Entity

Time filter

Source Type

Istanbul, Turkey

The Turkish Air Force Academy is a four-year co-educational military academy located in the city of Istanbul, Turkey. It is the main human resource for the Turkish Air Force Command.It was founded in 1951, replacing the Army Flight School, with the mandate to train the officers of the Turkish Air Force. The academy provides an engineering education to Air Force cadets from Turkey as well as a number of other countries, and prepares them for careers in their respective Air Forces. TuAFA is recognized by the Turkish Council of Higher Education, as a university accredited to grant engineering degrees. It should not be confused with the Air War College . Since 1992, the Academy has accepted female cadets and allied countries' cadets for enrolment. Accepting cadets not only from Turkey, but also all over the world makes this college very unusual.The aim of the academy is to produce officers who have;The qualities required in a soldierCommandership, management and leadership skillsMilitary and general knowledgeMorally and mentally developed personalityPhysical competence required for conditions of aviationWith its core values, the college seeks to develop officer candidates' integrity, bravery and honour. Wikipedia.


Sahingoz O.K.,Turkish Air force Academy
Journal of Systems Architecture | Year: 2013

Cyber-Physical Systems (CPSs) have emerged as a promising approach to facilitate the integration of the cyber and physical worlds in highly interconnected and complex ways. CPSs consist of several components, such as sensors, actuators, controllers, etc., and their structures are being complicated, and their scales are increasing day by day. Therefore, the data reliability and security have emerged as critical challenges between physical and virtual components of these systems. Wireless Sensor Networks (WSNs) are accepted as one of the most crucial technologies for building future CPSs. Because of their wireless and dynamic nature, WSNs are more vulnerable to security attacks than wired networks. The main solution for this problem is the usage of signed messages with symmetric or asymmetric key cryptography. Although, asymmetric key cryptography increases network security, it also causes severe computational, memory, and energy overhead for sensor nodes. On the other hand, symmetric key cryptography has the difficulty of providing high-level security and efficient key management scheme; however, it is better in terms of speed and low energy cost. In this paper, it is aimed to build a multi-level dynamic key management system for WSNs with the aid of an Unmanned Aerial Vehicle (UAV), which is a key distribution and coordination center for asymmetric keys. After that, each sensor node constructs different symmetric keys with its neighbors, and communication security is achieved by data encryption and mutual authentication with these keys. Evaluation results show the proposed system is scalable, and its performance is significantly better than asymmetric key management systems. © 2013 Elsevier B.V. All rights reserved. Source


Sahingoz O.K.,Turkish Air force Academy
Journal of Intelligent and Robotic Systems: Theory and Applications | Year: 2014

In recent years, the capabilities and roles of Unmanned Aerial Vehicles (UAVs) have rapidly evolved, and their usage in military and civilian areas is extremely popular as a result of the advances in technology of robotic systems such as processors, sensors, communications, and networking technologies. While this technology is progressing, development and maintenance costs of UAVs are decreasing relatively. The focus is changing from use of one large UAV to use of multiple UAVs, which are integrated into teams that can coordinate to achieve high-level goals. This level of coordination requires new networking models that can be set up on highly mobile nodes such as UAVs in the fleet. Such networking models allow any two nodes to communicate directly if they are in the communication range, or indirectly through a number of relay nodes such as UAVs. Setting up an ad-hoc network between flying UAVs is a challenging issue, and requirements can differ from traditional networks, Mobile Ad-hoc Networks (MANETs) and Vehicular Ad-hoc Networks (VANETs) in terms of node mobility, connectivity, message routing, service quality, application areas, etc. This paper identifies the challenges with using UAVs as relay nodes in an ad-hoc manner, introduces network models of UAVs, and depicts open research issues with analyzing opportunities and future work. © 2013 Springer Science+Business Media Dordrecht. Source


Sahingoz O.K.,Turkish Air force Academy
Journal of Intelligent and Robotic Systems: Theory and Applications | Year: 2014

In recent years, Unmanned Aerial Vehicles (UAVs) have been used in many military and civil application areas, due to their increased endurance, performance, portability, and their larger payload-carrying, computing and communication capabilities. Because of UAVs' complex operation areas and complicated constraints related to the assigned task, they have to fly on a path, which is calculated online and/or offline to satisfy these constraints and to check some control points in the operation theatre. If the number of control points and constraints increases, finding a feasible solution takes up too much time in this large operation area. In this case, the use of multi-UAVs decreases operation completion time; however, this usage increases the complexity of finding a feasible path problem. This problem is typically NP-hard and genetic algorithms have been successfully utilized for solving it in the last few decades. This paper presents how a flyable trajectory can be constructed for multi-UAV systems by using a Genetic Algorithm (GA) in a known environment and at a constant altitude. A GA is implemented parallel in a multi-core environment to increase the performance of the system. First, a feasible path is calculated by using a parallel GA, and then the path is smoothed by using Bezier curves to convert it flyable. Preliminary results show that the proposed method provides an effective and feasible path for each UAV in an Unmanned Aerial System with multi-UAVs. The proposed system is realized in Java with a GUI for showing results. This paper also outlines future work that can be conducted on the multi-UAV path planning. © 2013 Springer Science+Business Media Dordrecht. Source


Atli O.,Turkish Air force Academy
International Journal of Computational Intelligence Systems | Year: 2011

When the project is scheduled with a given set of resources, it is difficult to find the optimal solution. Resourceconstrained scheduling problems (RCPSP) are generally NP-hard. In this paper, a high level heuristic procedure "Tabu Search Algorithm (TSA)" is proposed to provide good solutions to resource-constrained, deterministic activity duration project scheduling problems. We present the application results of the computational tabu search and OPL-CPLEX algorithm and compare them with that of earlier applicable researches along with a discussion about further research. Our computational results are presented, which establish the superiority of tabu search over the existing heuristic algorithms. Two different solution strategies are also discussed, namely tabu search and OPLCPLEX exact algorithm approach which can be used with the proposed model. Due to the execution time, we have shown that OPL-CPLEX's algorithm is a valid method with medium scale RCPSPs. For the considered deterministic problems, a good agreement has been obtained between theoretical and experimental results. © the authors. Source


Sahingoz O.K.,Turkish Air force Academy
Lecture Notes in Electrical Engineering | Year: 2013

Wireless Sensor Networks (WSNs) are more vulnerable to security attacks than wired networks because of their wireless and dynamic nature. In today's WSNs, the sensor nodes act not only as routers but also as communication endpoints, and they are also responsible for the security of the messages. Therefore, it is important to define whether an incoming message originates from a trustworthy node or not. The main solution for this is the usage of cryptographically signed messages. There are two main classifications for signing messages: namely symmetric and asymmetric algorithm based cryptography. In the asymmetric key cryptography, public/private key pairs are used to encrypt and decrypt messages. However, it can cause severe computational, memory, and energy overhead for the nodes. On the other side, symmetric key cryptography is superior to asymmetric key cryptography in terms of speed and low energy cost, but at the same time, it needs to design an efficient and flexible key distribution schemes for improving system performance. In this paper, it is aimed to set a multi-level dynamic key management system for WSNs with the aid of an Unmanned Aerial Vehicle (UAV) as a key distribution and coordination center for asymmetric keys. Public keys of the sensor nodes are dispatched by UAVs and symmetric keys set with these key combinations. Evaluation results show the proposed system is scalable, and its performance is considerably better than single asymmetric key management systems. © 2013 Springer Science+Business Media. Source

Discover hidden collaborations