
Tuncay ErcanYasar University · Department of Management Information Systems
Tuncay Ercan
Doctor of Philosophy
About
100
Publications
85,142
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
863
Citations
Citations since 2017
Introduction
Tuncay Ercan graduated from Military Academy, Department of Electric-Electronics in 1986. He received his M.S. degree from Ege University, and Ph.D from Dokuz Eylul University in Computer Engineering in 2000 and 2005 respectively. He is an Associate Professor at Yasar University, Department of Computer Engineering. His research interests include: Advanced Network Technologies, Wireless Ad-hoc and Sensor Networks, IoT, IIoT, Cloud Computing, Net Sec. and Forensics, Network modelling and MIS.
Additional affiliations
October 2005 - February 2021
Position
- Professor
Description
- Tuncay Ercan graduated from Military Academy, Department of Electric-Electronics in 1986. He received his M.S. degree from Ege University, and Ph.D from Dokuz Eylul University in Computer Engineering in 2000 and 2005 respectively. He is an Associate Professor at Yasar University, Department of Computer Engineering. His research interests include: Advanced Network Technologies, Wireless Ad-hoc and Sensor Networks, Network Security and Forensics, Network modelling and Management Information System
Publications
Publications (100)
Edge Computing and predictive maintenance have become important terms in the research area of the Industrial Internet of Things. Edge computing is an evolution of cloud computing that brings the computing and storage resources of a cloud closer to the devices thus reducing problems of latency and high data influx. Predictive maintenance (PdM) is a...
Agile has been invented to improve and overcome the deficiencies of efficient software development. At present, the agile model is used in software development vastly due to its support to both developers and clients resourcefully. Agile methodology increases the interaction between the developer and client to make the software product defect-free....
Sağlık sektörü, alanındaki bütün resmi yönetmeliklere uyum sağlamak, sağlıkta gelişim, kalite ve sürdürülebilirlik odaklı bir stratejik yaklaşımı pratik olarak gerçekleştirebilmek konusunda oldukça başarılıdır. Bu doğrultuda sektörün insan odaklı temel değerlerinden olan hakkaniyet, evrensellik, kanıta dayalılık, hesap verebilirlik, şeffaflık ve ka...
Academic and industrial studies on smart systems, which have entered all areas of our lives, continue to their rapid developments along with gaining momentum with Industry 4.0. Especially, many of the different production devices with their molding, printing, shaping, and cutting capabilities have a certain level of automation. They work together w...
Background
Scrum methodology is the most useful and adopted part of the agile methodology. Many organizations are adopting Scrum for the last decade to meet their software requirements. It is facilitating the software industries to develop software applications according to the user's requirements.
Objective
Scrum helps to fulfill the customer's r...
The term “smart city” is currently at the intersection of
digital technologies, all transformative innovations, and
urban living spaces. Smart cities, which are the development area of many new ideas due to their increasing population, are the first exciting places that many people think
of to work and live. As the world is increasingly urbanized,...
The research aims to test the model of integrated DOI theory and TOE framework to predict Cloud Computing (CC) decision-making intentions of SMEs, Izmir, Turkey. The survey data was collected from 140 Information Technology (IT) decision-makers via Google forms survey tool. Confirmatory factor analyses were made to examine the decision-making appro...
Purpose of the study: This study aims to investigate the internal and external factors for CC adoption decisions of
companies in Izmir, Turkey using a combination of DOI and TOE models.
Methodology: This is a confirmatory survey of businesses, forming a questionnaire for 176 IT decision-makers of noncloud or cloud user businesses in the city of Izm...
Smart utilities are the fundamental opportunities provided by smart cities for the public to live civilized. They are overall public solutions that combine the design and implementation of intelligent systems mainly for electricity, water, and natural gas in addition to tens of different assets like public transportation, healthy environment, water...
It is very important to know the services and responsibilities of the city administration. Regardless of this objective, building a comfortable and sustainable city for the citizens by putting the quality of life at the center of the city, is one of these responsibilities. In fact, the issue of the way how city administrations change especially wit...
Cloud computing has emerged as a phenomenon way of IT services for companies. As IT decisionmakers in the national sector need an integrated marketing communication, integrated sales channel management, and inventory management, they develop a cloud computing adoption model for downloading, configuring and maintaining application by outsourcing dat...
The aim of this chapter is to evaluate and predict the future of international fntech instruments in the domain of innovation diffusion theory (IDT) adoption strategies. Further, the consequences of the new payments system directive (PSD2) in Europe and blockchain applications are discussed. For instance, money transfer and payments have the highest...
Purpose of the study: This research aims to understand the benefits and challenges of cloud and non-cloud adopter
companies of production and service sectors on cloud computing and making recommendations based on companies’
perceptions of the issue in Izmir, Turkey.
Methodology: This is a descriptive survey of businesses, forming a questionnaire fo...
Purpose of the study: This study aims to investigate the internal and external factors for CC adoption decisions of companies in Izmir, Turkey using a combination of DOI and TOE models. Methodology: This is a confirmatory survey of businesses, forming a questionnaire for 176 IT decision-makers of non-cloud or cloud user businesses in the city of Iz...
In this study, an artificial intelligent algorithm that can be used for monitoring health-care MIoT (Medicinal Internet of Things) and predicting system based on Adaptive Neuro-Fuzzy Inferences System Architecture (ANFIS) is
proposed. We contribute with a new modification for ANFIS architecture and implement it in Field-programmable
Gate Array (FPG...
Power transmission has faced many challenges as the days goes by. Power demand has increased and its becoming increasingly difficult to acquire right way for new lines, due to growth, population, urbanizations and environmental issues. This research aims to provide methods for the rationale selections of HVDC system, essential HVDC equations and th...
Internet kullanımının yaygınlaşması insanlar arasındaki bilgi paylaşımı
ve etkileşimini önemli ölçüde arttırarak günlük yaşantımızı değiştirmektedir.
“Nesnelerin Interneti (IoT: Internet of Things)” olarak adlandırılan yeni
teknoloji akıllı cihazların, birbirlerini algılayarak iletişime geçmesi ve
toplanan bilgilerin bulut sistemlerinde değerlendir...
The use of information technologies in the implementation of
industry 4.0 applications has naturally attracted the attention
of many entrepreneurs and the business community. Industry
4.0 applications enabled cost reduction and efficiency in
Industrial production systems. However, there are difficulties
in the process of reliable data collection, i...
Internet of Things has entered our lives as many
forms and devices and enabled us to connect even the smallest-size
devices to the internet. This progression aided us by deploying
sensors on the workspace we need, such as hospitals, buildings, all
sort of vehicles, logistics, even automated manufacturing and
factories. In terms of quantity, around...
It is a well-known fact that the use of the networking technologies increases communication, sharing of information and mutual interaction among the different systems. The Internet of Things (IoT) is a new technological concept that the intelligent devices (different sensors, application outputs, production data in factories) somehow communicate wi...
The use of information technologies in the implementation of industry 4.0 applications has naturally attracted the attention of many entrepreneurs and the business community. Industry 4.0 applications enabled cost reduction and efficiency in Industrial production systems. However, there are difficulties in the process of reliable data collection, i...
Manipulators serve worldwide to increase quality
requirements and speed up the production of the manufacturing
industry. Typical applications of manipulators include welding,
painting, ironing, assembly, picking and placing, product
inspection. In this study, we focus on designing and implementing
a low-cost training manipulator set for “Robotic an...
In Wireless Sensor Networks (WSNs), the sensor
nodes have limited energy resources with their mostly
irreplaceable batteries. This makes to encourage design protocols
that are energy efficient to provide a longer network lifetime. This
paper proposes a method to divide the sensor network into equalsize grids namely regular geometric shaped clusters...
Cloud computing became the most efficient resource for following the business processes of companies and providing the required ICT capability for the last 10 years. It is a well-known fact that different cloud computing services help firms to orient themselves effectively to their functional goals. Because many additional issues such as budget, hu...
Applications related with WSNs may include thousands of separate sensor nodes, production and control data for different industrial sectors. It is important to manage these applications, monitor the network and reprogram the nodes to avoid operational problems. In this study, we propose a smart wireless sensor network using a reconfigurable embedde...
Development of mobile and wireless technologies, increasing user demands due to the ease of use, intensive use of multimedia applications and the inefficient use of frequency spectrum enable the emergence of a new communication paradigm, namely Cognitive Radios (CR). The use of CRs will provide effective use of spectrum and efficient energy managem...
As cloud computing is gaining more recognition to the public, request for services to a given
task within the virtual environment of the cloud also increases. This paper proposed a maxmin algorithm liked technique with the aim of developing a new framework that tends to
balance the load that may be experienced due to the high demand of resources by...
zet Internet kullanımının insanlar arasındaki iletişimi, bilgi paylaşımını ve karşılıklı etkileşimi arttırarak günlük hayatımızı önemli ölçüde değiştirdiği artık kaçınılmaz bir gerçektir. " Nesnelerin Interneti (IoT: Internet of Things) " olarak adlandırılan yeni teknolojik kavram akıllı cihazların, birbirlerini algılayan ve iletişime geçebilen nes...
The number of users and overall workload on computer networks increase continually. However, the management of the computer networks infrastructure in which taking the advantage of rapid changes in technology is still complicated and exteremely expensive. The concept of Software Defined Networks (SDN) proposes the development of software tools with...
In this study a model for data reliability in wireless sensor networks is proposed, in which machine learning methods are used. Proposed framework includes data modelling, missing data prediction, anomaly detection, data fusion and trust mechanism phases. Thus, temporal analysis is performed on the preprocessed sensor data and missing data are pred...
Determination and classification of white blood cells are very important for diagnosing many
diseases. The number of white blood cells and morphological changes or blasts of them provide
valuable information for the positive results of the diseases such as Acute Lymphocytic
Leucomia (ALL). Recognition and classification of white cells as basophi...
Trust and trustworthiness of web services and organizations is calculated as scalar values. But there is still a certain level of risk for the overall reliability of this value. In this article, we focus on calculating trust values as intervals between upper and lower bounds based on predefined confidence values through an additional confidence pro...
As cloud computing is gaining more recognition as a public utility which gives the client room to focus on his
work without focusing on installation and maintenance of other important devices, as they are installed and
maintained by the cloud service providers. Cloud computing is meant to be scalable, and enhance the quality of
service (QoS), cost...
In the paper, two-way real-time meteorological data analysis and mapping information system is proposed. In this scope, the following main results are obtained: 1) updating the raw data and performing the analysis and mapping operations are realized whenever the meteorological data arrive to the system; 2) end users can realize the mapping of the o...
The counts, the so-called differential counts, and sizes of different types of white blood cells provide invaluable information to evaluate a wide range of important hematic pathologies from infections to leukemia. Today, the diagnosis of diseases can still be achieved mainly by manual techniques. However, this traditional method is very tedious an...
Günümüzde hızla yaygınlaşmakta olan kamusal bulut servislerinin karşılaştığı en büyük sorunlardan biri, kullanıcı ile servis arasındaki güven ilişkisidir. Güven ilişkisini rakamsal sonuçlarla ifade eden ve hizmet sözleşmesine dayalı güven modelleri, bulut servislerinin bileşenleri ve bu bileşenlerin güvenilirliği konularında yetersiz kalmışlardır....
Günümüzde enerji verimliliğini arttırmak için Endüstri, Ulaştırma ve Telekomünikasyon gibi farklı alanlarda birçok çalışma yapılmaktadır. İletişim ağlarının özellikle yaygın internet kullanımı nedeniyle enerji tasarrufu konusundaki önemi gittikçe artmaktadır. Mevcut iletişim altyapısının hızı ve kapsama alanı gelişirken, enerji tüketiminin verimlil...
Mobile devices are mainly lack of regular user interfaces that facilitate the human-computer interaction and the access to network resources. However, almost all commercial applications contain their mobile versions. If we consider the importance of business and learning environments, there are still many new opportunities to integrate mobile devic...
Internet, as a marketing medium in the tourism industry, is a very valuable destination marketing tool. Different tourism
authorities and organizations serve as marketing and service providers. They benefit from the use of Internet within the concept
of marketing efforts. A new technology, Semantic Web, brought incremental changes by bringing machi...
Internet, as a marketing medium in the tourism industry, is a very
valuable destination marketing tool. Different tourism authorities and
organizations serve as marketing and service providers. They benefit from the
use of Internet within the concept of marketing efforts. A new technology,
Semantic Web, brought incremental changes by bringing machi...
Due to the rapid technological advances in mobile and wireless networking devices, personal computing has moved towards into ad hoc and pervasive environments. Today, the dynamic nature of mobile applications and services have integrated them far more in end-users' lives. Organizations need an effective way of handling their information system for...
In the last few years, Internet has changed from displaying electronic brochures to a big sales market supporting online information and customer service to everyone. With the improvement of the new technologies, the web is a virtual marketplace more than ever. During this period, the analysts discovered that they had very little information about...
The ultimate goal of all businesses no matter in which sectors they operate is to maintain their profitability and growth. There is a relationship among the capital, investment, and the personnel in order to achieve objectives for the performance of the organizational systems and it must be maintained without any deterioration. Companies have a cha...
The report describes the means for dynamic control of the computation process that are available in Spider – a language for
Control Network Programming.
The report describes the type of improved uninformed or heuristic search algorithms that are well-suited for non-procedural
implementation in Control network programming, and how this can be achieved using the tools for dynamic computation control.
As the demand for uninterrupted Internet access grows, the popularity of wireless communication increases. However, wireless communication has some problems compared to conventional wired communication. Especially, if widely used Wireless Local Area Network (WLAN) applications are taken into consideration, it becomes an important issue to balance t...
Many of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business
(B2B) operations. Computing environments of mobile wireless devices owned by individuals or organizations have become totally
distributed between peers and partners. Designing applicable access control mechanisms in this...
“Corporate Security Implementation for Mobile Information Systems”
People no matter how old they are, may come together to learn something useful in every period of their lives. Students’ being together with different people in different classes has, in fact, the same meaning. When such a review has been done, individuals want to socialize when they get together with other group members, no matter it is a part of...
This paper presents how the university students obtain their course project requirements in a course project, how they reach and use the Internet and other resources, and their trends in the literature review using the Internet. More, the variety of the resources and the reliability and accessibility of these have also been investigated. In additio...
Although technology is a very important, useful and indispensable part of the life, effective and appropriate
usage of it still needs to be improved in education. This study presents the way university students gather their course project requirements during the project elicitation phase, how they access the Internet and other
resources, and their...
Doğal felaketler veya tahmin edilemeyen sebepler nedeniyle
kaybolan, enkaz altında kalan ve kurtarma ekipleri tarafından
kurtarılmayı bekleyen insanlar için, her geçen süre
hayatlarını kaybetme risklerini arttırmaktadır. Bu yüzden
bütün kurtarma ekipleri mümkün olan en teknolojik
imkanlarla kurtarılmayı bekleyen insanları bulabilmek için
diğer yard...
This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is t...
As the demand for uninterrupted Internet access grows, the popularity of wireless communication increases. However, wireless
communication has some problems compared to conventional wired communication. Especially, if widely used Wireless Local Area
Network (WLAN) applications are taken into consideration, it becomes an important issue to balance t...
Cloud computing is becoming an adoptable technology for many of the organizations with its dynamic scalability and usage of
virtualized resources as a service through the Internet. It will likely have a significant impact on the educational environment in
the future. Cloud computing is an excellent alternative for educational institutions which are...
The report describes the means for dynamic control of the computation process that are available in Spider – a language for Control Network Programming.
The report describes the type of improved uninformed or heuristic search algorithms that are well-suited for non-procedural implementation in Control network programming, and how this can be achieved using the tools for dynamic computation control.
This report presents the general picture of how Control Network Programming can be effectively used for implementing various search strategies, both blind and informed. An interesting possibility is non-procedural solutions that can be developed for most local search algorithms. A generic solution is described for procedural implementations.
User-Generated Content (UGC) in cyberspace is an important aspect of knowledge management discipline. We observed that the technical management of UGC has a number of issues and is not undertaken efficiently in large enterprises. This study provides review of extensive literature search for the technical issues of UGC globally. Based on the experie...
The use of European Credit Transfer system (ECTS) provides a reference standard for exchange students across the European Union (EU). It helps more transparency and compatibility to compare the self-study period and performance of students from the different educational structures. However, the implementation of ECTS and re-design of courses accord...
Companies are not always capable of adding new resources like facilities, offices and
employees in different locations although their workload increases. If the organization
consists of many smaller units dispersed geographically, the virtual offices are examples
of how companies can empower their employees and help them to collaborate with
col...
During last decade, the new emerging technology of Geographic Information Systems (GIS) has
drawn the attentions of both academicians and public/government sector managers. However, due
to some various reasons, the organizations which have these systems in their organic structure
could not be able to make use of them properly. In our article, we...
Gelisen teknoloji ile zamandan ve mekandan bağımsız olarak
is yapabilme imkanları, sirket yöneticilerinin ev-ofis
uygulamalarına daha olumlu bakmalarını sağlamıstır. Bu
uygulamalar çalısanların ofisleri dısında bulundukları
zamanlarda ihtiyaç duydukları sirket kaynaklarına emniyetli
bir sekilde ulasıp islerini sürdürebilmeleri için uygun bir
seçene...
National economies can only succeed in the manufacturing and service industries if only
they can adapt themselves into the current technology. Technological tools and techniques
used by the organizations help them pursuit the innovation processes and theories without
looking at their application area. Every worker should learn the ways how to apply...
This paper discusses different aspect of distance learning’s practices ranging from law to
ethics point of view. To describe what distance learning is? It is a communication between
sender (instructor), receiver (student) with a special purpose unstructured message (also
known study contents) through internet in today’s era. Traditional concept of...
The growth of Geographical Information Systems (GIS) emerges as analytical decision-making tools utilizing highly specialized geographic data. However, a simple system still does not exist for the integration/sharing information among GIS. Different organizations working within various domains have built their own data models for collecting and ana...
Adli Bilişim son yıllarda bütün dünyada önem kazanmış bir terim olup, sayısal medya dediğimiz bilgisayarlar, gelişmiş mobil telefonlar ve portatif depolama birimleri içindeki bilgilerin korunması, toplanması ve analizi anlamında kullanılmaktadır. Bilgisayarların yaşamımızın her bölümünde yaygın ve yoğun olarak kullanıyor olması nedeni ile suç ve bi...
Nowadays, information systems in a business organization are mostly based on the computer based technology. This enables the workers to produce, access, share, and store the information easily in their daily work-life. From the organizational point of view, this also enables the workers accomplish their daily works efficiently and more rapidly. On...
The regular information flow for the sailors sailing on their boats and approaching the Marina is very important. They should ask and learn the basic utilities and how to access the required services in the Marina. Boats must be able to safely and easily get into and out of the marina and docks. Therefore, different types of inshore/offshore commun...
Terrorism is the greatest threat to national security and cannot be defeated by
conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey,
regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These
groups have a clear understanding of the relative ineffectiveness of counter-guerri...
Geographic Information Systems (GIS) is used in almost all the areas of Information Management Systems and provides a very useful Decision Support System (DSS) tool to the executive managers. From the organizational point of view, GIS is a DSS tool using graphic and non-graphic (tabular) data simultaneously in an interactive way. In order to assess...
Grid Networks have a very popular interest in many
distributed applications from the point of academic
view. They enable large scale resource sharing
between authorized users and facilities. The
dynamic and complex nature of grid systems
challenge significant security issues that require new
technical approaches. This paper reviews and
recommends a...
Nowadays with the widespread use of Internet
resources, remote user authentication has become an
important process to provide the security of the
different systems. The process determines the
identity of a person who is attempting to access the
system. Various cryptographic algorithms are used
in remote user authentication schemes used in
smartcard...
The wireless networks are dominating the airwaves,
with a very high penetration rate at our homes and
offices due to decrease in hardware prices and
simplicity of use. However, security concerns have
emerged which requires users and network
administrators to act accordingly.
There is a strong demand towards acquisition of
wireless enabled networks...
Geographic Information System (GIS) enables students to extract geographic data and to combine it in new ways related to their need of technological issues. Computer technology currently used makes these specialized data available to some other people or organizations. Results of GIS studies can also be stored and displayed. This provides valuable...
Son yıllarda gelişen kablosuz iletişim teknolojileri özellikle kablosuz ağlar alanında yeni seçenekler ve
kullanım olanakları ortaya çıkarmıştır. Bu alanlardan birisi de yapısız kablosuz ağlardır. Gelişen teknolojiler her ne
kadar büyük fırsatlar sunsa da özellikle ağ güvenliği konusunda büyük sorunlar içermektedir. Yapısız kablosuz
ağlar, iki veya...
Kablosuz genişbant erişim sistemlerinin (WiMAX- Worldwide Interoperability for Microwave Access)
kullanılmakta olan haberleşme sistemlerine kazandıracağı uzun mesafelerde ve yüksek hızda veri aktarabilme
özelliği, bu konuyla ilgili çalışmaları artırmıştır. Haberleşme şebekelerinin alt yapılarında, noktadan noktaya
veya bir noktadan çok noktaya olan...