Çulha, Davut

Loading...
Profile Picture
Name Variants
Çulha, Dr. Davut
Davut, Culha
Davut, Çulha
D., Culha
Ç.,Davut
D.,Çulha
Çulha,D.
Culha D.
Ç., Davut
Culha, Davut
D., Çulha
C.,Davut
Çulha, Davut
D.,Culha
Culha,D.
C., Davut
Job Title
Doçent Doktor
Email Address
davut.culha@atilim.edu.tr
Main Affiliation
Software Engineering
Status
Website
ORCID ID
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID

Sustainable Development Goals

SDG data is not available
Scholarly Output

5

Articles

1

Citation Count

22

Supervised Theses

0

Scholarly Output Search Results

Now showing 1 - 5 of 5
  • Conference Object
    Citation - WoS: 13
    A Decentralized Application for Secure Messaging in a Trustless Environment
    (Ieee, 2018) Abdulaziz, Mohamed; Culha, Davut; Yazici, Ali; Software Engineering
    Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol.
  • Conference Object
    Citation - Scopus: 14
    A Decentralized Application for Secure Messaging in a Trustless Environment
    (Institute of Electrical and Electronics Engineers Inc., 2019) Abdulaziz,M.; Culha,D.; Yazici,A.; Software Engineering
    Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol. © 2018 IEEE.
  • Conference Object
    Citation - Scopus: 1
    Smart Contract Upgradability: a Structured and Natural Approach
    (Institute of Electrical and Electronics Engineers Inc., 2024) Culha, Davut; Yazici, Ali; Software Engineering
    Software maintenance is crucial as technology rapidly evolves, requiring software to meet new demands and correct errors. Smart contracts, immutable programs on blockchains like Ethereum, face challenges despite their immutability, often needing updates for errors or new features. Smart contracts are upgraded using different patterns, which are not natural because most of them implement upgrades using low-level operations that deviate from their intended use. In other words, these patterns are not natural because upgrades are done by implementing workarounds. Moreover, smart contracts are also susceptible to security vulnerabilities because they may hold large amounts of money. In this paper, upgradability of smart contracts is considered a necessity. For this purpose, a more structured method is proposed by adding high-level features and combining inheritance properties of object-oriented languages. A key component of this method is the gotoContract variable, which allows for the redirection of function calls to upgraded contracts. The proposed method provides a complete upgrade of data and functions in smart contracts. It aims to minimize the effects of upgrades on end users of the smart contracts. Additionally, this natural way of upgrading will help mitigate security risks in the smart contracts by providing a high-level approach to upgrade.
  • Conference Object
    A Decentralized Application for Secure Messaging in a Trustless Environment
    (Institute of Electrical and Electronics Engineers Inc., 2019) Abdulaziz,M.; Yazıcı, Ali; Culha,D.; Yazici,A.; Çulha, Davut; Yazıcı, Ali; Çulha, Davut; Software Engineering; Software Engineering
    Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol. © 2018 IEEE.
  • Article
    Binary Tree Blockchain of Decomposed Transactions
    (Graz University of Technology, Institute of Information Systems and Computer Media (IICM), 2025) Culha, Davut; Software Engineering
    Widespread adoption of blockchain technologies requires scalability. To achieve scalability, various methods are applied, including new consensus algorithms, directed acyclic graph solutions, sharding solutions, and off-chain solutions. Sharding solutions are particularly promising as they distribute workload across different parts of the blockchain network. Similarly, directed acyclic graphs use graph data structures to distribute workload effectively. In this work, a binary tree data structure is used to enhance blockchain scalability. Binary trees offer several advantages, such as the ability to address nodes with binary numbers, providing a straightforward and efficient method for identifying and locating nodes. Each node in the tree contains a block of transactions, which allows for transactions to be directed to specific paths within the tree. This directionality not only increases scalability by enabling parallel processing of transactions but also ensures that the blockchain can handle a higher volume of transactions without becoming congested. Moreover, transactions are decomposed into transaction elements, improving the immutability of the binary tree blockchain. This novel decomposition process helps to minimize the computational overhead required for calculating account balances, making the system more efficient. By breaking down transactions into their fundamental components, the system can process and verify transactions more rapidly and accurately. This approach effectively realizes implicit sharding using a binary tree structure, distributing the processing load more evenly and reducing bottlenecks. The proposed method is simulated to assess its performance. Experimental results demonstrate that the proposed method achieves a significantly higher transaction throughput of 32307 transactions per second. Furthermore, block generation times decrease as the system scales, with an average block generation time of 0.13 seconds, underscoring the efficiency of the binary tree blockchain structure.