Çulha, Davut

Loading...
Profile Picture
Name Variants
Çulha, Dr. Davut
Davut, Culha
Davut, Çulha
D., Culha
Ç.,Davut
D.,Çulha
Çulha,D.
Culha D.
Ç., Davut
Culha, Davut
D., Çulha
C.,Davut
Çulha, Davut
D.,Culha
Culha,D.
C., Davut
Job Title
Doçent Doktor
Email Address
davut.culha@atilim.edu.tr
Main Affiliation
Software Engineering
Status
Website
ORCID ID
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID

Sustainable Development Goals

SDG data is not available
This researcher does not have a Scopus ID.
This researcher does not have a WoS ID.
Scholarly Output

7

Articles

1

Views / Downloads

28/137

Supervised MSc Theses

2

Supervised PhD Theses

0

WoS Citation Count

14

Scopus Citation Count

18

Patents

0

Projects

0

WoS Citations per Publication

2.00

Scopus Citations per Publication

2.57

Open Access Source

1

Supervised Theses

2

JournalCount
International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism, IBIGDELFT 2018 - Proceedings -- 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism, IBIGDELFT 2018 -- 3 December 2018 through 4 December 2018 -- Ankara -- 1445742
6th International Conference on Blockchain Computing and Applications -- NOV 26-29, 2024 -- Zayed University, Dubai, U ARAB EMIRATES1
International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT) -- DEC 03-04, 2018 -- Turkish IT Author, Ankara, TURKEY1
Journal of Universal Computer Science1
Current Page: 1 / 1

Scopus Quartile Distribution

Competency Cloud

GCRIS Competency Cloud

Scholarly Output Search Results

Now showing 1 - 7 of 7
  • Conference Object
    Citation - WoS: 13
    A Decentralized Application for Secure Messaging in a Trustless Environment
    (Ieee, 2018) Abdulaziz, Mohamed; Culha, Davut; Yazici, Ali
    Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol.
  • Conference Object
    Citation - Scopus: 14
    A Decentralized Application for Secure Messaging in a Trustless Environment
    (Institute of Electrical and Electronics Engineers Inc., 2019) Abdulaziz,M.; Culha,D.; Yazici,A.
    Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol. © 2018 IEEE.
  • Conference Object
    Citation - WoS: 1
    Citation - Scopus: 4
    Smart Contract Upgradability: a Structured and Natural Approach
    (Institute of Electrical and Electronics Engineers Inc., 2024) Culha, Davut; Yazici, Ali
    Software maintenance is crucial as technology rapidly evolves, requiring software to meet new demands and correct errors. Smart contracts, immutable programs on blockchains like Ethereum, face challenges despite their immutability, often needing updates for errors or new features. Smart contracts are upgraded using different patterns, which are not natural because most of them implement upgrades using low-level operations that deviate from their intended use. In other words, these patterns are not natural because upgrades are done by implementing workarounds. Moreover, smart contracts are also susceptible to security vulnerabilities because they may hold large amounts of money. In this paper, upgradability of smart contracts is considered a necessity. For this purpose, a more structured method is proposed by adding high-level features and combining inheritance properties of object-oriented languages. A key component of this method is the gotoContract variable, which allows for the redirection of function calls to upgraded contracts. The proposed method provides a complete upgrade of data and functions in smart contracts. It aims to minimize the effects of upgrades on end users of the smart contracts. Additionally, this natural way of upgrading will help mitigate security risks in the smart contracts by providing a high-level approach to upgrade.
  • Master Thesis
    Whisperchat: Merkezsiz Anlık Mesajlaşma Uygulaması
    (2019) Hassan, Mohamed Abdulazız Mohamed; Yazıcı, Ali; Çulha, Davut
    Anlık mesajlaşma, iletişim aracı olarak yaygın olarak benimsenmiştir. Çoğu anlık mesajlaşma uygulaması, üstverileri toplar veya sızdırır. Birçok insan, çağdaş ve popüler anlık mesajlaşma uygulamalarının getirdiği güvenlik ve kişisel gizlilik konularının farkında değildir. Hem güvenli hem de tamamen anonim olan merkezsiz ve kullanımı kolay mesajlaşma sistemi öneriyoruz. Bir saldırganın tehlike yaratabileceği merkezi sunucular olmadığından, önerilen sistem sansüre karşı dayanıklıkdır. Ethereum ortamında hafif bir istemci aracılığıyla çalışan uygulamayı, Android ortamında gerçekleştirdik. Önerdiğimiz uygulamanın yalnızca güvenli ve anonim değil aynı zamanda pratik de olduğunu göstermek için başarım değerlendirmesini yaptık.
  • Conference Object
    A Decentralized Application for Secure Messaging in a Trustless Environment
    (Institute of Electrical and Electronics Engineers Inc., 2019) Abdulaziz,M.; Yazıcı, Ali; Culha,D.; Yazici,A.; Çulha, Davut; Yazıcı, Ali; Çulha, Davut; Software Engineering; Software Engineering
    Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol. © 2018 IEEE.
  • Master Thesis
    IoT Veri Pazarları için Adil ve Güvenilir Bir Blok Zinciri Tabanlı Öneri Sistemi Geliştirilmesi
    (2025) Ayrıbaş, Haktan; Çulha, Davut
    Bu tez, Nesnelerin İnterneti (IoT) cihazlarının yaygınlaşmasıyla ortaya çıkan veri alışverişi fırsatlarını değerlendirirken, mevcut merkezi veri pazaryerlerinin şeffaflık eksikliği, adaletsiz gelir dağılımı ve büyük sağlayıcıları kayıran önyargılı sistemler gibi temel sorunlarına çözüm aramaktadır. Araştırma, uç bilişim ve adalet odaklı öneri mekanizmalarıyla bütünleşen blokzincir destekli bir IoT veri pazaryeri önermekte ve bu sistemin performans, adalet ve kullanıcı güveni açısından etkilerini incelemektedir. Önerilen sistem, akıllı sözleşmelerle yönetilen dört katmanlı hiyerarşik bir mimariye sahiptir ve Yetki İspatı (PoA) konsensus mekanizmasını kullanmaktadır. Sistem, gecikme ve enerji tüketimini azaltmak için uç bilişimden faydalanırken, adalet odaklı öneri sistemi sağlayıcı maruziyet eşitliği ile içerik çeşitliliğini çok amaçlı optimizasyon yaklaşımıyla dengelemektedir. 30 günlük simülasyon sürecinde 10.000'e kadar IoT cihazı, 180 veri sağlayıcısı ve 650 tüketici ile gerçekleştirilen deneyler, sistemin etkinliğini kanıtlamıştır. Sonuçlar gecikmede %41,9 azalma, enerji tüketiminde %39,6 tasarruf, sağlayıcı adaleti için 0,285 Gini katsayısı ve öneri kalitesinde sadece %4,52 oranında bir düşüş göstermiştir. Ayrıca kullanıcı güveni %51,3, sağlayıcı katılımı ise %40,3 oranında artmıştır. Bu çalışma, uygun şekilde entegre edilmiş blokzincir altyapısının daha adil, verimli ve güvenilir IoT veri ekosistemleri oluşturabileceğini ortaya koymaktadır.
  • Article
    Binary Tree Blockchain of Decomposed Transactions
    (Graz University of Technology, Institute of Information Systems and Computer Media (IICM), 2025) Culha, Davut
    Widespread adoption of blockchain technologies requires scalability. To achieve scalability, various methods are applied, including new consensus algorithms, directed acyclic graph solutions, sharding solutions, and off-chain solutions. Sharding solutions are particularly promising as they distribute workload across different parts of the blockchain network. Similarly, directed acyclic graphs use graph data structures to distribute workload effectively. In this work, a binary tree data structure is used to enhance blockchain scalability. Binary trees offer several advantages, such as the ability to address nodes with binary numbers, providing a straightforward and efficient method for identifying and locating nodes. Each node in the tree contains a block of transactions, which allows for transactions to be directed to specific paths within the tree. This directionality not only increases scalability by enabling parallel processing of transactions but also ensures that the blockchain can handle a higher volume of transactions without becoming congested. Moreover, transactions are decomposed into transaction elements, improving the immutability of the binary tree blockchain. This novel decomposition process helps to minimize the computational overhead required for calculating account balances, making the system more efficient. By breaking down transactions into their fundamental components, the system can process and verify transactions more rapidly and accurately. This approach effectively realizes implicit sharding using a binary tree structure, distributing the processing load more evenly and reducing bottlenecks. The proposed method is simulated to assess its performance. Experimental results demonstrate that the proposed method achieves a significantly higher transaction throughput of 32307 transactions per second. Furthermore, block generation times decrease as the system scales, with an average block generation time of 0.13 seconds, underscoring the efficiency of the binary tree blockchain structure.