Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Muhammet Baykara is active.

Publication


Featured researches published by Muhammet Baykara.


international conference on electronics computer and computation | 2013

Real time face recognition and tracking system

Muhammet Baykara; Resul Das

Nowadays that security comes into more prominence every day, it is necessary for people to keep more passwords in their mind and carry more cards with themselves. Such implementations however, are becoming less secure and practical, thus leading to an increasing interest in techniques related to biometrics systems. Biometrics systems are the systems which store physical properties of people in electronic environment and enable them to be recognized by the stored electronic information when needed. Biometrics is the identification of human. It works on the principle of identification of physical properties of a person which he or she cannot alter, are distinctive from others, can be used for identification, and are in his or her possession only. Extensive studies are conducted on biometrics techniques such as fingerprint, hand, face, iris, retina and voice recognition. Some systems have been developed, tested, and results have been obtained. Face recognition systems are among the most important subjects in biometrics systems. These systems, which are very important for security in particular, have been widely used and developed in many countries. This study aims to achieve face recognition successfully by detecting human face in real time, based on Principal Component Analysis (PCA) algorithm and comparing the result with pre-recorded face samples.


international conference on electronics computer and computation | 2013

A steganography application for secure data communication

Muhammet Baykara; Resul Das

Information security is the process of protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. Nowadays, apart from the military and institutional information security, individual information security is very important. If individual information security is ignored, it can cause intangible damage and monetary loss. In this study, a steganography application was developed to increase personal information security. This application is intended to provide a more secure way of communication for emails which play an important role in personal data transfer. Thus, Steganography, which is one of the communication hiding techniques, is used. And also existing steganography methods are examined and a new application has been developed to be used for personal information security. Finally, this application was applied to an electronic mail communication.


IOP Conference Series: Materials Science and Engineering | 2016

Information security threats and an easy-to-implement attack detection framework for wireless sensor network-based smart grid applications

Gurkan Tuna; H Örenbaş; Resul Das; D Kogias; Muhammet Baykara

Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.


IOP Conference Series: Materials Science and Engineering | 2016

A secure and easy-to-implement web-based communication framework for caregiving robot teams

Gurkan Tuna; Resul Das; A Tuna; H Örenbaş; Muhammet Baykara; K Gülez

In recent years, robots have started to become more commonplace in our lives, from factory floors to museums, festivals and shows. They have started to change how we work and play. With an increase in the population of the elderly, they have also been started to be used for caregiving services, and hence many countries have been investing in the robot development. The advancements in robotics and wireless communications has led to the emergence of autonomous caregiving robot teams which cooperate to accomplish a set of tasks assigned by human operators. Although wireless communications and devices are flexible and convenient, they are vulnerable to many risks compared to traditional wired networks. Since robots with wireless communication capability transmit all data types, including sensory, coordination, and control, through radio frequencies, they are open to intruders and attackers unless protected and their openness may lead to many security issues such as data theft, passive listening, and service interruption. In this paper, a secure web-based communication framework is proposed to address potential security threats due to wireless communication in robot-robot and human-robot interaction. The proposed framework is simple and practical, and can be used by caregiving robot teams in the exchange of sensory data as well as coordination and control data.


workshop on information security applications | 2018

A novel honeypot based security approach for real-time intrusion detection and prevention systems

Muhammet Baykara; Resul Das

Abstract In the digitalized modern world in parallel to the new technological developments, information security has become the highest priority in the individual and institutional sense. In order to ensure the security of information systems, various systems are used techniques and technologies, including encryption, authorization, firewall, honeypot based systems. In this study, a honeypot based approach for intrusion detection/prevention systems (ID/PS) is proposed. The developed honeypot server application is combined with IDSs to analyze data in real-time and to operate effectively. Moreover, by associating the advantages of low and high-interaction honeypots, a superior hybrid honeypot system is performed. Therefore, in order to reduce the cost of configuration, maintenance, and management, after viewing the usage of honeypots on corporate networks, virtualization technologies are used. The developed system is a honeypot based intrusion detection and prevention system (IDPS) type and it is able to show the network traffic on servers visually in real-time animation. Thereby, it provides system information easily. Finally, the developed system can detect zero-day attack due to the configuration of intrusion detection, which makes it superior in performance compared to other IDSs. This system also helps in reducing the false positive level in IDSs.


2017 International Conference on Computer Science and Engineering (UBMK) | 2017

Augmented reality based mobile learning system design in preschool education

Muhammet Baykara; Ugur Gurturk; Bedirhan Atasoy; Ibrahim Percin

With the development of computers, the Internet and mobile technologies, different needs have emerged for people and different solutions have been discovered to meet these needs. One of the critical areas which are considered as the main factor in creating the tomorrow of human beings where a careful study should be done is the education and teaching. Many technologies are being used and various methods are being tried to develop and make the field of education and training more productive. Among these methods, the use of Augmented Reality (AR) technology is emerging in a wide range and scope with advancing technology and it is becoming widespread. In AR technology, the message and information to be given are visualized by visual and auditory methods (3D). In this study, a mobile-based augmented reality application was implemented for pre-school education. In the study, animals and plants were visualized in both English and Turkish as 3D, and at the same time, animals were presented with 3D visualization. In addition to providing audiovisual and visual material in pre-school education, the study will assist in children development and accelerate the learning process.


2017 International Conference on Computer Science and Engineering (UBMK) | 2017

Classification of social media shares using sentiment analysis

Muhammet Baykara; Ugur Gurturk

The use of social media is increasing rapidly today. With this increase, there is a lot of meaningful and meaningless data in social media environments. Parallel to this data formation, new working areas have also been formed. Sentiment analysis is an important area of study for generating meaningful information from this large data set. The sentiment analysis study, objectively indicates whether a phrase is positive, neutral or negative. That is, it is the process of determining whether the content is positive, negative or neutral. In this study, the analysis of the shares belonging to a certain Twitter user was performed by sentiment analysis method. Bayes algorithm is used in the analysis phase. Moreover, classification of users categorization (news, politics, culture) according to their content has been successfully accomplished.


2017 International Conference on Computer Science and Engineering (UBMK) | 2017

NFC based smart mobile attendance system

Muhammet Baykara; Ugur Gurturk; Ertugrul Karakaya

In todays rapidly evolving world of information and technology, software that tries to respond to growing demands is used in many industries. Everything can be made easier and faster with mobile platforms and smart PCs that almost everyone now has. Different types of technology can be managed and used, in various area such as shopping, banking, education. In this study, a mobile software was developed which enables to report the signature system that applied in educational institutions as a digital system with minimum error rate. Thanks to the intelligent attendance system developed using NFC technology, NFC tags of users can be used to track their participation according to their location and time of interaction successfully.


2017 International Artificial Intelligence and Data Processing Symposium (IDAP) | 2017

Sosyal ağ analizi ve veri görselleştirme araçlarinin İncelenmesi ve uygulamali karşilaştirilmasi

Yücel Bürhan; Muhammet Baykara; Resul Das

Social network analysis has become an important issue in recent years because of the development and use of social networks widespread. Almost any kind of data can be easily obtained as valuable information about actors from these data. In this study, general information about the most used social network analysis and visualization tools are given. The author-subject network that analyzed with the help of link estimation methods, the author-writer network showing the links between co-authors is drawn and displayed visually through four different social network analysis and visualization tools.


2018 6th International Symposium on Digital Forensic and Security (ISDFS) | 2018

A review of cloned mobile malware applications for android devices

Muhammet Baykara; Eren Colak

Collaboration


Dive into the Muhammet Baykara's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

H Örenbaş

Yıldız Technical University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

K Gülez

Yıldız Technical University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge