Circular Image

Z. Erkin

49 records found

Offline Digital Euro

A Minimum Viable CBDC using Groth-Sahai proofs

Current digital payment solutions are fragile and offer less privacy than traditional cash. Their critical dependency on an online service used to perform and validate transactions makes them void if this service is unreachable. Moreover, no transaction can be executed during ser ...
This thesis researches the security of firmware images in the Internet of Things (IoT) and embedded devices. We present an open-source tool, Embedded Binary Analysis Tool (EBAT), designed to analyze cross-architectural firmware image security context. EBAT consists of various mod ...

Creating New Train Timetables in Case of Disruptions

Optimising a Branch & Bound Algorithm

The Dutch railway system is one of the most densely used systems worldwide and the busiest in Europe. Given the tight schedules, incidents can quickly cascade through the entire country if not handled properly. Alternative timetables are created to help train traffic controllers ...
Foremost among the challenges of the Bitcoin blockchain is the scalability bottleneck. To address this issue, the Lightning Network, a payment channel network, was created. Lightning is a payment channel network that is source-routed and uses onion routing, like Tor. However, unl ...
Call graphs are useful tools for representing method relationships within software projects and correlations between dependencies. Although static analysis is a prevalent method for call graph construction, it has its limitations such as struggling with handling dynamic features ...
Federated Learning is highly susceptible to backdoor and targeted attacks as participants can manipulate their data and models locally without any oversight on whether they follow the correct process. There are a number of server-side defenses that mitigate the attacks by modify ...
Machine learning models are increasingly being used within software engineering for their predictions. Research shows that these models’ performance is increasing with new research. This thesis focuses on models for method name prediction, for which the goal is to have a model th ...
Searchable Symmetric Encryption (SSE) schemes provide secure search over encrypted databases while allowing admitted information leakages. Generally, the leakages can be categorized into access, search, and volume pattern. In most existing Searchable Encryption (SE) schemes, thes ...
In this Thesis a fast, low-cost, anthropomorphic robotic hand with tactile feedback is designed. The hand consists of an index finger and a thumb, both of which have four degrees of freedom. All eight degrees of freedom are fully actuated using eight servomotors whose forces are ...
In this paper, a method is proposed for stylizing stereoscopic augmented reality, while attempting to retain temporal and visual coherence. By tracking an AR marker and estimating a disparity map from stereo images, world positions of anchor points are tracked across frames and i ...
According to the Contrast Sensitivity Function, the contrast of different spatial frequency elements of an image will be seen differently depending on distance. We propose a method for compensating for these differences by acting on an image's frequency representation and manipul ...
The appearance of an object or scene is determined by factors like the material, the lights, the geometry, the position of the observer, and the surroundings.
Changes in these factors can be simulated using a projector-camera setup.
Other research focuses on changing the ...
Augmented Reality (AR) tracking for mobile devices is not realiable in environments where large virtual content, such as an entire virtual building, is to be displayed to the user. This paper presents a study on how multiple on-site markers can be used to better align the virtual ...
Diminished reality (DR) is an extension of augmented reality (AR) in which real objects are concealed, removed, or replaced. State of the art DR implementations are written and evaluated on desktop platforms, and those which are aimed at smartphones use auxiliary data or hardware ...
A decrease in wellbeing worldwide due to the COVID-19 pandemic called for ways to assess wellbeing in a scalable and adequate manner. Conversational User Interfaces (CUIs) seem suitable, however, applying them optimally in certain contexts remains a challenge. This study aims to ...
The increase in global internet users brings forth a vast amount of social media users and therefore opinions that are shared online. A subset of those users, adolescents, seem to develop some sort of addiction towards social media, which could lead to low life satisfaction. This ...
With the COVID-19 pandemic testing humanity worldwide in unforeseen ways, wellbeing assessment has stepped to the foreground of individual health status. Conversational User Interfaces (CUIs) prove promising as an assessment tool, but lacking the means to retain users engaged dur ...
With the surge of mental health issues during COVID-19, more emphasis has turned towards assessing wellbeing. At the same time, recent advances in AI have shown huge potential in a variety of fields. However, few solutions are available at the intersection of those two fields. Th ...

Designing a dashboard for wellbeing data

A recommendation system for individual wellbeing

Due to COVID-19 the overall wellbeing worldwide decreased. Assessing and improving wellbeing became a more important subject. This article describes the design research that uses the My Wellness Check survey created by the Delft University for Technology and aims to create a dash ...
Quantum networks allow multiple devices to exchange information encoded within quantum systems.
Such quantum networks use classical control messages to coordinate entanglement between nodes.
Third parties which can forge such control messages may interfere with the workin ...