Umut Can Çabuk

Umut Can Çabuk
San Diego State University | SDSU · Department of Electrical and Computer Engineering

Ph.D. (cand.)

About

42
Publications
56,202
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
234
Citations
Additional affiliations
October 2021 - November 2021
San Diego State University
Position
  • Researcher
May 2019 - present
Ege University
Position
  • Research Assistant
January 2017 - May 2019
Erzincan University
Position
  • Research Assistant
Description
  • Co-tutor of the course "Telecommunications Laboratory (a.k.a Mobile Communication Technologies)" taught in collaboration with Turkcell Academy
Education
February 2017 - February 2021
Ege University
Field of study
  • Information Technologies
January 2013 - March 2015
Aarhus University
Field of study
  • Information Technology Engineering
September 2008 - June 2012
Uludag University
Field of study
  • Electronics Engineering

Publications

Publications (42)
Conference Paper
Full-text available
Positioning and location tracking are two major needs of the modern era; in which logistics, industry automation, smart buildings/cities and the Internet of Things concepts are trending topics and are constantly evolving. Introduction of the Global Positioning System (GPS) solved the issue well for outdoor scenarios, however, it is not a reliable s...
Conference Paper
Full-text available
There is no doubt that the revolutionary concept of the blockchain, which is the underlying technology behind the famous cryptocurrency Bitcoin and its successors, is triggering the start of a new era in the Internet and the online services. While most people focus only at cryptocurrencies; in fact, many administrative operations, fintech procedure...
Article
Full-text available
In the second decade of the 21st century, blockchain definitely became one of the most trending computational technologies. This research aims to question the feasibility and suitability of using blockchain technology within e-voting systems, regarding both technical and non-technical aspects. In today's world, although the course of this spreading...
Article
Full-text available
Drone technology is developing very rapidly. Flying devices accomplishing various applications are becoming an integral part of our daily life undoubtedly. Drones are characterized by extreme mobility, decent computing power, scalability, and a very short lifetime due to energy constraints. The rise of drones inevitably enabled swarms and drone net...
Article
Full-text available
For many wireless ad-hoc network (WANET) applications, including wireless sensor, robotic, and flying ad-hoc networks, area coverage is a major challenge. This challenge, which may include the number of required nodes, cumulative energy consumption, or total distance travelled, involves covering the largest possible area with the least cost. Whatev...
Preprint
Full-text available
The Accumulate Protocol ("Accumulate") is an identity-based, Delegated Proof of Stake (DPoS) blockchain designed to power the digital economy through interoperability with Layer-1 blockchains, integration with enterprise tech stacks, and interfacing with the World Wide Web. Accumulate bypasses the trilemma of security, scalability, and decentraliza...
Article
Full-text available
The Internet of things (IoT) is the key enabler of the smart systems used in many areas, from agriculture to aviation, industrial automation to autonomous vehicles. Most IoT deployments employ cost-efficient lightweight devices with limited resources (e.g., bandwidth, energy, storage). Although an IoT network must be built in its simplest form, eng...
Patent
Buluş, dağıtım şirketleri (D) ve aboneler (A) arasında gerçekleştirilen su, doğalgaz, elektrik, akaryakıt, kuru veya işlenmiş tarım ürünleri (buğday, şeker, kahve ve benzeri) gibi stok, nakliyat ve satışı gerçekleştirilen her türlü emtia için; miktar, ağırlık, debi, basınç, alan, hacim vb. ölçülebilen ve tarifelendirilebilen her türlü özelliğine ai...
Chapter
Drone networks are becoming increasingly popular in recent years and they are being used in many applications such as area coverage, delivery systems, military operations, etc. Area coverage is a broad family of applications where a group of connected drones collaboratively visit the whole or parts of an area to fulfill a specific objective and is...
Chapter
Topology control, consisting of construction and maintenance phases, is a crucial conception for wireless ad-hoc networks of any type, expressly the wireless sensor networks. Topology maintenance, the latter phase, concerns several problems, such as optimizing the energy consumption, increasing the data rate, making clusters, and sustaining the con...
Book
Full-text available
This report presents the outcomes of the first and largest research regarding the consumer use of Bitcoin and other cryptocurrencies for retail shopping and associated payments. What the research reveals includes the demographics of crypto-consumers, their current experiences, their perception of crypto-shopping, and the market-wise adoption of cry...
Chapter
Full-text available
Drone technologies have attracted the attention of many researchers in recent years due to their potential opportunities. Fleets of drones integrated with widely available relatively short-range communication technologies have various application areas such as wildlife monitoring, disaster relief, and military surveillance. One of the major problem...
Conference Paper
Full-text available
Topology control, consisting of construction and maintenance phases, is a crucial conception for wireless ad-hoc networks of any type, expressly the wireless sensor networks. Topology maintenance, the latter phase, concerns several problems, such as optimizing the energy consumption, increasing the data rate, making clusters, and sustaining the con...
Conference Paper
Full-text available
Drone networks are becoming increasingly popular in recent years and they are being used in many applications such as area coverage, delivery systems, military operations, etc. Area coverage is a broad family of applications where a group of connected drones collaboratively visit the whole or parts of an area to fulfill a specific objective and is...
Conference Paper
Full-text available
Endurance of unmanned aerial vehicles (UAVs) in operation is a critical aspect of usability and serviceability; therefore, the energy efficiency must carefully be considered in the UAV system design. In spite of their high potential, electric-powered rotating-wing multi-copters, which are drones, have even scarcer energy resources. Thus, extraordin...
Conference Paper
Full-text available
Unmanned aerial vehicles (UAV) are being used increasingly more within military campaigns, commercial services, and industrial projects. Though using UAVs on such missions is not a new phenomenon anymore, forming them into autonomous groups (called swarms) to accomplish the missions more efficiently is still a hot topic. To implement smart algorith...
Chapter
Factorization of large integers has been being considered as a challenging problem in computer science and engineering since the earliest times of the computer technology. Despite the comprehensive efforts, there is still no reported deterministic polynomial-time algorithm; however, its complexity class is in fact not yet decided. A fast and robust...
Conference Paper
Full-text available
The revolutionary concept of blockchain and its applications are spectacularly drawing more and more attention in today’s world. The crypto-currency platforms have been on the forefront of implementing blockchain technology. However, the capabilities of blockchains are not limited to monetary transactions. Introduction of smart contracts allowed de...
Conference Paper
Full-text available
Wireless sensor networks (WSNs) consist of tiny nodes that are capable of sensing the environment and transmitting the sensed data through wireless transceivers. Synchronous and asynchronous operations are two communication paradigms, which have different advantages and purposes. A WSN can be modeled as a graph that leads to use graph-theoretic str...
Conference Paper
Full-text available
Wireless sensor networks (WSN) and their applications become more and more common as the technology advances. The emerging concepts of Internet of Things and the Industry 4.0 boost their popularity, too. But there are still dominant bottlenecks including battery lifetime, transmission range, routing issues and others. These limitations may cause pe...
Conference Paper
Full-text available
Factorization of (large) integers is a challenging problem in computer science and engineering, with no reported deterministic polynomial time solution, though its complexity class is not yet decided. A fast and robust polynomial-time algorithm for that problem is desired to increase the available processing capabilities, but it also spreads hesita...
Presentation
Full-text available
Fast development in both hardware and software technologies is making computers cheaper and more powerful day by day. This development also increases the market size of both hardware and software products. Digital games cover a significant portion of these markets. While it is hard to strictly classify the games, one can categorize them by their pl...
Article
Full-text available
Global and other outdoor positioning systems are already subject to comprehensive research and development for almost half a century. Conversely, indoor positioning services became a hot topic in the last decade. Since GPS (and. other outdoor solutions) do not work reliably in most indoor environments, researchers and developers are working on accu...
Article
Full-text available
Embedded systems are designed to complete certain tasks in the fields of white goods, traffic lights, smart factories, office devices, the Internet of things and many more. Installing programs to different embedded systems may require different integrated circuit cards and/or computer support. Hence, it is observed that some vendors have been outso...
Conference Paper
Full-text available
Radio propagation and path loss attenuation are subject to many research-even for LTE-throughout decades already. Nevertheless, smart city and Internet of Things concepts are emerging recently. Hence, new path loss studies are required to address new problems that come up with these. This study introduces eastern market districts, located in the he...
Presentation
Full-text available
Recent developments in the internet technologies made possible and/or cheaper to carry many services to the Internet. Such that, online polls, petitions and questionnaires have gained vast popularity in the last decade. Contrarily, more comprehensive election systems, called e-voting systems, made little progress and could not be widespread. There...
Presentation
Full-text available
The Internet is currently evolving into the Internet of Things (IoT). Apart from the computers, smartphones, and tablets; consumer electronics, white goods, transportation vehicles, special purpose sensor/actuator devices and many others are gaining access to the Internet. There may be many types of devices in a smaller portion of the huge Internet...
Article
Full-text available
This paper presents results of a research that aims to find a suitable, reliable and lightweight pseudo random number generator for constrained devices used in the Internet of things. Within the study, three reduced versions of the xorshift+ generator are built. They are tested using the TestU01 suite (as well as the NIST suite) to measure their ab...
Presentation
Full-text available
Recent advances on internet, computer and information security make it possible to hold elections and voting online by providing security, safety and privacy. Throughout the world, except for the several pioneer countries, electronic voting applications are still not widespread, although they are sufficient candidates for replacing conventional ele...
Presentation
Full-text available
The Internet of Things, especially the sensor networks, continues to emerge with new technologies as their usage becomes widespread. This popularity also raised concerns regarding security flaws within the communication between the devices and for the systems in general. These networks consist of devices, which have limited processing capabilities...
Conference Paper
Full-text available
The revolutionary network that totally changed how the humankind life, the Internet, is now evolving into the Internet of things; which is being achieved by fetching the network connectivity to legacy industrial or commercial devices, as well as everyday objects. This connectivity may be an Internet connection, where the Internet protocol and relat...
Presentation
Full-text available
In the 21st century, scientific and technological developments, especially electronics and computer based technologies, have gained significant acceleration. In the light of these developments, information production occurs very rapidly. Unfortunately, lack of strong coordination among scientific research institutions, and the unlikeliness of dynam...
Article
Full-text available
In the last decade, Interactive Voice Response (IVR) systems gained popularity among customer care, phone banking and many other commercial services. It helps to reduce conversation and dialing overheads, guides customers and automates call forwardings. On the other hand, many sensitive phone and online services, including banking operations and e-...
Conference Paper
Full-text available
Network and security education requires as much hands-on experiments as possible to let students to understand the complex topics. The network and security scenarios should be experimented in network topologies which are simulated in the laboratories. This study aims to describe how various network experimentation approaches can be used effectively...
Conference Paper
Full-text available
In 21. century, fast expansion of the internet has made all people a potential internet user. At the same time, the advance in the digital technology, the internet has become a suitable yet ideal platform for delivering public services. Hence, many public services are started to be offered to citizens through the internet in all over the World. But...
Article
Full-text available
Topology control is a set of strategies and actions those aim to improve energy efficiency, lifetime and reliability of the networks. One of the most effective methodology is topology reduction, which is a part of the overall topology control process. Topology control process is usually considered under two phases: construction and maintenance. Thi...
Conference Paper
Full-text available
It was long time ago, when the Internet was a basic network used for data and information sharing. The evolutionary process of the Internet started with connecting people and then with the increasing popularity of it and with the emerging concept of smart systems, device-to-device communications within smart systems dawned. And now; by taking the a...
Article
Full-text available
While the Internet is evolving to the Internet of Things, all other technologies that are related to it are also advancing in a way to contain and support concepts like device-to-device networking, proximate discovery, energy efficiency and security. One of the fastest thrives can be seen in mobile communication technologies. This became more obvio...
Article
Full-text available
Long term evolution direct, plus its features of device-to-device networking and proximate discovery, are new and emerging technologies able to come out of the shadow to render a whole new perspective at mobile payments. In this work, we propose a new mobile payment system using long term evolution direct and its features. A sensitive mobile paymen...
Thesis
Full-text available
This thesis work presents an architectural design of a system to bring non-repudiation concept into the IP based digital voice conversations (VoIP) in LTE and UMTS networks, using electronic signatures, by considering a centralized approach. Moreover, functionalities and technical methods to support such a system are researched. Last but not least,...

Network

Cited By

Projects

Projects (6)
Project
Provide solutions to the connectivity problems on drone networks
Project
Design and test of efficient strategies, architectures, methodologies, and algorithms regarding wireless and mobile networks.