Search Results

Now showing 1 - 10 of 22
  • Article
    Citation - WoS: 2
    Citation - Scopus: 8
    It Service Management (itsm) Education and Research: Global View
    (Tempus Publications, 2015) Yazici, Ali; Mishra, Alok; Kontogiorgis, Paul; Software Engineering
    This article provides an overview of Information Technology Service Management (ITSM) and investigates the education and research activities in this discipline from a global perspective. The objectives of the study are to inform the training organizations (e.g., universities, training institutes) on the current status of the educational activities in ITSM at undergraduate and graduate levels; and to guide the researchers by providing quantitative data on the research activities conducted in the field. In the educational arena, the statistical data showed that, stand-alone undergraduate/graduate programs are becoming popular among the high school graduates with elevated expectations of the market place, in addition to the appreciation of the IT service management area by the IT sector and the public. The results of the research findings provide guidelines for curriculum developers in the design and implementation of courses for the de facto interdisciplinary ITSM degree/certificate training programs and motivate and guide the researchers by providing the most recent quantitative data on the ITSM field. It is one of the first studies to provide education and research trends in ITSM area. The present study adds to this important stream of emerging research area and contributes by advancing the understanding of ITSM education and research issues. This paper advances the current state of knowledge on ITSM education and explores recent research trends in this area which is becoming standard towards providing quality IT services in enterprises.
  • Conference Object
    Citation - Scopus: 2
    Big Data on Cloud for Government Agencies: Benefits, Challenges, and Solutions
    (Assoc Computing Machinery, 2018) Rashed, Alaa Hussain; Karakaya, Ziya; Yazici, Ali
    Big Data and Cloud computing are the most important technologies that give the opportunity for government agencies to gain a competitive advantage and improve their organizations. On one hand, Big Data implementation requires investing a significant amount of money in hardware, software, and workforce. On the other hand, Cloud Computing offers an unlimited, scalable and on-demand pool of resources which provide the ability to adopt Big Data technology without wasting on the financial resources of the organization and make the implementation of Big Data faster and easier. The aim of this study is to conduct a systematic literature review in order to collect data to identify the benefits and challenges of Big Data on Cloud for government agencies and to make a clear understanding of how combining Big Data and Cloud Computing help to overcome some of these challenges. The last objective of this study is to identify the solutions for related challenges of Big Data. Four research questions were designed to determine the information that is related to the objectives of this study. Data is collected using literature review method and the results are deduced from there.
  • Conference Object
    Citation - WoS: 6
    Jmathnorm: a Database Normalization Tool Using Mathematica
    (Springer-verlag Berlin, 2007) Yazici, Ali; Karakaya, Ziya
    This paper is about designing a complete interactive tool, named JMathNorm, for relational database (RDB) normalization using Mathematica. It is an extension of the prototype developed by the same authors [1] with the inclusion of Second Normal Form (2NF), and Boyce-Codd Normal Form (BCNF) in addition to the existing Third normal Form (3NF) module. The tool developed in this study is complete and can be used for real-time database design as well as an aid in teaching fundamental concepts of DB normalization to students with limited mathematical background. JMathNorm also supports interactive use of modules for experimenting the fundamental set operations such as closure, and full closure together with modules to obtain the minimal cover of the functional dependency set and testing an attribute for a candidate key. JMathNorm's GUI interface is written in Java and utilizes Mathematica's Mink facility to drive the Mathematica kernel.
  • Article
    Education With Experience: Assessment of a Co-Op Model in Undergraduate Engineering Programs in Computing
    (Ieee Computer Soc, 2023) Nazlioglu, Selma; Turhan, Cigdem; Yazici, Ali
    A major concern among graduates of computing departments is the discrepancy between the expectations of software companies and the competencies provided by the academic departments. This ongoing problem makes co-op education inevitable, as it combines industrial experience with traditional education.
  • Conference Object
    Citation - WoS: 13
    A Decentralized Application for Secure Messaging in a Trustless Environment
    (Ieee, 2018) Abdulaziz, Mohamed; Culha, Davut; Yazici, Ali
    Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol.
  • Conference Object
    Citation - WoS: 7
    Successful Requirement Elicitation by Combining Requirement Engineering Techniques
    (Ieee, 2008) Mishra, Deepti; Mishra, Alok; Yazici, Ali
    The role of customers and other stakeholders is becoming increasingly significant during requirement engineering activities. Methods of eliciting requirements are now more co-operative. There are many techniques to obtain requirements from customers. Selecting the right techniques according to the characteristics of the project is very important. In some complex problems, combination of requirement engineering techniques should be applied for efficient and successful requirement engineering process. In this paper, we have presented the application of combination of requirement engineering techniques for a real life complex project (Supply Chain Management) with higher requirements volatility developed in a small scale software development organization, This will help in understanding requirements elicitation for such kind of complex software and facilitate in selecting the appropriate techniques towards getting the consistent and complete requirements.
  • Editorial
    Foreword
    (CEUR-WS, 2017) Yazici, Ali; Oǧuztüzün, Halit
  • Conference Object
    Citation - WoS: 1
    Citation - Scopus: 4
    Smart Contract Upgradability: a Structured and Natural Approach
    (Institute of Electrical and Electronics Engineers Inc., 2024) Culha, Davut; Yazici, Ali
    Software maintenance is crucial as technology rapidly evolves, requiring software to meet new demands and correct errors. Smart contracts, immutable programs on blockchains like Ethereum, face challenges despite their immutability, often needing updates for errors or new features. Smart contracts are upgraded using different patterns, which are not natural because most of them implement upgrades using low-level operations that deviate from their intended use. In other words, these patterns are not natural because upgrades are done by implementing workarounds. Moreover, smart contracts are also susceptible to security vulnerabilities because they may hold large amounts of money. In this paper, upgradability of smart contracts is considered a necessity. For this purpose, a more structured method is proposed by adding high-level features and combining inheritance properties of object-oriented languages. A key component of this method is the gotoContract variable, which allows for the redirection of function calls to upgraded contracts. The proposed method provides a complete upgrade of data and functions in smart contracts. It aims to minimize the effects of upgrades on end users of the smart contracts. Additionally, this natural way of upgrading will help mitigate security risks in the smart contracts by providing a high-level approach to upgrade.
  • Conference Object
    Informatics Engineering Education in Turkey and Expectations of Software Industry
    (Ieee, 2018) Yazici, Ali; Mishra, Alok; Karakaya, Ziya; Ustunkok, Tolga
    In this study, using the OSYM data, the number of intakes in Informatics Engineering programs in Turkey, accreditation data and the medium of instruction of the program are summarized for the years 2016 and 2017. In addition, the software sector's expectations from the informatics engineering graduates are reassessed based on the academic studies. The developed knowledge-skill gap set was used to evaluate the situation in Turkish informatics engineering programs. Sector expectations are discussed in the context of 2017-2019 Turkey Software Sector Strategy and Action Plan prepared by the Ministry of Science, Industry and Technology of Turkey and some proposals are made for the academia. As a result, it was observed that the expectations of the software industry were similar in all studies. Additionally, the expectations were changed in the direction of developing technologies and this change should be reflected in the informatics engineering programs.
  • Conference Object
    The Romberg-Like Parallel Numerical Integration on a Cluster System
    (Ieee, 2009) Yazici, Ali
    In this paper, an approximation of a double integral over a triangular region using a Romberg-like buffered extrapolation technique is considered. A master-worker algorithm organization was developed and implemented using the Message Passing Interface (MPI) paradigm which aims at computing the function f(x,y) at the nodes of the triangle by the worker processes in parallel. The algorithm is implemented on a Sun Cluster consisting of 8xX2200 Sun Fire dual core processors using Sun's OpenMPI message passing environment. Here, the Sun Studio Performance Analyzer is utilized to display the runtime behavior of the processes and CPU's involved in the computations. A simple model is developed to predict the speed-up factor.