Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tuncay Ercan is active.

Publication


Featured researches published by Tuncay Ercan.


international symposium on pervasive systems, algorithms, and networks | 2009

A Layered Security Approach for Cloud Computing Infrastructure

Mehmet Can Yildiz; Jemal H. Abawajy; Tuncay Ercan; Andrew J. Bernoth

This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is to offer a macro level solution for identified common infrastructure security requirements. This model with a number of emerged patterns can be applied to infrastructure aspect of Cloud Computing as a proposed shared security approach in system development life cycle focusing on the plan-built-run scope.


Ksii Transactions on Internet and Information Systems | 2015

Formal Trust Assessment with Confidence Probability

Mahir Kutay; Tuncay Ercan

Trust and trustworthiness of web services and organizations is calculated as scalar values. But there is still a certain level of risk for the overall reliability of this value. In this article, we focus on calculating trust values as intervals between upper and lower bounds based on predefined confidence values through an additional confidence probability. This will give us a more realistic approach to the trust assessments between individuals and organizations. We also developed a web-based software tool, TAST (Trust Assessment Software Tool) that collects the web services’ evaluation of different customer groups for similar organizations through the user interface and calculates the trust intervals for predefined and previously selected confidence values. Our model uses a weighted calculation of mean and variances of customer groups in specific periods and analyses the total and incremental trust of different customer groups.


Sensors | 2008

Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors

Yasar Guneri Sahin; Tuncay Ercan

Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.


international conference on knowledge based and intelligent information and engineering systems | 2010

Control network programming with SPIDER: dynamic search control

Kostadin Kratchanov; Tzanko Golemanov; Emilia Golemanova; Tuncay Ercan

The report describes the means for dynamic control of the computation process that are available in Spider - a language for Control Network Programming.


international conference on algorithms and architectures for parallel processing | 2010

Semantic access control for corporate mobile devices

Tuncay Ercan; Mehmet Can Yildiz

Many of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or organizations have become totally distributed between peers and partners. Designing applicable access control mechanisms in this environment is difficult from the point of traditional security measures. Semantic web technologies offer appropriate access opportunities to the corporate resources by using related context in user devices and servers under the trust philosophy. Semantic web technology combines user requests and service descriptions for an efficient matchmaking. This paper examines various access control mechanisms and semantically analyzes them. The purpose of this paper is to present a more secure access control mechanism for mobile corporate devices. This model can be used as an additional security framework that enforces access control mechanisms in the organizations.


Geoinformatics 2008 and Joint Conference on GIS and Built Environment: Geo-Simulation and Virtual GIS Environments | 2008

Integration of GIS : A showcase study on GML based WebGIS

Tohid Ahmed Rana; Murat Komesli; Tuncay Ercan; Yumei Sun

The growth of Geographical Information Systems (GIS) emerges as analytical decision-making tools utilizing highly specialized geographic data. However, a simple system still does not exist for the integration/sharing information among GIS. Different organizations working within various domains have built their own data models for collecting and analyzing data. Many data storage, analysis, and delivery issues have prevented these organizations from effectively sharing their data. This presentation aims to show how to share the geo referenced information by utilizing GML (Geography Markup Language) technology among heterogeneous GIS. At present, the updates are retrieved manually; often failing entirely results in information loss and major inconsistencies or referenced data set can be purchased from geographic information producers. The problems and expense associated with the integration of updates for geographic databases are documented. Moreover, a showcase study on a GML based Web-GIS application system has also been developed in order to show how to share geographic information by using GML. The application includes various coverage layers online maps, important textual information and selected case studies


signal processing and communications applications conference | 2016

A framework model for data reliability in wireless sensor networks

Ilker Kalayci; Tuncay Ercan

In this study a model for data reliability in wireless sensor networks is proposed, in which machine learning methods are used. Proposed framework includes data modelling, missing data prediction, anomaly detection, data fusion and trust mechanism phases. Thus, temporal analysis is performed on the preprocessed sensor data and missing data are predicated. Then outliers on collected data are detected on the cluster head nodes by using Eta one-class Support Vector Machines. If an event is detected data are fused and then send to sink. If an anomaly is detected for a nodes data, the trust weight of the node is decreased.


metadata and semantics research | 2011

OWL Ontology Development for Destination Marketing

Murat Komesli; Tuncay Ercan; Gökçe Özdemir

Internet, as a marketing medium in the tourism industry, is a very valuable destination marketing tool. Different tourism authorities and organizations serve as marketing and service providers. They benefit from the use of Internet within the concept of marketing efforts. A new technology, Semantic Web, brought incremental changes by bringing machine-readable descriptions to current web interfaces of these organizations. This paper provides necessary framework for the applicability of Semantic Web technology on Destination Marketing. It creates a methodology on how web pages are created and analyzed with the value-added tourism marketing purposes. Semantic Web technology achieves such interoperability by referring to ontology models. The ontology presented here determines the value of this integration in destination marketing organizations.


international conference on knowledge based and intelligent information and engineering systems | 2010

Non-procedural implementation of local heuristic search in control network programming

Kostadin Kratchanov; Emilia Golemanova; Tzanko Golemanov; Tuncay Ercan

The report describes the type of improved uninformed or heuristic search algorithms that are well-suited for non-procedural implementation in Control network programming, and how this can be achieved using the tools for dynamic computation control.


International Conference on Wireless and Mobile Networks | 2010

Host Based Dynamic Throughput Maximization Model for IEEE 802.11 WLAN

Murat Koyuncu; Mehmet Kazim Gercek; Tuncay Ercan

As the demand for uninterrupted Internet access grows, the popularity of wireless communication increases. However, wireless communication has some problems compared to conventional wired communication. Especially, if widely used Wireless Local Area Network (WLAN) applications are taken into consideration, it becomes an important issue to balance the load among available access points. It is impossible to balance the load when wireless hosts associate with an access point by using the classical approach of Received Signal Strength Index (RSSI). Some solutions containing a central server, requiring a specific brand of access point or protocol revisions have been proposed previously, but none of them has been favored as a generally accepted solution. In this study, a proposal which is central server free and requires no modifications to the existing infrastructure is presented. The proposed model is based on a dynamic determination of the least loaded access point to associate with, in order to balance load and maximize throughput.

Collaboration


Dive into the Tuncay Ercan's collaboration.

Top Co-Authors

Avatar

Yasar Guneri Sahin

İzmir University of Economics

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge