Ayav, Tolga
Loading...
Name Variants
Ayav T.
Ayav,Tolga
Ayav, Tolga
Ayav, T.
Tolga Ayav
Ayav,Tolga
Ayav, Tolga
Ayav, T.
Tolga Ayav
Job Title
Prof. Dr.
Email Address
tolgaayav@iyte.edu.tr
Main Affiliation
Bilgisayar Mühendisliği Bölümü
Status
Website
ORCID ID
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID
Sustainable Development Goals
SDG data could not be loaded because of an error. Please refresh the page or try again later.

Scholarly Output
69
Articles
17
Citation Count
0
Supervised Theses
23
68 results
Scholarly Output Search Results
Now showing 1 - 10 of 68
Article Otomotiv Endüstrisinde Zamanlama Mimarilerinin Değerlendirilmesi(2021) Saydam, Berkay; Ayav, Tolga; Ayav, Tolga; Bilgisayar Mühendisliği BölümüTeknolojik gelişmeler araçlara da yansırken güvenlikten ödün vermeden araçlara yeni işlevler ekleme zorluğunu da beraberinde getirmektedir. Araçlarda kullanılan çeşitli işlevleri yerine getiren görevler farklı karakteristiklere sahiptir. Güvenlik ve performans, bu görevlerin karakteristiğini belirlemek için kullanılan iki temel kriterdir. Görevlerin karakteristikleri, Otomotiv Güvenlik Bütünlük Seviyeleri olarak bilinen güvenlik seviyelerine göre sınıflandırılabilir. Donanım ve yazılım tasarımı ile ayrıca bunların doğrulanması ve testi otomotiv endüstrisinde uzun soluklu bir ilerlemedir. Bir Elektronik Kontrol Birimi sahada kullanılmaya başlandığında, donanım tasarımındaki herhangi bir değişiklik oldukça maliyetlidir. Makalede savunulan hipoteze göre, Merkezi İşlem Birimi tarafından görev yürütme sıralarını belirlemek için kullanılan zamanlama algoritmaları özenle seçilmelidir. Ayrıca donanım ve yazılım tasarımında bu karakteristik ve algoritmalar dikkate alınmalıdır. Aksi takdirde görevler, kritik bileşen için zaman kısıtının kaçırılması gibi güvenlik açısından ciddi sorunlara neden olabilmektedir. Bu makalede, zamanlama mimarileri değerlendirilerek hangi zamanlama mimarilerinin hangi amaçla kullanılması gerektiği belirtilmektedir. Algoritmaların avantaj ve dezavantajları sunulmaktadır.Master Thesis Block-chain based remote update for embedded devices(Izmir Institute of Technology, 2019-12) Kaptan, Melike; Ayav, Tolga; Ayav, Tolga; Erten, Yusuf MuratThis research work is an attempt to devise a platform to send automatic remote updates for embedded devices. In this scenario there are Original Equipment Manufacturers (OEMs), Software suppliers, Block-Chain nodes, Gateways and embedded devices. OEMs and software suppliers are there to keep their software on IPFS (Inter Planetary File System) and send the meta-data and hashes of their software to the Block-Chain nodes in order to keep this information distributed and ready to be requested and used. There are also gateways which are also the members of the Block-Chain and IPFS network. Gateways are responsible for asking for a specific update for specific devices from IPFS database using the meta-data standing on the Block-Chain. And they will send those hashed secure updates to the devices. In order to provide a traceable data keeping platform gateway update operations are handled as a transactions in the second block-chain network which is the clock-chain of the gateways. In this study implementation of the two block chain shows us that, even though the calculation overhead of the member devices, with regulations specific to the applications block-chains provide applicable platforms.Master Thesis A blockchain application for payment and traffic management in smart vehicles(Izmir Institute of Technology, 2022-07) Yiğitbaşı, Boğaçhan; Ayav, Tolga; Ayav, TolgaThe proposed solution offers an alternative way to our current retail shopping of fuel fees. It can be applied to any retail shopping process but this phase of the project is considered an initiation of upcoming. The next phases of the project, include full integration with smart cars in order to handle all procedures automatically. In the traditional way, when you buy some gas from a station with your credit card, the station owner pays some fee to his bank and it has to wait for some time to be able to get that money. You as an individual have to expose your identity so they can track your shopping habits and follow your expenses. Sometimes they may offer some loyalty discounts or gifts but with really ridiculous rates. Our system offers a digital payment system based on the Ethereum blockchain. It has its own token called TRANT (Transport Token) and by this token, any client with a digital wallet (Metamask) is able to pay their gas fees without exposing their real identity -only their wallet address-, and get some rewards in terms of TRANT for their loyalties and using our DEX (Decentralized Exchange) exchange them into the ether which can be converted into real fiat money easily. On the other hand, the proposed solution also has some advantages for the other party in this equation such as gas station owners, they immediately get their money at that very first moment without any remittance.Conference Object Loyalty Program using Blockchain(Ieee Computer Soc, 2020) Sonmezturk, Osman; Ayav, Tolga; Erten, Yusuf M.; Ayav, Tolga; Bilgisayar Mühendisliği BölümüThe traditional loyalty systems usually offer people benefits in a specific sector. The users usually need to stay within the loyalty system for a long time and accumulate points in order to win rewards which may not be very interesting for them most of the time. Additionally, users usually do not prefer to share their personal information to join these loyalty systems due to privacy concerns. It has, therefore, been observed that the number of customers in the loyalty systems is decreasing day by day. To reduce these drawbacks a loyalty program which complies with ERC20 standards was proposed in this study using tokens based on the Ethereum blockchain. Using this new generation loyalty system, users can convert their earned tokens to Ether in the market and they can receive services or products with the accumulated tokens according to their interests from any supplier that has been contracted by the manufacturer. Additionally, users in the designed system do not need to carry many different cards, it is adequate to have only one Ethereum wallet. Furthermore, users do not need to share any personal data to join the loyalty system. Suppliers can also request Ether from the manufacturer for the tokens they have accumulated from the members of the loyalty system. The proposed loyalty system has been implemented and presented in this study.Conference Object Model Based Testing of VHDL Programs(Ieee, 2015) Ayav, Tolga; Tuglular, Tugkan; Belli, Fevzi; Tuğlular, Tuğkan; Ayav, Tolga; Bilgisayar Mühendisliği BölümüVHDL programs are often validated by means of test benches constructed from formal system specification. To include real-time properties of VHDL programs, the proposed approach first transforms them to concurrently running network of timed automata and then performs model checking on properties taken from the specification. Counterexamples generated by the model checker are used to form a test bench. The approach is validated by a case study composed of a nontrivial application running on a microprocessor. As presented, the approach enables testing both hardware and software at once.Master Thesis Implementation and performance analysis of contex-aware role-based access controls for cloud-based IoT platform(Izmir Institute of Technology, 2019-09) Döşemeci, Mete Merthan; Ayav, Tolga; Ayav, TolgaIoT has received substantial attention in both industry and the scholarly world in the recent years. The main idea is to interconnect the physical world with the digital world. Sensors read physical world and present processible data. This data needs to be secured. Currently, most of the cloud based IoT platforms use some sort of Role-Based Access Control (RBAC) , which is one of the approaches to control access to the devices, hence the data. In some cases RBAC is insufficient for fulfilling constantly changing requirements of IoT. ABAC (Attribute Based Access Control) can be flexible enough for fulfilling. However ABAC requires higher level of maintenance. We wanted to implement a access control method that uses both RBAC’s and ABAC’s advantages. We called it OBAC(Operation Based Access Control). Authorization is being implemented in a plug and play manner. We implemented that way because; It is designed for cloud platforms and we wanted to switch between access control methods easily. The results of the experiment shows that proposed access control(OBAC) had minimum latency and management steps across other access control methods.Article Achieving query performance in the cloud via a cost-effective data replication strategy(Springer, 2021) Tos, Uras; Mokadem, Riad; Hameurlain, Abdelkader; Ayav, Tolga; Ayav, Tolga; Bilgisayar Mühendisliği BölümüMeeting performance expectations of tenants without sacrificing economic benefit is a tough challenge for cloud providers. We propose a data replication strategy to simultaneously satisfy both the performance and provider profit. Response time of database queries is estimated with the consideration of parallel execution. If the estimated response time is not acceptable, bottlenecks are identified in the query plan. Data replication is realized to resolve the bottlenecks. Data placement is heuristically performed in a way to satisfy query response times at a minimal cost for the provider. We demonstrate the validity of our strategy in a performance evaluation study.Conference Object Towards test case generation for synthesizable VHDL programs using model checker(2010) Ayav, T.; Tuglular, T.; Belli, F.; Tuğlular, Tuğkan; Ayav, Tolga; Bilgisayar Mühendisliği BölümüVHDL programs are often tested by means of simulations, relying on test benches written intuitively. In this paper, we propose a formal approach to construct test benches from system specification. To consider the real-time properties of VHDL programs, we first transform them to timed automata and then perform model checking against the properties designated from the specification. Counterexamples returned from the model checker serve as a basis of test cases, i.e., they are used to form a test bench. The approach is demonstrated and complemented by a simple case study. © 2010 IEEE.Conference Object Boolean Differentiation for Formalizing Myers' Cause-Effect Graph Testing Technique(Ieee, 2015) Ayav, Tolga; Belli, Fevzi; Ayav, Tolga; Bilgisayar Mühendisliği BölümüCause-Effect Graph Testing is a popular technique used for almost four decades. Based on Boolean algebra, this technique assists deriving test cases from a given specification informally written in a natural language. The present paper suggests Boolean differentiation for formalizing this technique. The new approach is applied to an example, borrowed from G. Myers, for demonstrating and analyzing its features. Evaluations show that the new approach outperforms Myers' approach in terms of the detected faults per test cases.Conference Object Moving Switching Functions to Continuous Domain(Ieee Computer Soc, 2016) Ayav, Tolga; Sozer, Hasan; Ayav, Tolga; Bilgisayar Mühendisliği BölümüThis paper proposes a method for moving switching functions to continuous domain. The benefits of this approach are twofold. First, the elementary calculus works with the transformed functions. Second, this transformation approach facilitates various analyses relying on Boolean algebra and other existing Boolean-based calculi like Boolean difference. We present one of the potential applications and show how MCDC test pairs can be computed solely by means of elementary calculus.