Bedir TekinerdoganWageningen University & Research | WUR · Information Technology
Bedir Tekinerdogan
Prof.Dr.
About
387
Publications
261,894
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,475
Citations
Introduction
Prof. Tekinerdogan is a full professor and chair of the Information Technology group at Wageningen University, The Netherlands. He has more than 25 years of experience in software/systems engineering and is the author of more than 400 peer-reviewed papers. He has ample experience in systems architecting, product line engineering, cyber-physical systems, model-driven software engineering, systems engineering, system of systems engineering, data science, and artificial intelligence.
Additional affiliations
August 1995 - August 2008
January 2015 - present
September 2008 - December 2014
Education
September 1995 - March 2000
August 1988 - August 1993
Publications
Publications (387)
Low-Code Development Platforms (LCDPs) empower users to create and deploy custom software with little to no programming. These platforms streamline development, offering benefits like faster time-to-market, reduced technical barriers, and broader participation in software creation, even for those without traditional coding skills. This study explor...
Low-Code Development Platforms (LCDPs) empower users to create and deploy custom software with little to no programming. These platforms streamline development, offering benefits like faster time-to-market, reduced technical barriers, and broader participation in software creation, even for those without traditional coding skills. This study explor...
In the rapidly evolving landscape of cyber threats, effective defense strategies are crucial for safeguarding sensitive information and critical systems. Deep learning methods, notably the Transformer architecture, have shown immense potential in addressing cybersecurity challenges. However, customizing, and adapting Transformer architectures for c...
The notion of the smart city involves embedding Industry 4.0 technologies to improve the lives of inhabitants in urban environments. Within this context, smart city data layers (SCDLs) concern the integration of extra tiers of information for the purposes of improving communication potential. Under the Industry 4.0 technology grouping, advanced com...
A safety-critical system is a system in which the software malfunctioning could result in death, injury, or damage to the environment. Addressing safety concerns early on at the architecture design level is critical to guide the subsequent life cycle activities to ensure that the eventual system is reliable. A fundamental approach to address safety...
Drinking water utilities face significant challenges in ensuring a reliable and safe supply of water in the face of increasing water demands and limited resources. Aging supply networks and distribution networks often result in water leakages, further exacerbating the situation, particularly in urban areas. The management of water infrastructure is...
The large scale adoption of wind turbines and solar panels in the Netherlands places new demands on the medium voltage power grid. For example, highly varying loads can cause failures in certain cables. Cable joints are natural weak spots prone to faults due to varying currents, creating downtime challenges for public utility companies. Predictive...
The energy system has transformed into a huge network of interconnected digital assets generating big data, thanks to the digitalisa-tion trend and large-scale integration of small-scale distributed energy resources, such as wind turbines, solar photovoltaics systems and electric vehicles. On the one hand, these renewable energy technologies are in...
Microservice architecture (MSA) is an architectural style that is designed to support the modular development of software systems within a particular domain. It is characterized by the use of small, independently deployable services, which can be developed and deployed autonomously. The benefits of MSA include improved scalability, fault‐tolerance,...
This technical report is a reflection on the transformative impact of rising levels of abstractions and automation in the world of software programming. How will the increasing level of abstraction and automation impact the skills that programmers need to thrive? As automation takes over routine programming tasks, how will it affect the demand for...
Just-in-time defect prediction (JITDP) research is increasingly focused on program changes instead of complete program modules within the context of continuous integration and continuous testing paradigm. Traditional machine learning-based defect prediction models have been built since the early 2000s, and recently, deep learning-based models have...
As a concept that is somewhat under emergence, the notion of the Metaverse varies across different academic articles. Yet there is a shared view on the benefits to its ongoing implementation, particularly for digital art, where the technology can provide a new metric for artists to showcase and sell their artwork to a global audience with minimal b...
This paper presents a conceptual framework that reflects the current state of thinking on tokenizing circularity in agri-food systems. The framework is built upon classifications of tokens and the key principles of circular economy and shows how tokenization can support circularity in agri-food systems through the flows of information and flows of...
The agricultural domain is experiencing an increasing use of digital twin technologies in greenhouse horticulture for the betterment of monitoring production. Research in this domain has started leading towards more advanced ways of visually interacting with these digital twins, and this could be by means of immersive technologies (such as virtual...
The purpose of this study is to examine the reported architectural approaches and governance mechanisms for digital business ecosystems (DBEs). A systematic literature review is employed, in which 92 relevant articles are selected for analysis. This study provides an overview of articles, reports the formal modeling notations, modeling viewpoints,...
The integration of Internet of Things (IoT) networks into smart cities is crucial to enhance the efficiency of city operations and services. Designing a smart city architecture that can adapt to the constantly changing functional and quality requirements of city services is essential. However, critical decisions must be made during this process, su...
The Publisher regrets that in the above published article, the heading ‘Machine Learning and Traditional Statistical Methods’ was repeated in the section ‘Machine Learning Capabilities’. The second occurrence of the heading, ‘Machine Learning and Traditional Statistical Methods’, should have read, ‘Machine Learning and Traditional Domain-Specific M...
Context
Digital Twin-based predictive maintenance systems are frequently integrated into complex systems. The success of the integration depends on the design of the system. A Reference Architecture can be used as a blueprint to design Application Architectures rapidly and consistently for various application domains, resulting in a reduced time-to...
Innovations in digital technologies, especially in artificial intelligence (AI), promise substantial benefits to the agricultural sector. Agriculture is increasingly expected to ensure food security and food safety while at the same time considering the environmental aspects. AI in the agricultural sector offers the potential to feed a continuously...
Malicious software forms a threat to many software‐intensive systems and as such several malware detection approaches have been introduced, often based on sequential data analysis. Long short‐term memory (LSTM) is an artificial recurrent neural network (RNN) architecture that is effective for sequential data analysis, however, no study has yet anal...
A safety-critical system is a system in which the software malfunctioning could result in death, injury, or damage to the environment. Addressing safety concerns early on at the architecture design level is critical to guide the subsequent life cycle activities to ensure that the eventual system is reliable. A fundamental approach to address safety...
A digital twin is a digital replica of a physical entity that can be remotely controlled, which allows for sophisticated control for a variety of reasons. Digital twins are made possible using various technologies such as Internet of Things, sensor technology, artificial intelligence, data science, and machine learning. With this, it represents a n...
Currently, not all children that need speech therapy have access to a therapist. With the current international shortage of speech–language pathologists (SLPs), there is a demand for online tools to support SLPs with their daily tasks. Several online speech therapy (OST) systems have been designed and proposed in the literature; however, the implem...
Imbalanced datasets affect the performance of machine learning algorithms adversely. To cope with this problem, several resampling methods have been developed recently. In this article, we present a case study approach for investigating the effects of data balancing approaches. The case study concerns the discrimination between growth hormone treat...
The invention of the computer mid-last century initiated the third industrial revolution or digital revolution, which started the digitalization of society, a society in which documents were digitized, and communication became digital. Digitalization defines the adoption of digital technology through replacing non-digital or manual processes with d...
Nowadays, we produce and consume a large volume of products giving insufficient regard to what happens to the products before, during and after use or consumption. Globally roughly one-third of food produced is lost or wasted each year. As the world population and per-capita income increase, the problem gets worse. This lifestyle based on “linear”...
Context: Automated software defect prediction (SDP) methods are increasingly applied, often with the use of machine learning (ML) techniques. Yet, the existing ML-based approaches require manually extracted features, which are cumbersome, time consuming and hardly capture the semantic information reported in bug reporting tools. Deep learning (DL)...
With the current international shortage of speech-language pathologists (SLPs), there is a demand for online tools to support SLPs with their daily tasks. For this purpose, several online speech therapy systems (OSTSs) have been proposed and discussed in the literature. However, developing these OSTSs is not trivial since it involves the considerat...
Context
Automated software defect prediction (SDP) methods are increasingly applied, often with the use of machine learning (ML) techniques. Yet, the existing ML-based approaches require manually extracted features, which are cumbersome, time consuming and hardly capture the semantic information reported in bug reporting tools. Deep learning (DL) t...
The introduction of electronic health records (EHR) has created new opportunities for efficient patient data management. For example, preventative medical practice, rather than reactive, is possible through the integration of machine learning to mine digital patient record datasets. Furthermore, within the wider smart cities’ infrastructure, EHR ha...
Data currently generated in the field of nutrition is becoming increasingly complex and high-dimensional, bringing with it new methods of data analysis. The characteristics of machine learning make it suitable for such analysis and thus lends itself as an alternative tool to deal with data of this nature. Machine learning has already been applied i...
Recently pipelines of machine learning-based classification models have become important to codify, orchestrate, and automate the workflow to produce an effective machine learning model. In this article, we propose a framework that combines feature engineering techniques such as data imputation, transformation, and class balancing to compare the pe...
Digital Twins can be considered as a new phase in smart and data-driven greenhouse horticulture. A Digital Twin is a digital equivalent to a real-life object of which it mirrors its behaviour and states over its lifetime in a virtual space. Research indicates that they can substantially enhance productivity and sustainability, and are able to deal...
Context
: Predictive maintenance is a technique for creating a more sustainable, safe, and profitable industry. One of the key challenges for creating predictive maintenance systems is the lack of failure data, as the machine is frequently repaired before failure. Digital Twins provide a real-time representation of the physical machine and generate...
Microservice architecture (MSA) is an architectural style for distributed software systems, which promotes the use of fine-grained services with their own lifecycles. Several benefits of MSA have been reported in the literature, including increased modularity, flexible configuration, easier development, easier maintenance, and increased productivit...
High-frequency financial market data is conceptually distinct from high energy physics (HEP) data. Market data is a time series generated by market participants, while HEP data is a set of independent events generated by collisions between particles. However, there are similarities within the data structure and required tools for data analysis, and...
Phishing attacks aim to steal confidential information using sophisticated methods, techniques, and tools such as phishing through content injection, social engineering, online social networks, and mobile applications. To avoid and mitigate the risks of these attacks, several phishing detection approaches were developed, among which deep learning a...
The manual prediction of plant species and plant diseases is expensive, time-consuming, and requires expertise that is not always available. Automated approaches, including machine learning and deep learning, are increasingly being applied to surmount these challenges. For this, accurate models are needed to provide reliable predictions and guide t...
p>Critical infrastructure (CI) is an integrated set of systems and assets that are essential to ensure the functioning of a nation, including its economy, the public’s health and/or safety. Hence, protecting critical infrastructures (CI) is vital because of the potential severe consequences that may emerge at the national level. Many CIs are now co...
With the need for increased modularity and flexible configuration of software modules, microservice architecture (MSA) has gained interest and momentum in the last 7 years. As a result, MSA has been widely addressed in the literature and discussed from various perspectives. In addition, several vendors have provided their specific solutions in the...
This article focuses on insider-threat detection within healthcare infrastructures. There are inherent dangers to digitising patient records and considering the sensitive nature of the data, EHR is equally at risk of both external threats and insider attacks, but security applications are predominantly facing the outer boundary of the network. In t...
With the rapid developments in ICT, the current agriculture businesses have become increasingly data-driven and are supported by advanced data analytics techniques. In this context, several studies have investigated the adopted data analytics platforms in the agricultural sector. However, the main characteristics and overall findings on these platf...
Microservice architecture (MSA) is a paradigm to design and develop scalable distributed applications using loosely coupled, highly cohesive components that can be deployed independently. The applications that realize the MSA may contain thousands of services that together form the overall system. Microservices interact with each other by producing...
For a healthy production line, it is essential to ensure a low failure rate of products. Product quality in production lines can be inspected using several techniques at the end of a production process, including a manual inspection. Different methods are applied to inspect the product quality at the end of the production process and sometimes duri...