scispace - formally typeset
Search or ask a question
Author

Tuncay Ercan

Other affiliations: Siemens
Bio: Tuncay Ercan is an academic researcher from Yaşar University. The author has contributed to research in topics: Cloud computing & Wireless sensor network. The author has an hindex of 7, co-authored 40 publications receiving 707 citations. Previous affiliations of Tuncay Ercan include Siemens.

Papers
More filters
Journal ArticleDOI
Tuncay Ercan1
TL;DR: What the cloud computing infrastructure will provide in the educational arena, especially in the universities where the use of computers are more intensive and what can be done to increase the benefits of common applications for students and teachers are reviewed.

392 citations

Journal ArticleDOI
TL;DR: A new and completely automatic counting, segmentation and classification process is developed that automatically counts the white blood cells, determine their sizes accurately and classifies them into five types such as basophil, lymphocyte, neutrophil, monocyte and eosinophil.

135 citations

Proceedings ArticleDOI
14 Dec 2009
TL;DR: This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service commerce platforms and Internet Integration.
Abstract: This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is to offer a macro level solution for identified common infrastructure security requirements. This model with a number of emerged patterns can be applied to infrastructure aspect of Cloud Computing as a proposed shared security approach in system development life cycle focusing on the plan-built-run scope.

72 citations

01 Jan 2010
TL;DR: In this article, the authors present the way university students gather their course project requirements during the project elicitation phase, how they access the Internet and other resources, and their trends in the literature review using the Internet.
Abstract: Although technology is a very important, useful and indispensable part of the life, effective and appropriate usage of it still needs to be improved in education. This study presents the way university students gather their course project requirements during the project elicitation phase, how they access the Internet and other resources, and their trends in the literature review using the Internet. Furthermore, the diversity of Internet resources which are used for homework and course projects studies, and the reliability and accessibility of these resources have also been investigated and assessed. In addition, the results obtained from the study have been discussed and evaluated, the academic resources accessibility and usability in universities have been assessed and their importance discussed. The internet resources have been divided into sub categories according to their accessibility and reliability. Finally, the effects of reliable and limited accessible internet resources and unreliable and unlimited internet resources on university students’ out-of-class works and projects have been presented and discussed.

65 citations

Journal ArticleDOI
TL;DR: In this paper, the authors investigated the internal and external factors for CC adoption decisions of companies in Izmir, Turkey using a combination of DOI and TOE models, and found that complexity and top management supports are significantly important for efficient CC adoption.
Abstract: Purpose of the study: This study aims to investigate the internal and external factors for CC adoption decisions of companies in Izmir, Turkey using a combination of DOI and TOE models. Methodology: This is a confirmatory survey of businesses, forming a questionnaire for 176 IT decision-makers of non-cloud or cloud user businesses in the city of Izmir in Turkey. SmartPLS 3.0 software is used to assess the determinants affecting cloud computing adoption. Main Findings: The study identified relative advantage, compatibility, complexity, and top management support, using security and privacy concerns and cost savings as mediating variables of relative advantage for CC adoption. The survey results indicated that complexity and top management supports are significantly important for efficient CC adoption. The model explained 41.2 percent of CC adoption. Applications of this study: The study is believed to be useful in fields including business development for most sectors, computing, cloud providers as well as researchers on business administration, sales, marketing, and IT infrastructure. Particularly this study and the suggested framework will help companies and businesses adopt CC appropriately. Moreover, as suggested in the study, governments can use such frameworks when encouraging cloud providers to support companies in their decision making and transition periods for CC adoption. Novelty/Originality of this study: This study will undoubtedly contribute to the decision making processes of the companies for CC adoption. Through the integrated in-depth analysis of the factors that affect the adoption decisions in an industrial region of Turkey, the study will also provide valuable data for the researchers and businesses within similar company personas.

10 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The research revealed that relative advantage, top management support, firm size, competitive pressure, and trading partner pressure characteristics have a significant effect on the adoption of cloud computing.
Abstract: – The purpose of this paper is to investigate the factors that affect the adoption of cloud computing by firms belonging to the high‐tech industry. The eight factors examined in this study are relative advantage, complexity, compatibility, top management support, firm size, technology readiness, competitive pressure, and trading partner pressure., – A questionnaire‐based survey was used to collect data from 111 firms belonging to the high‐tech industry in Taiwan. Relevant hypotheses were derived and tested by logistic regression analysis., – The findings revealed that relative advantage, top management support, firm size, competitive pressure, and trading partner pressure characteristics have a significant effect on the adoption of cloud computing., – The research was conducted in the high‐tech industry, which may limit the generalisability of the findings., – The findings offer cloud computing service providers with a better understanding of what affects cloud computing adoption characteristics, with relevant insight on current promotions., – The research contributes to the application of new technology cloud computing adoption in the high‐tech industry through the use of a wide range of variables. The findings also help firms consider their information technologies investments when implementing cloud computing.

995 citations

Journal ArticleDOI
TL;DR: An extensive review on cloud computing with the main focus on gaps and security concerns is presented, which identifies the top security threats and their existing solutions and investigates the challenges/obstacles in implementing threat remediation.

288 citations

Journal ArticleDOI
TL;DR: This survey presents a comprehensive and organized review of the progress of outlier detection methods from 2000 to 2019 and categorizes them into different techniques from diverse outlier Detection techniques, such as distance-, clustering-, density-, ensemble-, and learning-based methods.
Abstract: Detecting outliers is a significant problem that has been studied in various research and application areas. Researchers continue to design robust schemes to provide solutions to detect outliers efficiently. In this survey, we present a comprehensive and organized review of the progress of outlier detection methods from 2000 to 2019. First, we offer the fundamental concepts of outlier detection and then categorize them into different techniques from diverse outlier detection techniques, such as distance-, clustering-, density-, ensemble-, and learning-based methods. In each category, we introduce some state-of-the-art outlier detection methods and further discuss them in detail in terms of their performance. Second, we delineate their pros, cons, and challenges to provide researchers with a concise overview of each technique and recommend solutions and possible research directions. This paper gives current progress of outlier detection techniques and provides a better understanding of the different outlier detection methods. The open research issues and challenges at the end will provide researchers with a clear path for the future of outlier detection methods.

263 citations

Journal ArticleDOI
TL;DR: In this article, the authors present a descriptive literature review and classification scheme for cloud computing research, which includes 205 refereed journal articles published since the inception of cloud computing and classify them into four main categories: technological issues, business issues, domains and applications, and conceptualizing cloud computing.
Abstract: We present a descriptive literature review and classification scheme for cloud computing research. This includes 205 refereed journal articles published since the inception of cloud computing research. The articles are classified based on a scheme that consists of four main categories: technological issues, business issues, domains and applications, and conceptualising cloud computing. The results show that although current research is still skewed towards technological issues, new research themes regarding social and organisational implications are emerging. This review provides a reference source and classification scheme for IS researchers interested in cloud computing, and to indicate under-researched areas as well as future directions.

240 citations

Journal ArticleDOI
TL;DR: In this article, a review of the applications of molecularly imprinted polymer (MIP) materials in the area of electrochemical sensors has been explored, where the designs of the MIPs containing different polymers, their preparation and their immobilization on the transducer surface have been discussed.
Abstract: In this review, the applications of molecularly imprinted polymer (MIP) materials in the area of electrochemical sensors have been explored. The designs of the MIPs containing different polymers, their preparation and their immobilization on the transducer surface have been discussed. Further, the employment of various transducers containing the MIPs based on different electrochemical techniques for determining analytes has been assessed. In addition, the general protocols for getting the electrochemical signal based on the binding ability of analyte with the MIPs have been given. The review ends with describing scope and limitations of the above electrochemical based MIP sensors.

211 citations