Browsing by Author "Yazici, Ali"
Now showing 1 - 20 of 29
- Results Per Page
- Sort Options
Article An Adaptive Element Division Algorithm for Accurate Evaluation of Singular and Near Singular Integrals in 3d(Tubitak Scientific & Technological Research Council Turkey, 2021) Bayindir, Hakan; Baranoglu, Besim; Yazici, AliAn adaptive algorithm for evaluation of singular and near singular integrals in 3D is presented. The algorithm is based on successive adaptive/selective subdivisions of the element until a prescribed error criteria is met. For evaluating the integrals in each subdivision, Gauss quadrature is applied. The method is computationally simple, memory efficient and can be applied for both triangular and quadrilateral elements, including the elements with nonplanar and/or curved surfaces. To assess the method, several examples are discussed. It has shown that the algorithm performs well for singular and near-singular integral examples presented in the paper and evaluates the integrals with very high accuracy.Article Citation - WoS: 9Citation - Scopus: 17An Assessment of the Software Engineering Curriculum in Turkish Universities: Ieee/Acm Guidelines Perspective(Fac Teacher Education, 2011) Mishra, Alok; Yazici, Ali; Software EngineeringSoftware engineering (SE) education has been emerging as an independent and mature discipline. Accordingly, various studies are being done to provide guidelines for SE education curriculum design. This paper presents software engineering education evolvement in Turkey, present SE education scenario in different universities along with the significance of software technology parks in relevance to software engineering education. The objective of this paper is to provide an assessment of SE curriculum in Turkish Universities with respect to IEEE/ACM guidelines given in SEEK (2004). This study will provide a guideline to universities conducting an SE programme at undergraduate level to align their course curriculum with IEEE/ACM guidelines (SEEK, 2004).Conference Object Citation - Scopus: 2Big Data on Cloud for Government Agencies: Benefits, Challenges, and Solutions(Assoc Computing Machinery, 2018) Rashed, Alaa Hussain; Karakaya, Ziya; Yazici, AliBig Data and Cloud computing are the most important technologies that give the opportunity for government agencies to gain a competitive advantage and improve their organizations. On one hand, Big Data implementation requires investing a significant amount of money in hardware, software, and workforce. On the other hand, Cloud Computing offers an unlimited, scalable and on-demand pool of resources which provide the ability to adopt Big Data technology without wasting on the financial resources of the organization and make the implementation of Big Data faster and easier. The aim of this study is to conduct a systematic literature review in order to collect data to identify the benefits and challenges of Big Data on Cloud for government agencies and to make a clear understanding of how combining Big Data and Cloud Computing help to overcome some of these challenges. The last objective of this study is to identify the solutions for related challenges of Big Data. Four research questions were designed to determine the information that is related to the objectives of this study. Data is collected using literature review method and the results are deduced from there.Conference Object A Casestudy of Data Models in Data Warehousing(Ieee, 2008) Mishra, Deepti; Yazici, Ali; Basaran, Beril PinarData warehousing (DFV) provides an excellent approach in transforming operational data into useful and reliable information to support the decision making process in any organization. In this paper, a case study is performed to implement a DW. This case-study is used to describe and compare various conceptual and logical design models for data warehousing. This comparison is done to find which of the conceptual and logical data models are more appropriate for implementing data warehouse for sales and shipping system.Article Citation - WoS: 11Citation - Scopus: 13Challenges in Agile Software Maintenance for Local and Global Development: an Empirical Assessment(Mdpi, 2023) Almashhadani, Mohammed; Mishra, Alok; Yazici, Ali; Younas, MuhammadAgile methods have gained wide popularity recently due to their characteristics in software development. Despite the success of agile methods in the software maintenance process, several challenges have been reported. In this study, we investigate the challenges that measure the impact of agile methods in software maintenance in terms of quality factors. A survey was conducted to collect data from agile practitioners to establish their opinions about existing challenges. As a result of the statistical analysis of the data from the survey, it has been observed that there are moderately effective challenges in manageability, scalability, communication, collaboration, and transparency. Further research is required to validate software maintenance challenges in agile methods.Conference Object Citation - WoS: 28A Comparison of Stream Processing Frameworks(Ieee, 2017) Karakaya, Ziya; Yazici, Ali; Alayyoub, MohammedThis study compares the performance of Big Data Stream Processing frameworks including Apache Spark, Flink, and Storm. Also, it measures the resource usage and performance scalability of the frameworks against a varying number of cluster sizes. It has been observed that, Flink outperforms both Spark and Storm under equal constraints. However, Spark can be optimized to provide the higher throughput than Flink with the cost of higher latency.Article Citation - WoS: 8Citation - Scopus: 15Cross-Factor Analysis of Software Engineering Practices Versus Practitioner Demographics: an Exploratory Study in Turkey(Elsevier Science inc, 2016) Garousi, Vahid; Coskuncay, Ahmet; Demirors, Onur; Yazici, AliContext: Understanding the types of software engineering practices and techniques used in the industry is important. There is a wide spectrum in terms of the types and maturity of software engineering practices conducted in each software team and company. Furthermore, it is important to understand the cross-factor relationship of software engineering practices and practitioner demographics including their companies and projects, e.g., is it the case that practitioners developing software for sectors such as military would utilize software size measurement approaches more, or use different software development methodologies, compared to practitioners developing software for other sectors?, and what kinds of practices are conducted by practitioners in small versus large companies? Objective: Our objective is to get an understanding into the cross-factor correlation of various software engineering practices versus practitioner demographics including their companies and projects (e.g., target industry, size and work experience). Such an understanding will enable us to identify patterns and pinpoint special issues which should be studied and addressed in the context of each specific demographic (e.g., small versus large companies). Thus, we decided to conduct an exploratory study in this area and collected real industrial data in the context of Turkey which has a vibrant software industry. Method: To achieve the above objective, we use the data from a recent Turkish-wide survey of software engineering practices which was systematically designed with 46 questions based on our past experience in the Canadian context and using the Software Engineering Body of Knowledge (SWEBOK). 202 practicing software engineers participated in the survey. We raise a set of 12 research questions about the cross-factor correlation of software engineering practices and practitioner demographics, and address them using statistical analysis. Results: The exploratory study results reveal important and interesting findings about cross-factor relationship of software engineering practices and practitioner demographics. Among some of the most interesting findings are the followings: (1) By analyzing the trends, we were first surprised to see that as a practitioner gets more years of work experience, against what one would expect, s/he experiences more challenges in Software Development Life-Cycle (SDLC) phases and SE tasks; (2) Almost 55% of participants measure software size; (3) Agile/lean development is used the least (16%) by the participants working in the companies serving the military and defense sector; (4) Usage of waterfall is low among participants employed by small sized companies whereas Agile/lean development is relatively popular among this class of participants; and (5) As company size increases, usage of spiral development slightly increases, whereas usage of extreme programming practices decreases. Conclusion: The results of this exploratory study will be useful to software engineering professionals and researchers both in Turkey and world-wide by revealing the cross-factor relationship of software engineering practices versus practitioner demographics. The study raises several new research directions, e.g., (1) Why are not many practitioners using any size nor project estimation metrics and how these fundamental engineering approaches could be utilized more frequently?, (2) What are the best practices, success stories and challenging experiences in using SE tools?, and (3) Why is Agile lean development is not popular in the military and defense sector and how these approaches could be utilized more frequently. (C) 2015 Elsevier Inc. All rights reserved.Conference Object Citation - WoS: 13A Decentralized Application for Secure Messaging in a Trustless Environment(Ieee, 2018) Abdulaziz, Mohamed; Culha, Davut; Yazici, AliBlockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol.Article Education With Experience: Assessment of a Co-Op Model in Undergraduate Engineering Programs in Computing(Ieee Computer Soc, 2023) Nazlioglu, Selma; Turhan, Cigdem; Yazici, AliA major concern among graduates of computing departments is the discrepancy between the expectations of software companies and the competencies provided by the academic departments. This ongoing problem makes co-op education inevitable, as it combines industrial experience with traditional education.Editorial Foreword(CEUR-WS, 2017) Yazici, Ali; Oǧuztüzün, HalitArticle Citation - WoS: 3Citation - Scopus: 14Green Information Technology/Information System Education: Curriculum Views(Drunpp-sarajevo, 2012) Mishra, Alok; Yazici, Ali; Mishra, Deepti; Computer Engineering; Software EngineeringGreen information technology (Green IT) is an emerging discipline and issues related with it are of growing concern for the business, social and environmental impact in the 21st century. Sustainability is becoming an important topic in IT to safeguard our future, and as evolving market segment. Recently more specific focus on "greening" information technology (IT) and information systems (IS) has been evident all over the world. An increase in green jobs is also occurring with many of those associated with information technology. The main constraint with green jobs related with IT or otherwise, is finding educated and qualified professionals. Due to this, there is a growing demand for green computing/information technology/information system education. The objective of this paper is to review such an available green IT/IS curriculum recently introduced by leading universities and organizations.Conference Object Informatics Engineering Education in Turkey and Expectations of Software Industry(Ieee, 2018) Yazici, Ali; Mishra, Alok; Karakaya, Ziya; Ustunkok, TolgaIn this study, using the OSYM data, the number of intakes in Informatics Engineering programs in Turkey, accreditation data and the medium of instruction of the program are summarized for the years 2016 and 2017. In addition, the software sector's expectations from the informatics engineering graduates are reassessed based on the academic studies. The developed knowledge-skill gap set was used to evaluate the situation in Turkish informatics engineering programs. Sector expectations are discussed in the context of 2017-2019 Turkey Software Sector Strategy and Action Plan prepared by the Ministry of Science, Industry and Technology of Turkey and some proposals are made for the academia. As a result, it was observed that the expectations of the software industry were similar in all studies. Additionally, the expectations were changed in the direction of developing technologies and this change should be reflected in the informatics engineering programs.Article Citation - WoS: 2Citation - Scopus: 8It Service Management (itsm) Education and Research: Global View(Tempus Publications, 2015) Yazici, Ali; Mishra, Alok; Kontogiorgis, Paul; Software EngineeringThis article provides an overview of Information Technology Service Management (ITSM) and investigates the education and research activities in this discipline from a global perspective. The objectives of the study are to inform the training organizations (e.g., universities, training institutes) on the current status of the educational activities in ITSM at undergraduate and graduate levels; and to guide the researchers by providing quantitative data on the research activities conducted in the field. In the educational arena, the statistical data showed that, stand-alone undergraduate/graduate programs are becoming popular among the high school graduates with elevated expectations of the market place, in addition to the appreciation of the IT service management area by the IT sector and the public. The results of the research findings provide guidelines for curriculum developers in the design and implementation of courses for the de facto interdisciplinary ITSM degree/certificate training programs and motivate and guide the researchers by providing the most recent quantitative data on the ITSM field. It is one of the first studies to provide education and research trends in ITSM area. The present study adds to this important stream of emerging research area and contributes by advancing the understanding of ITSM education and research issues. This paper advances the current state of knowledge on ITSM education and explores recent research trends in this area which is becoming standard towards providing quality IT services in enterprises.Conference Object Citation - WoS: 6Jmathnorm: a Database Normalization Tool Using Mathematica(Springer-verlag Berlin, 2007) Yazici, Ali; Karakaya, ZiyaThis paper is about designing a complete interactive tool, named JMathNorm, for relational database (RDB) normalization using Mathematica. It is an extension of the prototype developed by the same authors [1] with the inclusion of Second Normal Form (2NF), and Boyce-Codd Normal Form (BCNF) in addition to the existing Third normal Form (3NF) module. The tool developed in this study is complete and can be used for real-time database design as well as an aid in teaching fundamental concepts of DB normalization to students with limited mathematical background. JMathNorm also supports interactive use of modules for experimenting the fundamental set operations such as closure, and full closure together with modules to obtain the minimal cover of the functional dependency set and testing an attribute for a candidate key. JMathNorm's GUI interface is written in Java and utilizes Mathematica's Mink facility to drive the Mathematica kernel.Conference Object Citation - WoS: 4Normalizing relational database schemas using Mathematica(Springer-verlag Berlin, 2006) Yazici, Ali; Karakaya, ZiyaIn this paper, basic relational database (DB) normalization algorithms are implemented efficiently as Mathematica modules. It was observed that, Mathematica provided a straightforward platform as opposed to previous ones, mainly Prolog based tools which required complex data structures such as linked list representations with pointers. A Java user interface called JMath-Norm was designed to execute the Mathematica modules in a systematic way. For this purpose, Mathematica's Java link facility (JLink) is utilized to drive the Mathematica kernel. JMath-Norm provides an effective interactive tool in an educational setting for teaching DB normalization theory.Article Citation - WoS: 3Citation - Scopus: 3Online Learning Perceptions Amid Covid-19 Pandemic: the Engineering Undergraduates' Perspective(Tempus Publications, 2022) Eryilmaz, Meltem; Kalem, Guler; Kilic, Hurevren; Tirkes, Guzin; Topalli, Damla; Turhan, Cigdem; Yazici, Ali; Information Systems Engineering; Computer Engineering; Software EngineeringThe COVID-19 pandemic caused face-to-face education in just about all universities worldwide to shift to online education. For most students, this educational model was a compulsory first experience. In this study, the survey results are analyzed and discussed related to a group of students in the Engineering Faculty of a university in Turkey regarding their online education perceptions. Briefly summarized, the findings of the study indicate that: (a) most of the students still prefer face-to-face learning, which is also favored if accompanied by distance learning; (b) the concentration level of the students has dropped due to the concerns about the COVID-19 pandemic which affects their learning negatively; and (c) around half of the students participating in the study feel that the online exams conducted without a secure exam software, is considered unsafe. Additionally, the study's results were further extended to evaluate the questionnaire results and reported along with the suggestions of necessary actions in emergency online learning (EOL).Article Citation - WoS: 16Citation - Scopus: 17Organizational Software Piracy: an Empirical Assessment(Taylor & Francis Ltd, 2007) Mishra, Alok; Akman, Ibrahim; Yazici, AliApplication of Information Technology (IT) has had a significant impact on all aspects of business. Due to technology, the ease with which software can be pirated is increasing and is leading to increased concern for copyright protection. This paper reviews and discusses software piracy issues from a global perspective and reports the findings of a survey concerning the impact of sectors like government, private and academic in Turkey. Although software piracy has long been attracting the interest of academics, no quantitative research has ever been realized in this field in the country. Elsewhere also, most of the software piracy-related studies are from individuals' perspectives and are limited to students, academics, cost, and attitudes. Very few have reported findings related to IT professionals and organizations. The survey was conducted among IT managers of large-scale organizations from different sectors such as the government, private and academic community. Based on the survey of 162 IT managers, the results indicated that sectors have significant impact on software piracy to some extent.Conference Object Perceptions, Expectations and Implementations of Big Data in Public Sector(Ieee, 2018) Dogdu, Erdogan; Ozbayoglu, Murat; Yazici, Ali; Karakaya, ZiyaBig Data is one of the most commonly encountered buzzwords among IT professionals nowadays. Technological advancements in data acquisition, storage, telecommunications, embedded systems and sensor technologies resulted in huge inflows of streaming data coming from variety of sources, ranging from financial streaming data to social media tweets, or wearable health gadgets to drone flight logs. The processing and analysis of such data is a difficult task, but as appointed by many IT experts, it is crucial to have a Big Data Implementation plan in today's challenging industry standards. In this study, we performed a survey among IT professionals working in the public sector and tried to address some of their implementation issues and their perception of Big Data today and their expectations about how the industry will evolve. The results indicate that most of the public sector professionals are aware of the current Big Data requirements, embrace the Big Data challenge and are optimistic about the future.Conference Object The Romberg-Like Parallel Numerical Integration on a Cluster System(Ieee, 2009) Yazici, AliIn this paper, an approximation of a double integral over a triangular region using a Romberg-like buffered extrapolation technique is considered. A master-worker algorithm organization was developed and implemented using the Message Passing Interface (MPI) paradigm which aims at computing the function f(x,y) at the nodes of the triangle by the worker processes in parallel. The algorithm is implemented on a Sun Cluster consisting of 8xX2200 Sun Fire dual core processors using Sun's OpenMPI message passing environment. Here, the Sun Studio Performance Analyzer is utilized to display the runtime behavior of the processes and CPU's involved in the computations. A simple model is developed to predict the speed-up factor.Conference Object Citation - WoS: 1Citation - Scopus: 2Smart Contract Upgradability: a Structured and Natural Approach(Institute of Electrical and Electronics Engineers Inc., 2024) Culha, Davut; Yazici, AliSoftware maintenance is crucial as technology rapidly evolves, requiring software to meet new demands and correct errors. Smart contracts, immutable programs on blockchains like Ethereum, face challenges despite their immutability, often needing updates for errors or new features. Smart contracts are upgraded using different patterns, which are not natural because most of them implement upgrades using low-level operations that deviate from their intended use. In other words, these patterns are not natural because upgrades are done by implementing workarounds. Moreover, smart contracts are also susceptible to security vulnerabilities because they may hold large amounts of money. In this paper, upgradability of smart contracts is considered a necessity. For this purpose, a more structured method is proposed by adding high-level features and combining inheritance properties of object-oriented languages. A key component of this method is the gotoContract variable, which allows for the redirection of function calls to upgraded contracts. The proposed method provides a complete upgrade of data and functions in smart contracts. It aims to minimize the effects of upgrades on end users of the smart contracts. Additionally, this natural way of upgrading will help mitigate security risks in the smart contracts by providing a high-level approach to upgrade.

