Repository logoGCRIS
  • English
  • Türkçe
  • Русский
Log In
New user? Click here to register. Have you forgotten your password?
Home
Communities
Browse GCRIS
Overview
GCRIS Guide
  1. Home
  2. Browse by Author

Browsing by Author "Erkan, O.F."

Filter results by typing the first few letters
Now showing 1 - 2 of 2
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Conference Object
    Efficient Shared Path Protection Routing for Survivable Optical WDM Networks
    (Institute of Electrical and Electronics Engineers Inc., 2019) Erkan, O.F.; Erkan, O.
    Sustainability of the service continuity provided in the optical wavelength division multiplexing (WDM) networks with dynamic traffic environment requires effective protection schemes in the connections. Various approaches have been introduced for path protection and wavelength assignment to ensure survivability in WDM networks. In this paper, we propose a two-step algorithm to designate dedicated-path and shared-path protection schemes. The heuristic-based algorithm utilizes a global labeling which considers service time and line protection information. Thus, the algorithm aims to increase resource utilization by improving the efficiency of shared path protection. The proposed algorithm is applied to USNET and EuropeNet networks and performance analysis in terms of blocking probability and resource utilization is carried out. © 2019 IEEE.
  • Loading...
    Thumbnail Image
    Conference Object
    IoT Based Systems and Services: Recent Security Concerns and Feasible Solutions
    (Institute of Electrical and Electronics Engineers Inc., 2024) Attaullah, H.M.; Memon, S.; Erkan, O.F.; Khawar, R.
    The term Internet of Things (IoT) is used to refer as embedded devices or objects with internet access, allowing them to communicate globally, interacting with people and networks. IoT security issues are directly related to the widespread use of its systems. This paper examines the security technologies employed in IoT and their respective features and applications. Additionally, it addresses the various security concerns associated with IoT-based systems and services, highlighting their occurrence within the three-layer framework of IoT. These days, as IoT introduces advanced application architectures that minimizes human intervention by integrating businesses in some way to address digital computer processes by communicating within a given network. Moreover, it will be discussed the key technologies associated with Advanced Encryption Standards (AES) and the changes brought in market value and usage of services that has been taken place b since the IoT incorporated. © 2024 IEEE.
Repository logo
Collections
  • Scopus Collection
  • WoS Collection
  • TrDizin Collection
  • PubMed Collection
About
  • Contact
  • GCRIS
  • Research Ecosystems
  • Feedback
  • OAI-PMH

Powered by Research Ecosystems

  • Privacy policy
  • End User Agreement
  • Feedback