teaching and learning of DL topic. The proposed curriculum will enable students to solve real-world problems by applying DL approaches and gain necessary background to adapt their knowledge to more advanced, industry-specific fields. © 2018 IEEE.Article Citation - WoS: 6Citation - Scopus: 7Impact of Education on Security Practices in Ict(Univ Osijek, Tech Fac, 2015) Bostan, Atila; Akman, Ibrahim; Computer EngineeringIn assuring the security in information technology, user awareness and acquired-user habits are inevitable components, yet they may be qualified as the feeblest ones. As the information technology tries to put its best in providing maximum security, user awareness plays a key-role. Additionally, although the literature provides studies on approaches for teaching information security, there are not many evidences on the impact of education level. Therefore, this study investigates the impact of the education level on user security awareness in using the Information and Communication Technology (ICT) products. For this purpose, a survey was conducted among 433 citizens from different layers of the society. Interestingly, the results indicated that education level has significant impact on all security issues included in the analysis regarding computer usage, web usage and e-mail usage.Conference Object Citation - WoS: 1Analyzing the Requirements for E-Government Transition of Iraqi Ics Services(Ieee, 2017) Alameri, Mohammed Abdulbasit; Bostan, Atila; Akman, Ibrahim; Computer EngineeringIraqi Correction Services (ICS) is a department within the Ministry of Justice. Most services are provided through traditional paper and pen system. This system causes delays in service provision lime and work over-load on ICS staff which translates into a high cost of service provision. E-government applications represent an opportunity to automate governmental services while improving both effectiveness and efficiency. This work presents the approach taken to determine the priority to automate ICS service from the perspective of service beneficiaries. The research is yet to be completed, however, up to this point we developed four different questionnaire-sets in order to collect the requirements from the shareholders, verified them and implemented the actual survey in the field. The experience gained throughout these steps and the future analysis plan is reported in this paper.Article Citation - WoS: 2Citation - Scopus: 3Implicit Learning With Certificate Warning Messages on Ssl Web Pages: What Are They Teaching?(Wiley-hindawi, 2016) Bostan, Atila; Computer EngineeringSSL-based web services are the most common technology in secure transactions on the Internet today. The security level of these services is inevitably related with that of digital certificates and user awareness. With the high number of nonconforming digital certificate usage, which eventually invokes warning messages on the Internet, users are implicitly forced to develop unsecure usage habits. In this study, we have studied the implicit learning effect of certificate warning messages on the SSL web pages. We have conducted two different experimental studies on university students and on instructors in IT departments. The results point to acquired indifference towards these warnings in users. Copyright (C) 2016 John Wiley & Sons, Ltd.Conference Object Citation - WoS: 1An Undergraduate Curriculum for Deep Learning(Ieee, 2018) Tirkes, Guzin; Ekin, Cansu Cigdem; Sengul, Gokhan; Bostan, Atila; Karakaya, Murat; Computer EngineeringDeep Learning (DL) is an interesting and rapidly developing field of research which has been currently utilized as a part of industry and in many disciplines to address a wide range of problems, from image classification, computer vision, video games, bioinformatics, and handwriting recognition to machine translation. The starting point of this study is the recognition of a big gap between the sector need of specialists in DL technology and the lack of sufficient education provided by the universities. Higher education institutions are the best environment to provide this expertise to the students. However, currently most universities do not provide specifically designed DL courses to their students. Thus, the main objective of this study is to design a novel curriculum including two courses to facilitate teaching and learning of DL topic. The proposed curriculum will enable students to solve real-world problems by applying DL approaches and gain necessary background to adapt their knowledge to more advanced, industry-specific fields.Article Ict Usage Characteristics and Computer Security(PEOPLE: International Journal of Social Sciences, 2018) Akman, İbrahim; Bostan, Atila; Computer EngineeringAlthough acquired-user security habits and user security awareness are qualified as the feeblest components in assuring the information and communication technologies security, they are deemed to be inevitable as well. While the technology in information processing domain efforts its best in establishing the highest plausible security, user awareness is still referred as the key component. Human demographic factors, ICT usage frequency might have correlation with security related behavior routines, this dimension not to be known yet. Hence, in this study we examined the influence of ICT usage characteristics on secure computer usage behaviors. In order to investigate this relation, a survey was carried out with the participation of 466 individuals from diverse layers of the community. The results demonstrated that statistically noteworthy relations exist between several socio-demographic features, frequency and reason of ICT usage factors and secure computer usage.Article Unidirectional Data Transfer: a Secure System To Push the Data From a High Security Network To a Lower One Over an Actual Air-Gap(International Journal of Scientific Research in Information Systems and Engineering, 2017) Şengül, Gökhan; Bostan, Atila; Karakaya, Murat; Computer EngineeringThe term “air-gap” is typically used to refer physical and logical separation of two computer networks. This type of a separation is generally preferred when the security levels of the networks are not identical. Although the security requirements entail parting the data networks, there is a growing need for fast and automatic transfer of data especially from high-security networks to low-security ones. To protect security sensitive system from the risks originating from low-security network, unidirectional connections that permit the data transfer only from high to low-security network, namely information-diodes, are in use. Nonetheless, each diode solution has its drawbacks either in performance or security viewpoints. In this study, we present a unidirectional data transfer system in which the primary focus is data and signal security in technical design and with a plausible and adaptable data transfer performance. Such that the networks do not touch each other either in physically or logically and the transfer is guaranteed to be unidirectional. Apart from avoiding the malicious transmissions from low to high-security network, we claim that the proposed data diode design is safe from emanation leakage with respect to the contemporary sniffing and spoofing techniques.Conference Object Citation - WoS: 0Survey on the Usage of Digital Certificates in Ssl-Based Web Services(Turgut Ozal Univ, 2012) Yumsak, Ozkan; Bostan, Atila; Sekerci, Abdullah Sinan; Anameric, Munir; Law; Computer EngineeringSecurity of the communication on secure web services is provided with SSL (Secure Socket Layer) technology. SSL technology makes use of digital certificates and misuse of these digital certificates may cause security exploits. In this study, misuse ratio of certificates in university websites on the Internet is found out. To obtain this information, certificates which are used in the SSL web services are scanned. The conclusion of this study points out valid and invalid ratios of digital certificate usage in Internet based SSL web services.Master Thesis Parmak İzi Doğrulamada Gelişme(2017) Al-subaıhawı, Mohammed Abdulraheem Taqı; Bostan, Atila; Computer EngineeringParmak izi tanımlama ve doğrulama görevleri, işleme ve makine öğrenimi alanlarındaki en zorlu görevler arasındadır. Parmak izi işlemesi, biyometrik teknolojisi ve bilgi güvenliğinde kilit noktayı teşkil etmektedir. Çizgi yapısı gibi biyometrik parmak izi özniteliğinin bütün tanımlamasına dayalı halk nüfusu oranına göre, eksik (kısım) parmak izi görüntü tanımlaması ve doğrulamasının yapılması çok zordur. Bu sorundaki asıl zorluk eksik parmak izi görüntüsündeki çizgi yapısının kısmi kaybıdır. Bu tezde, kısmi görüntü kaybı ve ya eksik parmak izi görüntüsüyle çalışabilen parmak izi tanımlama ve doğrulama görevine küresel öznitelik yaklaşımının etkinliğini inceleyeceğiz. Küresel öznitelik vektör çıkarımı, bu tezde incelediğimiz ana küreselleşme yaklaşımıdır. Bu durumda, parmak izi tanımlama ve doğrulama görevi için, küresel geometri temelli öznitelik çıkarımı uyguladık. Birtakım küresel öznitelikler (yedi moment değeri), kısmi parmak izinden (eksik parmak izi) çıkarılmıştır. Bu çalışma, farklı öznitelik çıkarımı seviyelerinde parmak izi dalgaları ve gözeneklerinden küçük detaylı öznitelik çıkarma işleminden oluşan parmak izi tanımlama ve doğrulama problemine yönelik geleneksel yaklaşımla karşılaştırıldığında, küresel öznitelik vektörünün eksik parmak izi tanımlama problemiyle daha etkin bir şekilde çalışacağını göstermektedir. Üzerinde çalışılan sistem, birtakım rastgele seçilmiş eksik parmak izi görüntülerinden oluşturulmuş bir veri tabanı kullanılarak test edilmiştir. Rastgele oluşturulan eksik parmak izi görüntüleri, her görüntüdeki eksik parçanın büyüklüğüne 10 gruba ayrılmıştır. Sonrasında, her gruptan rastgele seçilen üç görüntüden yeni bir veri seti oluşturulmuş ve küresel ve yerel öznitelik çıkarımı olmak üzere iki farklı yaklaşımla test edilmiştir. Deneysel sonuçlar, küresel yaklaşımın %87 oranında tanımlama ve doğrulama etkinliği varken yerel yaklaşımın %17 oranında etkinliği olduğunu göstermiştir. Bu sonuç, küresel yaklaşımın, parmak izi tanımlama ve doğrulamasisteminin kısmi (eksik) parmak izi görüntüleri üzerindeki performansını, geleneksel yaklaşımdan %70 oranında daha fazla geliştirdiğini göstermektedir. Anahtar Kelimeler: Parmak izi tanımlama ve doğrulama, Küçük detaylı öznitelikler, çizgi öznitelikleri, Yerel öznitelik yaklaşımı, Küresel öznitelik yaklaşımı, Sabit Moment işlevi, İlgi Bölgesi