Mehmet Tekerek is a Professor in the Department of Computer Education and Instructional Technology at Kahramanmaraş Sütçüimam University in Kahramanmaraş, Turkey and Guest Faculty Member of Computer Engineering Department in Kyrgyzstan-Turkey Manas University in Bishkek, Kyrgyzstan. He is currently studying on Engineering Education and Instructional Technologies. Phone: +90(344)2801310 Address: KSÜ Avşar Kampusu Bilgisayar ve Öğretim Teknolojileri Eğitimi Bölümü 46050 Onikişubat Kahramanmaraş
Within FATİH Project, it's aimed to use information technology more effectively in learning e... more Within FATİH Project, it's aimed to use information technology more effectively in learning environments and targeted to make technological infrastructure improvements in schools. For this process information technology teachers play a key role. Thus, Information Technologies (IT) pre-service teachers' computer self-efficiency perceptions were examined. In the study, a survey model was used and the sample included 200 Computer Education and Instructional Technologies (CEIT) students in two different universities. Relationships between the perceptions of computer self-efficacy of CEIT students and variables such as gender, graduated high school type, place of department preference, grade level and university type were examined by using computer self-efficacy scale that was developed by Orhan ve Akkoyunlu (2003). As a result, it's indicated that; Male pre-service teachers have higher computer self-efficacy perceptions than female pre-service teachers, Pre-service teachers ...
Web technology is changing rapidly every day and the Internet has become a lifestyle for people a... more Web technology is changing rapidly every day and the Internet has become a lifestyle for people all over the world. It is obvious that the life style of societies is in a process of change, as new habits are acquired. Even though Internet use is one of the new social habits, it is one of the most important factors that induce this change as regards the convenience it brings to communication and other areas. The widespread use of Internet implies the idea that it can also be more widely used for educational purpose. Since chemistry teachers have a very important function in education, the determination of teachers ’ attitude towards Internet use is also important. In the literature it is possible to see many studies on teacher candidates ’ at-titude towards Internet use; however studies on appointed teachers ’ attitude are not very common. In our study, which aims to determine the attitude of appointed chemistry teachers according to different vari-ables, we used the Internet use att...
Knowledge networks can be defined as social networks that enable the transfer of the knowledge, w... more Knowledge networks can be defined as social networks that enable the transfer of the knowledge, which is defined as the intellectual product formed as a result of the work of human intelligence, to be transferred to any other means of communication. A knowledge network represents a large number of people, resources and relationships between them, to create the highest value, primarily to accumulate and use knowledge through the process of generating and transmitting knowledge. General structure of knowledge networks; it consists of three basic stages: gathering, organizing and disseminating knowledge. The first step, knowledge collection, institutions and organizations to enter the network structure of the knowledge that is present. The organizing phase is the structuring of irregular and unstructured knowledge in the network structure according to certain standards and recording them regularly in the structure. Knowledge dissemination can be expressed as the transfer of organized k...
Gunumuzde verimliligin artirilmasi, is akislarinin hizlandirilmasi, calisanlar ve diger kurumlarl... more Gunumuzde verimliligin artirilmasi, is akislarinin hizlandirilmasi, calisanlar ve diger kurumlarla daha hizli iletisim kurulabilmesi, gunluk yasantimizi kolaylastirmasi gibi bircok sebepten dolayi bilisim sistemleri hizla yayginlasmaktadir. Bilisim teknolojilerindeki gelismeler sonucunda, merkezi yapilar yerlerini, dagitik mimarilere, internet ve aglar uzerinden erisilebilen elektronik uygulamalara birakmistir. Web uygulamalari, uzaktan erisimler, cevrimici sistemler, bilgisayar aglari, internet gibi elektronik bilgi altyapilarinin kullaniminin artmasi sonucunda ekavramlar (e-ticaret, e-ogrenme, e-rezervasyon, e-sinav, e-okul, e-banka, e-devlet vb.) gunluk yasantimizin bir parcasi haline gelmistir. Bilisim ortamlarinin kullaniminin artmasi ve yayginlasmasina paralel olarak guvenlik tehditleri ve riskleri ayni oranda artmistir. Teknik guvenlik onlemlerinin gelismesine ragmen bilisim sistemlerine karsi yapilan saldirilarin sayisinin artmasi ve bilgi sistemleri uzerinde yuksek derecede...
Ad-hoc networks are temporary networks, which use wireless media that consists of interconnected ... more Ad-hoc networks are temporary networks, which use wireless media that consists of interconnected nodes without a common network infrastructure using wireless media for immediate and dedicated network solutions. Ad-hoc networks are much vulnerable against the threats compared to the traditional networks due to its nature of lacking of a central control mechanism and the individual attitude of each node. In this study, the security threats and the routing protocols defined for ad hoc networks are investigated and the findings are evaluated. The aim of the study is to reach a generalized conclusion on the existing routing protocols in ad-hoc networks by evaluating the advantages and disadvantages of these protocols. In this paper, it is shown that the routing and security protocols to be used in ad-hoc networks should be designed by providing a resistance, robustness and high energy efficiency in order to overcome security treats aiming for confidentiality, integrity and accessibility....
This paper describes efforts underway to construct a Scientific Publication Content Management Sy... more This paper describes efforts underway to construct a Scientific Publication Content Management System (SPCMS) with Peer Review Tools (PRT) for Academic Institutions. Firstly, known Scientific Publication processes have been reviewed and online publication process was chosen as a model for developing a scientific content publication and management system. Next, the developed system is implemented as a case study to Kyrgyzstan-Turkey Manas University scientific journals. Since it is aimed to construct an online only journals, the system is supposed to be fast-tracking, fully manageable and, on the other hand, it should be highly secure since all the manuscripts are to be stored on the system. To undertake such problems as fast tracking, data processing and security was decided to implement self- developed system by using PHP and AJAX programming on Apache server with MySQL database application. The result of this research is an automated publishing system for scholar manuscript public...
63 Sınıf Öğretmenlerinin Öğretme-Öğrenme Sürecinde Bilgisayar Kullanımına ĠliĢkin Tutumları Mehme... more 63 Sınıf Öğretmenlerinin Öğretme-Öğrenme Sürecinde Bilgisayar Kullanımına ĠliĢkin Tutumları Mehmet TEKEREK Dr, KSÜ, Bilgisayar ve Öğretim Teknolojileri Eğitimi Bölümü GülĢen SERT BiliĢim Teknolojileri Öğretmeni Öz: Teknoloji günümüzde günlük yaĢamın her alanına ...
In this study, it was aimed to determine ethical reasoning of lecturers in STEM disciplines in te... more In this study, it was aimed to determine ethical reasoning of lecturers in STEM disciplines in terms of several independent variables (gender, working another institution, age, academic title, academic discipline, service period). This study was designed as a survey research. Lecturers in STEM disciplines in Kahramanmaras Sutcuimam University were selected as participants of the study. ‘‘Ethical Reasoning Instrument (ERI)’ which was developed by Titus, Zoltowski, Huyck, and Oakes (2011) was used in order to collect data by adapting into Turkish. Data were analyzed by the help of independent sample t-test, one-way ANOVA and Kruskal-Wallis tests. The findings indicated that for all independent variables there were no statistically significant difference (p>.05) in ethical reasoning of lecturers. As an interesting result, it was determined that lecturers in engineering discipline have less ethical awareness than lecturers in medicine and science disciplines. Keywords: STEM, STEM Dis...
800x600 In this study, the effect of Scratch environment in teaching algorithm in elementary scho... more 800x600 In this study, the effect of Scratch environment in teaching algorithm in elementary school 6th grade Information and Communication Technologies course was examined. The research method was experimental method. Control group, pretest-posttest design of experimental research method and a convenience sample consisting of 60 6th grade students were used. The research instrument was achievement test to determine the effect of Scratch on learning algorithm. During the implementation process experiment group studied using Scratch and control group studied with traditional methods. The data was analyzed using independent-samples t-test, paired-samples t-test and ANCOVA statistics. According to findings there is no statically significant difference between posttest achievement scores of experiment and control groups. Similarly, In terms of gender there isn’t a statically significant difference between posttest scores of experiment and control groups. Keywords: distributed learning e...
The widespread use of internet implies the idea that it can also be more widely used for educatio... more The widespread use of internet implies the idea that it can also be more widely used for educational purposes. In this respect, since physics teachers have a very important function in education, to determine physics teachers’ attitudes towards internet use is also important. In the literature it is possible to see many studies on teacher candidates’ attitude towards internet use; “however studies on appointed teachers’ attitude are not very common. In our study, which aims to determine the attitude of appointed teachers according to different variables, we used the Internet Use Attitude Scale. For the teachers that took part in the study the attitude towards internet use was analyzed and interpreted according to the variables of gender, years on the job, type of school at which they are teaching, and duration of their weekly internet use. It was seen that a vast majority of the teachers have personal computers, they connect to internet at home and have positive attitude towards int...
Software development processes, in general, focus on organizing the order of the phases to develo... more Software development processes, in general, focus on organizing the order of the phases to develop the intended software product within time and cost constraints. However, the vulnerabilities of the software projects released to the market indicate the need of a security oriented software development process along with providing the time and cost criteria. Moreover, to our best knowledge, there exist some studies stating that the security activities in conventional software development contribute to the effectiveness in providing the security. However, if the agile software development processes are reviewed, it can be seen that principles of agile and security do not match at some points. At this point, the model of Trustworthy Scrum (TS) comes to prominence by enabling the security activities to cooperate with the agile methods and to work in Scrum framework. In this study, a statistical analysis related to the feasibility of the Trustworthy Scrum model was conducted in order to a...
In this study, elementary and high school students’ information and computer security awareness l... more In this study, elementary and high school students’ information and computer security awareness levels were investigated. Information and Computer Security Awareness Scale was developed by the researcher and it was applied to 2447 students in the schools in center of Kahramanmaras City, towns, small towns and villages of Kahramanmaras province. For data analysis the statistical analysis program was used. Consequently it was found that students have sufficient awareness level in terms of ethical issues. However, they have low awareness levels in terms of issues that require knowledge about rules. It can be deduced that information and computer security awareness education and related activities are insufficient. If these courses’ hours can be increased, students’ information and computer security awareness can be enhanced and negative effects of internet can be controlled.
It is known that internet have been widespread in many areas of life and enabled machines to comm... more It is known that internet have been widespread in many areas of life and enabled machines to communicate each other. The terms of Internet of Things (IoT) has emerged as a result of networks consist of machines and equipment that work independent of operator and communicate each other. Sensors, embedded systems, communication technologies and data storage systems like clouds create wide area networks that can communicate and share data. In this study, the application of the IoT on a low speed mechanical benchmark driven by a direct current motor has been designed. It is aimed to keep the motor speed fixed at desired value according to the changings occurs depending on varying the pressure acting on the actuators. In presented study, a speed control is performed by establishing a modeling and simulation mechanism that will give the closest results to the real system.
Machine translation is a computational linguistics sub-field that studies translation methods and... more Machine translation is a computational linguistics sub-field that studies translation methods and the use of software to translate text between natural languages. Although machine translation is not as accurate as human translation in terms of syntactic, semantic accuracy criteria, the usage of improved methods has lead to obtaininig comparatively acceptable results. In recent years, self-learning methods with statistical analysis of big data are being developed. The current development in machine translation among Turkish languages has moved towards rule-based methods. However, one of today’s leading methods, Statistical Machine Translation, is being poorly applied. For this purpose, in this work N-GRAM based and Phrase based Statistical Machine Translation methods were applied between Kyrgyz and Turkish languages, using limited training data. For both methods, the translation quality was evaluated with BLEU scoring algorithm. According to test results, both applied methods, provid...
Within FATIH Project, it’s aimed to use information technology more effectively in learning envir... more Within FATIH Project, it’s aimed to use information technology more effectively in learning environments and targeted to make technological infrastructure improvements in schools. For this process information technology teachers play a key role. Thus, Information Technologies (IT) pre-service teachers’ computer self-efficiency perceptions were examined. In the study, a survey model was used and the sample included 200 Computer Education and Instructional Technologies (CEIT) students in two different universities. Relationships between the perceptions of computer self-efficacy of CEIT students and variables such as gender, graduated high school type, place of department preference, grade level and university type were examined by using computer self-efficacy scale that was developed by Orhan ve Akkoyunlu (2003). As a result, it’s indicated that; Male pre-service teachers have higher computer self-efficacy perceptions than female pre-service teachers, Pre-service teachers that were gr...
Kahramanmaraş Sütçü İmam Üniversitesi Mühendislik Bilimleri Dergisi
Bilgi insanin var oldugu gunden surekli bircok iletisim yontemi ve bilimsel alanla etkilesim icer... more Bilgi insanin var oldugu gunden surekli bircok iletisim yontemi ve bilimsel alanla etkilesim icerisine girmistir. Insanlarin bilgiyi paylasma ihtiyacinin artmasiyla, bilgi iceriginin daha iyi anlasilmasi icin cok cesitli gorsellestirme yontemleri uygulanmaya baslanmistir. Bilgi aktariminin teknoloji, bilim, sanat ve kultur alaninin genislemesine paralel olarak gelismesi sonucu uygulanmaya baslanan bu yontemler bundan sonra ki surecte de gelismeye devam edecektir. Gunumuzde bilgi, bilgilendirme tasariminin onemli bir kolu olan veri gorsellestirmesiyle kendini ifade edebilmekte ve icerigin iletilebilmesine onemli olcude olanak saglamaktadir. Bu calismada “Veri Gorsellestirmesi ve Bilgilendirme Grafikleri”nin, bilgilendirme amacina yonelik bilimsel katkisi ele alinmaktadir. Bu kapsamda bir veri gorsellestirme araci olarak yazinin tanimi ve tarihsel olusum sureci incelenmis olup insanlarin gecmisten gunumuze bilgi aktarmada kullandiklari veri gorsellestirme yontemlerinin tanimi, tarihsel surec icerisindeki rolu, gunumuze kadar degisen ve gelisen gorsellestirme konulari ele alinmistir. Bu konunun onculeri ve ustalari ornek calismalariyla birlikte incelenmistir.Bununla birlikte, konunun temel ilke ve esaslarina yer verilerek ve konu bir tasarim disiplini icerisinde ele alinarak bilgilendirme tasarimiyla olan iliskisi degerlendirilmistir. Ayrica, tasarimcinin icerik ve estetik arasindaki dengeyi koruyarak anlasilir bir gorsellestirme olusturma cabasi icine girilmistir. Son olarak, veri gorsellestirmesinin guncel konumuna gore tasarim surecindeki yontem ve uygulamalari incelenerek uygulama alanlari, gunumuzdeki farkli ortamlarla olan bagi uzerinden degerlendirilerek orneklerle pekistirilmistir.
Within FATİH Project, it's aimed to use information technology more effectively in learning e... more Within FATİH Project, it's aimed to use information technology more effectively in learning environments and targeted to make technological infrastructure improvements in schools. For this process information technology teachers play a key role. Thus, Information Technologies (IT) pre-service teachers' computer self-efficiency perceptions were examined. In the study, a survey model was used and the sample included 200 Computer Education and Instructional Technologies (CEIT) students in two different universities. Relationships between the perceptions of computer self-efficacy of CEIT students and variables such as gender, graduated high school type, place of department preference, grade level and university type were examined by using computer self-efficacy scale that was developed by Orhan ve Akkoyunlu (2003). As a result, it's indicated that; Male pre-service teachers have higher computer self-efficacy perceptions than female pre-service teachers, Pre-service teachers ...
Web technology is changing rapidly every day and the Internet has become a lifestyle for people a... more Web technology is changing rapidly every day and the Internet has become a lifestyle for people all over the world. It is obvious that the life style of societies is in a process of change, as new habits are acquired. Even though Internet use is one of the new social habits, it is one of the most important factors that induce this change as regards the convenience it brings to communication and other areas. The widespread use of Internet implies the idea that it can also be more widely used for educational purpose. Since chemistry teachers have a very important function in education, the determination of teachers ’ attitude towards Internet use is also important. In the literature it is possible to see many studies on teacher candidates ’ at-titude towards Internet use; however studies on appointed teachers ’ attitude are not very common. In our study, which aims to determine the attitude of appointed chemistry teachers according to different vari-ables, we used the Internet use att...
Knowledge networks can be defined as social networks that enable the transfer of the knowledge, w... more Knowledge networks can be defined as social networks that enable the transfer of the knowledge, which is defined as the intellectual product formed as a result of the work of human intelligence, to be transferred to any other means of communication. A knowledge network represents a large number of people, resources and relationships between them, to create the highest value, primarily to accumulate and use knowledge through the process of generating and transmitting knowledge. General structure of knowledge networks; it consists of three basic stages: gathering, organizing and disseminating knowledge. The first step, knowledge collection, institutions and organizations to enter the network structure of the knowledge that is present. The organizing phase is the structuring of irregular and unstructured knowledge in the network structure according to certain standards and recording them regularly in the structure. Knowledge dissemination can be expressed as the transfer of organized k...
Gunumuzde verimliligin artirilmasi, is akislarinin hizlandirilmasi, calisanlar ve diger kurumlarl... more Gunumuzde verimliligin artirilmasi, is akislarinin hizlandirilmasi, calisanlar ve diger kurumlarla daha hizli iletisim kurulabilmesi, gunluk yasantimizi kolaylastirmasi gibi bircok sebepten dolayi bilisim sistemleri hizla yayginlasmaktadir. Bilisim teknolojilerindeki gelismeler sonucunda, merkezi yapilar yerlerini, dagitik mimarilere, internet ve aglar uzerinden erisilebilen elektronik uygulamalara birakmistir. Web uygulamalari, uzaktan erisimler, cevrimici sistemler, bilgisayar aglari, internet gibi elektronik bilgi altyapilarinin kullaniminin artmasi sonucunda ekavramlar (e-ticaret, e-ogrenme, e-rezervasyon, e-sinav, e-okul, e-banka, e-devlet vb.) gunluk yasantimizin bir parcasi haline gelmistir. Bilisim ortamlarinin kullaniminin artmasi ve yayginlasmasina paralel olarak guvenlik tehditleri ve riskleri ayni oranda artmistir. Teknik guvenlik onlemlerinin gelismesine ragmen bilisim sistemlerine karsi yapilan saldirilarin sayisinin artmasi ve bilgi sistemleri uzerinde yuksek derecede...
Ad-hoc networks are temporary networks, which use wireless media that consists of interconnected ... more Ad-hoc networks are temporary networks, which use wireless media that consists of interconnected nodes without a common network infrastructure using wireless media for immediate and dedicated network solutions. Ad-hoc networks are much vulnerable against the threats compared to the traditional networks due to its nature of lacking of a central control mechanism and the individual attitude of each node. In this study, the security threats and the routing protocols defined for ad hoc networks are investigated and the findings are evaluated. The aim of the study is to reach a generalized conclusion on the existing routing protocols in ad-hoc networks by evaluating the advantages and disadvantages of these protocols. In this paper, it is shown that the routing and security protocols to be used in ad-hoc networks should be designed by providing a resistance, robustness and high energy efficiency in order to overcome security treats aiming for confidentiality, integrity and accessibility....
This paper describes efforts underway to construct a Scientific Publication Content Management Sy... more This paper describes efforts underway to construct a Scientific Publication Content Management System (SPCMS) with Peer Review Tools (PRT) for Academic Institutions. Firstly, known Scientific Publication processes have been reviewed and online publication process was chosen as a model for developing a scientific content publication and management system. Next, the developed system is implemented as a case study to Kyrgyzstan-Turkey Manas University scientific journals. Since it is aimed to construct an online only journals, the system is supposed to be fast-tracking, fully manageable and, on the other hand, it should be highly secure since all the manuscripts are to be stored on the system. To undertake such problems as fast tracking, data processing and security was decided to implement self- developed system by using PHP and AJAX programming on Apache server with MySQL database application. The result of this research is an automated publishing system for scholar manuscript public...
63 Sınıf Öğretmenlerinin Öğretme-Öğrenme Sürecinde Bilgisayar Kullanımına ĠliĢkin Tutumları Mehme... more 63 Sınıf Öğretmenlerinin Öğretme-Öğrenme Sürecinde Bilgisayar Kullanımına ĠliĢkin Tutumları Mehmet TEKEREK Dr, KSÜ, Bilgisayar ve Öğretim Teknolojileri Eğitimi Bölümü GülĢen SERT BiliĢim Teknolojileri Öğretmeni Öz: Teknoloji günümüzde günlük yaĢamın her alanına ...
In this study, it was aimed to determine ethical reasoning of lecturers in STEM disciplines in te... more In this study, it was aimed to determine ethical reasoning of lecturers in STEM disciplines in terms of several independent variables (gender, working another institution, age, academic title, academic discipline, service period). This study was designed as a survey research. Lecturers in STEM disciplines in Kahramanmaras Sutcuimam University were selected as participants of the study. ‘‘Ethical Reasoning Instrument (ERI)’ which was developed by Titus, Zoltowski, Huyck, and Oakes (2011) was used in order to collect data by adapting into Turkish. Data were analyzed by the help of independent sample t-test, one-way ANOVA and Kruskal-Wallis tests. The findings indicated that for all independent variables there were no statistically significant difference (p>.05) in ethical reasoning of lecturers. As an interesting result, it was determined that lecturers in engineering discipline have less ethical awareness than lecturers in medicine and science disciplines. Keywords: STEM, STEM Dis...
800x600 In this study, the effect of Scratch environment in teaching algorithm in elementary scho... more 800x600 In this study, the effect of Scratch environment in teaching algorithm in elementary school 6th grade Information and Communication Technologies course was examined. The research method was experimental method. Control group, pretest-posttest design of experimental research method and a convenience sample consisting of 60 6th grade students were used. The research instrument was achievement test to determine the effect of Scratch on learning algorithm. During the implementation process experiment group studied using Scratch and control group studied with traditional methods. The data was analyzed using independent-samples t-test, paired-samples t-test and ANCOVA statistics. According to findings there is no statically significant difference between posttest achievement scores of experiment and control groups. Similarly, In terms of gender there isn’t a statically significant difference between posttest scores of experiment and control groups. Keywords: distributed learning e...
The widespread use of internet implies the idea that it can also be more widely used for educatio... more The widespread use of internet implies the idea that it can also be more widely used for educational purposes. In this respect, since physics teachers have a very important function in education, to determine physics teachers’ attitudes towards internet use is also important. In the literature it is possible to see many studies on teacher candidates’ attitude towards internet use; “however studies on appointed teachers’ attitude are not very common. In our study, which aims to determine the attitude of appointed teachers according to different variables, we used the Internet Use Attitude Scale. For the teachers that took part in the study the attitude towards internet use was analyzed and interpreted according to the variables of gender, years on the job, type of school at which they are teaching, and duration of their weekly internet use. It was seen that a vast majority of the teachers have personal computers, they connect to internet at home and have positive attitude towards int...
Software development processes, in general, focus on organizing the order of the phases to develo... more Software development processes, in general, focus on organizing the order of the phases to develop the intended software product within time and cost constraints. However, the vulnerabilities of the software projects released to the market indicate the need of a security oriented software development process along with providing the time and cost criteria. Moreover, to our best knowledge, there exist some studies stating that the security activities in conventional software development contribute to the effectiveness in providing the security. However, if the agile software development processes are reviewed, it can be seen that principles of agile and security do not match at some points. At this point, the model of Trustworthy Scrum (TS) comes to prominence by enabling the security activities to cooperate with the agile methods and to work in Scrum framework. In this study, a statistical analysis related to the feasibility of the Trustworthy Scrum model was conducted in order to a...
In this study, elementary and high school students’ information and computer security awareness l... more In this study, elementary and high school students’ information and computer security awareness levels were investigated. Information and Computer Security Awareness Scale was developed by the researcher and it was applied to 2447 students in the schools in center of Kahramanmaras City, towns, small towns and villages of Kahramanmaras province. For data analysis the statistical analysis program was used. Consequently it was found that students have sufficient awareness level in terms of ethical issues. However, they have low awareness levels in terms of issues that require knowledge about rules. It can be deduced that information and computer security awareness education and related activities are insufficient. If these courses’ hours can be increased, students’ information and computer security awareness can be enhanced and negative effects of internet can be controlled.
It is known that internet have been widespread in many areas of life and enabled machines to comm... more It is known that internet have been widespread in many areas of life and enabled machines to communicate each other. The terms of Internet of Things (IoT) has emerged as a result of networks consist of machines and equipment that work independent of operator and communicate each other. Sensors, embedded systems, communication technologies and data storage systems like clouds create wide area networks that can communicate and share data. In this study, the application of the IoT on a low speed mechanical benchmark driven by a direct current motor has been designed. It is aimed to keep the motor speed fixed at desired value according to the changings occurs depending on varying the pressure acting on the actuators. In presented study, a speed control is performed by establishing a modeling and simulation mechanism that will give the closest results to the real system.
Machine translation is a computational linguistics sub-field that studies translation methods and... more Machine translation is a computational linguistics sub-field that studies translation methods and the use of software to translate text between natural languages. Although machine translation is not as accurate as human translation in terms of syntactic, semantic accuracy criteria, the usage of improved methods has lead to obtaininig comparatively acceptable results. In recent years, self-learning methods with statistical analysis of big data are being developed. The current development in machine translation among Turkish languages has moved towards rule-based methods. However, one of today’s leading methods, Statistical Machine Translation, is being poorly applied. For this purpose, in this work N-GRAM based and Phrase based Statistical Machine Translation methods were applied between Kyrgyz and Turkish languages, using limited training data. For both methods, the translation quality was evaluated with BLEU scoring algorithm. According to test results, both applied methods, provid...
Within FATIH Project, it’s aimed to use information technology more effectively in learning envir... more Within FATIH Project, it’s aimed to use information technology more effectively in learning environments and targeted to make technological infrastructure improvements in schools. For this process information technology teachers play a key role. Thus, Information Technologies (IT) pre-service teachers’ computer self-efficiency perceptions were examined. In the study, a survey model was used and the sample included 200 Computer Education and Instructional Technologies (CEIT) students in two different universities. Relationships between the perceptions of computer self-efficacy of CEIT students and variables such as gender, graduated high school type, place of department preference, grade level and university type were examined by using computer self-efficacy scale that was developed by Orhan ve Akkoyunlu (2003). As a result, it’s indicated that; Male pre-service teachers have higher computer self-efficacy perceptions than female pre-service teachers, Pre-service teachers that were gr...
Kahramanmaraş Sütçü İmam Üniversitesi Mühendislik Bilimleri Dergisi
Bilgi insanin var oldugu gunden surekli bircok iletisim yontemi ve bilimsel alanla etkilesim icer... more Bilgi insanin var oldugu gunden surekli bircok iletisim yontemi ve bilimsel alanla etkilesim icerisine girmistir. Insanlarin bilgiyi paylasma ihtiyacinin artmasiyla, bilgi iceriginin daha iyi anlasilmasi icin cok cesitli gorsellestirme yontemleri uygulanmaya baslanmistir. Bilgi aktariminin teknoloji, bilim, sanat ve kultur alaninin genislemesine paralel olarak gelismesi sonucu uygulanmaya baslanan bu yontemler bundan sonra ki surecte de gelismeye devam edecektir. Gunumuzde bilgi, bilgilendirme tasariminin onemli bir kolu olan veri gorsellestirmesiyle kendini ifade edebilmekte ve icerigin iletilebilmesine onemli olcude olanak saglamaktadir. Bu calismada “Veri Gorsellestirmesi ve Bilgilendirme Grafikleri”nin, bilgilendirme amacina yonelik bilimsel katkisi ele alinmaktadir. Bu kapsamda bir veri gorsellestirme araci olarak yazinin tanimi ve tarihsel olusum sureci incelenmis olup insanlarin gecmisten gunumuze bilgi aktarmada kullandiklari veri gorsellestirme yontemlerinin tanimi, tarihsel surec icerisindeki rolu, gunumuze kadar degisen ve gelisen gorsellestirme konulari ele alinmistir. Bu konunun onculeri ve ustalari ornek calismalariyla birlikte incelenmistir.Bununla birlikte, konunun temel ilke ve esaslarina yer verilerek ve konu bir tasarim disiplini icerisinde ele alinarak bilgilendirme tasarimiyla olan iliskisi degerlendirilmistir. Ayrica, tasarimcinin icerik ve estetik arasindaki dengeyi koruyarak anlasilir bir gorsellestirme olusturma cabasi icine girilmistir. Son olarak, veri gorsellestirmesinin guncel konumuna gore tasarim surecindeki yontem ve uygulamalari incelenerek uygulama alanlari, gunumuzdeki farkli ortamlarla olan bagi uzerinden degerlendirilerek orneklerle pekistirilmistir.
Nowadays, it is necessary individuals to have several skillls, information, and competencies name... more Nowadays, it is necessary individuals to have several skillls, information, and competencies namely 21th centry skills. These skills are; learning and innovation skills, information, media and technology skills, life and career skills. To prepare training programs that provide individuals to obtain these skills and to form teacher competencies have become important issue. The purpose of this study was to reveal to what extent Undergraduate Programs of Teacher Training in Elementary Mathematics and Science departments revised by Council of Higher Education (YÖK) in 2018 reflect the 21th century skills. For this, course contents give by YÖK were examined. The methodology of the study was determined as document analysis. Findings of the study showed that, critical thinking and problem solving skills are used more in elementary mathematics program. On the other hand, creatively thinking and implementing innovations skills are used more in science programs.
The information security activities, targeted
the protection of confidentiality, integrity and av... more The information security activities, targeted the protection of confidentiality, integrity and availability of all kinds of information, was began in information and internet technologies areas in The United States of America, second half of twentieth century. While the importance of the protection of information increases, the information security industry has also continued its development. In this study, the emergence of the information security and its developments till now has been presented. The roles and status of the countries placed in this industry are tried to put forward by comparing some data. The data obtained from the sources are analyzed in terms of information security industry. Consequently, whether a relationship between the development levels of the countries and the development and presence of information security industry are examined. (Her türlü bilginin gizlilik, bütünlük ve erişilebilirliğini korumayı hedef alan bilgi güvenliği faaliyetleri, bilişim ve internet teknolojileri alanında yirminci yüzyılın ikinci yarısında Amerika Birleşik Devletlerinde başlamıştır. Bilginin korunmasının önemi arttıkça bilgi güvenliği endüstrisi de gelişimini sürdürmüştür. Bu çalışmada bilgi güvenliği endüstrisinin doğuşu ve günümüze kadar gelişimi incelenmiştir. Ayrıca bu endüstrinin konumlanmasında ülkelerin rolleri ve durumları bazı veriler ile karşılaştırılarak ortaya konmaya çalışılmıştır. Bu doğrultuda elde edilen kaynaklardan alınan veriler, bilgi güvenliği endüstrisi açısından analiz edilmiştir. Çalışma sonucunda ülkelerin belirlenen parametrelerdeki gelişmişlik düzeyleri ile bilgi güvenliği endüstrisinin varlığı ve gelişmişliği arasında bir ilişki olup olmadığı ortaya konmaya çalışılmıştır.)
Smart power grids have an important role
in protecting power transmission and distribution grids
... more Smart power grids have an important role in protecting power transmission and distribution grids which are locomotive of critical infrastructures against to sabotage and neglect, efficient cost administration, leakage determination. It is necessary to describe, classify certain threats and to take precautions to these threats in spreading use of smart power grids process. In this context, first threats to security and privacy come to the forefront during distributing and sharing of data produced by smart power grids. It is expected to include sensitive and non-sensitive data when data produced by smart power grids are examined and classified. It is necessary to distribute and share these sensitive data in the protection of privacy and data benefit in order to use for different purposes. In this study, smart power grids are described, the threats to sensitive data privacy are explained and solution suggestions are presented by evaluations. (Günümüzde kritik altyapı tehditlerinin başında siber saldırılar gelmektedir. Kritik altyapıların lokomotifi olan elektrik enerjisi iletim ve dağıtım şebekelerinin saldırı, sabotaj ve ihmallere karşı korunmasında, kaçakların tespitinde, maliyet etkin yönetiminde, akıllı şebekelerin önemli bir rolü vardır. Oldukça yeni bir çalışma alanı olan akıllı şebekelerin geliştirilerek kullanımının yaygınlaştırılması sürecinde tehditlerin tanımlanması, sınıflandırılması ve önlemlerin alınmasına yönelik çalışmalara ihtiyaç duyulmaktadır. Akıllı şebekelerin siber saldırılara maruz kalmaması için verilerin toplanmasında, paylaşılmasında güvenlik ve mahremiyet korumasının sağlanması gerekmektedir. Çeşitli sebeplerle verilerin işlenebilmesi amacıyla veri faydasının da mahremiyet önlemleri sırasında dikkate alınması gerekmektedir. Bu çalışmada akıllı şebekeler tanımlanmış, ürettiği hassas verilerin mahremiyetine yönelik tehditler sıralanmış ve değerlendirmeler yapılarak çözüm önerileri sunulmuştur.)
It is identified that one of the greatest threats against security in the next coming ten years w... more It is identified that one of the greatest threats against security in the next coming ten years will be cold cyber wars against information systems between countries. National information systems utilize the information technology infrastructure of enterprises in order to satisfy personal or enterprise needs. In the past years, attacks were taking place with no discrimination of targets, however in the recent years; attacks are organized, deliberate and pointed towards national information systems. Personal and enterprise level information security must be established in order to avoid information security threats that try to hamper or even destroy national information security, cause tangible and intangible damages on individuals and enterprises. In order to reduce the impact of such cyber threats to minimum at the national level, there are necessary critical enterprise and personal security precautions to be taken. The establishment of the enterprise and personal information security which form the stages of establishing national information security at highest level and development of a national security policy are among the first things that need to be done. In this paper, the strategic national information systems are identified, then personal and enterprise information security that are important stages in providing security for national information systems are described. The necessary security tests and the importance of education and awareness are discussed in the following section. Finally, evaluations have been performed on national information security and proposals have been put forward.
In this study, the awareness levels of elementary and high school students’ information and compu... more In this study, the awareness levels of elementary and high school students’ information and computer security were tried to reveal. A developed information and computer security scale was conducted to 2447 students from the center of Kahramanmaraş City, towns, small towns and villages of Kahramanmaraş. The data were assessed by using statistical analysis program.
About awareness of information and computer security both positive and negative findings were obtained. Basely, it was found that while students have sufficient awareness level in terms of ethical issues, they have low awareness level in terms of issues that required rules and knowledge. This situation reveals the idea that education and activities of awareness of information and computer security seem insufficient.
II. Bölgesel Sorunlar ve Türkiye Sempozyumu Proceeding Book, Feb 8, 2013
Tunus’ta 2010 Aralık ayında başlayıp, 2011’in başlarında yükselen, hızla Orta Doğu ve Kuzey Afrik... more Tunus’ta 2010 Aralık ayında başlayıp, 2011’in başlarında yükselen, hızla Orta Doğu ve Kuzey Afrika ülkelerine
yayılan ve etkileri hala devam etmekte olan halk hareketlerine Arap Baharı adı verilmektedir. Otoriter yönetimlere
karşı özgürlük ve demokrasi talepleriyle ortaya çıkan harekette, bilgi ve iletişim teknolojilerinin etkin rol oynadığı
yaygın olarak kabul edilmektedir. Bu teknolojilerin kullanımının oynadığı rolün abartıldığını iddia eden görüşler de
vardır.
Bu çalışmada Arap Baharı’nda yaşanan sosyal aktivizmin, yerel sosyokültürel değişim ve küresel ağ toplumunun
etkileri olmak üzere iki temel dinamiğe sahip olduğu öne sürülmektedir. Bu iki dinamiğin izi sürülürken, konunun
bileşenleri, “sokak siyaseti” ve “ağ toplumu” kavramları eşliğinde ve birbiriyle ilişkisi üzerinden tartışılmaktadır. Bu
ilişki yeni aktivizmi yaratmıştır. Çalışmada yeni aktivizm, bölgedeki yeni sosyal aktörlerin, kültürel olarak devralmış
oldukları eski “sokak siyaseti” geleneğini yeni çağın yeni araçlarını kullanarak icra etmeleri/sürdürmeleri sonucunda
ortaya çıkan hareket biçimi olarak değerlendirilmektedir.
Gelişen teknoloji ve Internet kullanımının yaygınlaşmasıyla günlük hayatımızdaki hemen hemen tüm ... more Gelişen teknoloji ve Internet kullanımının yaygınlaşmasıyla günlük hayatımızdaki hemen hemen tüm işler sanal ortama taşınmıştır. Bu gelişim çerçevesinde eğitim alanında da çeşitli uygulamalar yapılmaktadır. Eğitimde bilgisayardan çok farklı amaçlar için yararlanılabilir. Öğretim, üretim, iletişim amaçlı kullanmak bunlardan bazılarıdır.
www.okulumuzungazetesi.com sitesi ile öğrencilere yazma, okuma, okuduğunu anlama becerilerini geliştirmeye yönelik kazanımlar verilmeye çalışılmıştır. Bunun yanında öğrencilerin
İnternet’i kullanırken kendilerini geliştirmelerini sağlamak amaçlanmıştır. Çalışmada ders dışı etkinliklerin öğretimde kullanılması sürecinde yer alan okul gazetelerinin, farklı bir bakış açısıyla öğrenci ve öğretmene sunulması amaçlanmıştır. Sistem Asp tabanlı olarak dinamik web sayfası şeklinde oluşturulmuştur. Veriler veritabanında saklanmaktadır.
Eğitimde verimliliği etkileyen en önemli etkenlerden birisi öğretmendir. Toplumun değerlerinin ko... more Eğitimde verimliliği etkileyen en önemli etkenlerden birisi öğretmendir. Toplumun değerlerinin korunması, sürdürülmesi ve yeni değerlerin kazandırılmasında öğretmen en önemli öğedir. Eğitim fakültelerinde okuyan ve geleceğin öğretmenleri olacak olan öğrencilerin öğretmenlik mesleğini sevmeleri, mesleklerini başarıyla yürütebilmeleri için bir ön koşuldur (Tanel, Şengören ve Tanel). Bu çalışmada bilişim teknolojileri ve ilköğretim matematik öğretmeni adaylarının öğretmenlik mesleğine yönelik tutumlarının ne düzeyde olduğu araştırılmıştır. Tarama yönteminin kullanıldığı araştırmada veri toplama aracı olarak Tanel, Şengören ve Tanel (2007) tarafından geliştirilen “Öğretmenlik Mesleğine Bakış Açısı Tutum Ölçeği” kullanılmıştır. Araştırma ile öğrencilerin öğretmenlik mesleğine yönelik tutumlarına bakıldığında cinsiyet değişkenine göre kız öğrenciler lehine anlamlı bir ilişki tespit edilmiştir. Üniversite değişkenine göre Kahramanmaraş Sütçüimam Üniversitesi ile İnönü Üniversitesi öğrencileri arasında Kahramanmaraş Sütçüimam Üniversitesi öğrencileri lehine anlamlı bir ilişki olduğu görülmüştür. Anne öğrenim durumu değişkenine göre annesi ilkokul ve ortaokul mezunu olanlar arasında ilkokul lehine; ortaokul ve lise mezunu olanlar arasında lise lehine bir ilişki bulunmuştur. Öğrenim gördükleri bölümü isteyerek seçen öğrencilerle isteyerek seçmeyen öğrenciler arasında bölümü isteyerek seçenler lehine anlamlı bir ilişki bulunmuştur. Mezun olunca öğretmenlik yapmak isteyip istemeyen öğrenciler arasında mezun olunca öğretmenlik mesleği yapmak isteyen öğrenciler lehine bir ilişki bulunmuştur.
Uploads
the protection of confidentiality, integrity and availability
of all kinds of information, was began in information and
internet technologies areas in The United States of America,
second half of twentieth century. While the importance of
the protection of information increases, the information
security industry has also continued its development. In
this study, the emergence of the information security and
its developments till now has been presented. The roles and
status of the countries placed in this industry are tried to put
forward by comparing some data. The data obtained from
the sources are analyzed in terms of information security
industry. Consequently, whether a relationship between the
development levels of the countries and the development
and presence of information security industry are examined.
(Her türlü bilginin gizlilik, bütünlük ve erişilebilirliğini
korumayı hedef alan bilgi güvenliği faaliyetleri, bilişim
ve internet teknolojileri alanında yirminci yüzyılın ikinci
yarısında Amerika Birleşik Devletlerinde başlamıştır.
Bilginin korunmasının önemi arttıkça bilgi güvenliği
endüstrisi de gelişimini sürdürmüştür. Bu çalışmada bilgi
güvenliği endüstrisinin doğuşu ve günümüze kadar gelişimi
incelenmiştir. Ayrıca bu endüstrinin konumlanmasında
ülkelerin rolleri ve durumları bazı veriler ile karşılaştırılarak
ortaya konmaya çalışılmıştır. Bu doğrultuda elde edilen
kaynaklardan alınan veriler, bilgi güvenliği endüstrisi
açısından analiz edilmiştir. Çalışma sonucunda ülkelerin
belirlenen parametrelerdeki gelişmişlik düzeyleri ile bilgi
güvenliği endüstrisinin varlığı ve gelişmişliği arasında bir
ilişki olup olmadığı ortaya konmaya çalışılmıştır.)
in protecting power transmission and distribution grids
which are locomotive of critical infrastructures against to
sabotage and neglect, efficient cost administration, leakage
determination. It is necessary to describe, classify certain
threats and to take precautions to these threats in spreading
use of smart power grids process. In this context, first
threats to security and privacy come to the forefront during
distributing and sharing of data produced by smart power
grids. It is expected to include sensitive and non-sensitive
data when data produced by smart power grids are examined
and classified. It is necessary to distribute and share these
sensitive data in the protection of privacy and data benefit in
order to use for different purposes. In this study, smart power
grids are described, the threats to sensitive data privacy
are explained and solution suggestions are presented by
evaluations.
(Günümüzde kritik altyapı tehditlerinin başında siber
saldırılar gelmektedir. Kritik altyapıların lokomotifi olan
elektrik enerjisi iletim ve dağıtım şebekelerinin saldırı, sabotaj
ve ihmallere karşı korunmasında, kaçakların tespitinde,
maliyet etkin yönetiminde, akıllı şebekelerin önemli bir rolü
vardır. Oldukça yeni bir çalışma alanı olan akıllı şebekelerin
geliştirilerek kullanımının yaygınlaştırılması sürecinde
tehditlerin tanımlanması, sınıflandırılması ve önlemlerin
alınmasına yönelik çalışmalara ihtiyaç duyulmaktadır.
Akıllı şebekelerin siber saldırılara maruz kalmaması için
verilerin toplanmasında, paylaşılmasında güvenlik ve
mahremiyet korumasının sağlanması gerekmektedir. Çeşitli
sebeplerle verilerin işlenebilmesi amacıyla veri faydasının
da mahremiyet önlemleri sırasında dikkate alınması
gerekmektedir. Bu çalışmada akıllı şebekeler tanımlanmış,
ürettiği hassas verilerin mahremiyetine yönelik tehditler
sıralanmış ve değerlendirmeler yapılarak çözüm önerileri
sunulmuştur.)
About awareness of information and computer security both positive and negative findings were obtained. Basely, it was found that while students have sufficient awareness level in terms of ethical issues, they have low awareness level in terms of issues that required rules and knowledge. This situation reveals the idea that education and activities of awareness of information and computer security seem insufficient.
yayılan ve etkileri hala devam etmekte olan halk hareketlerine Arap Baharı adı verilmektedir. Otoriter yönetimlere
karşı özgürlük ve demokrasi talepleriyle ortaya çıkan harekette, bilgi ve iletişim teknolojilerinin etkin rol oynadığı
yaygın olarak kabul edilmektedir. Bu teknolojilerin kullanımının oynadığı rolün abartıldığını iddia eden görüşler de
vardır.
Bu çalışmada Arap Baharı’nda yaşanan sosyal aktivizmin, yerel sosyokültürel değişim ve küresel ağ toplumunun
etkileri olmak üzere iki temel dinamiğe sahip olduğu öne sürülmektedir. Bu iki dinamiğin izi sürülürken, konunun
bileşenleri, “sokak siyaseti” ve “ağ toplumu” kavramları eşliğinde ve birbiriyle ilişkisi üzerinden tartışılmaktadır. Bu
ilişki yeni aktivizmi yaratmıştır. Çalışmada yeni aktivizm, bölgedeki yeni sosyal aktörlerin, kültürel olarak devralmış
oldukları eski “sokak siyaseti” geleneğini yeni çağın yeni araçlarını kullanarak icra etmeleri/sürdürmeleri sonucunda
ortaya çıkan hareket biçimi olarak değerlendirilmektedir.
www.okulumuzungazetesi.com sitesi ile öğrencilere yazma, okuma, okuduğunu anlama becerilerini geliştirmeye yönelik kazanımlar verilmeye çalışılmıştır. Bunun yanında öğrencilerin
İnternet’i kullanırken kendilerini geliştirmelerini sağlamak amaçlanmıştır. Çalışmada ders dışı etkinliklerin öğretimde kullanılması sürecinde yer alan okul gazetelerinin, farklı bir bakış açısıyla öğrenci ve öğretmene sunulması amaçlanmıştır. Sistem Asp tabanlı olarak dinamik web sayfası şeklinde oluşturulmuştur. Veriler veritabanında saklanmaktadır.