default search action
Korhan Cengiz
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j45]Korhan Cengiz, Swati Lipsa, Ranjan Kumar Dash, Nikola Ivkovic, Mario Konecki:
A Novel Intrusion Detection System Based on Artificial Neural Network and Genetic Algorithm With a New Dimensionality Reduction Technique for UAV Communication. IEEE Access 12: 4925-4937 (2024) - [j44]Deepika Gautam, Sunil Prajapat, Pankaj Kumar, Ashok Kumar Das, Korhan Cengiz, Willy Susilo:
Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage. Clust. Comput. 27(6): 8159-8172 (2024) - [j43]Binita Kumari, Ajay Kumar Yadav, Korhan Cengiz, Bashir Salah:
Integrating CLDs and machine learning through hybridization for human-centric wireless networks. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j42]Mohamed Aly Bouke, Azizol Abdullah, Korhan Cengiz, Sedat Akleylek:
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems. PeerJ Comput. Sci. 10: e2043 (2024) - [j41]Rani Kumari, Dinesh Kumar Sah, Shivani Gupta, Korhan Cengiz, Nikola Ivkovic:
Advancing Medical Recommendations With Federated Learning on Decentralized Data: A Roadmap for Implementation. IEEE Trans. Consumer Electron. 70(1): 2666-2674 (2024) - [c6]Dinesh Kumar Sah, Ali Nauman, Muhammad Ali Jamshed, Korhan Cengiz, Nikola Ivkovic, Vedran Uros:
Reinforcement Learning Infused MAC for Adaptive Connectivity. WCNC 2024: 1-5 - 2023
- [j40]Swati Lipsa, Ranjan Kumar Dash, Nikola Ivkovic, Korhan Cengiz:
Task Scheduling in Cloud Computing: A Priority-Based Heuristic Approach. IEEE Access 11: 27111-27126 (2023) - [j39]Mohamed Aly Bouke, Azizol Abdullah, Jaroslav Frnda, Korhan Cengiz, Bashir Salah:
BukaGini: A Stability-Aware Gini Index Feature Selection Algorithm for Robust Model Performance. IEEE Access 11: 59386-59396 (2023) - [j38]Ranjan Kumar Dash, Tu N. Nguyen, Korhan Cengiz, Aditi Sharma:
Fine-tuned support vector regression model for stock predictions. Neural Comput. Appl. 35(32): 23295-23309 (2023) - [j37]Korhan Cengiz, Rani Kumari, Dinesh Kumar Sah, Nikola Ivkovic, Bashir Salah:
SOHCL-RDT: A self-organized hybrid cross-layer design for reliable data transmission in wireless network. Phys. Commun. 60: 102132 (2023) - [c5]Rani Kumari, Dinesh Kumar Sah, Korhan Cengiz, Ali Nauman, Nikola Ivkovic, Ivan Mihaljevic:
Optimizing Resource Utilization Using Vector Databases in Green Internet of Things. GLOBECOM (Workshops) 2023: 1988-1993 - [i1]Mohamed Aly Bouke, Sameer Hamoud Alshatebi, Azizol Abdullah, Korhan Cengiz, Hayate El Atigh:
African Union Convention on Cyber Security and Personal Data Protection: Challenges and Future Directions. CoRR abs/2307.01966 (2023) - 2022
- [j36]Ranjan Kumar Dash, Korhan Cengiz, Yasser Ali Alshehri, Noha Alnazzawi:
A new and reliable intelligent model for deployment of sensor nodes for IoT applications. Comput. Electr. Eng. 101: 107959 (2022) - [j35]Dinesh Kumar Sah, Chaya Ravindra, Korhan Cengiz, Yasser Ali Alshehri, Noha Alnazzawi, Nikola Ivkovic:
Early alert for sleep deprivation using mobile sensor data fusion. Comput. Electr. Eng. 102: 108228 (2022) - [j34]Dinesh Kumar Sah, Tu N. Nguyen, Korhan Cengiz, Braulio Dumba, Vikas Kumar:
Load-balance scheduling for intelligent sensors deployment in industrial internet of things. Clust. Comput. 25(3): 1715-1727 (2022) - [j33]Kübra Seyhan, Tu N. Nguyen, Sedat Akleylek, Korhan Cengiz:
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey. Clust. Comput. 25(3): 1729-1748 (2022) - [j32]Dinesh Kumar Sah, Tarachand Amgoth, Korhan Cengiz, Yasser Ali Alshehri, Noha Alnazzawi:
TDMA policy to optimize resource utilization in Wireless Sensor Networks using reinforcement learning for ambient environment. Comput. Commun. 195: 162-172 (2022) - [j31]Janmenjoy Nayak, Manohar Mishra, Bighnaraj Naik, Hanumanthu Swapnarekha, Korhan Cengiz, Vimal Shanmuganathan:
An impact study of COVID-19 on six different industries: Automobile, energy and power, agriculture, education, travel and tourism and consumer electronics. Expert Syst. J. Knowl. Eng. 39(3) (2022) - [j30]Rahim Khan, Qiang Yang, Inam Ullah, Ateeq Ur Rehman, Ahsan Bin Tufail, Alam Noor, Abdul Rehman, Korhan Cengiz:
3D convolutional neural networks based automatic modulation classification in the presence of channel noise. IET Commun. 16(5): 497-509 (2022) - [j29]Muhammad Ali Naeem, Tu N. Nguyen, Rashid Ali, Korhan Cengiz, Yahui Meng, Tahir Khurshaid:
Hybrid Cache Management in IoT-Based Named Data Networking. IEEE Internet Things J. 9(10): 7140-7150 (2022) - [j28]Ali Nauman, Tu N. Nguyen, Yazdan Ahmad Qadri, Zulqar Nain, Korhan Cengiz, Sung Won Kim:
Artificial Intelligence in Beyond 5G and 6G Reliable Communications. IEEE Internet Things Mag. 5(1): 73-78 (2022) - [j27]Ying Wang, Korhan Cengiz:
Implementation of the Spark technique in a matrix distributed computing algorithm. J. Intell. Syst. 31(1): 660-671 (2022) - [j26]Kulandairaj Martin Sagayam, Ahona Ghosh, Bharat Bhushan, J. Andrew Onesimu, Korhan Cengiz, Ahmed A. Elngar:
Underwater estimation of audio signal prediction using fruit fly algorithm and hybrid wavelet neural network. J. Reliab. Intell. Environ. 8(2): 211-221 (2022) - [j25]Dinesh Kumar Sah, Tu N. Nguyen, Manjusha Kandulna, Korhan Cengiz, Tarachand Amgoth:
3D Localization and Error Minimization in Underwater Sensor Networks. ACM Trans. Sens. Networks 18(3): 31:1-31:25 (2022) - [j24]Sunil Kumar, Korhan Cengiz, S. Vimal, Annamalai Suresh:
Energy Efficient Resource Migration Based Load Balance Mechanism for High Traffic Applications IoT. Wirel. Pers. Commun. 127(1): 385-403 (2022) - 2021
- [j23]Krishna Kant Singh, Piyush Yadav, Akansha Singh, Gaurav Dhiman, Korhan Cengiz:
Cooperative spectrum sensing optimization for cognitive radio in 6 G networks. Comput. Electr. Eng. 95: 107378 (2021) - [j22]Ali Nauman, Muhammad Ali Jamshed, Rashid Ali, Korhan Cengiz, Zulqarnain, Sung Won Kim:
Reinforcement learning-enabled Intelligent Device-to-Device (I-D2D) communication in Narrowband Internet of Things (NB-IoT). Comput. Commun. 176: 13-22 (2021) - [j21]Dinesh Kumar Sah, Korhan Cengiz, Praveen Kumar Donta, Venkata N. Inukollu, Tarachand Amgoth:
EDGF: Empirical dataset generation framework for wireless sensor networks. Comput. Commun. 180: 48-56 (2021) - [j20]Nasru Minallah, Khadem Ullah, Jaroslav Frnda, Korhan Cengiz, Muhammad Awais Javed:
Transmitter Diversity Gain Technique Aided Irregular Channel Coding for Mobile Video Transmission. Entropy 23(2): 235 (2021) - [j19]Gaurav Dhiman, Krishna Kant Singh, Mukesh Soni, Atulya Nagar, Mohammad Dehghani, Adam Slowik, Amandeep Kaur, Ashutosh Sharma, Essam H. Houssein, Korhan Cengiz:
MOSOA: A new multi-objective seagull optimization algorithm. Expert Syst. Appl. 167: 114150 (2021) - [j18]Korhan Cengiz, Rashid Ali, Sedat Akleylek, Jaroslav Frnda:
Call for papers: Special issue on distributed next generation 5G data networks. Intell. Converged Networks 2(1): 84-85 (2021) - [j17]Saurabh Chandra, Prateek, Rohit Sharma, Rajeev Arya, Korhan Cengiz:
QSPCA: A Two-Stage Efficient Power Control Approach in D2D Communication for 5G Networks. Intell. Converged Networks 2(4): 295-305 (2021) - [j16]Ling Ma, Mohammad Asif Ikbal, Korhan Cengiz:
Realization of Agricultural Machinery Equipment Management Information System Based on Network. Int. J. Agric. Environ. Inf. Syst. 12(3): 13-25 (2021) - [j15]Qiu-ming Zhang, Jing Luo, Korhan Cengiz:
An Optimized Deep Learning based Technique for Grading and Extraction of Diabetic Retinopathy Severities. Informatica (Slovenia) 45(5) (2021) - [j14]Korhan Cengiz:
Comprehensive Analysis on Least-Squares Lateration for Indoor Positioning Systems. IEEE Internet Things J. 8(4): 2842-2856 (2021) - [j13]Joel J. P. C. Rodrigues, Korhan Cengiz, Muhammad Awais Javed, Sudeep Tanwar, Zhaolong Ning, Sherali Zeadally:
GUEST EDITORIAL: Internet of Medical Things in the Context of COVID-19. IEEE Internet Things Mag. 4(2): 2-3 (2021) - [j12]Poongodi M, Tu N. Nguyen, Mounir Hamdi, Korhan Cengiz:
Global cryptocurrency trend prediction using social media. Inf. Process. Manag. 58(6): 102708 (2021) - [j11]Kübra Seyhan, Tu N. Nguyen, Sedat Akleylek, Korhan Cengiz, SK Hafizul Islam:
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security. J. Inf. Secur. Appl. 58: 102788 (2021) - [j10]Zhuoran Chen, Biao Cong, Zhenxing Hua, Korhan Cengiz, Mohammad Shabaz:
Application of clustering algorithm in complex landscape farmland synthetic aperture radar image segmentation. J. Intell. Syst. 30(1): 1014-1025 (2021) - [j9]Gaurav Dhiman, Diego Oliva, Amandeep Kaur, Krishna Kant Singh, S. Vimal, Ashutosh Sharma, Korhan Cengiz:
BEPO: A novel binary emperor penguin optimizer for automatic feature selection. Knowl. Based Syst. 211: 106560 (2021) - [j8]Amit Kumer Podder, Abdullah Al Bukhari, Sayemul Islam, Sujon Mia, Mazin Abed Mohammed, Nallapaneni Manoj Kumar, Korhan Cengiz, Karrar Hameed Abdulkareem:
IoT based smart agrotech system for verification of Urban farming parameters. Microprocess. Microsystems 82: 104025 (2021) - [j7]Jianli Guo, Korhan Cengiz, Ravi Tomar:
An IOT and Blockchain Approach for Food Traceability System in Agriculture. Scalable Comput. Pract. Exp. 22(2): 127-137 (2021) - [j6]Muhammad Ali Jamshed, Masood Ur Rehman, Jaroslav Frnda, Ayman Abdulhadi Althuwayb, Ali Nauman, Korhan Cengiz:
Dual Band and Dual Diversity Four-Element MIMO Dipole for 5G Handsets. Sensors 21(3): 767 (2021) - [j5]Saleemullah Memon, Kamran Ali Memon, Junaid Ahmed Uqaili, Kamlesh Kumar Soothar, Rabnawaz Sarmad Uqaili, Korhan Cengiz:
Joint optimal power splitting and relay selection strategy under SWIPT. Wirel. Networks 27(8): 5385-5395 (2021) - 2020
- [j4]Muhammad Shafiq, Zhihong Tian, Ali Kashif Bashir, Korhan Cengiz, Adnan Tahir:
SoftSystem: Smart Edge Computing Device Selection Method for IoT Based on Soft Set Technique. Wirel. Commun. Mob. Comput. 2020: 8864301:1-8864301:10 (2020) - [c4]Gunasekaran Raja, Kottilingam Kottursamy, Ajay Theetharappan, Korhan Cengiz, Aishwarya Ganapathisubramaniyan, Rupak Kharel, Keping Yu:
Dynamic Polygon Generation for Flexible Pattern Formation in Large-Scale UAV Swarm Networks. GLOBECOM (Workshops) 2020: 1-6
2010 – 2019
- 2018
- [j3]Korhan Cengiz, Tamer Dag:
Energy Aware Multi-Hop Routing Protocol for WSNs. IEEE Access 6: 2622-2633 (2018) - 2016
- [j2]Korhan Cengiz, Tamer Dag:
Improving Energy-Efficiency of WSNs through LEFCA. Int. J. Distributed Sens. Networks 12(9): 8139401 (2016) - [c3]Korhan Cengiz, Tamer Dag:
Extending the lifetime of WSNs with Maximum Energy Selection Algorithm (MESA). BlackSeaCom 2016: 1-5 - [c2]Korhan Cengiz, Tamer Dag:
Multi-hop low energy fixed clustering algorithm (M-LEFCA) for WSNs. ISTT 2016: 31-34 - [c1]Murat Aydemir, Korhan Cengiz:
A potential architecture and next generation technologies for 5G wireless networks. SIU 2016: 277-280 - 2015
- [j1]Korhan Cengiz, Tamer Dag:
A review on the recent energy-efficient approaches for the Internet protocol stack. EURASIP J. Wirel. Commun. Netw. 2015: 108 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint