Tuncay Ercan

Tuncay Ercan
Yasar University · Department of Management Information Systems

Doctor of Philosophy

About

100
Publications
85,142
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
863
Citations
Citations since 2017
30 Research Items
488 Citations
2017201820192020202120222023020406080
2017201820192020202120222023020406080
2017201820192020202120222023020406080
2017201820192020202120222023020406080
Introduction
Tuncay Ercan graduated from Military Academy, Department of Electric-Electronics in 1986. He received his M.S. degree from Ege University, and Ph.D from Dokuz Eylul University in Computer Engineering in 2000 and 2005 respectively. He is an Associate Professor at Yasar University, Department of Computer Engineering. His research interests include: Advanced Network Technologies, Wireless Ad-hoc and Sensor Networks, IoT, IIoT, Cloud Computing, Net Sec. and Forensics, Network modelling and MIS.
Additional affiliations
October 2005 - February 2021
Yasar University
Position
  • Professor
Description
  • Tuncay Ercan graduated from Military Academy, Department of Electric-Electronics in 1986. He received his M.S. degree from Ege University, and Ph.D from Dokuz Eylul University in Computer Engineering in 2000 and 2005 respectively. He is an Associate Professor at Yasar University, Department of Computer Engineering. His research interests include: Advanced Network Technologies, Wireless Ad-hoc and Sensor Networks, Network Security and Forensics, Network modelling and Management Information System

Publications

Publications (100)
Conference Paper
Edge Computing and predictive maintenance have become important terms in the research area of the Industrial Internet of Things. Edge computing is an evolution of cloud computing that brings the computing and storage resources of a cloud closer to the devices thus reducing problems of latency and high data influx. Predictive maintenance (PdM) is a...
Article
Agile has been invented to improve and overcome the deficiencies of efficient software development. At present, the agile model is used in software development vastly due to its support to both developers and clients resourcefully. Agile methodology increases the interaction between the developer and client to make the software product defect-free....
Conference Paper
Sağlık sektörü, alanındaki bütün resmi yönetmeliklere uyum sağlamak, sağlıkta gelişim, kalite ve sürdürülebilirlik odaklı bir stratejik yaklaşımı pratik olarak gerçekleştirebilmek konusunda oldukça başarılıdır. Bu doğrultuda sektörün insan odaklı temel değerlerinden olan hakkaniyet, evrensellik, kanıta dayalılık, hesap verebilirlik, şeffaflık ve ka...
Article
Full-text available
Academic and industrial studies on smart systems, which have entered all areas of our lives, continue to their rapid developments along with gaining momentum with Industry 4.0. Especially, many of the different production devices with their molding, printing, shaping, and cutting capabilities have a certain level of automation. They work together w...
Article
Background Scrum methodology is the most useful and adopted part of the agile methodology. Many organizations are adopting Scrum for the last decade to meet their software requirements. It is facilitating the software industries to develop software applications according to the user's requirements. Objective Scrum helps to fulfill the customer's r...
Chapter
The term “smart city” is currently at the intersection of digital technologies, all transformative innovations, and urban living spaces. Smart cities, which are the development area of many new ideas due to their increasing population, are the first exciting places that many people think of to work and live. As the world is increasingly urbanized,...
Article
Full-text available
The research aims to test the model of integrated DOI theory and TOE framework to predict Cloud Computing (CC) decision-making intentions of SMEs, Izmir, Turkey. The survey data was collected from 140 Information Technology (IT) decision-makers via Google forms survey tool. Confirmatory factor analyses were made to examine the decision-making appro...
Article
Full-text available
Purpose of the study: This study aims to investigate the internal and external factors for CC adoption decisions of companies in Izmir, Turkey using a combination of DOI and TOE models. Methodology: This is a confirmatory survey of businesses, forming a questionnaire for 176 IT decision-makers of noncloud or cloud user businesses in the city of Izm...
Chapter
Smart utilities are the fundamental opportunities provided by smart cities for the public to live civilized. They are overall public solutions that combine the design and implementation of intelligent systems mainly for electricity, water, and natural gas in addition to tens of different assets like public transportation, healthy environment, water...
Chapter
It is very important to know the services and responsibilities of the city administration. Regardless of this objective, building a comfortable and sustainable city for the citizens by putting the quality of life at the center of the city, is one of these responsibilities. In fact, the issue of the way how city administrations change especially wit...
Conference Paper
Full-text available
Cloud computing has emerged as a phenomenon way of IT services for companies. As IT decisionmakers in the national sector need an integrated marketing communication, integrated sales channel management, and inventory management, they develop a cloud computing adoption model for downloading, configuring and maintaining application by outsourcing dat...
Chapter
Full-text available
The aim of this chapter is to evaluate and predict the future of international fntech instruments in the domain of innovation diffusion theory (IDT) adoption strategies. Further, the consequences of the new payments system directive (PSD2) in Europe and blockchain applications are discussed. For instance, money transfer and payments have the highest...
Article
Full-text available
Purpose of the study: This research aims to understand the benefits and challenges of cloud and non-cloud adopter companies of production and service sectors on cloud computing and making recommendations based on companies’ perceptions of the issue in Izmir, Turkey. Methodology: This is a descriptive survey of businesses, forming a questionnaire fo...
Article
Full-text available
Purpose of the study: This study aims to investigate the internal and external factors for CC adoption decisions of companies in Izmir, Turkey using a combination of DOI and TOE models. Methodology: This is a confirmatory survey of businesses, forming a questionnaire for 176 IT decision-makers of non-cloud or cloud user businesses in the city of Iz...
Article
In this study, an artificial intelligent algorithm that can be used for monitoring health-care MIoT (Medicinal Internet of Things) and predicting system based on Adaptive Neuro-Fuzzy Inferences System Architecture (ANFIS) is proposed. We contribute with a new modification for ANFIS architecture and implement it in Field-programmable Gate Array (FPG...
Conference Paper
Full-text available
Power transmission has faced many challenges as the days goes by. Power demand has increased and its becoming increasingly difficult to acquire right way for new lines, due to growth, population, urbanizations and environmental issues. This research aims to provide methods for the rationale selections of HVDC system, essential HVDC equations and th...
Chapter
Full-text available
Internet kullanımının yaygınlaşması insanlar arasındaki bilgi paylaşımı ve etkileşimini önemli ölçüde arttırarak günlük yaşantımızı değiştirmektedir. “Nesnelerin Interneti (IoT: Internet of Things)” olarak adlandırılan yeni teknoloji akıllı cihazların, birbirlerini algılayarak iletişime geçmesi ve toplanan bilgilerin bulut sistemlerinde değerlendir...
Article
Full-text available
The use of information technologies in the implementation of industry 4.0 applications has naturally attracted the attention of many entrepreneurs and the business community. Industry 4.0 applications enabled cost reduction and efficiency in Industrial production systems. However, there are difficulties in the process of reliable data collection, i...
Conference Paper
Full-text available
Internet of Things has entered our lives as many forms and devices and enabled us to connect even the smallest-size devices to the internet. This progression aided us by deploying sensors on the workspace we need, such as hospitals, buildings, all sort of vehicles, logistics, even automated manufacturing and factories. In terms of quantity, around...
Chapter
Full-text available
It is a well-known fact that the use of the networking technologies increases communication, sharing of information and mutual interaction among the different systems. The Internet of Things (IoT) is a new technological concept that the intelligent devices (different sensors, application outputs, production data in factories) somehow communicate wi...
Article
The use of information technologies in the implementation of industry 4.0 applications has naturally attracted the attention of many entrepreneurs and the business community. Industry 4.0 applications enabled cost reduction and efficiency in Industrial production systems. However, there are difficulties in the process of reliable data collection, i...
Conference Paper
Full-text available
Manipulators serve worldwide to increase quality requirements and speed up the production of the manufacturing industry. Typical applications of manipulators include welding, painting, ironing, assembly, picking and placing, product inspection. In this study, we focus on designing and implementing a low-cost training manipulator set for “Robotic an...
Article
In Wireless Sensor Networks (WSNs), the sensor nodes have limited energy resources with their mostly irreplaceable batteries. This makes to encourage design protocols that are energy efficient to provide a longer network lifetime. This paper proposes a method to divide the sensor network into equalsize grids namely regular geometric shaped clusters...
Conference Paper
Cloud computing became the most efficient resource for following the business processes of companies and providing the required ICT capability for the last 10 years. It is a well-known fact that different cloud computing services help firms to orient themselves effectively to their functional goals. Because many additional issues such as budget, hu...
Article
Applications related with WSNs may include thousands of separate sensor nodes, production and control data for different industrial sectors. It is important to manage these applications, monitor the network and reprogram the nodes to avoid operational problems. In this study, we propose a smart wireless sensor network using a reconfigurable embedde...
Article
Full-text available
Development of mobile and wireless technologies, increasing user demands due to the ease of use, intensive use of multimedia applications and the inefficient use of frequency spectrum enable the emergence of a new communication paradigm, namely Cognitive Radios (CR). The use of CRs will provide effective use of spectrum and efficient energy managem...
Conference Paper
Full-text available
As cloud computing is gaining more recognition to the public, request for services to a given task within the virtual environment of the cloud also increases. This paper proposed a maxmin algorithm liked technique with the aim of developing a new framework that tends to balance the load that may be experienced due to the high demand of resources by...
Article
Full-text available
zet Internet kullanımının insanlar arasındaki iletişimi, bilgi paylaşımını ve karşılıklı etkileşimi arttırarak günlük hayatımızı önemli ölçüde değiştirdiği artık kaçınılmaz bir gerçektir. " Nesnelerin Interneti (IoT: Internet of Things) " olarak adlandırılan yeni teknolojik kavram akıllı cihazların, birbirlerini algılayan ve iletişime geçebilen nes...
Article
Full-text available
The number of users and overall workload on computer networks increase continually. However, the management of the computer networks infrastructure in which taking the advantage of rapid changes in technology is still complicated and exteremely expensive. The concept of Software Defined Networks (SDN) proposes the development of software tools with...
Conference Paper
Full-text available
In this study a model for data reliability in wireless sensor networks is proposed, in which machine learning methods are used. Proposed framework includes data modelling, missing data prediction, anomaly detection, data fusion and trust mechanism phases. Thus, temporal analysis is performed on the preprocessed sensor data and missing data are pred...
Article
Full-text available
Determination and classification of white blood cells are very important for diagnosing many diseases. The number of white blood cells and morphological changes or blasts of them provide valuable information for the positive results of the diseases such as Acute Lymphocytic Leucomia (ALL). Recognition and classification of white cells as basophi...
Article
Full-text available
Trust and trustworthiness of web services and organizations is calculated as scalar values. But there is still a certain level of risk for the overall reliability of this value. In this article, we focus on calculating trust values as intervals between upper and lower bounds based on predefined confidence values through an additional confidence pro...
Article
Full-text available
As cloud computing is gaining more recognition as a public utility which gives the client room to focus on his work without focusing on installation and maintenance of other important devices, as they are installed and maintained by the cloud service providers. Cloud computing is meant to be scalable, and enhance the quality of service (QoS), cost...
Article
Full-text available
In the paper, two-way real-time meteorological data analysis and mapping information system is proposed. In this scope, the following main results are obtained: 1) updating the raw data and performing the analysis and mapping operations are realized whenever the meteorological data arrive to the system; 2) end users can realize the mapping of the o...
Article
The counts, the so-called differential counts, and sizes of different types of white blood cells provide invaluable information to evaluate a wide range of important hematic pathologies from infections to leukemia. Today, the diagnosis of diseases can still be achieved mainly by manual techniques. However, this traditional method is very tedious an...
Conference Paper
Günümüzde hızla yaygınlaşmakta olan kamusal bulut servislerinin karşılaştığı en büyük sorunlardan biri, kullanıcı ile servis arasındaki güven ilişkisidir. Güven ilişkisini rakamsal sonuçlarla ifade eden ve hizmet sözleşmesine dayalı güven modelleri, bulut servislerinin bileşenleri ve bu bileşenlerin güvenilirliği konularında yetersiz kalmışlardır....
Conference Paper
Full-text available
Günümüzde enerji verimliliğini arttırmak için Endüstri, Ulaştırma ve Telekomünikasyon gibi farklı alanlarda birçok çalışma yapılmaktadır. İletişim ağlarının özellikle yaygın internet kullanımı nedeniyle enerji tasarrufu konusundaki önemi gittikçe artmaktadır. Mevcut iletişim altyapısının hızı ve kapsama alanı gelişirken, enerji tüketiminin verimlil...
Conference Paper
Full-text available
Mobile devices are mainly lack of regular user interfaces that facilitate the human-computer interaction and the access to network resources. However, almost all commercial applications contain their mobile versions. If we consider the importance of business and learning environments, there are still many new opportunities to integrate mobile devic...
Conference Paper
Internet, as a marketing medium in the tourism industry, is a very valuable destination marketing tool. Different tourism authorities and organizations serve as marketing and service providers. They benefit from the use of Internet within the concept of marketing efforts. A new technology, Semantic Web, brought incremental changes by bringing machi...
Conference Paper
Full-text available
Internet, as a marketing medium in the tourism industry, is a very valuable destination marketing tool. Different tourism authorities and organizations serve as marketing and service providers. They benefit from the use of Internet within the concept of marketing efforts. A new technology, Semantic Web, brought incremental changes by bringing machi...
Article
Full-text available
Due to the rapid technological advances in mobile and wireless networking devices, personal computing has moved towards into ad hoc and pervasive environments. Today, the dynamic nature of mobile applications and services have integrated them far more in end-users' lives. Organizations need an effective way of handling their information system for...
Conference Paper
Full-text available
In the last few years, Internet has changed from displaying electronic brochures to a big sales market supporting online information and customer service to everyone. With the improvement of the new technologies, the web is a virtual marketplace more than ever. During this period, the analysts discovered that they had very little information about...
Article
Full-text available
The ultimate goal of all businesses no matter in which sectors they operate is to maintain their profitability and growth. There is a relationship among the capital, investment, and the personnel in order to achieve objectives for the performance of the organizational systems and it must be maintained without any deterioration. Companies have a cha...
Conference Paper
Full-text available
The report describes the means for dynamic control of the computation process that are available in Spider – a language for Control Network Programming.
Conference Paper
Full-text available
The report describes the type of improved uninformed or heuristic search algorithms that are well-suited for non-procedural implementation in Control network programming, and how this can be achieved using the tools for dynamic computation control.
Conference Paper
As the demand for uninterrupted Internet access grows, the popularity of wireless communication increases. However, wireless communication has some problems compared to conventional wired communication. Especially, if widely used Wireless Local Area Network (WLAN) applications are taken into consideration, it becomes an important issue to balance t...
Conference Paper
Full-text available
Many of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or organizations have become totally distributed between peers and partners. Designing applicable access control mechanisms in this...
Article
Full-text available
“Corporate Security Implementation for Mobile Information Systems”
Conference Paper
People no matter how old they are, may come together to learn something useful in every period of their lives. Students’ being together with different people in different classes has, in fact, the same meaning. When such a review has been done, individuals want to socialize when they get together with other group members, no matter it is a part of...
Conference Paper
Full-text available
This paper presents how the university students obtain their course project requirements in a course project, how they reach and use the Internet and other resources, and their trends in the literature review using the Internet. More, the variety of the resources and the reliability and accessibility of these have also been investigated. In additio...
Article
Full-text available
Although technology is a very important, useful and indispensable part of the life, effective and appropriate usage of it still needs to be improved in education. This study presents the way university students gather their course project requirements during the project elicitation phase, how they access the Internet and other resources, and their...
Conference Paper
Doğal felaketler veya tahmin edilemeyen sebepler nedeniyle kaybolan, enkaz altında kalan ve kurtarma ekipleri tarafından kurtarılmayı bekleyen insanlar için, her geçen süre hayatlarını kaybetme risklerini arttırmaktadır. Bu yüzden bütün kurtarma ekipleri mümkün olan en teknolojik imkanlarla kurtarılmayı bekleyen insanları bulabilmek için diğer yard...
Conference Paper
This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is t...
Chapter
Full-text available
As the demand for uninterrupted Internet access grows, the popularity of wireless communication increases. However, wireless communication has some problems compared to conventional wired communication. Especially, if widely used Wireless Local Area Network (WLAN) applications are taken into consideration, it becomes an important issue to balance t...
Conference Paper
Full-text available
Cloud computing is becoming an adoptable technology for many of the organizations with its dynamic scalability and usage of virtualized resources as a service through the Internet. It will likely have a significant impact on the educational environment in the future. Cloud computing is an excellent alternative for educational institutions which are...
Conference Paper
Full-text available
The report describes the means for dynamic control of the computation process that are available in Spider – a language for Control Network Programming.
Conference Paper
Full-text available
The report describes the type of improved uninformed or heuristic search algorithms that are well-suited for non-procedural implementation in Control network programming, and how this can be achieved using the tools for dynamic computation control.
Conference Paper
Full-text available
This report presents the general picture of how Control Network Programming can be effectively used for implementing various search strategies, both blind and informed. An interesting possibility is non-procedural solutions that can be developed for most local search algorithms. A generic solution is described for procedural implementations.
Article
User-Generated Content (UGC) in cyberspace is an important aspect of knowledge management discipline. We observed that the technical management of UGC has a number of issues and is not undertaken efficiently in large enterprises. This study provides review of extensive literature search for the technical issues of UGC globally. Based on the experie...
Conference Paper
Full-text available
The use of European Credit Transfer system (ECTS) provides a reference standard for exchange students across the European Union (EU). It helps more transparency and compatibility to compare the self-study period and performance of students from the different educational structures. However, the implementation of ECTS and re-design of courses accord...
Conference Paper
Companies are not always capable of adding new resources like facilities, offices and employees in different locations although their workload increases. If the organization consists of many smaller units dispersed geographically, the virtual offices are examples of how companies can empower their employees and help them to collaborate with col...
Conference Paper
During last decade, the new emerging technology of Geographic Information Systems (GIS) has drawn the attentions of both academicians and public/government sector managers. However, due to some various reasons, the organizations which have these systems in their organic structure could not be able to make use of them properly. In our article, we...
Conference Paper
Gelisen teknoloji ile zamandan ve mekandan bağımsız olarak is yapabilme imkanları, sirket yöneticilerinin ev-ofis uygulamalarına daha olumlu bakmalarını sağlamıstır. Bu uygulamalar çalısanların ofisleri dısında bulundukları zamanlarda ihtiyaç duydukları sirket kaynaklarına emniyetli bir sekilde ulasıp islerini sürdürebilmeleri için uygun bir seçene...
Conference Paper
National economies can only succeed in the manufacturing and service industries if only they can adapt themselves into the current technology. Technological tools and techniques used by the organizations help them pursuit the innovation processes and theories without looking at their application area. Every worker should learn the ways how to apply...
Conference Paper
This paper discusses different aspect of distance learning’s practices ranging from law to ethics point of view. To describe what distance learning is? It is a communication between sender (instructor), receiver (student) with a special purpose unstructured message (also known study contents) through internet in today’s era. Traditional concept of...
Conference Paper
Full-text available
The growth of Geographical Information Systems (GIS) emerges as analytical decision-making tools utilizing highly specialized geographic data. However, a simple system still does not exist for the integration/sharing information among GIS. Different organizations working within various domains have built their own data models for collecting and ana...
Conference Paper
Adli Bilişim son yıllarda bütün dünyada önem kazanmış bir terim olup, sayısal medya dediğimiz bilgisayarlar, gelişmiş mobil telefonlar ve portatif depolama birimleri içindeki bilgilerin korunması, toplanması ve analizi anlamında kullanılmaktadır. Bilgisayarların yaşamımızın her bölümünde yaygın ve yoğun olarak kullanıyor olması nedeni ile suç ve bi...
Conference Paper
Nowadays, information systems in a business organization are mostly based on the computer based technology. This enables the workers to produce, access, share, and store the information easily in their daily work-life. From the organizational point of view, this also enables the workers accomplish their daily works efficiently and more rapidly. On...
Conference Paper
The regular information flow for the sailors sailing on their boats and approaching the Marina is very important. They should ask and learn the basic utilities and how to access the required services in the Marina. Boats must be able to safely and easily get into and out of the marina and docks. Therefore, different types of inshore/offshore commun...
Article
Full-text available
Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerri...
Conference Paper
Geographic Information Systems (GIS) is used in almost all the areas of Information Management Systems and provides a very useful Decision Support System (DSS) tool to the executive managers. From the organizational point of view, GIS is a DSS tool using graphic and non-graphic (tabular) data simultaneously in an interactive way. In order to assess...
Conference Paper
Grid Networks have a very popular interest in many distributed applications from the point of academic view. They enable large scale resource sharing between authorized users and facilities. The dynamic and complex nature of grid systems challenge significant security issues that require new technical approaches. This paper reviews and recommends a...
Conference Paper
Nowadays with the widespread use of Internet resources, remote user authentication has become an important process to provide the security of the different systems. The process determines the identity of a person who is attempting to access the system. Various cryptographic algorithms are used in remote user authentication schemes used in smartcard...
Conference Paper
The wireless networks are dominating the airwaves, with a very high penetration rate at our homes and offices due to decrease in hardware prices and simplicity of use. However, security concerns have emerged which requires users and network administrators to act accordingly. There is a strong demand towards acquisition of wireless enabled networks...
Conference Paper
Geographic Information System (GIS) enables students to extract geographic data and to combine it in new ways related to their need of technological issues. Computer technology currently used makes these specialized data available to some other people or organizations. Results of GIS studies can also be stored and displayed. This provides valuable...
Conference Paper
Full-text available
Son yıllarda gelişen kablosuz iletişim teknolojileri özellikle kablosuz ağlar alanında yeni seçenekler ve kullanım olanakları ortaya çıkarmıştır. Bu alanlardan birisi de yapısız kablosuz ağlardır. Gelişen teknolojiler her ne kadar büyük fırsatlar sunsa da özellikle ağ güvenliği konusunda büyük sorunlar içermektedir. Yapısız kablosuz ağlar, iki veya...
Conference Paper
Kablosuz genişbant erişim sistemlerinin (WiMAX- Worldwide Interoperability for Microwave Access) kullanılmakta olan haberleşme sistemlerine kazandıracağı uzun mesafelerde ve yüksek hızda veri aktarabilme özelliği, bu konuyla ilgili çalışmaları artırmıştır. Haberleşme şebekelerinin alt yapılarında, noktadan noktaya veya bir noktadan çok noktaya olan...