Asaf Varol

Asaf Varol
Matepe University · Computer Engineering

PhD

About

108
Publications
92,789
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,219
Citations

Publications

Publications (108)
Article
Cloud computing technology has acquired a vast vogue in the business technology area over the years. It has offered huge services and features; however, many challenges affect enterprises to adopt cloud computing. The primary concerns are cost advantages and security risks. By conducting two types of surveys (interview, questionnaire), this rese...
Article
The tourism industry is one of the important revenue sectors in today’s world. Millions of visits are made monthly to different countries across the planet. Some countries host more tourists than others, depending on the availability of factors that would fascinate visitors. Tourism demand can be affected by different factors, which may include gov...
Conference Paper
Full-text available
Consumer reviews in the Airbnb marketplace are one of the key attributes to measure the quality of services and the main determinant of consumer rentals decisions. Such feedback can impact both a new and repeated consumer's choice decision. The way to manage poor reviews can help to save or damage the host's reputation. Sentiment analysis enables a...
Article
Modeling and forecasting of tourism data have received attention in the past decades. Turkey is one of the countries that benefit significantly from the tourism industry. Several time series models have been recommended to best describe tourist arrivals to Turkey. However, in the 21st century, the world experiences great uncertainty in most possibl...
Conference Paper
Full-text available
As automation is changing everything in today’s world, there is an urgent need for artificial intelligence, the basic component of today’s automation and innovation to have standards for software engineering for analysis and design before it is synthesized to avoid disaster. Artificial intelligence software can make development costs and time easie...
Conference Paper
Full-text available
Bitcoin, the most well-known of all the cryptocurrencies , have attracted a lot of attention thus far, and their prices have been quite volatile. While some research employ traditional statistical and econometric methods to discover the factors that drive Bitcoin prices, experimenting on the development of prediction models to be utilized as decisi...
Poster
Full-text available
Internet of Things (IoT) plays a vital role in the existing and future generation of information, communication and applications. The 7th EAI International Conference on IoT as a Service (IoTaaS) aims to bring researchers, academicians, students, practitioners and professionals from academia and industry interested in creating IoT-based services. T...
Poster
Full-text available
The conference’s objective is to provide an international forum where researchers can present existing, evolving, or novel ideas, share their views, foster discussions and future collaborations among different stakeholders. The IoTaaS is seeking original research and industrial papers discussing IoT to address problems from various areas such as tr...
Article
Full-text available
This study reviews crime scene investigation, collection of evidence and protecting evidence phases of digital forensic process based on the research in the literature. Using appropriate methods for collecting and protecting electronic evidence would contribute to digital forensics and information technology law. In order to have effective evidence...
Conference Paper
Full-text available
Sentiments are the emotions or opinions of an individual encapsulated within texts or images. These emotions play a vital role in the decision-making process for a business. A cloud service provider and consumer are bound together in a Service Level Agreement (SLA) in a cloud environment. SLA defines all the rules and regulations for both parties t...
Conference Paper
Full-text available
The Internet of Things (IoT) has revolutionized the human world by transforming ordinary everyday objects into smart devices. These autonomous devices have reshaped our lives. The emerging technology is expanding day-by-day with the increasing need for smart devices as so the issues are also increasing w.r.t security, data reliability, maintenance...
Conference Paper
Full-text available
Tourism is counted as one of the most sensitive sectors to crises such as the COVID-19 pandemic. By the first quarter of 2020, it brought the foreign visitors' travels to a sudden and unexpected halt. This has negatively affected the tourism sector. Due to the perishable nature of the tourism industry products, many researchers are calling for urge...
Conference Paper
Taking security measures against cyber-attacks has become a necessity for the whole world. Determining the most appropriate measures and their effective implementation form the basis of cyber security for all key institutions.This study, aims to demonstrate the appropriate analysis of cyber-attacks and analysis output models that facilitate fast an...
Article
The perishable nature of tourism products and services makes forecasting an important tool for tourism planning, especially in the current COVID-19 pandemic time. The forecast assists tourism organizations in decision-making regarding resource allocations to avoid shortcomings. This study is motivated by the need to model periodic time series with...
Conference Paper
Full-text available
Cloud Computing is one of the most emerging technologies that has transformed the macro world. The advent of cloud computing is not less than an evolution and miracle to the technology. It has made the on-demand availability of various scalable software resources possible over the internet. Although its extraordinary services and advantages like re...
Conference Paper
Data mining and regression techniques are important methods that we can use to predict students’ performance to inform decision making. This study uses five regression techniques to analyse students’ first-year cumulative grade point average (CGPA) and predict their final graduation CGPA. The data set used in this study is that of programming and s...
Conference Paper
Full-text available
Quality of Service (QoS) is a key factor for a viable Service Level Agreement (SLA) which ensures the formation of a reliable provider-consumer relationship in cloud computing. SLA ties up a service provider with a service consumer on agreed upon terms and conditions so that the provider’s promised services and the consumer’s requirements are fulfi...
Article
Full-text available
Interpreting a speech signal is quite challenging because it consists of different frequencies and features that vary according to emotions. Although different algorithms are being developed in the speech emotion recognition (SER) domain, the success rates vary according to the spoken languages, emotions, and databases. In this study, a new lightwe...
Article
Full-text available
When buying and selling cars, it can be a challenge to assign the correct price. Artificial neural networks, a branch of artificial intelligence, are frequently used for such calculations. In this study we designed two different artificial neural networks for car price forecasting and tested them using data from a car sales website. For data, a sof...
Article
This survey investigates the characteristic flow, heat transfer and chemical reaction of Weissenberg and Williamson over a stretching sheet with thermal radiation and viscous dissipation. The nonlinear differential equation of the thermal boundary layer, which covers the physical problem, is derived and used to transform its equations into a system...
Article
Full-text available
Ülkelerin birçoğu, doğa tarafından üretilen afetlerle karşı karşıya kalabilmektedir. Deprem, sel, heyelan, kasırga, kuraklık, yangın vb. olaylar en fazla karşılaşılan doğal afetler arasında yer almaktadır. Diğer taraftan insanların sebebiyet verdiği afetler de söz konusu olabilmektedir. Örneğin Amerika’da 9/11 diye adlandırılan ve 2001 yılında gerç...
Conference Paper
E-mail is a very effective method for exchanging digital messages using computer-based devices. Since the beginning of 2015, statistics estimate that, on average, there have been around 205 billion e-mails sent per day. Unfortunately, e-mail has been used as a carrier for malicious and spam contents as well as a medium of various criminal activitie...
Conference Paper
Full-text available
A good understanding of the computer basic block system is effective in students' understanding of computer usage and programming. This information is also necessary for choosing the right computer when purchasing a computer. Otherwise, the user may spend unnecessary money on a technology that he will not use. In this study, the basic components an...
Conference Paper
Most of the home automation wireless technologies on the internet of things are based on ZigBee, Z-Wave, Wi-Fi, and Bluetooth wireless technologies. While these solutions are good enough, users of smart homes are facing challenges of selecting the best technology. This paper compares the performance of ZigBee, Z-Wave Wi-Fi and Bluetooth technologie...
Conference Paper
Full-text available
This paper presents a complete overview of the storage landscape and cloud computing. It explains the major advantages and disadvantages of storing data online using cloud storage, how this works, and the basic concepts involved in cloud computing, while also demonstrating the layers of its architecture with reference to the Infrastructure as a Ser...
Article
Full-text available
Ülkelerin birçoğu, doğa tarafından üretilen afetlerle karşı karşıya kalabilmektedir. Deprem, sel, heyelan, kasırga, kuraklık, yangın vb. olaylar en fazla karşılaşılan doğal afetler arasında yer almaktadır. Diğer taraftan insanların sebebiyet verdiği afetler de söz konusu olabilmektedir. Örneğin Amerika’da 9/11 diye adlandırılan ve 2001 yılında gerç...
Article
Full-text available
Protecting the privacy of the information on mobile devices is highly important, both at present and also in the future, due to the significant role that mobile devices play in keeping and storing our sensitive data and information. This paper sheds light on the different and various usage of mobile phones in our daily life, as well as teaching the...
Article
Full-text available
p class="0abstract">Thanks to rapid development of information technology there are many new tools that can be used for teaching and learning environment. In the long past, we had met classical classrooms where teachers had to use chalk to write done everything on the blackboard. Later, we have met new tools such as projection, desktop computers, s...
Conference Paper
Full-text available
Market monopolies are one of the major threats for educational sector. To abide from market monopolies and employ internet resources, open source learning management systems are determining the technical factors in providing ideal solution for educational sector. Higher Education institution face defies to make suitable selection which fit to their...
Conference Paper
Full-text available
Abstract— In the first part of this study, the basic concepts of forensic phonetics such as voice, speech, and voice track are explained. In the second part; visual and auditory montage detection methods used in forensic phonetics, one of the lower branches of digital forensics, were examined. The most frequently used visual and auditory analysis m...
Conference Paper
Voice over Internet Protocol (VoIP) is one of the highly used applications for voice and data communication purposes. The convenience of using VoIP applications, its acceptable quality, and the relatively low cost of usage have made it a potential replacement for landline and cellular communication. Along with these advantages, the vulnerability of...
Conference Paper
Mobile attack approaches can be categorized as Application Based Attacks and Frequency Based Attacks. Application based attacks are reviewed extensively in the literature. However, frequency based attacks to mobile phones are not experimented in detail. In this work, we have experimentally succeeded to attack an Android smartphone using a simple so...
Conference Paper
Digital evidence plays a vital role in determining legal case admissibility in electronic- and cyber-oriented crimes. Considering the complicated level of the Internet of Things (IoT) technology, performing the needed forensic investigation will be definitely faced by a number of challenges and obstacles, especially in digital evidence acquisition...
Article
Full-text available
Biometrics is the science that analyzes biological data and also the technology that measures biological data. Biometric systems make identification or identity verification by using measurable, distinctive physical and behavioral properties of humans. The most widely used biometrics techniques rely on finger prints, palm, hand geometry, iris, reti...
Conference Paper
Full-text available
Trabzon–Tabriz Transit Commerce Road has been active since ancient times. One of the most important point of view of this route is the Trabzon port. This port is in a strategic position among all other ports in Black Sea. Turkey has invested in developing the infrastructure of this route both during Ottoman and Republican times in order to gain adv...
Conference Paper
With an internet connection, criminals can now steal millions, buy and sell drugs, prey upon children from practically any location: their home, the public library, a coffee shop, the bus, a doctor's office, etc. In effect, the industry standard GPS electronic monitoring device alone no longer provides the information needed to detect unusual or de...
Conference Paper
Full-text available
Türkiye Bilimsel ve Teknik Araştırma Kurumu (TUBITAK), 2003 yılında Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü'nü, dışa bağımlılıktan kurtulmak için bir milli işletim sisteminin yapılabilirliğini araştırmak üzere görevlendirmiştir. Bu proje Ulusal Dağıtım diye adlandırılmış ve yapılan çalışmalar sonucu 2005 yılında bu enstitü Pardus 1.0 ad...
Article
Full-text available
In 2003, the Scientific and Technological Research Council of Turkey (TUBITAK) commissioned the National Research Institute of Electronics and Cryptology (UEKAE) in order to research feasibility of a national operating system for dependence from foreign countries. This project is called as National Distribution (Ulusal Dağıtım). In 2005, the projec...
Conference Paper
As the number of social media users increases for platforms such as Twitter, Facebook, and Instagram, so does the number of bot or spam accounts on these platforms. Typically, these bots or spam accounts are automated programmatically using the social media site's API and attempt to convey or spread a particular message. Some bots are designed for...
Conference Paper
Full-text available
The recent development in Information Communication Technology (ICT) has made changes in every aspect in our life. These changes are clearly reflected in cyberspace-related areas. The positive influence of cyberspace on knowledge, trade and business, and communication is undoubtable. However, there is a dark side of cyberspace deteriorates its peac...
Conference Paper
Full-text available
Biometrics is a term used to define an individual's DNA, hand geometry, face, etc. or behavioral characteristics, such as hand signature, voice tone, keystrokes and so on. For that reason, these biological characteristics are unique for every individual. In many situations, face recognition related technologies are becoming more popular among biome...
Article
Full-text available
In this paper, a novel nature inspired algorithm for continuous optimization of numerical functions has been proposed. The algorithm is inspired from the circular wave created from a water drop when it falls to a still water. Algorithm itself has been developed with the purpose of distributed working thus kept as embarrassingly parallel as possible...
Article
Full-text available
Many mobile device makers now incorporate biometric security features into their products. And, some device manufacturers now allow application developers to use these features via their software development kits (SDKs). In this study, we utilize fingerprint scanning and recognition technology, a popular biometric security feature, to develop a web...
Article
Full-text available
To store data and information on digital media and be accessible via the internet, makes the life easy. Lots of user save or share personal information on digital platforms which are defined as local or public source. Banks, government agencies, commercial organizations also store and operate institutional customers' information on digital systems....
Article
Full-text available
In this paper, we describe the process by which Sam Houston State University, United States, (SHSU) and Firat University (FU), Turkey developed collaborative undergraduate degree programs in Software Engineering and Digital Forensics Engineering. The paper explores the administrative, curricular, accreditation, and financial issues that needed to b...
Conference Paper
Full-text available
Diabetes is a disease that requires continuous monitoring and control. Patients and their families must rebuild their life according to the diabetes. In this study patient follow-up, control and routine medical examination have been actualized by an expert mobile system. In this study, the data about diabetes and its control, treatment and follow u...
Conference Paper
Full-text available
Since students of online education do not meet face to face in a classroom environment, students get engaged to the classes via third party content or learning management tools. It is evident that young people spend most of their time on Social Networking websites when they are connected to internet. These sites provide free of speech environment w...
Conference Paper
Full-text available
The Electronic commerce (e-commerce) which is the product of developments in the internet technology, It has been the place to commerce of the internet. In recent years, e-commerce with the significant development has shaped the economy of the 21st century. The development in e-commerce is brought together some questions, security issues and necess...
Article
Full-text available
zetçe Parmak uzunluklarının kişisel davranışlara ve kişilerin yatkın olabileceği mesleki alanlar üzerindeki etkisi, gelişmekte olan bir araştırma çalışmasıdır. Bu deneysel çalışmada, 124 deneğin (70 kadın-54 erkek) sol ve sağ avuç içlerinin sayısal resimleri çekilmiştir. Analiz sonucunda p<0,05 dikkate alınarak, sağ el ile sayısal ve eşit ağırlık p...
Conference Paper
Understanding and analyzing the difference between transformational and transactional leadership is crucial in getting the whole concept of leadership theories in organizations. Transformational leadership is the most popular theory which has evolved from the elements of leadership such as traits, situational and transactional leadership that focus...
Conference Paper
Full-text available
ZET: Biyometrik sistemler, fiziksel özellikleri kullanılarak kiĢilerin elektronik ortamda tanınmasıdır. Biyometrik sistemler, bireylerden alınan örnekler ve uygulanacak algoritmalar ile birlikte bir depolama aygıtına saklanması sonrasında, verilerin eĢleĢtirme prensibi ile çalıĢmaktadır. GeliĢmiĢ ülkelerin birçoğu biyometrik sistemlerden yararlanar...
Conference Paper
Full-text available
In this study virtual laboratory systems are investigated and effects of virtual laboratory systems on the robotics course that is worked at the Technology Faculties are discussed. For the application a SCORBOT-ER manipulation is used because this robot is expensive and it is very sensitive. The general purpose is become useful about effective lear...
Conference Paper
Full-text available
In this study, first the system of promoting into associate professor degree is introduced, and some problems related to establishing of the juries of the candidates are discussed. Second, new database management software is created to automate the selection of jury process. The system holds keywords for linking the research fields of the juries an...
Article
In this paper, it is proposed a new methodology based on invariant moments and multi-class support vector machine (MCSVM) for classification of human parasite eggs in microscopic images. The MCSVM is one of the most used classifiers but it has not used for classification of human parasite eggs to date. This method composes four stages. These are pr...
Article
Full-text available
A numerical study has been performed to obtain combined convection field in an inclined porous lid-driven enclosures heated from one wall with a non-uniformly heater. The lid moves at constant speed and temperature. Darcy-Brinkman-Forchheimer model was adopted to write governing equations and they solved using finite volume method. A detailed param...
Article
Steady state two-dimensional natural convection heat transfer was performed in triangular enclosures filled with porous media at different boundary conditions. Six different cases were tested based on all possibilities of temperature boundary conditions on vertical, bottom, and inclined walls of enclosure. Solutions of governing equations and linea...
Article
A two-dimensional solution of natural convection in solid adiabatic thin fin attached to porous right triangular enclosures has been analyzed numerically. The vertical wall of the enclosure is insulated while the bottom and the inclined walls are isothermal. The temperature of the bottom wall is higher than the temperature of the inclined wall. Gov...
Article
This paper presents a comparative study of implementation of feature extraction and classification algorithms based on discrete wavelet decompositions and Adaptive Network Based Fuzzy Inference System (ANFIS) for digital modulation recognition. Here, in first stage, 20 different feature extraction methods are generated by separately using Daubechie...
Conference Paper
Free convection in a porous media filled triangular enclosure has been investigated to obtain the effects of different boundary conditions using a numerical technique. Two cases have been investigated: In the first case, bottom wall is heated while vertical wall is cooled. In the second case, the bottom wall is cooled and vertical wall is heated. I...
Article
Full-text available
Millions of people in the world suffer from urinary incontinence and overactive bladder with the major causes for the symptoms being stress, urge, overflow and functional incontinence. For a more effective treatment of these ailments, a detailed understanding of the urinary flow dynamics is required. This challenging task is not easy to achieve due...
Article
Steady-state free convection heat transfer in a right-angle triangular enclosure, whose vertical wall insulated and inclined and bottom walls are differentially heated, is performed in this study. The governing equations are obtained using Darcy model. In this study, the governing equations were solved by finite difference method and solution of al...

Network

Cited By