Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Mehmet Tekerek
  • KSÜ Avşar Kampusu
    Bilgisayar ve Öğretim Teknolojileri Eğitimi Bölümü
    46050 Onikişubat
    Kahramanmaraş
  • +90(344)2801310
Within FATİH Project, it's aimed to use information technology more effectively in learning environments and targeted to make technological infrastructure improvements in schools. For this process information technology teachers play... more
Within FATİH Project, it's aimed to use information technology more effectively in learning environments and targeted to make technological infrastructure improvements in schools. For this process information technology teachers play a key role. Thus, Information Technologies (IT) pre-service teachers' computer self-efficiency perceptions were examined. In the study, a survey model was used and the sample included 200 Computer Education and Instructional Technologies (CEIT) students in two different universities. Relationships between the perceptions of computer self-efficacy of CEIT students and variables such as gender, graduated high school type, place of department preference, grade level and university type were examined by using computer self-efficacy scale that was developed by Orhan ve Akkoyunlu (2003). As a result, it's indicated that; Male pre-service teachers have higher computer self-efficacy perceptions than female pre-service teachers, Pre-service teachers ...
Web technology is changing rapidly every day and the Internet has become a lifestyle for people all over the world. It is obvious that the life style of societies is in a process of change, as new habits are acquired. Even though Internet... more
Web technology is changing rapidly every day and the Internet has become a lifestyle for people all over the world. It is obvious that the life style of societies is in a process of change, as new habits are acquired. Even though Internet use is one of the new social habits, it is one of the most important factors that induce this change as regards the convenience it brings to communication and other areas. The widespread use of Internet implies the idea that it can also be more widely used for educational purpose. Since chemistry teachers have a very important function in education, the determination of teachers ’ attitude towards Internet use is also important. In the literature it is possible to see many studies on teacher candidates ’ at-titude towards Internet use; however studies on appointed teachers ’ attitude are not very common. In our study, which aims to determine the attitude of appointed chemistry teachers according to different vari-ables, we used the Internet use att...
Knowledge networks can be defined as social networks that enable the transfer of the knowledge, which is defined as the intellectual product formed as a result of the work of human intelligence, to be transferred to any other means of... more
Knowledge networks can be defined as social networks that enable the transfer of the knowledge, which is defined as the intellectual product formed as a result of the work of human intelligence, to be transferred to any other means of communication. A knowledge network represents a large number of people, resources and relationships between them, to create the highest value, primarily to accumulate and use knowledge through the process of generating and transmitting knowledge. General structure of knowledge networks; it consists of three basic stages: gathering, organizing and disseminating knowledge. The first step, knowledge collection, institutions and organizations to enter the network structure of the knowledge that is present. The organizing phase is the structuring of irregular and unstructured knowledge in the network structure according to certain standards and recording them regularly in the structure. Knowledge dissemination can be expressed as the transfer of organized k...
Gunumuzde verimliligin artirilmasi, is akislarinin hizlandirilmasi, calisanlar ve diger kurumlarla daha hizli iletisim kurulabilmesi, gunluk yasantimizi kolaylastirmasi gibi bircok sebepten dolayi bilisim sistemleri hizla... more
Gunumuzde verimliligin artirilmasi, is akislarinin hizlandirilmasi, calisanlar ve diger kurumlarla daha hizli iletisim kurulabilmesi, gunluk yasantimizi kolaylastirmasi gibi bircok sebepten dolayi bilisim sistemleri hizla yayginlasmaktadir. Bilisim teknolojilerindeki gelismeler sonucunda, merkezi yapilar yerlerini, dagitik mimarilere, internet ve aglar uzerinden erisilebilen elektronik uygulamalara birakmistir. Web uygulamalari, uzaktan erisimler, cevrimici sistemler, bilgisayar aglari, internet gibi elektronik bilgi altyapilarinin kullaniminin artmasi sonucunda ekavramlar (e-ticaret, e-ogrenme, e-rezervasyon, e-sinav, e-okul, e-banka, e-devlet vb.) gunluk yasantimizin bir parcasi haline gelmistir. Bilisim ortamlarinin kullaniminin artmasi ve yayginlasmasina paralel olarak guvenlik tehditleri ve riskleri ayni oranda artmistir. Teknik guvenlik onlemlerinin gelismesine ragmen bilisim sistemlerine karsi yapilan saldirilarin sayisinin artmasi ve bilgi sistemleri uzerinde yuksek derecede...
Ad-hoc networks are temporary networks, which use wireless media that consists of interconnected nodes without a common network infrastructure using wireless media for immediate and dedicated network solutions. Ad-hoc networks are much... more
Ad-hoc networks are temporary networks, which use wireless media that consists of interconnected nodes without a common network infrastructure using wireless media for immediate and dedicated network solutions. Ad-hoc networks are much vulnerable against the threats compared to the traditional networks due to its nature of lacking of a central control mechanism and the individual attitude of each node. In this study, the security threats and the routing protocols defined for ad hoc networks are investigated and the findings are evaluated. The aim of the study is to reach a generalized conclusion on the existing routing protocols in ad-hoc networks by evaluating the advantages and disadvantages of these protocols. In this paper, it is shown that the routing and security protocols to be used in ad-hoc networks should be designed by providing a resistance, robustness and high energy efficiency in order to overcome security treats aiming for confidentiality, integrity and accessibility....
This paper describes efforts underway to construct a Scientific Publication Content Management System (SPCMS) with Peer Review Tools (PRT) for Academic Institutions. Firstly, known Scientific Publication processes have been reviewed and... more
This paper describes efforts underway to construct a Scientific Publication Content Management System (SPCMS) with Peer Review Tools (PRT) for Academic Institutions. Firstly, known Scientific Publication processes have been reviewed and online publication process was chosen as a model for developing a scientific content publication and management system. Next, the developed system is implemented as a case study to Kyrgyzstan-Turkey Manas University scientific journals. Since it is aimed to construct an online only journals, the system is supposed to be fast-tracking, fully manageable and, on the other hand, it should be highly secure since all the manuscripts are to be stored on the system. To undertake such problems as fast tracking, data processing and security was decided to implement self- developed system by using PHP and AJAX programming on Apache server with MySQL database application. The result of this research is an automated publishing system for scholar manuscript public...
63 Sınıf Öğretmenlerinin Öğretme-Öğrenme Sürecinde Bilgisayar Kullanımına ĠliĢkin Tutumları Mehmet TEKEREK Dr, KSÜ, Bilgisayar ve Öğretim Teknolojileri Eğitimi Bölümü GülĢen SERT BiliĢim Teknolojileri Öğretmeni Öz: Teknoloji günümüzde... more
63 Sınıf Öğretmenlerinin Öğretme-Öğrenme Sürecinde Bilgisayar Kullanımına ĠliĢkin Tutumları Mehmet TEKEREK Dr, KSÜ, Bilgisayar ve Öğretim Teknolojileri Eğitimi Bölümü GülĢen SERT BiliĢim Teknolojileri Öğretmeni Öz: Teknoloji günümüzde günlük yaĢamın her alanına ...
In this study, it was aimed to determine ethical reasoning of lecturers in STEM disciplines in terms of several independent variables (gender, working another institution, age, academic title, academic discipline, service period). This... more
In this study, it was aimed to determine ethical reasoning of lecturers in STEM disciplines in terms of several independent variables (gender, working another institution, age, academic title, academic discipline, service period). This study was designed as a survey research. Lecturers in STEM disciplines in Kahramanmaras Sutcuimam University were selected as participants of the study. ‘‘Ethical Reasoning Instrument (ERI)’ which was developed by Titus, Zoltowski, Huyck, and Oakes (2011) was used in order to collect data by adapting into Turkish. Data were analyzed by the help of independent sample t-test, one-way ANOVA and Kruskal-Wallis tests. The findings indicated that for all independent variables there were no statistically significant difference (p>.05) in ethical reasoning of lecturers. As an interesting result, it was determined that lecturers in engineering discipline have less ethical awareness than lecturers in medicine and science disciplines. Keywords: STEM, STEM Dis...
800x600 In this study, the effect of Scratch environment in teaching algorithm in elementary school 6th grade Information and Communication Technologies course was examined. The research method was experimental method. Control group,... more
800x600 In this study, the effect of Scratch environment in teaching algorithm in elementary school 6th grade Information and Communication Technologies course was examined. The research method was experimental method. Control group, pretest-posttest design of experimental research method and a convenience sample consisting of 60 6th grade students were used. The research instrument was achievement test to determine the effect of Scratch on learning algorithm. During the implementation process experiment group studied using Scratch and control group studied with traditional methods. The data was analyzed using independent-samples t-test, paired-samples t-test and ANCOVA statistics. According to findings there is no statically significant difference between posttest achievement scores of experiment and control groups. Similarly, In terms of gender there isn’t a statically significant difference between posttest scores of experiment and control groups. Keywords: distributed learning e...
The widespread use of internet implies the idea that it can also be more widely used for educational purposes. In this respect, since physics teachers have a very important function in education, to determine physics teachers’ attitudes... more
The widespread use of internet implies the idea that it can also be more widely used for educational purposes. In this respect, since physics teachers have a very important function in education, to determine physics teachers’ attitudes towards internet use is also important. In the literature it is possible to see many studies on teacher candidates’ attitude towards internet use; “however studies on appointed teachers’ attitude are not very common. In our study, which aims to determine the attitude of appointed teachers according to different variables, we used the Internet Use Attitude Scale. For the teachers that took part in the study the attitude towards internet use was analyzed and interpreted according to the variables of gender, years on the job, type of school at which they are teaching, and duration of their weekly internet use. It was seen that a vast majority of the teachers have personal computers, they connect to internet at home and have positive attitude towards int...
Software development processes, in general, focus on organizing the order of the phases to develop the intended software product within time and cost constraints. However, the vulnerabilities of the software projects released to the... more
Software development processes, in general, focus on organizing the order of the phases to develop the intended software product within time and cost constraints. However, the vulnerabilities of the software projects released to the market indicate the need of a security oriented software development process along with providing the time and cost criteria. Moreover, to our best knowledge, there exist some studies stating that the security activities in conventional software development contribute to the effectiveness in providing the security. However, if the agile software development processes are reviewed, it can be seen that principles of agile and security do not match at some points. At this point, the model of Trustworthy Scrum (TS) comes to prominence by enabling the security activities to cooperate with the agile methods and to work in Scrum framework. In this study, a statistical analysis related to the feasibility of the Trustworthy Scrum model was conducted in order to a...
In this study, elementary and high school students’ information and computer security awareness levels were investigated. Information and Computer Security Awareness Scale was developed by the researcher and it was applied to 2447... more
In this study, elementary and high school students’ information and computer security awareness levels were investigated. Information and Computer Security Awareness Scale was developed by the researcher and it was applied to 2447 students in the schools in center of Kahramanmaras City, towns, small towns and villages of Kahramanmaras province. For data analysis the statistical analysis program was used. Consequently it was found that students have sufficient awareness level in terms of ethical issues. However, they have low awareness levels in terms of issues that require knowledge about rules. It can be deduced that information and computer security awareness education and related activities are insufficient. If these courses’ hours can be increased, students’ information and computer security awareness can be enhanced and negative effects of internet can be controlled.
It is known that internet have been widespread in many areas of life and enabled machines to communicate each other. The terms of Internet of Things (IoT) has emerged as a result of networks consist of machines and equipment that work... more
It is known that internet have been widespread in many areas of life and enabled machines to communicate each other. The terms of Internet of Things (IoT) has emerged as a result of networks consist of machines and equipment that work independent of operator and communicate each other. Sensors, embedded systems, communication technologies and data storage systems like clouds create wide area networks that can communicate and share data. In this study, the application of the IoT on a low speed mechanical benchmark driven by a direct current motor has been designed. It is aimed to keep the motor speed fixed at desired value according to the changings occurs depending on varying the pressure acting on the actuators. In presented study, a speed control is performed by establishing a modeling and simulation mechanism that will give the closest results to the real system.
Web yayinlarinda verilerin %65’i goruntulerden olusmaktadir. Bundan dolayi goruntu verilerinin boyutu, kalitesi, erisilirlik gibi unsurlari onem kazanmaktadir. Goruntu bicimleri hakkinda yapilan bircok arastirma gezer aglar gibi sinirli... more
Web yayinlarinda verilerin %65’i goruntulerden olusmaktadir. Bundan dolayi goruntu verilerinin boyutu, kalitesi, erisilirlik gibi unsurlari onem kazanmaktadir. Goruntu bicimleri hakkinda yapilan bircok arastirma gezer aglar gibi sinirli aglarda yukleme hizinin artmasini saglamaya yoneliktir. Web yayinlarinda kullanilmakta olan goruntu bicimlerinin cogu yillar onceki teknolojileri kullanarak gerceklestirilmektedir. Boylece kayipli ve kayipsiz goruntu sikistirma algoritmalarinin sikistirma derecesini goruntu kalitesini bozmadan yukseltme yontemleri gelistirilmektedir. Bu calismada web yayinlarinda goruntu verisinin sayisal bicimde saklama ve raster goruntuleri sikistirma ozellikleri uzerinde durulmustur. JPEG ve PNG sayisal goruntu bicimlerinin sikistirma algoritmalari ile Google tarafindan gelistirilmis WebP algoritmasi, SSIM kalite olcusu ve boyut acisindan karsilastirilmistir. Karsilastirma donusturulmus goruntuler kullanilarak gerceklestirilmis ve sonuclari sunulmustur. Sonuc olar...
Machine translation is a computational linguistics sub-field that studies translation methods and the use of software to translate text between natural languages. Although machine translation is not as accurate as human translation in... more
Machine translation is a computational linguistics sub-field that studies translation methods and the use of software to translate text between natural languages. Although machine translation is not as accurate as human translation in terms of syntactic, semantic accuracy criteria, the usage of improved methods has lead to obtaininig comparatively acceptable results. In recent years, self-learning methods with statistical analysis of big data are being developed. The current development in machine translation among Turkish languages has moved towards rule-based methods. However, one of today’s leading methods, Statistical Machine Translation, is being poorly applied. For this purpose, in this work N-GRAM based and Phrase based Statistical Machine Translation methods were applied between Kyrgyz and Turkish languages, using limited training data. For both methods, the translation quality was evaluated with BLEU scoring algorithm. According to test results, both applied methods, provid...
Within FATIH Project, it’s aimed to use information technology more effectively in learning environments and targeted to make technological infrastructure improvements in schools. For this process information technology teachers play a... more
Within FATIH Project, it’s aimed to use information technology more effectively in learning environments and targeted to make technological infrastructure improvements in schools. For this process information technology teachers play a key role. Thus, Information Technologies (IT) pre-service teachers’ computer self-efficiency perceptions were examined. In the study, a survey model was used and the sample included 200 Computer Education and Instructional Technologies (CEIT) students in two different universities. Relationships between the perceptions of computer self-efficacy of CEIT students and variables such as gender, graduated high school type, place of department preference, grade level and university type were examined by using computer self-efficacy scale that was developed by Orhan ve Akkoyunlu (2003). As a result, it’s indicated that; Male pre-service teachers have higher computer self-efficacy perceptions than female pre-service teachers, Pre-service teachers that were gr...
Bilgi insanin var oldugu gunden surekli bircok iletisim yontemi ve bilimsel alanla etkilesim icerisine girmistir. Insanlarin bilgiyi paylasma ihtiyacinin artmasiyla, bilgi iceriginin daha iyi anlasilmasi icin cok cesitli gorsellestirme... more
Bilgi insanin var oldugu gunden surekli bircok iletisim yontemi ve bilimsel alanla etkilesim icerisine girmistir. Insanlarin bilgiyi paylasma ihtiyacinin artmasiyla, bilgi iceriginin daha iyi anlasilmasi icin cok cesitli gorsellestirme yontemleri uygulanmaya baslanmistir. Bilgi aktariminin teknoloji, bilim, sanat ve kultur alaninin genislemesine paralel olarak gelismesi sonucu uygulanmaya baslanan bu yontemler bundan sonra ki surecte de gelismeye devam edecektir. Gunumuzde bilgi, bilgilendirme tasariminin onemli bir kolu olan veri gorsellestirmesiyle kendini ifade edebilmekte ve icerigin iletilebilmesine onemli olcude olanak saglamaktadir. Bu calismada “Veri Gorsellestirmesi ve Bilgilendirme Grafikleri”nin, bilgilendirme amacina yonelik bilimsel katkisi ele alinmaktadir. Bu kapsamda bir veri gorsellestirme araci olarak yazinin tanimi ve tarihsel olusum sureci incelenmis olup insanlarin gecmisten gunumuze bilgi aktarmada kullandiklari veri gorsellestirme yontemlerinin tanimi, tarihsel surec icerisindeki rolu, gunumuze kadar degisen ve gelisen gorsellestirme konulari ele alinmistir. Bu konunun onculeri ve ustalari ornek calismalariyla birlikte incelenmistir.Bununla birlikte, konunun temel ilke ve esaslarina yer verilerek ve konu bir tasarim disiplini icerisinde ele alinarak bilgilendirme tasarimiyla olan iliskisi degerlendirilmistir. Ayrica, tasarimcinin icerik ve estetik arasindaki dengeyi koruyarak anlasilir bir gorsellestirme olusturma cabasi icine girilmistir. Son olarak, veri gorsellestirmesinin guncel konumuna gore tasarim surecindeki yontem ve uygulamalari incelenerek uygulama alanlari, gunumuzdeki farkli ortamlarla olan bagi uzerinden degerlendirilerek orneklerle pekistirilmistir.
Sigara Icme Aliskanligi Ile Bilgisayar Kullanma Aliskanligi Arasindaki Iliskinin Incelenmesi: Betimsel Bir Arastirma
Natural language is one of the most fundamental features that distinguish people from other living things and enable people to communicate each other. Language is a tool that enables people to express their feelings and thoughts and to... more
Natural language is one of the most fundamental features that distinguish people from other living things and enable people to communicate each other. Language is a tool that enables people to express their feelings and thoughts and to transfers cultures through generations. Texts and audio are examples of natural language in daily life. In the natural language, many words disappear in time, on the other hand new words are derived. Therefore, while the process of natural language processing (NLP) is complex even for human, it is difficult to process in computer system. The area of linguistics examines how people use language. NLP, which requires the collaboration of linguists and computer scientists, plays an important role in human computer interaction. Studies in NLP have increased with the use of artificial intelligence technologies in the field of linguistics. With the deep learning methods which are one of the artificial intelligence study areas, platforms close to natural lang...
In this study, the effect of Scratch environment in teaching algorithm in elementary school 6th grade Information and Communication Technologies course was examined. The research method was experimental method. Control group,... more
In this study, the effect of Scratch environment in teaching algorithm in elementary school 6th grade Information and Communication Technologies course was examined. The research method was experimental method. Control group, pretest-posttest design of experimental research method and a convenience sample consisting of 60 6th grade students were used. The research instrument was achievement test to determine the effect of Scratch on learning algorithm. During the implementation process experiment group studied using Scratch and control group studied with traditional methods. The data was analyzed using independent-samples t-test, paired-samples t-test and ANCOVA statistics. According to findings there is no statically significant difference between posttest achievement scores of experiment and control groups. Similarly, In terms of gender there isn't a statically significant difference between posttest scores of experiment and control groups.
An initial design for a power circuit of a new plasma system is proposed and implemented in MatLab code. The plasma device is a torus and requires an excitement of wires, which are wrapped around the torus for a toroidal field and a... more
An initial design for a power circuit of a new plasma system is proposed and implemented in MatLab code. The plasma device is a torus and requires an excitement of wires, which are wrapped around the torus for a toroidal field and a poloidal field coil placed at the outer part of the device. This poloidal coil structure ignites an electrical field inside the chamber and that yields to a circular magnetic field inside the plasma. The proposed electrical design for this poloidal field equipment has some components including the alternating current unit and the direct current one. The circuit first uses an ac-dc converter, in order to transfer the ac grid to the dc one. Then it uses a switching scheme and a discharge circuit. The operation voltages for the poloidal field are estimated to be 1 kV, respectively. It has been proven that the designed system can produce an almost dc current with 66 V fluctuation, which is under the limit of 6%, considering the high voltage of 1kV.
Instructional models form based on the needs. To satisfy the needs specific targeted instructions are presented. Teaching how a vehicle is used, is an example for specific targeted courses. This study suggests and defines a new concept... more
Instructional models form based on the needs. To satisfy the needs specific targeted instructions are presented. Teaching how a vehicle is used, is an example for specific targeted courses. This study suggests and defines a new concept namely “integrated instructional material”. Integrated structures are applications and structures which contain integration for a specific purpose in a system approach. Accordingly, integrated instructional material is an assistant system for instruction. In other words, it is a supportive tool for teaching subjects of different disciplines as a whole by integrating them. 33 Preservice teachers, enrolled engineering class of Pedagogical Formation Education at a Faculty of Education of a state university in the Mediterranean Region of Turkey, performed the development process of integrated instructional material in the context of Instructional Technology and Material Design course. Data were collected through observation notes, open ended questionnaires, and clinical interviews. Content analysis was used in order to analyze data.
In this study, emotional intelligence levels of engineering students from different universities in Turkey were investigated. Data were collected by " Emotional Intelligence Scale " developed by Schutte and et al (1998). 98 engineering... more
In this study, emotional intelligence levels of engineering students from different universities in Turkey were investigated. Data were collected by " Emotional Intelligence Scale " developed by Schutte and et al (1998). 98 engineering students from different engineering faculties were selected as the participants of the study. The participants participated in the TUBITAK Alternative Energy Car Races before the study. Findings of the study showed that there is no significant difference in students' emotional intelligence scores in terms of age and gender. Additionally, the students who have similar hobbies regarding developing design had higher emotional intelligence score. In terms of being engineer in the family, students showed higher performance in emotional intelligence score. Students who don't have professional pessimism have higher emotional intelligence score.
The Hadoop framework uses the MapReduce programming paradigm to process big data by distributing data across a cluster and aggregating. MapReduce is one of the methods used to process big data hosted on large clusters. In this method,... more
The Hadoop framework uses the MapReduce programming paradigm to process big data by distributing data across a cluster and aggregating. MapReduce is one of the methods used to process big data hosted on large clusters. In this method, jobs are processed by dividing into small pieces and distributing over nodes. Parameters such as distributing method over nodes, the number of jobs held in a parallel fashion, and the number of nodes in the cluster affect the execution time of jobs. The aim of this paper is to determine how the numbers of nodes, maps, and reduces affect the performance of the Hadoop framework in a cloud environment. For this purpose, tests were carried out on a Hadoop cluster with 10 nodes hosted in a cloud environment by running PiEstimator, Grep, Teragen, and Terasort benchmarking tools on it. These benchmarking tools available under the Hadoop framework are classified as CPU-intensive and CPU-light applications as a result of tests. In CPU-light applications, increasing the numbers of nodes, maps, and reduces does not improve the efficiency of these applications; they even cause an increase in time spent on jobs by using system resources unnecessarily. Therefore, in CPU-light applications, selecting the numbers of nodes, maps, and reduces as minimum is found as the optimization of time spent on a process. In CPU-intensive applications, according to the phase that small job pieces is processed, it is found that selecting the number of maps or reduces equal to total number of CPUs on a cluster is the optimization of time spent on a process.
Research Interests:
In this study, it was aimed to determine ethical reasoning of lecturers in STEM disciplines in terms of several independent variables (gender, working another institution, age, academic title, academic discipline, service period). This... more
In this study, it was aimed to determine ethical reasoning of lecturers in STEM disciplines in terms of several independent variables (gender, working another institution, age, academic title, academic discipline, service period). This study was designed as a survey research. Lecturers in STEM disciplines in Kahramanmaras Sutçuimam University were selected as participants of the study. ''Ethical Reasoning Instrument (ERI)' which was developed by Titus, Zoltowski, Huyck, and Oakes (2011) was used in order to collect data by adapting into Turkish. Data were analyzed by the help of independent sample t-test, one-way ANOVA and Kruskal-Wallis tests. The findings indicated that for all independent variables there were no statistically significant difference (p>.05) in ethical reasoning of lecturers. As an interesting result, it was determined that lecturers in engineering discipline have less ethical awareness than lecturers in medicine and science disciplines.
Research Interests:
— Ad-hoc networks are temporary networks, which use wireless media that consists of interconnected nodes without a common network infrastructure using wireless media for immediate and dedicated network solutions. Ad-hoc networks are much... more
— Ad-hoc networks are temporary networks, which use wireless media that consists of interconnected nodes
without a common network infrastructure using wireless media for immediate and dedicated network solutions. Ad-hoc
networks are much vulnerable against the threats compared to the traditional networks due to its nature of lacking of a
central control mechanism and the individual attitude of each node. In this study, the security threats and the routing
protocols defined for ad hoc networks are investigated and the findings are evaluated. The aim of the study is to reach a
generalized conclusion on the existing routing protocols in ad-hoc networks by evaluating the advantages and
disadvantages of these protocols. In this paper, it is shown that the routing and security protocols to be used in ad-hoc
networks should be designed by providing a resistance, robustness and high energy efficiency in order to overcome
security treats aiming for confidentiality, integrity and accessibility. The balance between resistance to threats, high
energy efficiency and robustness should be carefully considered and implemented in an autonomous way by weighting
each of them for a specific task.

Tasarsız ağlar, paylaşılan kablosuz bir kanal üzerinde acil veya özel ağ çözümleri için alt yapısı olmadan
hareketli düğümlerin bir araya gelmesiyle oluşan geçici ağlardır. Merkezi bir denetim mekanizmasının olmaması,
kablosuz ortamların doğası, düğümlerin hareketliliği, ağa katılan her bir düğümün yönlendirici olarak görev yapması
gibi nedenlerden dolayı tasarsız ağlar geleneksel ağlara göre daha savunmasızdır. Ancak tasarsız ağların bu topolojisi
kişisel alan ağlarından kurtarma operasyonlarına kadar birçok uygulama içinde ideal bir ortam sunmaktadır. Çalışma
kapsamında; tasarsız ağlarda tanımlanmış, güvenlik tehditleri veyönlendirme protokolleri incelenerek tespitler ve
değerlendirmeler yapılmıştır. Çalışma ile tasarsız ağlarda mevcut yönlendirme protokollerinin güçlü ve zayıf yönleri
tehditler farkındalığıyla incelenerek yapılan tespit ve değerlendirmelerin gelecekte ortaya konulacak yaklaşımlara katkı
sağlaması hedeflenmiştir. Sonuç olarak yeni yapılacak olan çalışmalarda,güvenliğin temel unsurları olan gizlilik,
bütünlük ve erişilebilirlik odaklı saldırılara karşı dirençli, enerji verimliliği yüksek, güvenlik-performans-enerji
üçlüsünün ağırlıklarını ilgili probleme göre otonom olarak ayarlayabilecek yeni protokoller üzerinde durulması
gerekmektedir.
Research Interests:
Machine translation is a computational linguistics sub-field that studies translation methods and the use of software to translate text between natural languages. Although machine translation is not as accurate as human translation in... more
Machine translation is a computational linguistics sub-field that studies translation methods and the
use of software to translate text between natural languages. Although machine translation is not as
accurate as human translation in terms of syntactic, semantic accuracy criteria, the usage of improved
methods has lead to obtaininig comparatively acceptable results. In recent years, self-learning
methods with statistical analysis of big data are being developed. The current development in machine
translation among Turkish languages has moved towards rule-based methods. However, one of
today’s leading methods, Statistical Machine Translation, is being poorly applied. For this purpose,
in this work N-GRAM based and Phrase based Statistical Machine Translation methods were applied
between Kyrgyz and Turkish languages, using limited training data. For both methods, the translation
quality was evaluated with BLEU scoring algorithm. According to test results, both applied methods,
provided translations with poor translation quality, 0.1 (one hundredths) on average. In most cases,
no translations obtained, or human translation incompatible results were observed. In order to reach
higher translation qualities, various suggestions were proposed.
Research Interests:
65% of data in web compose of images. For this reason, elements of these images such as, quality, accessibility and size have great importance in digital world. Many studies related to image formats have been conducted in order to... more
65% of data in web compose of images. For this reason, elements of these images such as, quality, accessibility and size have great importance in digital world. Many studies related to image formats have been conducted in order to increase speed of transmission or installation as in limited mobile networks. Today’s most image formats used in web still use old compression formats. Thus, compression algorithms, which can provide high-level of image quality for lossy and losseless image without image distortion, has been
developed. This study focused on saving digital image data formats on web space and compression features of raster images. Particularly, JPEG and PNG digital image formats
compression algorithms and WebP algorithm which was developed by Google Inc. were compared in terms of SSIM quality index and size. Comparison was done by using encoded web images and results were presented.
As a result, when compared to the other digital image formats in web, WebP digital image format indicated better results in smaller file sizes and it provided close, similar and better
image quality.
Research Interests:
Computer Education and Instructional Technology (CEIT) Departments train computer teachers to fill gap of computer instructor in all grades of schools in Turkey. Additionally graduates can also work as instructional technologist or... more
Computer Education and Instructional Technology (CEIT) Departments train computer teachers to fill gap of computer instructor in all grades of schools in Turkey. Additionally graduates can also work as instructional technologist or software developer. The curriculum of CEIT departments includes mathematics courses.
The aim of this study is to identify attitudes of undergraduate students at CEIT departments towards math. In order to investigate the research question quantitative methods was used. Specifically survey research was preferred. Mathematics Attitude Questionnaire (MAQ) that was developed by Duatepe and Çilesiz (1999) was used and the questionnaire includes 38 items. The instrument was conducted with 122 undergraduate students from CEIT departments of four different universities in Turkey in the spring semester of 2010- 2011. Data were analyzed through independent samples t-test and one-way ANOVA by means of PASW Statistics. In conclusion, some differences were found in terms of math attitudes of CEIT’s students.
The aim of the robotic education is to make the students know the elements of robot and to enhance their abilities on planning applications by using the robot applications and more for experiencing the existing mechanic construction.... more
The aim of the robotic education is to make the students know the elements of robot and to enhance their abilities on planning applications by using the robot applications and more for experiencing the existing mechanic construction.

In order to studying according to a certain curriculum, they need laboratories which they can enhance them befitting to their future settings.

It's certain that practices of the computer take place as a collateral factor in every field of education. Practices of computer hold a place as an access and control factors.

In this study, the current structure of the robotic education is accentuated, and XR3 is prepared according to experimental robot as an educational material. 2D simulation is improved which has the capacity of visualization the movement with robot synchronously and provides observing the movements of robot in advance or the opportunity of watching it visually without the need of robot's move.

Rhino XR3 Robot and Mark 3 Controller which is in the constitution of Flexible Manufacturing Systems’ laboratory of Gazi University Engineering and Architecture Faculty were used for this application. Delphi 6 Personal Edition Compiler was also used for the development period of software.
This paper describes efforts underway to construct a Scientific Publication Content Management System (SPCMS) with Peer Review Tools (PRT) for Academic Institutions. Firstly, known Scientific Publication processes have been reviewed and... more
This paper describes efforts underway to construct a Scientific Publication Content Management System (SPCMS) with Peer Review Tools (PRT) for Academic Institutions. Firstly, known Scientific Publication processes have been reviewed and online publication process was chosen as a model for developing a scientific content publication and management system. Next, the developed system will be implemented as a case study to Kyrgyzstan-Turkey Manas University scientific journal publication system. Since it is aimed to construct an online only journals, the system is supposed to be fast-tracking, fully manageable and, on the other hand, it should be highly secure since all the manuscripts are to be stored on the system. To undertake such problems as fast tracking, speedy data processing and security was decided to implement self-developed system by using PHP and AJAX programming on Apache server with MySQL data base application.The result of this research is an automated publishing system for scholar manuscript publications, from submission through peer review, aggregate, manage and publish university journals, utilizing a single, dynamic destination.
In this study, 9th grade students' attitudes about usage of tablet PCs in FATIH Project were examined. The research method was survey and a convenience sample consisting of 220 students was used. The data were gathered via a revised form... more
In this study, 9th grade students' attitudes about usage of tablet PCs in FATIH Project were examined. The research method was survey and a convenience sample consisting of 220 students was used. The data were gathered via a revised form of "Tablet PC Attitude Scale" developed by Beeland (2002) and adapted to Turkish by Sünkür, Şanlı ve Arabacı (2011). Frequency, percentage and mean statistics were used to analyze the data. Additionally independent- samples t-test and one-way ANOVA statistics were used to determine whether attitudes towards tablet PC usage differ from in terms of gender, kind of school and having a PC. According to findings tablet PC appeals to students and presents an enjoyable learning environment for them. Students like to use tablet PC and consider that it will affect to have a good job in future. Students' attitudes towards the tablet PC do not differ in terms of gender and students' attitudes who have their own PC are more positive than others.
Research Interests:
In this study, the effect of Scratch environment in teaching algorithm in elementary school 6th grade Information and Communication Technologies course was examined. The research method was experimental method. Control group,... more
In this study, the effect of Scratch environment in teaching algorithm in elementary school 6th grade Information and Communication Technologies course was examined. The research method was experimental method. Control group, pretest-posttest design of experimental research method and a convenience sample consisting of 60 6th grade students were used. The research instrument was achievement test to determine the effect of Scratch on learning algorithm. During the implementation process experiment group studied using
Scratch and control group studied with traditional methods. The data was analyzed using independent-samples
t-test, paired-samples t-test and ANCOVA statistics. According to findings there is no statically significant difference between posttest achievement scores of experiment and control groups. Similarly, In terms of gender there isn’t a statically significant difference between posttest scores of experiment and control groups.
Research Interests:
In this study, elementary and high school students’ information and computer security awareness levels were investigated. Information and Computer Security Awareness Scale was developed by the researcher and it was applied to 2447... more
In this study, elementary and high school students’ information and computer security awareness levels were investigated. Information and Computer Security Awareness Scale was developed by the researcher and it was applied to 2447 students in the schools in center of Kahramanmaraş City, towns, small towns and villages of Kahramanmaraş province. For data analysis the statistical analysis program was used. Consequently it was found that students have sufficient awareness level in terms of ethical issues. However, they have low awareness levels in terms of issues that require knowledge about rules. It can be deduced that information and computer security awareness education and related activities are insufficient. If these courses’ hours can be increased, students’ information and computer security awareness can be enhanced and negative effects of internet can be controlled.
This study aimed to determine whether there are differences in terms of sex and department among the continuous anger and anger expression styles of teacher candidates at Kahramanmaras Sutcuimam University. The 278 students participated... more
This study aimed to determine whether there are differences in terms of sex and department among the continuous anger and anger expression styles of teacher candidates at Kahramanmaras Sutcuimam University. The 278 students participated in the study from three departments of the University. The data obtained using the State Trait Anger scale in the study. As a result of the study there was no significant statistical difference found in terms of sex (p>0.05) and there were significant statistical differences in continuous anger and anger control dimension between the departments (p<0.05).
Günümüzde verimliliğin artırılması, is akıslarının hızlandırılması, çalısanlar ve diğer kurumlarla daha hızlı iletisim kurulabilmesi, günlük yasantımızı kolaylastırması gibi birçok sebepten dolayı bilisim sistemleri hızla... more
Günümüzde verimliliğin artırılması, is akıslarının hızlandırılması, çalısanlar ve diğer kurumlarla daha hızlı iletisim kurulabilmesi, günlük yasantımızı kolaylastırması gibi birçok sebepten dolayı bilisim sistemleri hızla yaygınlasmaktadır. Bilisim teknolojilerindeki gelismeler sonucunda, merkezi yapılar yerlerini, dağıtık mimarilere, internet ve ağlar üzerinden erisilebilen elektronik uygulamalara bırakmıstır. Web uygulamaları, uzaktan erisimler, çevrimiçi sistemler, bilgisayar ağları, internet gibi elektronik bilgi altyapılarının kullanımının artması sonucunda ekavramlar (e-ticaret, e-öğrenme, e-rezervasyon, e-sınav, e-okul, e-banka, e-devlet vb.) günlük yasantımızın bir parçası haline gelmistir. Bilisim ortamlarının kullanımının artması ve yaygınlasmasına paralel olarak güvenlik tehditleri ve riskleri aynı oranda artmıstır. Teknik güvenlik önlemlerinin gelismesine rağmen bilisim sistemlerine karsı yapılan saldırıların sayısının artması ve bilgi sistemleri üzerinde yüksek derecede etki yapan hasarlar olusturması, teknik yöntemlerin bilgi güvenliğinin sağlanmasında yetersiz olduğunu göstermektedir. Bilgi güvenliğinin sağlanabilmesi için teknik önlemlerin yanında, idari önlemler (kurallar, cezalar, yaptırımlar vb), standartlar (ISO 27001,Ortak Kriterler vb) ve insan faktörü göz önüne alındığında bilgi güvenliği karmasık çözümler içeren ve yönetilmesi zorunlu hale gelen bir süreç halini almıstır. Bu çalısmada bilgi güvenliği yasayan bir süreç olarak ele alınmıs ve yönetilebilirlik gerekliliği ortaya konarak, bir bilgi güvenliği yönetim modeli gelistirilmistir.
Fatih Projesi kapsamında Bilişim Teknolojilerinin, öğrenme ortamlarında daha etkin kullanımı amaçlanmaktadır. Ayrıca tüm okullarda teknolojik altyapı iyileştirmelerinin yapılması hedeflenmektedir. Söz konusu sürecin işletilebilmesi için... more
Fatih Projesi kapsamında Bilişim Teknolojilerinin, öğrenme ortamlarında daha etkin kullanımı amaçlanmaktadır. Ayrıca tüm okullarda teknolojik altyapı iyileştirmelerinin yapılması hedeflenmektedir. Söz konusu sürecin işletilebilmesi için Bilişim teknolojileri öğretmenleri kilit rol oynayacaktır. Bu nedenle, araştırmada Fatih projesini sürdürecek olan Bilişim teknolojileri öğretmenliği adaylarının bilgisayar öz yeterlik algıları tarama modeli kullanılarak incelenmiştir. Çalışma grubunu iki farklı üniversitenin Bilgisayar ve Öğretim Teknolojileri Eğitimi bölümünde (BÖTE) öğrenim gören 200 öğrenci oluşturmuştur. Araştırmada Akkoyunlu ve Orhan (2003) tarafından geliştirilen “Bilgisayar öz yeterlik ölçeği” kullanılarak, öğrencilerin bilgisayar öz yeterlik algıları ile cinsiyet, mezun olunan ortaöğretim türü, bölüm tercih sırası, devam edilen sınıf ve okuduğu üniversite değişkenleri arasındaki ilişkiler incelenmiştir. Araştırma sonucunda, erkek öğrencilerin kız öğrencilere göre, meslek lisesi mezunu öğrencilerin, genel lise mezunu öğrencilere göre, 3 ve 4. sınıfa devam eden öğrencilerin 1. sınıf öğrencilerine göre daha yüksek bilgisayar öz yeterlik algısına sahip olduğu görülmüştür. Bölüm tercih sırasının bilgisayar öz yeterlik algısını etkilemediği bulgularına ulaşılmıştır.
Widespread use of internet reveals the idea that it can also be more widely used for educational purposes. In this respect, teachers have a very important function in education and the determination of teachers’ attitude towards internet... more
Widespread use of internet reveals the idea that it can also be more widely used for educational purposes. In this respect, teachers have a very important function in education and the determination of teachers’ attitude towards internet using is also important. In the literature although it is possible to see many studies on pre-service teachers’ attitude towards internet use, studies identifying the attitude regarding in-service teachers’ internet using are not very common. In our study, which aims to determine the attitude of in-service teachers according to various variables, the Internet Usage Attitude Scale developed by Tavşancıl and Keser (2002) was used. The participant teachers’ attitudes towards internet using was analyzed and interpreted according to the variables of gender and duration of their weekly internet using. It was seen that a vast majority of the teachers have personal computers, connect to internet at home and have positive attitude concerning internet use. In addition to this it was concluded that female teachers have more positive attitude than male teachers regarding internet use in social interaction and communication.
Research Interests:
The widespread use of internet implies the idea that it can also be more widely used for educational purposes. In this respect, since physics teachers have a very important function in education, to determine physics teachers’ attitudes... more
The widespread use of internet implies the idea that it can also be more widely used for educational purposes. In this respect, since physics teachers have a very important function in education, to determine physics teachers’ attitudes towards internet use is also important. In the literature it is possible to see many studies on teacher candidates’ attitude towards internet use; “however studies on appointed teachers’ attitude are not very common. In our study, which aims to determine the attitude of appointed teachers according to different variables, we used the Internet Use Attitude Scale. For the teachers that took part in the study the attitude towards internet use was analyzed and interpreted according to the variables of gender, years on the job, type of school at which they are teaching, and duration of their weekly internet use. It was seen that a vast majority of the teachers have personal computers, they connect to internet at home and have positive attitude towards internet use. It was also seen that female teachers have more positive attitude than male teachers in use of internet for social interaction and communication.
Teknoloji günümüzde günlük yaşamın her alanına girmiş durumdadır. Teknolojik uygulamaların en yaygın kullanıldığı alanlardan biri de eğitimdir. Araştırmalara göre öğretimde bilgisayar kullanımı eğitim durumlarını olumlu yönde... more
Teknoloji günümüzde günlük yaşamın her alanına girmiş durumdadır. Teknolojik uygulamaların en yaygın kullanıldığı alanlardan biri de eğitimdir. Araştırmalara göre öğretimde bilgisayar kullanımı eğitim durumlarını olumlu yönde etkilemektedir. Bu araştırmada sınıf öğretmenlerinin bilgisayar kullanma durumları, bilgisayarın rolü ve bilgisayarın öğretimde kullanımı ile ilgili görüşleri belirlenmeye çalışılmıştır. Çalışma öğretmenlerin bilgisayarları öğretme-öğrenme sürecinde kullanımıyla ilgili görüşlerini ortaya koymaya yönelik betimsel bir araştırmadır. Araştırmanın çalışma grubu 141 öğretmenden oluşmaktadır. Veri toplama aracı olarak Seferoğlu (2008) tarafından geliştirilen “Bilgisayar Kullanımına Yönelik Öğretmen Davranışları”, tutum ölçeği kullanılmıştır. Araştırma sonucunda öğretmenlerin cinsiyet, yaş ve mesleki kıdemlerine göre bilgisayarı öğretme-öğrenme sürecinde kullanım düzeyleri arasında anlamlı bir ilişki görülmemiştir. Öğretmenlerin okuttukları sınıflara göre bilgisayarı öğretme-öğrenme sürecinde kullanım düzeyleri dördüncü sınıfı okutan öğretmenler ve üçüncü sınıfı okutan öğretmenler arasında anlamlı bir ilişkiye rastlanmıştır ve bu ilişkinin dördüncü sınıfı okutan öğretmenler lehine olduğu bulunmuştur.
İlköğretim okullarının ikinci kademesinde okutulan bilgisayar dersinin öğrencilerin bilgi teknolojilerini (BT) kullanmaları açısından verimliliğinin ele alındığı bu çalışmada, Ankara ili sınırları içindeki üç farklı sosyoekonomik düzeyi... more
İlköğretim okullarının ikinci kademesinde okutulan bilgisayar dersinin öğrencilerin bilgi teknolojilerini (BT) kullanmaları açısından verimliliğinin ele alındığı bu çalışmada, Ankara ili sınırları içindeki üç farklı sosyoekonomik düzeyi yansıtan 3 ayrı ilçede ilköğretim öğrencileri üzerinde bir anket çalışması yapılmıştır. Çalışmada, mevcut bilgisayar dersinin uygulamasının köy ilköğretim okulları ve düşük gelişmişlik düzeyindeki kasaba okulları için yeterli olduğu saptanmıştır.
Ancak orta gelişmişlik düzeyinde bulunan kasabalar ve iller ile yüksek gelişmişlik düzeyindeki il ve ilçe merkezleri için mevcut bilgisayar dersi uygulamasının yetersiz olduğu ortaya konmuştur.
Araştırma sonucuna göre, modüler uygulamaların BT için uygunluğu tartışılmıştır.
Web technology is changing rapidly every day and the Internet has become a lifestyle for people all over the world. It is obvious that the life style of societies is in a process of change, as new habits are acquired. Even though Internet... more
Web technology is changing rapidly every day and the Internet has become a lifestyle for people all over the world. It is obvious that the life style of societies is in a process of change, as new habits are acquired. Even though Internet use is one of the new social habits, it is one of the most important factors that induce this change as regards the convenience it brings to communication and other areas. The widespread use of Internet implies the idea that it can also be more widely used for educational purpose. Since chemistry teachers have a very important function in education, the determination of teachers’ attitude towards Internet use is also important. In the literature it is possible to see many studies on teacher candidates’ attitude towards Internet use; however studies on appointed teachers’ attitude are not very common. In our study, which aims to determine the attitude of appointed chemistry teachers according to different variables, we used the Internet use attitude scale. Participant teacher’s attitude towards Internet use was analyzed and interpreted according to the variables of gender, years on the job, type of school at which they are teaching, and duration of their weekly Internet use. It was seen that a vast majority of the teachers have personal computers, they connect to Internet at home and have positive attitude towards Internet use. It was also seen that female teachers have more positive attitude than male teachers in use of Internet for social interaction and communication.
Proje kavramının yapısının yönetim, tasarım ve üretim yönünden incelendiği bu arastırmada, Teknoloji Projesinin küresel anlamda kullanılan proje kavramı içerisindeki yeri de incelenmistir. Ayrıca Teknoloji Projesinde tasarım ve üretim... more
Proje kavramının yapısının yönetim, tasarım ve üretim yönünden incelendiği bu arastırmada, Teknoloji Projesinin küresel anlamda kullanılan proje kavramı içerisindeki yeri de incelenmistir. Ayrıca Teknoloji Projesinde tasarım ve üretim asamasında ne gibi safhalardan geçilmesi gerektiği üzerinde durulmustur. Bu bağlamda bir Teknoloji Eğitimi Projesi olusturulmustur. Proje, iki eksenli PC kontrollü robot sistemden olusmaktadır. Proje, mekanik sistemlerin elektronik donanımla desteklendiği ve Turbo Pascal’da hazırlanan bir yazılımla kontrolünün sağlanması seklindedir.
Nowadays, it is necessary individuals to have several skillls, information, and competencies namely 21th centry skills. These skills are; learning and innovation skills, information, media and technology skills, life and career skills. To... more
Nowadays, it is necessary individuals to have several skillls, information, and competencies namely 21th centry skills. These skills are; learning and innovation skills, information, media and technology skills, life and career skills. To prepare training programs that provide individuals to obtain these skills and to form teacher competencies have become important issue. The purpose of this study was to reveal to what extent Undergraduate Programs of Teacher Training in Elementary Mathematics and Science departments revised by Council of Higher Education (YÖK) in 2018 reflect the 21th century skills. For this, course contents give by YÖK were examined. The methodology of the study was determined as document analysis. Findings of the study showed that, critical thinking and problem solving skills are used more in elementary mathematics program. On the other hand, creatively thinking and implementing innovations skills are used more in science programs.
The information security activities, targeted the protection of confidentiality, integrity and availability of all kinds of information, was began in information and internet technologies areas in The United States of America, second half... more
The information security activities, targeted
the protection of confidentiality, integrity and availability
of all kinds of information, was began in information and
internet technologies areas in The United States of America,
second half of twentieth century. While the importance of
the protection of information increases, the information
security industry has also continued its development. In
this study, the emergence of the information security and
its developments till now has been presented. The roles and
status of the countries placed in this industry are tried to put
forward by comparing some data. The data obtained from
the sources are analyzed in terms of information security
industry. Consequently, whether a relationship between the
development levels of the countries and the development
and presence of information security industry are examined.
(Her türlü bilginin gizlilik, bütünlük ve erişilebilirliğini
korumayı hedef alan bilgi güvenliği faaliyetleri, bilişim
ve internet teknolojileri alanında yirminci yüzyılın ikinci
yarısında Amerika Birleşik Devletlerinde başlamıştır.
Bilginin korunmasının önemi arttıkça bilgi güvenliği
endüstrisi de gelişimini sürdürmüştür. Bu çalışmada bilgi
güvenliği endüstrisinin doğuşu ve günümüze kadar gelişimi
incelenmiştir. Ayrıca bu endüstrinin konumlanmasında
ülkelerin rolleri ve durumları bazı veriler ile karşılaştırılarak
ortaya konmaya çalışılmıştır. Bu doğrultuda elde edilen
kaynaklardan alınan veriler, bilgi güvenliği endüstrisi
açısından analiz edilmiştir. Çalışma sonucunda ülkelerin
belirlenen parametrelerdeki gelişmişlik düzeyleri ile bilgi
güvenliği endüstrisinin varlığı ve gelişmişliği arasında bir
ilişki olup olmadığı ortaya konmaya çalışılmıştır.)
Research Interests:
Smart power grids have an important role in protecting power transmission and distribution grids which are locomotive of critical infrastructures against to sabotage and neglect, efficient cost administration, leakage determination. It is... more
Smart power grids have an important role
in protecting power transmission and distribution grids
which are locomotive of critical infrastructures against to
sabotage and neglect, efficient cost administration, leakage
determination. It is necessary to describe, classify certain
threats and to take precautions to these threats in spreading
use of smart power grids process. In this context, first
threats to security and privacy come to the forefront during
distributing and sharing of data produced by smart power
grids. It is expected to include sensitive and non-sensitive
data when data produced by smart power grids are examined
and classified. It is necessary to distribute and share these
sensitive data in the protection of privacy and data benefit in
order to use for different purposes. In this study, smart power
grids are described, the threats to sensitive data privacy
are explained and solution suggestions are presented by
evaluations.
(Günümüzde kritik altyapı tehditlerinin başında siber
saldırılar gelmektedir. Kritik altyapıların lokomotifi olan
elektrik enerjisi iletim ve dağıtım şebekelerinin saldırı, sabotaj
ve ihmallere karşı korunmasında, kaçakların tespitinde,
maliyet etkin yönetiminde, akıllı şebekelerin önemli bir rolü
vardır. Oldukça yeni bir çalışma alanı olan akıllı şebekelerin
geliştirilerek kullanımının yaygınlaştırılması sürecinde
tehditlerin tanımlanması, sınıflandırılması ve önlemlerin
alınmasına yönelik çalışmalara ihtiyaç duyulmaktadır.
Akıllı şebekelerin siber saldırılara maruz kalmaması için
verilerin toplanmasında, paylaşılmasında güvenlik ve
mahremiyet korumasının sağlanması gerekmektedir. Çeşitli
sebeplerle verilerin işlenebilmesi amacıyla veri faydasının
da mahremiyet önlemleri sırasında dikkate alınması
gerekmektedir. Bu çalışmada akıllı şebekeler tanımlanmış,
ürettiği hassas verilerin mahremiyetine yönelik tehditler
sıralanmış ve değerlendirmeler yapılarak çözüm önerileri
sunulmuştur.)
Research Interests:
It is identified that one of the greatest threats against security in the next coming ten years will be cold cyber wars against information systems between countries. National information systems utilize the information technology... more
It is identified that one of the greatest threats against security in the next coming ten years will be cold cyber wars against information systems between countries. National information systems utilize the information technology infrastructure of enterprises in order to satisfy personal or enterprise needs. In the past years, attacks were taking place with no discrimination of targets, however in the recent years; attacks are organized, deliberate and pointed towards national information systems. Personal and enterprise level information security must be established in order to avoid information security threats that try to hamper or even destroy national information security, cause tangible and intangible damages on individuals and enterprises. In order to reduce the impact of such cyber threats to minimum at the national level, there are necessary critical enterprise and personal security precautions to be taken. The establishment of the enterprise and personal information security which form the stages of establishing national information security at highest level and development of a national security policy are among the first things that need to be done. In this paper, the strategic national information systems are identified, then personal and enterprise information security that are important stages in providing security for national information systems are described. The necessary security tests and the importance of education and awareness are discussed in the following section. Finally, evaluations have been performed on national information security and proposals have been put forward.
Research Interests:
In this study, the awareness levels of elementary and high school students’ information and computer security were tried to reveal. A developed information and computer security scale was conducted to 2447 students from the center of... more
In this study, the awareness levels of elementary and high school students’ information and computer security were tried to reveal. A developed information and computer security scale was conducted to 2447 students from the center of Kahramanmaraş City, towns, small towns and villages of Kahramanmaraş. The data were assessed by using statistical analysis program.
About awareness of information and computer security both positive and negative findings were obtained. Basely, it was found that while students have sufficient awareness level in terms of ethical issues, they have low awareness level in terms of issues that required rules and knowledge. This situation reveals the idea that education and activities of awareness of information and computer security seem insufficient.
Tunus’ta 2010 Aralık ayında başlayıp, 2011’in başlarında yükselen, hızla Orta Doğu ve Kuzey Afrika ülkelerine yayılan ve etkileri hala devam etmekte olan halk hareketlerine Arap Baharı adı verilmektedir. Otoriter yönetimlere karşı... more
Tunus’ta 2010 Aralık ayında başlayıp, 2011’in başlarında yükselen, hızla Orta Doğu ve Kuzey Afrika ülkelerine
yayılan ve etkileri hala devam etmekte olan halk hareketlerine Arap Baharı adı verilmektedir. Otoriter yönetimlere
karşı özgürlük ve demokrasi talepleriyle ortaya çıkan harekette, bilgi ve iletişim teknolojilerinin etkin rol oynadığı
yaygın olarak kabul edilmektedir. Bu teknolojilerin kullanımının oynadığı rolün abartıldığını iddia eden görüşler de
vardır.
Bu çalışmada Arap Baharı’nda yaşanan sosyal aktivizmin, yerel sosyokültürel değişim ve küresel ağ toplumunun
etkileri olmak üzere iki temel dinamiğe sahip olduğu öne sürülmektedir. Bu iki dinamiğin izi sürülürken, konunun
bileşenleri, “sokak siyaseti” ve “ağ toplumu” kavramları eşliğinde ve birbiriyle ilişkisi üzerinden tartışılmaktadır. Bu
ilişki yeni aktivizmi yaratmıştır. Çalışmada yeni aktivizm, bölgedeki yeni sosyal aktörlerin, kültürel olarak devralmış
oldukları eski “sokak siyaseti” geleneğini yeni çağın yeni araçlarını kullanarak icra etmeleri/sürdürmeleri sonucunda
ortaya çıkan hareket biçimi olarak değerlendirilmektedir.
Gelişen teknoloji ve Internet kullanımının yaygınlaşmasıyla günlük hayatımızdaki hemen hemen tüm işler sanal ortama taşınmıştır. Bu gelişim çerçevesinde eğitim alanında da çeşitli uygulamalar yapılmaktadır. Eğitimde bilgisayardan çok... more
Gelişen teknoloji ve Internet kullanımının yaygınlaşmasıyla günlük hayatımızdaki hemen hemen tüm işler sanal ortama taşınmıştır. Bu gelişim çerçevesinde eğitim alanında da çeşitli uygulamalar yapılmaktadır. Eğitimde bilgisayardan çok farklı amaçlar için yararlanılabilir. Öğretim, üretim, iletişim amaçlı kullanmak bunlardan bazılarıdır.
www.okulumuzungazetesi.com sitesi ile öğrencilere yazma, okuma, okuduğunu anlama becerilerini geliştirmeye yönelik kazanımlar verilmeye çalışılmıştır. Bunun yanında öğrencilerin
İnternet’i kullanırken kendilerini geliştirmelerini sağlamak amaçlanmıştır. Çalışmada ders dışı etkinliklerin öğretimde kullanılması sürecinde yer alan okul gazetelerinin, farklı bir bakış açısıyla öğrenci ve öğretmene sunulması amaçlanmıştır. Sistem Asp tabanlı olarak dinamik web sayfası şeklinde oluşturulmuştur. Veriler veritabanında saklanmaktadır.
Eğitimde verimliliği etkileyen en önemli etkenlerden birisi öğretmendir. Toplumun değerlerinin korunması, sürdürülmesi ve yeni değerlerin kazandırılmasında öğretmen en önemli öğedir. Eğitim fakültelerinde okuyan ve geleceğin öğretmenleri... more
Eğitimde verimliliği etkileyen en önemli etkenlerden birisi öğretmendir. Toplumun değerlerinin korunması, sürdürülmesi ve yeni değerlerin kazandırılmasında öğretmen en önemli öğedir. Eğitim fakültelerinde okuyan ve geleceğin öğretmenleri olacak olan öğrencilerin öğretmenlik mesleğini sevmeleri, mesleklerini başarıyla yürütebilmeleri için bir ön koşuldur (Tanel, Şengören ve Tanel). Bu çalışmada bilişim teknolojileri ve ilköğretim matematik öğretmeni adaylarının öğretmenlik mesleğine yönelik tutumlarının ne düzeyde olduğu araştırılmıştır. Tarama yönteminin kullanıldığı araştırmada veri toplama aracı olarak Tanel, Şengören ve Tanel (2007) tarafından geliştirilen “Öğretmenlik Mesleğine Bakış Açısı Tutum Ölçeği” kullanılmıştır. Araştırma ile öğrencilerin öğretmenlik mesleğine yönelik tutumlarına bakıldığında cinsiyet değişkenine göre kız öğrenciler lehine anlamlı bir ilişki tespit edilmiştir. Üniversite değişkenine göre Kahramanmaraş Sütçüimam Üniversitesi ile İnönü Üniversitesi öğrencileri arasında Kahramanmaraş Sütçüimam Üniversitesi öğrencileri lehine anlamlı bir ilişki olduğu görülmüştür. Anne öğrenim durumu değişkenine göre annesi ilkokul ve ortaokul mezunu olanlar arasında ilkokul lehine; ortaokul ve lise mezunu olanlar arasında lise lehine bir ilişki bulunmuştur. Öğrenim gördükleri bölümü isteyerek seçen öğrencilerle isteyerek seçmeyen öğrenciler arasında bölümü isteyerek seçenler lehine anlamlı bir ilişki bulunmuştur. Mezun olunca öğretmenlik yapmak isteyip istemeyen öğrenciler arasında mezun olunca öğretmenlik mesleği yapmak isteyen öğrenciler lehine bir ilişki bulunmuştur.