Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Erdal Cayirci is active.

Publication


Featured researches published by Erdal Cayirci.


Wireless Networks | 2007

SENDROM: sensor networks for disaster relief operations management

Erdal Cayirci; Tolga Coplu

SENDROM is a new sensor network architecture to manage the rescue operations after large scale disasters. This architecture mainly consists of sensor nodes deployed prior to a disaster and central nodes that can query sensor nodes. Central nodes are stored nearby the emergency operation centers and airports before a disaster. Following a disaster rescue teams are assigned one mobile central node and guided to a region based on the data in the SENDROM database. This paper explains the SENDROM architecture as well as our new task and data dissemination, localization of a detected person, and end-to-end reliable event transfer schemes introduced for SENDROM. Then it evaluates the performance of these schemes analytically and through simulation.


IEEE Communications Letters | 2003

Data aggregation and dilution by modulus addressing in wireless sensor networks

Erdal Cayirci

DADMA is a distributed data aggregation and dilution technique for sensor networks where nodes aggregate/dilute sensed data by following the rules given in an SQL statement. Our test results show that DADMA reduces the number of transmitted packets 60% on the average.


winter simulation conference | 2013

Modeling and simulation as a cloud service: a survey

Erdal Cayirci

Modelling and simulation as a service (MSaaS) is defined, and the differences between MSaaS and Software as a Service are clarified. MSaaS architectures and deployment strategies are surveyed. The top threats to cloud computing and MSaaS, the other security challenges and technical requirements are explained. Accountability, risk and trust modelling are related to each other and also to security and privacy. Those notions and their relations are presented. MSaaS composition in multi-datacenter and/or multi-cloud scenarios is also elaborated on.


international conference on embedded wireless systems and networks | 2005

Power aware many to many routing in wireless sensor and actuator networks

Erdal Cayirci; Tolga Coplu; Ozlem Emiroglu

In this paper, a new power aware many-to-many routing protocol for wireless sensor and actuator networks is introduced. The protocol has two versions adapted for three cases. The first version is designed for networks where every node transmits at the same power level. The transmission power level may not be adjustable, or can be adjusted according to a deployment scenario and changed before or after the deployment. The second version is for the case where nodes can individually adjust the transmission power according to the channel conditions and communications distance.


intelligent sensors sensor networks and information processing conference | 2004

Distributed spatial data aggregation and dilution based on hashing and relational algebra in wireless sensor networks

Erdal Cayirci; Tolga Coplu

A data aggregation and dilution scheme is introduced for the wireless sensor network, which can be perceived as a distributed relational database. A new algorithm that can run on tiny sensor nodes to aggregate or dilute the sensed data packets is developed. Two location based hash functions are also introduced to determine how the sensed data can be grouped or which sensors should be excluded from a query. Analytical models are provided for the performance evaluation. The numerical results show that our scheme can reduce the number of transmitted packets 50% on average compared to the case where aggregation or dilution is not used.


international conference on cloud computing | 2009

Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges

Erdal Cayirci; Chunming Rong; Wim Huiskamp; Cor Verkoelen

Military/civilian education training and experimentation networks (ETEN) are an important application area for the cloud computing concept. However, major security challenges have to be overcome to realize an ETEN. These challenges can be categorized as security challenges typical to any cloud and multi-level security challenges specific to an ETEN environment. The cloud approach for ETEN is introduced and its security challenges are explained in this paper.


IEEE Communications Letters | 2009

A shadow zone aware routing protocol for acoustic underwater sensor networks

Son Thanh Nguyen; Erdal Cayirci; Liang Yan; Chunming Rong

Shadow zone and delay aware routing (SZODAR) scheme is a practical and distributed protocol that can find routes around shadow zones. In SZODAR, sensor nodes can raise or lower their acoustic transceivers to a depth such that shadow zones of the neighboring nodes are avoided. This paper presents the protocol working principle and preliminary calculations of the engineering parameters.


winter simulation conference | 2013

A joint trust and risk model for MSaaS mashups

Erdal Cayirci

Modeling and simulation as a service and its difference from software as a service is explained. The literature on trust and risk for cloud service mash-ups are surveyed. A joint trust and risk model is introduced for MSaaS federations. The model is based on historic data related not only security incidents but also performance records. Negative and positive performances are differentiated and the freshness of the historic data are taken into account in the model. A numerical analysis by using the model through Monte-Carlo simulation is also provided.


winter simulation conference | 2009

Multi-resolution federations in support of operational and higher level combined/joint computer assisted exercises

Erdal Cayirci

Multi-resolution military federations are still in their infancy. Their usefulness are often discussed and there is a confusion about the related taxonomy. In this paper, first the definitions for the field are clarified, and the latest developments are explained. Computer assisted exercise architectures and the place of constructive simulations in this architecture are also explained. Then the advantages of multi-resolution federations in support of computer assisted exercises are elaborated by using an example vignette.


military communications conference | 2006

A Mac Protocol for Tactical Underwater Surveillance Networks

Turgay Karlidere; Erdal Cayirci

We introduce power controlled and loosely synchronized (PCLS) MAC protocol for tactical underwater surveillance system (TUSS). PCLS protocol employs loosely synchronized listen-sleep schedules, and transmission power control. Shorter preamble signals are used instead of RTS/CTS handshake. These reduce the energy consumption and the link layer delay, and also make PCLS resilient against topology changes due to node failures and mobility. PCLS protocol is evaluated through the simulation of TUSS scenario where the mobile objects drift over the sea surface with respect to the reference point group mobility (RPGM) model. It is also compared with IEEE 802.11, B-MAC and LMAC

Collaboration


Dive into the Erdal Cayirci's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Liang Yan

University of Stavanger

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Gansen Zhao

Sun Yat-sen University

View shared research outputs
Top Co-Authors

Avatar

Tolga Coplu

Istanbul Technical University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge