Zeydin Pala

Zeydin Pala
  • PhD
  • Head of Department at Muş Alparslan University

About

117
Publications
87,604
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
621
Citations
Introduction
Zeydin Pala is currently an assistant professor at the Department of Computer Engineering.He received his BS degree in Electrical and Electronics Engineering in 1993 from Istanbul University, Turkey. He received his MS and PhD degrees in Electrical and Electronics Engineering in 2007 from Yuzuncu Yil University, Van, Turkey and in 2012 from Firat University, Elazig, Turkey, respectively. His research interests lie in areas of WSN, ad hoc networks,AI,ML,TS, and RFID technology.
Current institution
Muş Alparslan University
Current position
  • Head of Department
Additional affiliations
February 1993 - December 1999
Van Yuzuncu Yil University
Position
  • Computer Programmer
January 2012 - present
Muş Alparslan University
Position
  • Project Manager

Publications

Publications (117)
Conference Paper
Full-text available
This article provides a comprehensive summary of the historical development of low-carbon energy consumption in Türkiye, United Kingdom, and France, spanning from the past to the present. The transition to low-carbon energy sources is a crucial aspect of global efforts to mitigate climate change, and understanding the trajectories of these three na...
Conference Paper
Full-text available
This article provides a comprehensive summary of the historical trajectories of low-carbon energy consumption in four major global economies the United States, Russia, China, and Japan from 1965 to 2022. Tracking the evolution of these nations' approaches to low-carbon energy is crucial for understanding their contributions to global sustainability...
Article
Full-text available
Hypergraphs and simplicial complexes can be used to model higher-order interactions. Graphs are limited to model and describe pairwise interactions. In this study, the issue of centrality in hypergraphs was studied. We introduce centrality measures based on the entropy of nodes and hyperedges in the hypergraphs. Until now, a lot of measures from va...
Article
Full-text available
The variety of diseases is increasing day by day, and the demand for hospitals, especially for emergency and radiology units, is also increasing. As in other units, it is necessary to prepare the radiology unit for the future, to take into account the needs and to plan for the future. Due to the radiation emitted by the devices in the radiology uni...
Chapter
Full-text available
In this study, annual forecasts were made by using data sets based on the CO2 amounts measured in tonnes per capita per capita for 55 years between 1967-2021 in Turkey, Russia and England.
Chapter
Full-text available
Our aim in this study is to make predictions with DeepAR, taking into account the lowest temperatures measured in Melbourne between 1981-1991. Temperature forecasting is one of the most basic tasks of weather forecasting. Here, 61-day forecasts were made based on the lowest temperature observation data of 3647 days and the results obtained were eva...
Article
Accurate natural gas consumption forecasting plays a significant role in production, supply, and dispatching. Therefore, in this study, a new multi-hybrid model methodology is proposed that combines both statistical and deep learning models to obtain better prediction results beyond individual models or constrained hybrid models in linear and non-l...
Preprint
Full-text available
As the demand for medical care increases significantly every day, the issue of managing the volume of patients in hospitals and radiology units becomes more and more important. Due to the radiation emitted by the devices in the radiology unit, the minimum time spent by the patients for radiological imaging in hospitals is of vital importance both f...
Article
Full-text available
Because many time series usually contain both linear and nonlinear components, a single linear or nonlinear model may be insufficient for modeling and predicting time series. Therefore, estimation results are tried to be improved by using collaborative models in time series short-term prediction processes. In this study, the performances of both st...
Article
Full-text available
Two different approaches of two different time-series models were used to predict the critical frequency (foF2) of the ionospheric F2 layer over Athens (38.0° N, 23.5° E), Greece. Experimental foF2 data were obtained for the Athens station between 2004 and 2018. For the foF2 prediction, the R language forecasthybrid model library time-series conven...
Article
Full-text available
Spatial light modulators (SLMs) are versatile devices used for optical studies. These instruments have a wide area of application in photonics. Additionally, SLMs have potential utility in different applications, such as biomedical applications, laser based surgery for precise cutting and as optical tweezers to separate cells in a petri container....
Article
Full-text available
Entropy is used to measure uncertainty in complex systems. Hypergraphs provide structure for mathematically modeling real-world data. In this study, analyzes were made using entropy on the data in the hypergraph structure. The entropies of the nodes and hyperedges were calculated using the node degree and hyper edge degree. Their activities were fo...
Chapter
Full-text available
İstatistik tabanlı ETS, SNAIVE ve DRIFT zaman serisi tahmin modelleri kullanılarak açık kaynak olarak erişilebilen üç adet zaman serisi üzerinde analizler yapıldı. Modellerin performanslarını değerlendirmek için de MAPE metriğinden faydalanıldı. Analizlerde kullanılan aylık zaman serilerinde frekansın katı olarak test uzunluğu belirlemenin tahmin...
Article
Full-text available
The aim of this study is to contribute to the literature by estimating the 5-weeks number of cases/deaths for each continent by using statistical-based prediction models, which are quite effective on simple but small-scale datasets. While Auto.arima, Tbats, Naive, Holt, Thetaf and, Drift models were used for prediction processes root mean square er...
Article
In this study, electric field strength ( $E$ ) levels of high-voltage lines were measured monthly in Sütlüce (38°N, 41°E), Muş, Turkey, between 2014 and 2018, and the obtained 60 monthly mean values were used as time series (TS) to forecast next 12 months by using conventional statistical and deep learning (DL) algorithms. In addition to the conve...
Article
Full-text available
Interaction with the environments in which humans live is increasing more and more, and Artificial Intelligence (AI) offers significant contributions to this. Although the topic of smart homes has attracted a great deal of attention from researchers, the AI-based application in this area is still in its infancy. In this study, a home security autom...
Article
Full-text available
This study compares the performance of time series models for forecasting electromagnetic radiation levels at Yesilce neighborhood in Mus, Turkey. To make successful predictions using EMF time series, which is obtained in the 36-month measurement process using the calibrated Wavecontrol SMP2 device, nine different models were used. In addition to M...
Article
Full-text available
To predict Solar Cycle 25, we used the values of sunspot number (SSN), which have been measured regularly from 1749 to the present. In this study, we converted the SSN dataset, which consists of SSNs between 1749 – 2018, into a time series, and made the ten-year forecast with the help of deep-learning (DL) algorithms. Our results show that algorith...
Article
Data transmission and IP telephony-based sound transmission are carried out via same network infrastructure in campus networks. In general, there are two types of traffics in network environment. The first one is the normal stream traffic which refers to data and sound. The second one is the background traffic which is considered as undesirable tra...
Data
Full-text available
Article
Full-text available
Wireless sensor networks (WSNs) still attract the attention of researchers, users and the private sector despite their low power and low range tendency for malfunction. This attraction towards WSNs results from their low cost structure and the solutions they offer for many prevalent problems. Many conditions, which remain unforeseen or unexpected d...
Article
Full-text available
Each method suggested for each solution to simplify our lives brings a perspective towards problems. Wireless solutions are now included in every aspect of our lives. In this study, duties and responsibilities of both campus security and security guards were brought to the forefront and a wireless mobile patrol system was suggested. The aim was to...
Conference Paper
Full-text available
Electronic information systems remain at the forefront in modern economies, especially in development economics. Economy gets defenseless in a sense when information flow is interrupted. Services such as vital public services, national defense industry, health services, transportation, telecommunication services, manufacturing, wholesale and retail...
Article
Full-text available
In wireless sensor networks (WSNs), the data observed by different nodes must be relayed safely to the base station over intermediate nodes. In the network environment, some sensor nodes can act suspiciously when they enter someone else's control or due to other equipment failure. Data packets that are sent through suspicious nodes may be randomly...
Article
Full-text available
We investigated the impact of transmission power control using Mica2 mote discrete power levels on neighbor sensor network lifetime. We built a linear programming framework to qualify the cooperation of sensor networks using a discrete energy model in comparison to noncooperating networks. Our results showed that a wireless sensor neighbor network...
Conference Paper
Full-text available
Developing technology, electromagnetic field propagating devices usage consistently increasing, total electromagnetic field we exposed always increases. It can effect on human health depending on electromagnetic field exposure time and magnitude. In this study, Electromagnetic field in a point was measured. With the aid of created fuzzy system, dep...
Conference Paper
Full-text available
Information and information systems security is a process that requires continuity. Threats to information system comes from two different sources, including internal and external threats. Internal threats as well as external threats should be taken into care. If institutional weaknesses and vulnerabilities in the network are not detected and not c...
Conference Paper
Full-text available
Electromagnetic waves are much more in our lives day by day. Progression of technology and developing wireless communication systems support this situation. Effects of non-ionizing electromagnetic waves are still debated, but electromagnetic pollution measurements must be done regularly. In this study, the changes in electromagnetic pollution at ce...
Conference Paper
Full-text available
Çevremizde elektrik ile çalışan yâda üzerimizde taşıdığımız her elektrikli cihaz belli bir seviyede bizleri elektromanyetik radyasyona maruz bırakmaktadır. Muhtemel etkilerinden tamamen korunmak imkânsız olmakla birlikte bunları azaltmak mümkündür. Bu çalışmada Muş Alparslan Üniversitesi kampüsünde düşük ve yüksek frekanslı elektromanyetik dalgalar...
Data
Full-text available
Giriş: Bilgisayar ve İnternet’ e Bakış Ders 01:Bilgisayarlar ve Bilgisayar Tiplerine Bakış Ders 02:Bilgisayar Verileri Nasıl işler? Ders 03:Bilgisayar Mimarisi ve İşleyişi Ders Ders 04:Klavye ve Fare Kullanımı Ders 05:Bilgisayar Donanımı ve Bilgisayar Satın Alma Rehberi Ders 06:Windows XP Ders 07:DOS Ders 08:Windows XP kurulumu, Onarımı ve Bakı...
Data
Full-text available
Data
Full-text available
Data
Full-text available
Article
Full-text available
In this paper it is introduced a novel Linear Programming framework to reveal correlation between consumed energy and packet relaying in wireless ad hoc networks. It’s used Linear Programming to solve the problem of maximizing or minimizing a linear function whose variables are required to satisfy a finite set of constraints that are expressed eith...
Article
Full-text available
In Wireless Sensor Networks the data generating from sensing nodes is as crucial as collecting data from different location of the network. The data observed by different nodes must be relayed safely over intermediate nodes to the base station. In this paper, the effects of sleep mode on energy dissipation in wireless sensor ad hoc networks is inve...
Conference Paper
Full-text available
In this paper, we investigate the effects of mobility on the energy dissipation characteristics of wireless networks. We construct a Linear Programming (LP) framework that jointly captures data routing, mobility, and energy dissipation aspects and explore the design space by performing numerical analysis using the developed LP framework. Our result...
Article
In this paper we consider neighbor sensor networks which are defined as multiple wireless sensor networks under the administration of different authorities but located physically on the same area or close to each other. We construct a Linear Programming framework to characterize the cooperation of neighbor sensor networks in comparison to non-coope...
Conference Paper
Full-text available
In this paper we introduced a novel Linear Programming framework to reveal correlation between consumed energy and packet relaying in wireless ad hoc networks. We used Linear Programming to solve the problem of maximizing or minimizing a linear function whose variables are required to satisfy a finite set of constraints that are expressed either as...
Conference Paper
Full-text available
In Wireless Sensor Networks the data generating from sensing nodes is as crucial as collecting data from different location of the network. The data observed by different nodes must be relayed safely over intermediate nodes to the base station. In this paper, we investigate the effects of sleep mode on energy dissipation in wireless sensor ad hoc n...
Thesis
Full-text available
Wireless Sensor Networks (WSNs) are composed of a lot of sensor nodes, capable of signal processing and wireless communication that provide extensive information from the physical world to the digital world through distributed sensing solutions. One important class of wireless sensor networks is wireless ad hoc sensor networks, that characterized b...
Book
Full-text available
Kategorik olarak Delphi Kontrol Elemanlari: - Delphi 7 ile temel programlama teknikleri - Metin giris kontrolleri - Component Library - Etiketler - Delphi nesne modeli - Ozel bilgi giris kontrolleri - BaseCLX kutuphanesi - Buttonlar - Standart fonksiyonlar - Hata yakalama taknikleri - Mesaj pencereleri - Formlar ve diyalog kutulari - Delphi ile gra...
Conference Paper
Full-text available
RFID teknolojisi canlı ve cansızları radyo dal-gaları ile tanımlayan bir teknolojidir [1]. RFID veri iletimini kablosuz olarak gerçekleştiren bir teknolojidir [2]. Bununla beraber RFID tek ve basit bir teknoloji değildir. RFID etiketlerden, okuyucu ve bilgisayar ağlarından, veritabanı ve özel yazılımlardan meydana gelmektedir. RFID teknolojisinin o...
Article
Full-text available
In this study, a solution has been provided for the problems encountered in parking-lot management systems via RFID technology. RFID readers, RFID labels, computers, barriers and software are used as for the main components of the RFID technology. The software has been handled for the management, controlling, transaction reporting and operation tas...
Conference Paper
Full-text available
By this work, a solution has been provided for the e-exam system of an educational foundation. As for materials used; the RFID readers that are the main components of this technology, RFID labels, laptops and a software have been utilized. The objectives of the software are the automatic operation, control and reporting of e-exam classrooms. By the...
Book
Full-text available
Bilgisayar ve İnternet'e Bakış, Bilgisayarlar, Klavye ve Fare Kullanımı, İşletim Sistemleri, Windows Vista İşletim Sistemi, MS - DOS İşletim Sistemi, Word 2007, Excel 2007, Access 2007, Powerpoint 2007, Outlook 2007, Publisher 2007 ile Web Sayfası Tasarımı, İnternet ve İnternet Kavramları, İnternet Explorer, İnternet Bağlantı Teknolojileri, Ağ Tekn...
Book
Full-text available
Excel Programına Bakış Excel'de Veri Seçme Metotları Excel'de Otomatik İşlemler Excel'de Toplama Birden Fazla Sayfa ile Çalışma Hücrelerle Çalışma Biçimlendirilmelerle Çalışma Excel'de Yazdırma Excel'de Grafik Excel Fonksiyonlarını Kullanma Excel'de Form Makro ve Visual Basic Kullanımı Dış Veri Alma Verilerle Çalışma
Conference Paper
Full-text available
z Bu çalışmada bir okulun e-yoklama sistemi için RFID teknolojisi ile çözüm aranmaya çalışılmıştır. Çalışmada materyal olarak; bu teknolojiyi meydana getiren RFID okuyucular, RFID etiketler, dizüstü bilgisayarlar, LCD ekranlar ve bilgisayar yazılımı kullanılmıştır. Yazılım ile okulun e-yoklama salonlarının merkezi bir veritabanı çerçevesinde otomat...
Conference Paper
Full-text available
ZET Bu çalışmada; bir okuldaki öğrencilerin sınıf ortamındaki performanslarını değerlendirmek için RFID teknolojisi ile çözüm aranmaya çalışılmıştır. Okuldaki eğitim sınıflarının yönetimi için bir yandan donanım kullanılırken, diğer yandan donanımı kontrol edecek yazılım da kullanıldı. Donanım olarak; RFID okuyucular, RFID etiketler, USB kabloları,...
Conference Paper
Full-text available
Radio Frequency Identification (RFID) is becoming a widely-used technology that makes life easier. Nonetheless, some issues concerning security and privacy discourages potential RFID technology users. To avoid these security issues, substantial amount of work is done by the academics environment. Thanks to EPCGlobal Class-1 Gen-2 protocol that is d...
Conference Paper
Full-text available
ZET Bu çalıĢmada bir kurumun e-takip sistemi için RFID teknolojisi ile çözüm aranmaya çalıĢılmıĢtır. ÇalıĢmada materyal olarak; bu teknolojiyi meydana getiren RFID okuyucular, RFID etiketler, dizüstü bilgisayarlar, LCD ekranlar ve bilgisayar yazılımı kullanılmıĢtır. Yazılım ile kurumun e-takip salonlarının merkezi bir veritabanı çerçevesinde otomat...
Article
Full-text available
There has been a considerable amount of reduction in transaction costs and decrease in stock shortage with the use of Radio Frequency Identification (RFID) technology in automation. Most of the RFID networks include a wide range of automation technologies. These technologies are RFID readers, RFID writers, RFID barcode scanners, RFID smart sensors...
Conference Paper
Full-text available
There has been a considerable amount of reduction in transaction costs and decrease in stock shortage with the use of Radio Frequency Identification (RFID) technology in automation. Most of the RFID networks include a wide range of automation technologies. These technologies are RFID readers, RFID writers, RFID barcode scanners, RFID smart sensors...
Conference Paper
Full-text available
Thesis
Full-text available
The cost of business processes has been reduced with the use of RFID technology in the automation. Many RFID networks include a variety of automation technologies such as RFID readers, printers, barcode scanners, intelligent sensors and controllers. In this study, the parking problem of a city is meant to be solved through out RFID technology and c...
Book
Full-text available
- Bilgisayar ve İnternet'e bakış - Bilgisayar tiplerine bakış - Bilgisayar verileri nasıl işler? - Bilgisayar mimarisi ve işleyişi - Klavye ve siz - Bilgisayar donanımı ve Donanım satıl alma rehberi - Windows WP - DOS - Word XP - Access XP - Powerpoint XP - CD/DVD/VCD, taşınabilir bellek ve disket kullanımı - CD yazma - Yazıcı, Tarayıcı ve Dijital...
Book
Full-text available
ASP.NET´e Giriş ASP.NET Sayfa Yapısı ASP.NET Programlama Temelleri ASP.NET İle Hata Yakalama ASP.NET İle XML Web Servisleri Geliştirme ASP.NET İle Kimlik Denetleme Web Formları ve Web Kontrolleri Sayfalar Arasında Dolaşma Visual Studio. Net İle Web Servisleri Geliştirme.
Book
Full-text available
Bilgisayar donanımı, bilgisayar ile ilgilenen her kesimin ilgi duyduğu ve merak saldığı bir konudur. Fakat bu konudaki kaynak yetersizliği büyük bir kavram karmaşasına neden olmuştur. Kavram karmaşasını tamamen ortadan kaldıracak ve bilgisayar donanımı hususunda sizi uzmanlığa taşıyacak çözüm elinizin altındadır.
Book
Full-text available
Visual Studio 2005 IDE Visual Programlamaya Giriş Konsol ve Windows Uygulamalarına Giriş Değişkenler ve Değişken Tipleri Veri Yapıları ile Çalışmak Veri Tipleri Dönüşümleri Operatörler ve Kullanım Biçimleri Program Kontrol Deyimleri Döngü Deyimleri Fonksiyonlr ve Altprogramlar Hata Yakalama Windows Formları ile Çalışma Mesaj Pencereleri ve Bilgi Gi...
Book
Full-text available
İnsan hayatının temel yanlarında biri de bilgi ve verileridir. Veriler, insan hayatının ayrılmaz parçalarıdır. Veriler, analizleri, analizler de sonuçları doğurur. Gerçek ferdi yaşamda gerekse toplumsal yaşamda hep veriler ile düşünür ve neticede verilere dayanan sonuçları üretiriz.
Book
Full-text available
Veritabanına Genel Bakış Veritabanı Yönetim Sistemleri Microsoft SQL Server 2000 Desktop SQL Server için Hata Kontrolleri ADO.NET Uygulamalarına Giriş Veri Kaynaklarına Bağlanma VisualBasic.NET'te SQL Kullanımı Veritabanı Data Nesneleri Veri Bağlama (Data Binding) Data-Bound Kontrolleri ADO.NET DatSet'lere Genel Bakış ADO.NET ve XML Etkileşimi Veri...
Book
Full-text available
Book
Full-text available
-Visual Basic .NET' e Giriş -Visual Studio .Net IDE -Visual Basic .NET ile Programlamaya Giriş -Değişkenler ve Değişken Tipleri -Program Kontrol Deyimleri -Fonksiyonlar ve Alt Programlar -Mesaj Pencereleri ve Bilgi Giriş Kutuları -NET Framework Class Library -Windows Formları ile Çalışma -Menüler ve araç çubukları -Nesne Yönelimli Programl...
Book
Full-text available
Book
Full-text available
Book
Full-text available
Access 2003´e Giriş Tablo Oluşturma Metodları ve Tablolar ile Çalışma Veri Alanlarını Tanıma Form Oluşturma Metodları denetim Panosu Hazırlama Tablolar arasında İlişki Kurma Alt Formlar Diğer Tablolardan Veri Alma XML ve Ofis Uygulamalarına Veri Verme Access´te Hesap Yapma Visual Basic Ortamında Hesap Yapma VBA Ortamında En Çok Kullanılan Fonksiyon...
Book
Full-text available
Book
Full-text available
Book
Full-text available
Kitap profesyonel olarak programcılık yapan kişilere hitap etmektedir. Kitabın Konu Başlıkları Kontroller Windows 95 & 98 Kontrolleri İnternet Kontrolleri Seri ve Paralel İletişim Diğer Nesneler Menü Tasarımı Çizim Drag & Drop Dde & Link Ekran Koruyucu Class Module User Control, Property Page Veri Tabanı Windows API
Book
Full-text available
Windows´un ve Visual programlama yapısının programlamaya getirdiği yeni boyut, programlama dillerini monotonluktan kurtarmış ve her versiyonda büyük yeniliklerin ve kolaylıkların programlama dilleri içerisinde yer almasına sebep olmuştur. C++ Builder´in ilk versiyonu ile bugün ulaştığı 6. versiyonu arasında çok büyük gelişmeler yaşanmıştır ve uzun...
Book
Full-text available
Book
Full-text available
Book
Full-text available
Book
Full-text available
Book
Full-text available
Çıktığı günden beri büyük bir beğeni toplayan ve programcılığı zevke dönüştüren Visual Basic programlama dili, programcıdan hak ettiği ilgiyi her zaman gördü. Visual dillerin yaygınlaşmasıyla programcılık korkulacak, sıkıcı bir iş olmaktan çıkıp, herkesin ilgisini çekebilecek bir iş haline gelmiştir. Bunda Visual Basic dilinin katkısı azımsanmayaca...
Book
Full-text available
Book
Full-text available
Book
Full-text available
Book
Full-text available

Questions

Questions (6)
Question
Is it possible coordinate different types of sensors in a single WSN?

Network

Cited By