Browsing by Author "Ercan, Tuncay"
Now showing 1 - 20 of 40
- Results Per Page
- Sort Options
Conference Object Citation - WoS: 4Citation - Scopus: 1A desktop application to learn the actual workload of the students(ELSEVIER SCIENCE BV, 2009) Tuncay Ercan; Ferhat Karaagac; Afsar Ethem Emekli; Ercan, Tuncay; Karaaǧaç, Ferhat; Emekli, Afşar Ethem; H Uzunboylu; N CavusThe use of European Credit Transfer system (ECTS) provides a reference standard for exchange students across the European Union (EU). It helps more transparency and compatibility to compare the self-study period and performance of students from the different educational structures. However the implementation of ECTS and re-design of courses according to ECTS can be comparatively problematic in most countries. Teachers generally would like to learn the actual workload that is necessary to successfully complete the course(s) of the study program because this is a more realistic evaluation for the duration of study except the teaching time. In this study we describe the design and implementation of a Windows Vista sidebar gadget tool namely Helo Gadget. It runs like an instant messenger on the desktop and interactively collects data from the users. It periodically asks what the students are doing at that moment and saves the answers in the database. The statistics generated by the tool can be used to improve performance of the students and calculate the necessary course credits. The proposed tool enables teachers to monitor the activities of their own students and see these meaningful statistics of courses and students in a daily routine. (C) 2009 Elsevier Ltd. All rights reserved.Conference Object Citation - WoS: 3Citation - Scopus: 3A Framework Model for Data Reliability in Wireless Sensor Networks(IEEE, 2016) Ilker Kalayci; Tuncay Ercan; Ercan, Tuncay; Kalayci, IlkerIn this study a model for data reliability in wireless sensor networks is proposed in which machine learning methods are used. Proposed framework includes data modelling missing data prediction anomaly detection data fusion and trust mechanism phases. Thus temporal analysis is performed on the preprocessed sensor data and missing data are predicated. Then outliers on collected data are detected on the cluster head nodes by using Eta one-class Support Vector Machines. If an event is detected data are fused and then send to sink. If an anomaly is detected for a node's data the trust weight of the node is decreased.Conference Object Citation - WoS: 24Citation - Scopus: 56A Layered Security Approach for Cloud Computing Infrastructure(IEEE, 2009) Mehmet Yildiz; Jemal Abawajy; Tuncay Ercan; Andrew Bernoth; Ercan, Tuncay; Bernoth, Andrew; Abawajy, Jemal; Yildiz, MehmetThis paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS Utility Web Platform and Managed Services Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is to offer a macro level solution for identified common infrastructure security requirements. This model with a number of emerged patterns can be applied to infrastructure aspect of Cloud Computing as a proposed shared security approach in system development life cycle focusing on the plan-built-run scope.Conference Object A low cost manipulator training set(Institute of Electrical and Electronics Engineers Inc., 2018) Saygin Ay; Mahir Kutay; Tuncay Ercan; Ercan, Tuncay; Kutay, Mahir; Ay, Saygin; S.N. Engin , D.O. Arisoy , M.A. OzManipulators serve worldwide to increase quality requirements and speed up the production of the manufacturing industry. Typical applications of manipulators include welding painting ironing assembly picking and placing product inspection. In this study we focus on designing and implementing a low-cost training manipulator set for "Robotic and Control Laboratory" in the University. The set includes two 6-DOF manipulators controlled in coordination by Raspberry PI computer using Codesys platform. Manipulators can move to the desired coordinates through forward kinematic calculations The link transformation matrices for each joint are obtained by the Denavit-Hartenberg (DH) conventions. Due to complexity of transformation matrices Matlab program is used to solve the matrix equations and the calculation results are transferred to Codesys environment. Codesys control application creates a virtual PLC functionality for Raspberry PI that communicates with servo control board by I2C communication protocol. Servo control board generates Pulse Width Modulation (PWM) signals applied to servo driver motors for obtaining the desired movements. In order to ease the user-manipulator interactions a web-based interface is developed for running on a tablet PC or smart phones. Students use the set successfully for various practices in the laboratory. © 2020 Elsevier B.V. All rights reserved.Article Citation - WoS: 19Citation - Scopus: 33A software-based cost estimation technique in scrum using a developer's expertise(Elsevier Ltd, 2022) Shariq Aziz Butt; Ayesha Khalid; Tuncay Ercan; Paola Patricia Ariza-Colpas; Melisa Acosta-Coll; Gabriel Piñeres-Espitia; Emiro De-La-Hoz-Franco; Marlon Alberto Piñeres-Melo; Roberto Cesar Morales-Ortega; Piñeres-Espitia, Gabriel; Ortega, Roberto Morales; Khalid, Ayesha; Ariza-Colpas, Paola Patricia; Ercan, Tuncay; Melisa, Acosta-Coll; Butt, Shariq AzizBackground: Scrum methodology is the most useful and adopted part of the agile methodology. Many organizations are adopting Scrum for the last decade to meet their software requirements. It is facilitating the software industries to develop software applications according to the user's requirements. Objective: Scrum helps to fulfill the customer's requirements by interacting with the client and developer. Instead of this scrum still has some challenges that influence the cost of a scrum. These challenging factors include coordination team size change request complexity and issues in daily meeting sessions. Due to these factors mostly the cost and time exceed scrum-based projects. To overcome these issues from the accurate and precise estimation in the scrum project we have developed a web-based software system to estimate the effort of a user story as well as the budget. Methodology: There are some sophisticated cost estimation techniques for scrum-based projects. But all estimation techniques have some limitations that make them less useful for estimation and overcoming the effects of these factors in the scrum. We have surveyed the multiple software industries to get the static findings of the survey. We have designed the 30 hypotheses that main aim to reveal how much the proposed estimation technique is valuable for the accuracy of estimation. For the inclusion of participants we have set the age criteria to get the opinions of the most experienced programmers. Results: The main aim of this paper is to provide knowledge about key challenging factors in Scrum that cause exceed in cost and time and also briefly explain why existing scrum cost estimation techniques are not pertinent for projects. In the last we propose a framework as a solution to manage these factors and control cost and time from exceeding. We also adopted this estimation technique in different case studies in software industries for findings and results. The technique calculates the efforts autonomously. We design a software-based estimation technique that collects inputs from team/s and estimates the cost and time of a project. Conclusion: In outcomes we found that our cost estimation approach reduced the issues from scrum software project development and make it more proficient for estimation of projects. Our proposed estimation technique introduced the new concept of estimation that facilitate the client software industry and developers as well to meet the requirements of the client fulfill the changes during the sprints/s development and deliver the project within the time and cost. © 2022 Elsevier B.V. All rights reserved.Book Part Citation - Scopus: 7An overview of international fintech instruments using innovation diffusion theory adoption strategies(IGI Global, 2020) Ebru E. Saygılı; Tuncay Ercan; Ercan, Tuncay; Saygili, EbruThe aim of this chapter is to evaluate and predict the future of international fintech instruments in the domain of innovation diffusion theory (IDT) adoption strategies. Further the consequences of the new payments system directive (PSD2) in Europe and blockchain applications are discussed. For instance money transfer and payments have the highest rate of adoption (ROA) while insurance services have the highest speed of growing ROA due to relative advantages high compatibility and trialability levels and low level of complexity and uncertainty. Cross country comparisons include descriptive statistics about fintech deal value and volume innovation rank B2C commerce market ROA and internet penetration. Germany is the only country listed in all of the top 10 ranking lists followed by the U.S. the U.K. and France. Also China India and Canada have distinguished success in terms of fintech indicators while the growth in Japan is expected to be slow. Accordingly ROA in five emerging markets is much higher than some of the developed countries which can be explained by the Cancian Theory. © 2022 Elsevier B.V. All rights reserved.Conference Object Citation - WoS: 3Anomaly Detection in Wireless Sensor Networks Data by Using Histogram Based Outlier Score Method(IEEE, 2018) Ilker Kalayci; Tuncay Ercan; Ercan, Tuncay; Kalayci, IlkerData anomaly detection in wireless sensor networks which is one of the important technologies and study areas is a method that enhances data quality and data reliability. Besides data enhancing methods such as estimating missing data deduplication noise removal, anomaly detection is important in terms of finding data patterns which are out of normal data. This stage influences next analysis and decision processes and plays an important role in determining events faults or unexcepted but meaningful patterns. This study proposes the Histogram Based Outlier Score (HBOS) method to detect anomalies in data acquired by wireless sensor networks. In respect to anomaly detection methods used in this area such as data classification data clustering statistical distance based and support vector machines based approaches histogram based algorithms are unsupervised and provide fast solutions.Article Citation - WoS: 128Citation - Scopus: 163Automatic segmentation counting size determination and classification of white blood cells(Elsevier B.V., 2014) Sedat Nazlibilek; Deniz Karacor; Tuncay Ercan; Murat Hüsnü Sazli; Osman Kalender; Yavuz Ege; Ercan, Tuncay; Ege, Yavuz; Karacor, Deniz; Nazlibilek, Sedat; Kalender, Osman; Sazli, Murat HusnuThe counts the so-called differential counts and sizes of different types of white blood cells provide invaluable information to evaluate a wide range of important hematic pathologies from infections to leukemia. Today the diagnosis of diseases can still be achieved mainly by manual techniques. However this traditional method is very tedious and time-consuming. The accuracy of it depends on the operator's expertise. There are laser based cytometers used in laboratories. These advanced devices are costly and requires accurate hardware calibration. They also use actual blood samples. Thus there is always a need for a cost effective and robust automated system. The proposed system in this paper automatically counts the white blood cells determine their sizes accurately and classifies them into five types such as basophil lymphocyte neutrophil monocyte and eosinophil. The aim of the system is to help for diagnosing diseases. In our work a new and completely automatic counting segmentation and classification process is developed. The outputs of the system are the number of white blood cells their sizes and types. © 2014 Elsevier Ltd. All rights reserved. © 2017 Elsevier B.V. All rights reserved.Conference Object Citation - WoS: 1Citation - Scopus: 3Benefits of semantic approach in the learning environment(Elsevier Science bv, 2011) Tuncay Ercan; Ercan, TuncayMobile devices are mainly lack of regular user interfaces that facilitate the human-computer interaction and the access to network resources. However almost all commercial applications contain their mobile versions. If we consider the importance of business and learning environments there are still many new opportunities to integrate mobile devices with web-based services. Development of Educational Semantic Web and the implications for Web-based teaching and learning attracts great attention. This study focuses on creating a web site with semantic features taken from a student survey conducted to learn their e-learning awareness and developing an efficient search mechanism among mobile users in the learning environment. The ontology working in mobile devices benefits from adapting context and content information from a centralized system into a significant data mining application. © 2011 Published by Elsevier Ltd. © 2011 Elsevier B.V. All rights reserved.Conference Object Citation - WoS: 2Citation - Scopus: 7Control Network Programming with SPIDER: Dynamic Search Control(SPRINGER-VERLAG BERLIN, 2010) Kostadin Kratchanov; Tzanko Golemanov; Emilia Golemanova; Tuncay Ercan; Golemanova, Emilia; Ercan, Tuncay; Golemanov, Tzanko; Kratchanov, Kostadin; R Setchi; I Jordanov; RJ Howlett; LC JainThe report describes the means for dynamic control of the computation process that are available in Spider - a language for Control Network Programming.Conference Object Design and Implementation of a Customized Micro Server Platform for Indoor Monitoring and Control(IEEE, 2019) Zirve Baran Totuk; Tuncay Ercan; Ercan, Tuncay; Totuk, Zirve BaranThe concept of the Internet of Industrial Things (IIoT) which emerged when the Internet of Things (IoT) applications started to be used in the industry has provided the efficiency flexibility traceability and security to the end users in their workspaces. Indoor monitoring and control systems which are the leading applications of the Internet of industrial things play a major role in providing these elements. Over the years these systems have evolved from wired alarm systems to data loggers wireless sensor networks and then to with cloud computing based smart gateways. In the face of this evolution of systems the expectations of end users such as being able to control at tens of thousands of points high quality of service or achieving commercial targets have increased at the same rate.In order to meet all these expectations a modular and compact platform based on Fog Computing and single board computer which provides optimum performance and cost has been designed and developed in this study. When the results obtained from the test processes implemented under real scenarios are examined it is seen that the hardware used and the software infrastructure all open source are sufficient and usable for indoor monitoring and control applications.Article Citation - Scopus: 6Design of an FPGA-based intelligent gateway for industrial IoT(World Academy of Research in Science and Engineering, 2019) Tuncay Ercan; Ahmed Khazal Younis; Ercan, Tuncay; Al Azzawi, Ahmed KhazalThe use of information technologies in the implementation of industry 4.0 applications has naturally attracted the attention of many entrepreneurs and the business community. Industry 4.0 applications enabled cost reduction and efficiency in Industrial production systems. However there are difficulties in the process of reliable data collection integration and analysis of production-related data. The authors propose FPGA-based hardware and ANFIS software-driven intelligent algorithms to use temperature and humidity sensor test data for these processes. This approach achieves a significant performance and resource utilization rate in Industrial IoT systems and shows 55% decrease in the amount of HW resources in FPGA. © 2019 Elsevier B.V. All rights reserved.Article Citation - WoS: 5Citation - Scopus: 7Detection of hidden hostile/terrorist groups in harsh territories by using animals as mobile biological sensors(MDPI, 2008) Yasar Guneri Sahin; Tuncay Ercan; Ercan, Tuncay; Sahin, Yasar GuneriTerrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq Afghanistan and Turkey regular forces cannot reach these hostile/terrorist groups the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations detection of terrorist and hostile groups in their hiding places such as caves lairs etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh rugged and mountainous countries. To assist these forces commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices improving communications for data transfer from the source and developing better ways to monitor and detect threats terrorist ability to carry out attacks can be severely disrupted.Conference Object Citation - WoS: 176Citation - Scopus: 273Effective use of cloud computing in educational institutions(ELSEVIER SCIENCE BV, 2010) Tuncay Ercan; Ercan, Tuncay; H UzunboyluCloud computing is becoming an adoptable technology for many of the organizations with its dynamic scalability and usage of virtualized resources as a service through the Internet. It will likely have a significant impact on the educational environment in the future. Cloud computing is an excellent alternative for educational institutions which are especially under budget shortage in order to operate their information systems effectively without spending any more capital for the computers and network devices. Universities take advantage of available cloud-based applications offered by service providers and enable their own users/students to perform business and academic tasks. In this paper we will review what the cloud computing infrastructure will provide in the educational arena especially in the universities where the use of computers are more intensive and what can be done to increase the benefits of common applications for students and teachers. (C) 2010 Elsevier Ltd. All rights reserved.Article Endüstriyel Nesnelerin İnterneti Uygulamaları için FPGA Destekli ve Bağlam Tabanlı Erişim Kontrol Güvenlik Sistemi(2023) Tuncay Ercan; EMRAH TOMUR; Didem GENÇ; Ercan, Tuncay; Tomur, Emrah; Genç, DidemEndüstri 4.0 ile birlikte üretimin her alanında gittikçe artan bilgisayar destekli sistemlerin yarattığı farklı ve karmaşık ağ topolojileri artan veri miktarı firmaların güvenlik ihtiyaçlarını artırmaktadır. Bundan dolayı farklı endüstriyel sektörlerde kullanılan farklı cihaz ve veri kullanımı şirketler kendi kritik akıllı üretim sistemlerine yönelik güvenilir bir risk yönetim sistemine ihtiyaç duymaktadır. İşletmeler bu yüzden sahip oldukları Endüstriyel Kontrol ve Bilişim Sistemlerini korumayı amaçlarlar. Bu çalışmada üretim alanında kullanılabilecek endüstriyel cihazlar ve/veya bunlara bağlı sensörlerin erişim kontrolü bağlamında güvenlik ihtiyaçlarını karşılayacak ve kenar bilişim kapsamında çalışacak FPGA (Alanda Programlanabilir Kapı Dizileri) destekli bir güvenlik platformu tasarlanmış ve çalışma yöntemi açıklanmıştır. Akıllı üretim cihazlarının bulunduğu bir imalathane ortamında çalışan cihaz sensor akıllı kontrol kutusu ve ağ geçidi gibi bileşenler üzerinde bağlam-tabanlı bir erişim denetim sistemi kullanımı gösterilmiş ve örnek bir çoklu kimlik doğrulama yöntemi tasarlanmıştır.Conference Object Essential Components for Online Health Support and Reliable Data Storage(Institute of Electrical and Electronics Engineers Inc., 2023) Ercan, Tuncay; Yetis, Ayse Kahveci; Hanoglu, ErayArticle Citation - Scopus: 3Face matrix: A quick search and indexing method for suspect recognition in police departments(Asian Network for Scientific Information, 2007) Yasar Guneri Sahin; Samsun Mustafa Basarici; Tuncay Ercan; Ercan, Tuncay; Sahin, Yasar Guneri; Basarici, Samsun MustafaThis study presents an indexing and a quick sort method that could be used to find the possible matching guilty pictures from the police database by using a tracing software and eyewitness descriptions about the suspected guilty profile. It is well known that databases located in the police departments have a large amount of prerecorded convicted guilty pictures. Searching a picture from database for recognition is very hard and it may take too much time. In addition to this it can also require to track many redundant pictures to find the correct guilty. There is of course no guarantee that Photofit (robot picture) is included in database. Therefore police departments have difficult problems to recognize exact guilty using Photofits described by eyewitness. In this paper a matrix construction using particular distances on face has been demonstrated. In order to find these certain points on the face a new point selection schema and some existing recognition methods are presented. Finally three different determinant values of this matrix are computed and are used for picture indexing in the database. In the test environment the system results 30 different matches with the predefined Photofits by using this indexing algorithm together with a face tracing software and a patch program proving that the tracking time for redundant pictures is reduced. © 2007 Asian Network for Scientific Information. © 2018 Elsevier B.V. All rights reserved.Article Field-Programmable Gate Array Implementation of Adaptive Neuro-Fuzzy System Using Sensors Monitoring Health-Care Medicinal Internet of Things(AMER SCIENTIFIC PUBLISHERS, 2020) Ahmed Khazal Alazzawi; Tuncay Ercan; Ercan, Tuncay; Alazzawi, Ahmed KhazalIn this study an artificial intelligent algorithm that can be used for monitoring health-care MIoT (Medicinal Internet of Things) and predicting system based on Adaptive Neuro-Fuzzy Inferences System Architecture (ANFIS) is proposed. We contribute with a new modification for ANFIS architecture and implement it in Field-programmable Gate Array (FPGA) using High-Level Synthesis (HLS) approach for monitoring predicting temperature and humidity. The proposed modification for intelligent algorithm is done by extending the ANFIS standard architecture to six-layer adaptive instead of five-layer in order to minimize the number of linear parameters that need to adapt in the defuzzification output layer and hardware utilization resources that used within the FPGA environment. The performance of proposed architecture has been evaluated and tested in term of mean square error between the real outputs of the modified algorithm (that are taken from hardware ANFIS-IP core) and the desired targets (optimal outputs that are taken from Matlab simulation). The modifying architecture provides a high precision in the training phase and acceptable precision in the testing phase when compared with a standard Matlab toolbox. While the number of hardware resources within our proposed embedded system are decreased by 55% when compared with other works that untiled the same approach.Article Formal Trust Assessment with Confidence Probability(KSII-KOR SOC INTERNET INFORMATION, 2015) Mahir Kutay; Tuncay Ercan; Ercan, Tuncay; Kutay, MahirTrust and trustworthiness of web services and organizations is calculated as scalar values. But there is still a certain level of risk for the overall reliability of this value. In this article we focus on calculating trust values as intervals between upper and lower bounds based on predefined confidence values through an additional confidence probability. This will give us a more realistic approach to the trust assessments between individuals and organizations. We also developed a web-based software tool TAST (Trust Assessment Software Tool) that collects the web services' evaluation of different customer groups for similar organizations through the user interface and calculates the trust intervals for predefined and previously selected confidence values. Our model uses a weighted calculation of mean and variances of customer groups in specific periods and analyses the total and incremental trust of different customer groups.Doctoral Thesis Gelişmekte olan piyasalarda bulut bilişim adaptasyonunu etkileyen kritik faktörler (İzmir, Türkiye)(2020) Saygıner, Can; Ercan, TuncayBulut bilişim, işletmelere bilgi işlem altyapı çözümleri sunmaktadır. Ancak, şirketler bulut bilişimi adapte ederken kendine uygun başarı, potansiyel zorlukları, ihtiyaçları, sonuçları, riskleri, şirket içi karar yönünü ve iş modelini araştırma ihtiyacı duymalıdır. Dünyada veri artışıyla beraber, bulut bilişim adaptasyonu üretim, hizmet, ulusal pazarda çalışan, uluslararası pazarda çalışan, mikro ölçekli işletmeler, küçük ve orta ölçekli şirketler ve büyük ölçekli şirketler tarafından göz ardı edilmemesi gereken bir süreçtir. Gelişen endüstriyel rekabet ortamında bu süreçlerin gelişmesi, işletmelere sanayi 4.0'ın elementleri olan büyük veri, nesnelerin interneti ve yapay zekâ uygulamalarından daha çok faydalanmasını sağlayacaktır. Bu teknolojiyi adapte etmek için de bulut sağlayıcılar altyapı, platform ve yazılım hizmetlerini; özel, genel, topluluk ya da hibrit bulut ortamında işletmelerin ihtiyacına göre yayınlamaktadır. Bu araştırma, bulut bilişimin adaptasyonu ile ilgili işletmelerin algısını anlamayı ve Türkiye'nin İzmir ilinde bulut bilişimin benimsenmesini etkileyen faktörleri araştırmayı amaçlamaktadır. Bulut bilişimin adaptasyonu algısı açıklayıcı analiz ile incelenmiştir. Bulut bilişim adaptasyonu (CCA), doğrulayıcı faktör analizinde bağımlı değişken olarak kullanılmıştır. Bağımsız değişkenler, Yeniliğin Yayılma Teorisi (DOI) teorisinden elde edilen faktörler göreceli avantajlar (RA), güvenlik endişeleri (SC), maliyet tasarrufu (CS), uyumluluk (COMP) ve karmaşıklıktır (COMPX). Teknolojik, Örgütsel ve Çevresel (TOE) teorisinden elde edilen faktörler teknolojik hazırlık (TR), üst yönetim desteği (TMS), firma büyüklüğü (FS), yasa düzenleyici destekler (RS) ve rekabet baskısıdır (CP). Elde edilen açıklayıcı analiz sonuçlarına göre, uzaktan çalışabilirlik, İzmir'deki buluta geçen şirketler için bulut bilişime adaptasyonun en önemli sebebiyken; iş süreçleri uyum sorunu ve güvenlik kaygıları, İzmir'de buluta geçmeyen şirketlerin karşılaştıkları en önemli sorunlar olarak göze çarpmaktadır. Elde edilen doğrulayıcı faktör analizi sonuçlarına göre, karmaşıklık (COMPX) ve üst yönetim desteğinin TMS), bulut bilişime adaptasyonda (CCA) doğrudan etkisi bulunmaktadır. Göreceli avantajlar (RA) ve uyumluluk (COMP), karmaşıklık (COMPX) faktöründe doğrudan etkisi vardır. Teknolojik hazırlığın (TR) ve rekabet baskısının (CP), üst yönetim desteğine (TMS) doğrudan etkisi bulunmaktadır. Bu araştırmada, bulut bilişime adaptasyon için bir karar alma modeli oluşturarak işletmelere katkıda bulunması hedeflenmektedir. Bulut bilişimin faydalarının ve zorluklarının, sektördeki işletmeler ve akademi için kapsamlı ve katma değerli veriler sağlaması amaçlanmıştır.

