Bedir Tekinerdogan

Bedir Tekinerdogan
Wageningen University & Research | WUR · Information Technology

Prof.Dr.

About

325
Publications
167,734
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,697
Citations
Citations since 2016
172 Research Items
2302 Citations
20162017201820192020202120220200400600800
20162017201820192020202120220200400600800
20162017201820192020202120220200400600800
20162017201820192020202120220200400600800
Introduction
Prof. Tekinerdogan is a full professor and chair of the Information Technology group at Wageningen University, The Netherlands. He has more than 25 years of experience in software/systems engineering and is the author of more than 400 peer-reviewed papers. He has ample experience in systems architecting, product line engineering, cyber-physical systems, model-driven software engineering, systems engineering, system of systems engineering, data science, and artificial intelligence.
Additional affiliations
January 2015 - present
Wageningen University & Research
Position
  • Chairholder/Professor
September 2008 - December 2014
Bilkent University
Position
  • Faculty Professor
August 1995 - August 2008
University of Twente
Position
  • Faculty Professor
Education
September 1995 - March 2000
University of Twente
Field of study
  • Computer Science - Software Engineering
August 1988 - August 1993
University of Twente
Field of study
  • Computer Science

Publications

Publications (325)
Article
Imbalanced datasets affect the performance of machine learning algorithms adversely. To cope with this problem, several resampling methods have been developed recently. In this article, we present a case study approach for investigating the effects of data balancing approaches. The case study concerns the discrimination between growth hormone treat...
Conference Paper
Full-text available
The invention of the computer mid-last century initiated the third industrial revolution or digital revolution, which started the digitalization of society, a society in which documents were digitized, and communication became digital. Digitalization defines the adoption of digital technology through replacing non-digital or manual processes with d...
Article
Full-text available
Nowadays, we produce and consume a large volume of products giving insufficient regard to what happens to the products before, during and after use or consumption. Globally roughly one-third of food produced is lost or wasted each year. As the world population and per-capita income increase, the problem gets worse. This lifestyle based on “linear”...
Preprint
Full-text available
Context: Automated software defect prediction (SDP) methods are increasingly applied, often with the use of machine learning (ML) techniques. Yet, the existing ML-based approaches require manually extracted features, which are cumbersome, time consuming and hardly capture the semantic information reported in bug reporting tools. Deep learning (DL)...
Article
Full-text available
With the current international shortage of speech-language pathologists (SLPs), there is a demand for online tools to support SLPs with their daily tasks. For this purpose, several online speech therapy systems (OSTSs) have been proposed and discussed in the literature. However, developing these OSTSs is not trivial since it involves the considerat...
Article
Context Automated software defect prediction (SDP) methods are increasingly applied, often with the use of machine learning (ML) techniques. Yet, the existing ML-based approaches require manually extracted features, which are cumbersome, time consuming and hardly capture the semantic information reported in bug reporting tools. Deep learning (DL) t...
Article
Full-text available
The introduction of electronic health records (EHR) has created new opportunities for efficient patient data management. For example, preventative medical practice, rather than reactive, is possible through the integration of machine learning to mine digital patient record datasets. Furthermore, within the wider smart cities’ infrastructure, EHR ha...
Article
Full-text available
Data currently generated in the field of nutrition is becoming increasingly complex and high-dimensional, bringing with it new methods of data analysis. The characteristics of machine learning make it suitable for such analysis and thus lends itself as an alternative tool to deal with data of this nature. Machine learning has already been applied i...
Article
Recently pipelines of machine learning-based classification models have become important to codify, orchestrate, and automate the workflow to produce an effective machine learning model. In this article, we propose a framework that combines feature engineering techniques such as data imputation, transformation, and class balancing to compare the pe...
Article
Full-text available
Digital Twins can be considered as a new phase in smart and data-driven greenhouse horticulture. A Digital Twin is a digital equivalent to a real-life object of which it mirrors its behaviour and states over its lifetime in a virtual space. Research indicates that they can substantially enhance productivity and sustainability, and are able to deal...
Article
Full-text available
Context : Predictive maintenance is a technique for creating a more sustainable, safe, and profitable industry. One of the key challenges for creating predictive maintenance systems is the lack of failure data, as the machine is frequently repaired before failure. Digital Twins provide a real-time representation of the physical machine and generate...
Article
Full-text available
Microservice architecture (MSA) is an architectural style for distributed software systems, which promotes the use of fine-grained services with their own lifecycles. Several benefits of MSA have been reported in the literature, including increased modularity, flexible configuration, easier development, easier maintenance, and increased productivit...
Article
Full-text available
Phishing attacks aim to steal confidential information using sophisticated methods, techniques, and tools such as phishing through content injection, social engineering, online social networks, and mobile applications. To avoid and mitigate the risks of these attacks, several phishing detection approaches were developed, among which deep learning a...
Article
The manual prediction of plant species and plant diseases is expensive, time-consuming, and requires expertise that is not always available. Automated approaches, including machine learning and deep learning, are increasingly being applied to surmount these challenges. For this, accurate models are needed to provide reliable predictions and guide t...
Article
Full-text available
With the need for increased modularity and flexible configuration of software modules, microservice architecture (MSA) has gained interest and momentum in the last 7 years. As a result, MSA has been widely addressed in the literature and discussed from various perspectives. In addition, several vendors have provided their specific solutions in the...
Preprint
This article focuses on insider-threat detection within healthcare infrastructures. There are inherent dangers to digitising patient records and considering the sensitive nature of the data, EHR is equally at risk of both external threats and insider attacks, but security applications are predominantly facing the outer boundary of the network. In t...
Article
Full-text available
With the rapid developments in ICT, the current agriculture businesses have become increasingly data-driven and are supported by advanced data analytics techniques. In this context, several studies have investigated the adopted data analytics platforms in the agricultural sector. However, the main characteristics and overall findings on these platf...
Article
Full-text available
Microservice architecture (MSA) is a paradigm to design and develop scalable distributed applications using loosely coupled, highly cohesive components that can be deployed independently. The applications that realize the MSA may contain thousands of services that together form the overall system. Microservices interact with each other by producing...
Article
For a healthy production line, it is essential to ensure a low failure rate of products. Product quality in production lines can be inspected using several techniques at the end of a production process, including a manual inspection. Different methods are applied to inspect the product quality at the end of the production process and sometimes duri...
Article
Full-text available
According to the latest World Economic Forum report, about 70% of the African population depends on agriculture for their livelihood. This makes agriculture a critical sector within the African continent. Nonetheless, agricultural productivity is low and food insecurity is still a challenge. This has in recent years led to several initiatives in us...
Article
Full-text available
p>Precision Nutrition makes use of personal information about individuals to produce nutritional recommendations that have more utility than general population level recommendations. In many cases, being able to predict current status is a necessary first step in offering tailored nutritional advice. The objective of this study is to predict plasma...
Article
Background The European Commission (EC) has launched the European Green Deal communication, setting out the path for a fundamental transformation of Europe. Key element in this policy is a fully sustainable food system outlined in the farm-to-fork strategy. Such strategy requires a systems approach in which all aspects related to the production and...
Article
Full-text available
For detecting and resolving the various types of malware, novel techniques are proposed, among which deep learning algorithms play a crucial role. Although there has been a lot of research on the development of DL-based mobile malware detection approaches, they were not reviewed in detail yet. This paper aims to identify, assess, and synthesize the...
Article
Full-text available
Farms face various risks such as uncertainties in the natural growth process, obtaining adequate financing, volatile input and output prices, unpredictable changes in farm-related policy and regulations, and farmers‘ personal health problems. Accordingly, farmers have to make decisions to be prepared for such situations under risk or mitigate their...
Book
6th International Conference, Held as Part of the Services Conference Federation, SCF 2021 Virtual Event, December 10–14, 2021 Proceedings With the rapid advancements of mobile Internet, cloud computing, and big data, the traditional device-centric Internet of Things (IoT) is now moving into a new era which is termed Internet of Things Services (I...
Article
p>Critical infrastructure (CI) is an integrated set of systems and assets that are essential to ensure the functioning of a nation, including its economy, the public’s health and/or safety. Hence, protecting critical infrastructures (CI) is vital because of the potential severe consequences that may emerge at the national level. Many CIs are now co...
Article
Full-text available
Software bug report classification is a critical process to understand the nature, implications, and causes of software failures. Furthermore, classification enables a fast and appropriate reaction to software bugs. However, for large-scale projects, one must deal with a broad set of bugs from multiple types. In this context, manually classifying b...
Article
Full-text available
Smart warehouses aim to increase the overall service quality, productivity, and efficiency of the warehouse while minimizing costs and failures. In recent years, several studies have proposed and discussed different types of smart warehouses, identified key challenges, and proposed several solution directions for coping with these challenges. The o...
Article
Full-text available
The amount of arable land is limited, yet the demand for agricultural food products is increasing. This issue has led to the notion of precision farming, where smart city-based technologies (e.g., Internet of Things, digital twins, artificial intelligence) are employed in combination to cater for increased production with fewer resources. Widely us...
Article
Full-text available
Despite increasing global environmental concerns, we continue to consume large amounts of products with little regard to what happens before, during, and after their use. Roughly one-third of the food produced is wasted. Because the world’s population is expected to grow to 10 billion by 2050, adopting circular economy practices will become essenti...
Article
Full-text available
Background Care for people with an Intellectual Disability (ID) is complex: multiple health care professionals are involved and use different Health Information Systems (HISs) to store medical and daily care information on the same individuals. The objective of this study is to identify the HISs needs of professionals in ID care by addressing the o...
Article
Full-text available
Ghana produces 20% of global cocoa output and is the second-largest producer and exporter of cocoa beans in the world. The Ghana cocoa industry is, however, challenged by a lack of adequate decision support systems across the supply chain. Particularly, cocoa farmers have limited access to information, which impedes planning, pricing, benchmarking,...
Article
Full-text available
Microservice architecture consists of a collection of loosely coupled, self-contained services that can be deployed independently. Given the limited capacity of the resources for a large number of services, the deployment of the services does not scale well and leads to operational complexity and runtime overhead. This paper proposes a model-driven...
Article
Full-text available
With advanced digitalisation, we can observe a massive increase of user-generated content on the web that provides opinions of people on different subjects. Sentiment analysis is the computational study of analysing people's feelings and opinions for an entity. The field of sentiment analysis has been the topic of extensive research in the past dec...
Conference Paper
p>Physical protection system (PPS) is developed to protect the assets or facilities against threats. A systematic analysis of the capabilities and intentions of potential threat capabilities is needed resulting in a so-called Design Basis Threat (DBT) document. A proper development of DBT is important to identify the system requirements that are re...
Conference Paper
Anomaly detection in electricity consumption data is one of the most important methods to identify anomalous events in buildings and electric assets, such as energy theft, metering defect, cyber attacks and technical losses. In this paper, a novel deep learning based approach is presented to detect anomalies in electricity consumption data one hour...
Article
Full-text available
Farm management information system (FMIS) is an important element of precision agriculture to support the decision making process in the agricultural business. Developing FMIS is not trivial and requires the proper design and implementation models for supporting the understandability, enhancing communication and analysis of the design decisions, an...
Article
Full-text available
Background Currently many healthcare systems are supported by an increasing set of Health Information Sys-tems (HISs), which assist the activities for multiple stakeholders. The literature on HISs is, however, fragmented and a solid overview of the current state of HISs is missing. This impedes the understanding and characterization of the required...
Article
Full-text available
The systematic literature review (SLR) process is separated into several steps to increase rigor and reproducibility. The selection of primary studies (i.e., citation screening) is an important step in the SLR process. The citation screening process aims to identify the relevant primary studies fairly and with high rigor using selection criteria. T...
Article
Full-text available
Machine learning, particularly deep learning (DL), has become a central and state-of-the-art method for several computer vision applications and remote sensing (RS) image processing. Researchers are continually trying to improve the performance of the DL methods by developing new architectural designs of the networks and/or developing new technique...
Article
Full-text available
Background Healthcare relies on health information systems (HISs) to support the care and receive reimbursement for the care provided. Healthcare providers experience many problems with their HISs due to improper architecture design. To support the design of a proper HIS architecture, a reference architecture (RA) can be used that meets the various...
Article
One of the key challenges in computer networks is network security. For securing the network, various solutions have been proposed, including network security protocols and firewalls. In the case of so-called packet-filtering firewalls, policy rules are implemented to monitor changes to the network and preserve the required security level. Due to t...
Article
A physical protection system (PPS) aims to protect a system against adversarial attacks by deterrence, detection, delay, and response. PPSs have targeted the protection of various systems, each of which has its specific requirements. On the other hand, PPSs also share a large set of features that are implemented for each system. To reduce the devel...
Book
Data-intensive systems are software applications that process and generate Big Data. Data-intensive systems support the use of large amounts of data strategically and efficiently to provide intelligence. For example, examining industrial sensor data or business process data can enhance production, guide proactive improvements of development process...
Article
Full-text available
Cybersecurity is critical in realizing Internet of Things (IoT) applications and many different standards have been introduced specifically for this purpose. However, selecting relevant standards is not trivial and requires a broad understanding of cybersecurity and knowledge about the available standards. In this study, we present a systematic app...
Article
Context Microservice is an architectural style that separates large systems into small functional units to provide better modularity. A key challenge of microservice architecture design frequently discussed in the literature is the identification and decomposition of the service modules. Besides this, two other key challenges can be identified, inc...
Article
Full-text available
The systematic literature review (SLR) process includes several steps to collect secondary data and analyze it to answer research questions. In this context, the document retrieval and primary study selection steps are heavily intertwined and known for their repetitiveness, high human workload, and difficulty identifying all relevant literature. Th...
Chapter
Data-intensive computing is a class of parallel computing applications which use data parallel approaches to process large volumes of data (terabytes or petabytes in size). The advent of big data and data-intensive software systems present tremendous opportunities (e.g., in science, medicine, health care, finance) to businesses and society. Researc...
Preprint
Full-text available
Many systems nowadays require protection against security or safety threats. A physical protection system (PPS) integrates people, procedures, and equipment to protect assets or facilities. PPSs have targeted various systems, including airports, rail transport, highways, hospitals, bridges, the electricity grid, dams, power plants, seaports, oil re...
Article
Full-text available
Digital Twins are very promising to bring smart farming to new levels of farming productivity and sustainability. A Digital Twin is a digital equivalent of a real-life object of which it mirrors its behaviour and states over its lifetime in a virtual space. Using Digital Twins as a central means for farm management enables the decoupling of physica...
Article
Context : Systematic Literature Review (SLR) studies aim to identify relevant primary papers, extract the required data, analyze, and synthesize results to gain further and broader insight into the investigated domain. Multiple SLR studies have been conducted in several domains, such as software engineering, medicine, and pharmacy. Conducting an SL...
Article
Full-text available
Precision Nutrition research aims to use personal information about individuals or groups of individuals to deliver nutritional advice that, theoretically, would be more suitable than generic advice. Machine learning, a subbranch of Artificial Intelligence, has promise to aid in the development of predictive models that are suitable for Precision N...