47674 research outputs found
Sort by
The symptoms of PTSD in women who are residents of shelters and were exposed to IPV:an investigation in the frame of cognitive model by Ehlers&Clark
In this study, the symptoms of posttraumatic stress disorder (PTSD) in women who
are residents of shelters and were exposed to intimate partner violence (IPV) is
examined in the frame of the cognitive model by Ehlers and Clark (2000). The sample
of the study consisted of 142 women aged between 19-55, in İstanbul. Assessment
tools were the PTSD checklist for DSM-5 (PCL-5), posttraumatic cognitions inventory
(PTCI), multidimensional scale of perceived social support (MSPSS) and brief COPE
inventory. In order to test the variables of cognitive model, multiple hierarchical
regression analysis was used. Results indicated that 75.4% of women might fulfill the
diagnostic criteria of PTSD. Moreover, the demographic and risk factors alone
predicted the 12% of variance in PTSD symptoms. The final model including both risk
factors and cognitive behavioral variables explained 41% of variance in PTSD
symptoms. Furthermore, variables which explained a statistically significant amount
of variance in PTSD were partner’s alcohol consumption, women’s past suicidal
thoughts, absence of work experiences, family history of psychological disorders,
posttraumatic negative cognitions about self. To sum up, the cognitive model of PTSD
is a useful model to explain symptoms of PTSD in victims of IPV and can be used to
developed beneficial treatment techniques for those women.Öz……………………………………………………………………………………………………………………………iv
Abstract…………………………………………………………………………………………………………………..v
İthaf………………………………………………………………………………………………………………………..vi
Teşekkür………………………………………………………………………………………………………………..vii
İçindekiler……………………………………………………………………………………………………………..viii
Tablolar Listesi………………………………………………………………………………………………………..xi
Şekiller Ve Görseller Listesi…………………………………………………………………………………….xii
Semboller Ve Kısaltmalar Listesi………………………..………………………………………..……..…xiii
BÖLÜMLER
1. Giriş……………..………………………………………………………………………………………………………1
1.1. Şiddet Kavramı…………………………………………………………………………………………..3
1.1.1. Kadına Yönelik Şiddet………………………………………………………………………4
1.1.2. Eş Şiddeti/Yakın Partner Şiddeti……………………………………………………….4
1.1.2.1. Fiziksel Şiddet………………………………………………………………………5
1.1.2.2. Duygusal Şiddet…………………………………………………………………..5
1.1.2.3. Cinsel Şiddet……………………………………………………………………….6
1.1.2.4. Ekonomik Şiddet………………………………………………………………….6
1.1.2.5. Dijital Şiddet………………………………………………………………………..7
1.1.2.6. Şiddet Döngüsü……………………………………………………………………7
1.2. Eş Şiddeti İle İlgili Yapılan Çalışmalar………………………………………………………….8
1.2.1. Eş Şiddetinin Dünya’daki Yaygınlığı………………………………………………….8
1.2.2. Eş Şiddetinin Türkiye’deki Yaygınlığı…………………………………………………9
1.2.3. Eş Şiddetini Açıklayan Psiko-Sosyal Kuramlar…………………………………11
1.2.4. Eş Şiddetindeki Risk Faktörleri, Demografik Faktörler Ve Koruyucu
Faktörler………………………………………………………………………………………………….16
1.2.5. Eş Şiddetinin Sonuçları Ve Sığınma Evlerinde Kalan Kadınlarla İlgili
Literatür…………………………………………………………………………………………………..19
1.3. Travma Sonrası Stres Bozukluğu………………………………………………………………24
1.3.1. Travma Sonrası Stres Bozukluğu DSM-5 Tanı Kriterleri…………………..24
1.3.2. Bilişsel model…………………………………………………………………………………27
1.4. Araştırmanın Amacı Ve Önemi…………………………………………………………………33
2. Yöntem .…………………………………………………………………………………………………………….34
2.1. Katılımcılar……………………………………………………………………………………………….34
2.2. Veri Toplama Araçları………………………………………………………………………………34
2.2.1. Kişisel Bilgi Formu………………………………………………………………………….34
2.2.2. DSM 5 İçin Travma Sonrası Stres Bozukluğu Kontrol Listesi- PCL-5…34
2.2.3. Travma Sonrası Bilişler Ölçeği-TSBÖ……………………………………………….35
2.2.4. Çok Boyutlu Algılanan Sosyal Destek Ölçeğinin Gözden Geçirilmiş
Formu………………………………………………………………………………………………………36
2.2.5. Başa Çıkma Stilleri Ölçeği Kısa Formu- Brief COPE………………………….36
2.3. İşlem………………………………………………………………………………………………………..37
2.4. Verilerin Analizi………………………………………………………………………………………..37
3. Bulgular…..…………………………………………………………………………………………………………39
3.1. Betimsel Analiz Bulguları………………………………………………………………………….39
3.2. Pearson Korelasyon Analizi Bulguları……………………………………………………….45
3.3. Çoklu Hiyerarşik Regresyon Analizi Bulguları……………………………………………49
4. Sonuç……………………..………………………………………………………………………………………….54
4.1.Betimsel Analiz Bulgularının Değerlendirilmesi………………………………………….54
4.2. Pearson Korelasyon Analizi Bulgularının İncelenmesi………………………………..58
4.3. Çoklu Hiyerarşik Regresyon Analizi Bulgularının Değerlendirilmesi…….…….61
4.4. Genel Değerlendirme……………………………………………………………………………….64
4.5. Klinik Doğurgular………………………………………………………………………………………65
4.6. Çalışmanın Sınırlılıkları……………………………………………………………………………..66
4.7. Yeni Çalışmalar İçin Öneriler……………………………………………………………………..67
Referanslar……………………….…………………………………………………………………………………..69
Ekler………………………………..…………………………………………………………………………………….77
A. Bilgilendirilmiş Onam Formu…………………………………………………………………..77
B. Kişisel Bilgi Formu………………………………..………………………………..……………….78
C. Dsm 5 İçin Travma Sonrası Stres Bozukluğu Kontrol Listesi
(Pcl-5)…………………………………………………………………………………….……………….…84
D. Travma Sonrası Bilişler Ölçeği (Tsbö)……………………………..………….…………..86
E. Çok Boyutlu Algılanan Sosyal Destek Ölçeği’nin Gözden Geçirilmiş
Formu……………………………………………………………………………………………...………88
F. Başa Çıkma Stratejileri Kısa Formu (Brıef Cope)…………………..……………….90
G. Aile, Çalışma Ve Sosyal Hizmet Bakanlığı İzni……………………………….………92
H. Etik Kurul Onayı……………………………………………………………………….………….9
1990 ve 2017 yılları arasında Türkiye'nin Birleşmiş Milletler Barış Gücü operasyonlarına katılımının incelenmesi
It is argued in recent literature that Turkey’s contribution to peacekeeping
operations, especially UN peacekeeping operations has risen between 2003 and
2017, compared to 1990 and 2002. Thanks to collected data, this thesis aims to find
whether Turkey’s contribution to peacekeeping operations, especially UN
peacekeeping operations really increased, and if there is such an increase, what the
reasons for it could be. In the light of collected data, this thesis advocates there is an
increase in Turkey’s participation in UN peacekeeping operations between 2003 and
2017, compared to 1990 and 2002.
In the literature, some authors explain this rise with domestic factors, while some
others claim international factor. Domestic reasons are demonstrated as follows:
More proactive foreign policy which stresses soft power, the rise of neo-Ottomanism,
neo-Islamism and Turkism; International factor is that middle powers’ willingness to
participate in peacekeeping operations after the end of the Cold War. I compared all
these arguments with the data I collected, and analyzed which arguments can be
supported. Then, the study showed that more proactive foreign policy which
emphasizes soft power could be impacted on Turkey’s increased role in UN
peacekeeping operations. Additionally, the rise of Neo-Ottomanism and Neo
Islamism could not explain the reasons behind the rise in Turkey’s participation to UN
peacekeeping missions. Also, due to lack of findings on whether Turkism affected or
did not affect on Turkey’s increased attendance to UN peacekeeping operations, the
thesis did not comment anything on this issue. Lastly, it is claimed since Turkey is also
a middle power, the rise in Turkey’s attendance to UN missions could be associated
with the middle powers’ volunterisim to contribute to UN missions, but since Turkey
did not take active role in missions like other middle powers, this was not given as an
actual reason for this issue.Abstract ....................................................................................................................... iv
Öz ................................................................................................................................ vi
Acknowledgements .................................................................................................... viii
Table Of Contents ...................................................................................................... ixx
List Of Figures .............................................................................................................. xii
List Of Tables .............................................................................................................. xiii
CHAPTERS
1. Introduction ............................................................................................................. 1
1.1. Research Question And Significance Of The Problem ...................................... 1
1.2. Method And Data .............................................................................................. 4
2. Literature Review ..................................................................................................... 8
2.1. Introduction ...................................................................................................... 8
2.2. Domestic Factors for Turkey’s Increased Contribution to UN Peacekeeping
Operations ........................................................................................................ 9
2.3. Turkish Foreign Policy Between 1990 and 2002 ............................................. 10
2.4. Turkish Foreign Policy Activism in 2003 and 2017 .......................................... 15
2.5. UN Peacekeeping Operations and Turkey’s Proactive Foreign Policy ............ 16
2.6. Three Policies (Neo-Islamism, Neo-Ottomanism And Turkism) in Recent
Turkish Foreign Policy And Peacekeeping Operations ................................... 19
2.7. Neo-Ottomanism............................................................................................. 20
2.8. Neo-Ottomanism and Peacekeeping Operations ........................................... 21
2.9. Neo-Islamism ................................................................................................... 22
2.10. Neo-Islamism and Peacekeeping Operations ............................................... 23
2.11. Turkism .......................................................................................................... 23
2.12. Turkism and Peacekeeping Operations ........................................................ 24
2.13. Soft Power Through Peacekeeping Operations ............................................ 24
2.14. Turkey’s Soft Power and UN Peacekeeping Operations ............................... 27
2.15. Perceived International Responsibilities ....................................................... 28
2.16. International Factors for Turkey’s Increased Contribution to UN
Peacekeeping Operations .............................................................................. 31
2.17. Changes in the International System ............................................................ 31
2.18. Middle Powers’ Volunteerism and Peacekeeping Operations ..................... 32
3. Measuring the Change in Turkey’s Participation ................................................... 37
3.1. Introduction .................................................................................................... 37
3.2. Analyzing the Data .......................................................................................... 37
3.3. Peacekeeping Operations in Africa ................................................................. 51
3.4. Peacekeeping Operations in Asia .................................................................... 55
3.5. Peacekeeping Operations in Europe ............................................................... 58
3.6. Peacekeeping Operations in South America ................................................... 60
4. Understanding the Reasons Behind Turkey’s Participation to UN Missions ......... 64
4.1. Introduction .................................................................................................... 64
4.2. Proactive Foreign Policy and Soft Power Of Turkey? ...................................... 64
4.3. Which Operations and Which Strategy? ......................................................... 70
4.3.1. Neo-Islamism? ...................................................................................... 70
4.3.1.1. Peacekeeping Operations in Muslim Countries in Africa ........ 71
4.3.1.2. Peacekeeping Operations in Muslim Countries in Asia ........... 74
4.3.1.3. Peacekeeping Operations in Muslim Countries in Europe ...... 78
4.3.1.4. South America .......................................................................... 81
4.3.2. Neo-Ottomanism? ................................................................................ 82
4.3.2.1. Africa ........................................................................................ 83
4.3.2.2. Asia ........................................................................................... 87
4.3.2.3. Europe ...................................................................................... 90
4.3.2.4. South America .......................................................................... 92
4.3.3. Turkism? ............................................................................................... 93
4.4. Trend Among Middle Powers? ........................................................................ 94
5. Conclusion ............................................................................................................ 100
5.1. Recommendations for Future Studies .......................................................... 103
References ................................................................................................................ 105
Appendices ............................................................................................................... 112
Appendix 1 ........................................................................................................... 112
Appendix 2 ........................................................................................................... 137
Appendix 3 ........................................................................................................... 148
Appendix 4 ........................................................................................................... 152
Appendix 5 ........................................................................................................... 154
Appendix 6 ........................................................................................................... 156
Appendix 7 ........................................................................................................... 157
Appendix 8 ........................................................................................................... 159
Appendix 9 ........................................................................................................... 160
Appendix 10 ......................................................................................................... 161
Appendix 11 ......................................................................................................... 162
Appendix 12 ......................................................................................................... 163
Appendix 13 ......................................................................................................... 164
Appendix 14 ......................................................................................................... 165
Appendix 15 ......................................................................................................... 169
Appendix 16 ......................................................................................................... 171
Appendix 17 ......................................................................................................... 173
Appendix 18 ......................................................................................................... 174
Appendix 19 ......................................................................................................... 176
Appendix 20 ......................................................................................................... 177
Appendix 21 ......................................................................................................... 178
Appendix 22 ......................................................................................................... 179
Appendix 23 ......................................................................................................... 180
Appendix 24 ......................................................................................................... 181
Appendix 25 ......................................................................................................... 185
Appendix 26 ......................................................................................................... 187
Appendix 27 ......................................................................................................... 189
Appendix 28 ......................................................................................................... 190
Appendix 29 ......................................................................................................... 192
Appendix 30 ......................................................................................................... 193
Appendix 31 ......................................................................................................... 19
[Kemal Karpat ve Coşkun Çakır'ın bulunduğu sahilde çekilmiş fotoğraf]
Kemal Karpat Arşivi
[Nihal Atamer'in eşi Burhanettin Atamer'in ordudaki arkadaşlarıyla çekilmiş fotoğrafı]
Taha Toros Arşivi, Dosya No: 66-Zafer-Nihal-Gülden Atame
[Mahmut Şevket Paşa arşivinden çıkmış olan yakın arkadaşlarına ait fotoğraf]
Mahmut Şevket Paşa Arşivi.
Not: İstanbul Şehir Üniversitesi Öğretim Üyesi Doç.Dr. Kahraman Şakul aracılığıyla Mahmut Şevket Paşa ailesi tarafından bağışlanmıştır
A conceptual view of exergy destruction in mergers and acquisitions
Company mergers are complex where several firm-specific and contextual factors interact with each other impacting the outcome of the process. Although many firms merge with or acquire others to increase the value of their firms, have more market power and gain more ability to negotiate with suppliers or customers, most of mergers and acquisitions result in failures. Despite the poor performances, firms continue to merge and acquire. The existing literature on the other hand lacks in providing a robust theory to the issue of poor post-merger performance. This study thus responds to exploring the issue of high failure rates in mergers and acquisitions in an entirely different way. As the first output of a research programme on the conceptual, theoretical and empirical issues in merger and acquisitions research, we conceptualize the loss of performance or exergy in mergers and acquisitions using thermodynamic analysis of the mixing process in physical systems. Three propositions are developed that conceptualize the ideal conditions for mergers in terms of firm size, relatedness between the merging firms and the ambient states. The exergy loss due to merging increases with the increasing levels of strategic or cultural incompatibility between the two firms. When the sizes of two firms differ, it is preferable for the larger firm to have higher knowledge base than the smaller firm. Lastly, the knowledge intensity of the country that the merging takes place as well as the relative knowledge base of the merging firms do interact and change the post-merger performance significantly
Ambassadors, spies, captives, merchants and travelers : Ottoman information networks in the East, 1736-1747
This thesis sheds light on the Ottoman information networks in the East during the
reign of Nadir Shah in Iran. It emphasizes singular cases of agencies who convey (and
process) information, such as ambassadors, spies, captives, merchants, couriers, and
travelers, but with due effort to depict the clear and implicit connections and links
among them.
The study is limited to the period when Nadir Shah reigned in Iran from 1736 to 1747,
because the intensity of the developments and contacts in this interesting period
provides an opportunity to investigate the sources and agents of information with
due attention to detail. The study emphasizes Ottoman agents but it makes room for
the voices, views and actions of Iranian and other actors as well. The thesis is based
mainly on Ottoman sources but benefits from other sources as well. Its main focus is
on Anatolia, Iraq, the Hedjaz, Iran, and India, and on individuals who were in contact
with the Ottoman central and local officials.
The research combines descriptive and analytical approaches. The descriptive side of
the study aims to show how and when intelligence arrived in Istanbul. In the process,
it introduces new or hitherto neglected Ottoman sources and agents as well. Münif’s
ambassadorial report on Iran and Müteferrika’s Zeyl-i Tarih-i Seyyah are cases in
point. Careful assessment of the available information helps correct some
chronological and geographical mistakes in the current literature and draw attention
to incoherent narratives in the primary sources. At the analytical level, this research points to the tensions and complexities of policy making. It points to friendly or
hostile relations among certain Ottoman agents and how two political factions, led
by Ahmed Paşa and Hacı Beşir Ağa, respectively, influenced the making of the
Ottoman government’s Iran policy in the 1730s and 1740s.CONTENTS:
Abstract ................................................................................................................... iv
Öz ............................................................................................................................ vi
Dedication ............................................................................................................. viii
Acknowledgements ................................................................................................. ix
Table of Contents ..................................................................................................... xi
List of Tables .......................................................................................................... xiv
List of Diagrams ................................................................................................... xviii
List of Maps ........................................................................................................... xix
List of Figures .......................................................................................................... xx
Abbreviations......................................................................................................... xxi
Notes on Dates and Transliteration ....................................................................... xxv
CHAPTERS
1. Introduction ......................................................................................................... 1
1.1. Significance of Ottoman-Iran Relations during the Reign of Nadir Shah ..................... 4
1.2. Significance of Information Network and Agencies ................................................... 5
1.3. The Framework of the Study ..................................................................................... 6
1.4. An Overview of Ottoman-Iranian Relations in 1736-1747.......................................... 8
2. Review on Sources, Agents and Literature.......................................................... 21
2.1. Locating the Sources ................................................................................................21
2.2. Classifying the Agents ..............................................................................................28
2.2.1. Official Missions and Their Hosts .......................................................................29
2.2.2. Spies and Captives ............................................................................................35
2.2.3. Travelers ...........................................................................................................36
2.2.4. Merchants ........................................................................................................38
2.2.5. Couriers ............................................................................................................38
2.3. A Review of Literature .............................................................................................39
2.3.1. Chronological Mistakes .....................................................................................41
2.3.2. Mistakes in Names and Location .......................................................................48
2.3.3. The Kurdan Treaty of 1746 ................................................................................55
3. Factions of Ahmed Paşa and Hacı Beşir Ağa in Making Ottoman Foreign Policy of
Iran ........................................................................................................................ 62
3.1. The Faction of Ahmed Paşa ......................................................................................67
3.1.1. Ahmed Paşa ......................................................................................................67
3.1.2. Other Members ................................................................................................86
3.2. The Faction of Hacı Beşir Ağa ...................................................................................94
3.2.1. Hacı Beşir Ağa ...................................................................................................94
3.2.2. Other Members ................................................................................................99
4. Official Source of Information: Official Missions ................................................104
4.1. Journeys of the Official Missions ............................................................................113
4.2. Durations of Official Missions ................................................................................128
4.3. Official Correspondence ........................................................................................136 5. Unofficial Sources of Information: Spies, Captives, Merchants, Couriers, and
Travelers ...............................................................................................................151
5.1. Spies ......................................................................................................................154
5.1.1. Karakulak Ali Bey ............................................................................................154
5.1.2. Two Ottoman Spies in Tabriz ...........................................................................156
5.1.3. A Spy from Yerevan.........................................................................................157
5.1.4. Another Ottoman Spy in Tabriz .......................................................................160
5.1.5. Molla Veli .......................................................................................................161
5.1.6. Two Documents about Payment to Ottoman Spies .........................................162
5.1.7. Iranian Spies in the Ottoman Empire ...............................................................163
5.2. Captives.................................................................................................................164
5.2.1. Ottoman Captives in Iran ................................................................................164
5.2.1.1. Feyzullah Bey ..........................................................................................165 5.2.1.2. Ahmed Ağa .............................................................................................166 5.2.1.3. Camuş Hasan Ağa ....................................................................................167 5.2.2. Uzbek Fugitives from Nadir’s Army .................................................................168
5.3. Travelers ...............................................................................................................170
5.3.1. Jean Otter .......................................................................................................171
5.3.2. Tanburi Küçük Arutin Efendi ............................................................................175
5.3.3. Khwaja Abd-ul Karim Kashmiri ........................................................................177
5.4. Couriers .................................................................................................................179
5.5. Nadir Shah’s Indian Campaign as a Case Study .......................................................184
5.5.1. The First News on the Campaign .....................................................................187
5.5.2. A Detailed Report on the Campaign ................................................................191
5.5.3. Müteferrika’s Second Work on Iran: Zeyl-i Tarih-i Seyyah ................................194
6. Conclusion ........................................................................................................200
Bibliography ..........................................................................................................205
Appendices
A. Routes and Distances ........................................................................................242
A.1. Sources and Assumptions ......................................................................................242
A.2. The Return Journeys of Münif Mustafa Efendi and Nazif Mustafa Efendi ...............245
A.3. The Distances in the Sources .................................................................................247
A.4. The Routes ............................................................................................................254
B. A New Ottoman Ambassadorial Report on Iran: Münif Mustafa Efendi’s İran
Sefaretnamesi .......................................................................................................264
B.1. Münif Mustafa Efendi: An Ottoman Poet and Ambassador ....................................264
B.2. The Lists of Münif’s Works in Manuscript Libraries ................................................268
B.3. Münif Mustafa Efendi’s İran Sefaretnamesi ...........................................................273
B.4. Nazif Mustafa Efendi’s Report on Münif’s Mission in 1742 .....................................282
C. Selected Turkish Poems on Nadir Shah..............................................................286
C.1. Poems on Mahmud I .............................................................................................288
C.2. Poems on the Ottoman Elites ................................................................................289
C.3. Poems on the Fifth Madhhab, Baghdad and the Diplomatic Interactions ...............292
C.4. Poems on Nadir Shah and His Death ......................................................................296
D. Selected Paintings of Certain Actors .................................................................30
The evaluation of the provision inside of temporary helping law no: 6284 on the protection of family and the prevention of violence against women
Anahtarlı Boole geri besleme fonksiyonu olan kayan anahtar üreteçleri için gelişmiş saldırı yöntemi
Ultra-lightweight stream ciphers are highly optimized variation of stream ciphers for miniscule hardwares with limited power and calculation resources such as RFID product tags used in retail marketing and Wireless Sensor Network components that are indispensable part of modern SCADA systems.
In FSE 2015, Armknecht and Mikhalev presented a unique ultra-lightweight stream cipher design approach defined as Keystream Generators with Keyed Update Function (KSG with KUF) along with a concrete cipher Sprout [1]. This design approach used by recent stream ciphers such as Fruit [2] and Plantlet [3], promises to make use of secret key during state updates in order to maintain security level as well as shorten internal state size to reduce hardware area in conjunction with power consumption. In 2018, definition of KSG with KUF is narrowed by Kara and Esgin [4], with new definition Keystream Generators with Boolean Keyed Feedback Function (KSG with Boolean KFF), on which a generic scope trade-off attack is also mounted. This attack relies on guess capacity definition given in the same article, to eliminate wrong states during exhaustive search operation.
In this thesis, we examined this generic Kara and Esgin attack in-depth and accelerated by a factor up to about 60 times. In order to accomplish this speedup, a new guess capacity definition and sieving method are introduced in addition to the improved algorithm which contributes efficiency of the attack in both performance and stability. Improvements are validated with intense performance tests comprising nearly twenty sample feedback functions, including Sprout, with diverse existence of guess capacities.Yazarlık Beyanı ii
Abstract iv
Öz v
Teşekkür vii
Şekil Listesi xi
Tablo Listesi xii
Kısaltmalar xiii
Sözlükçe xiv
1 Giriş 1 1.1 Motivasyon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 İlişkin Çalışmalar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Katkılarımız . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.4 Tezin Bölümleri (Ana Hatları) . . . . . . . . . . . . . . . . . . . . . . . . . 7
2 Temel Kavramlar 10 2.1 Kriptografinin Kısa Geçmişi . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.1.1 İletişim Yöntemlerinin Gelişimi . . . . . . . . . . . . . . . . . . . . 10 2.1.2 Kriptografi Nedir? . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.2 Kriptografik Algoritmaların Sınıflandırılması . . . . . . . . . . . . . . . . . 11 2.2.1 Antik Dönem Teknikleri . . . . . . . . . . . . . . . . . . . . . . . . 11 2.2.2 Elektronik Dünyaya Geçiş . . . . . . . . . . . . . . . . . . . . . . . 12
3 Dizi Şifreleme 14 3.1 Giriş & Kullanım Alanları . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.1.1 GSM (2G), UMTS(3G) ve LTE(4G) Güvenliği . . . . . . . . . . . 15 3.1.2 Kablosuz Ağ Güvenliği (WEP and WPA) . . . . . . . . . . . . . . 15 3.1.3 RFID Uygulamaları . . . . . . . . . . . . . . . . . . . . . . . . . . 16 3.1.4 Kablosuz Sensör Ağları (WSN) . . . . . . . . . . . . . . . . . . . . 16 3.1.5 ZigBee Protokolü . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3.2 Dizi Şifrelemenin Temel Kavramları . . . . . . . . . . . . . . . . . . . . . . 19 3.3 Tek Seferlik Şifre (One Time Pad) . . . . . . . . . . . . . . . . . . . . . . 19
3.4 Donanımsal Nitelikler ve Performans Ölçütleri . . . . . . . . . . . . . . . . 20 3.4.1 Donanım Boyutu (Kapı Eşdeğeri) . . . . . . . . . . . . . . . . . . . 20 3.4.2 Çıktı Hızı . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 3.4.3 Yayılım Gecikmesi . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 3.4.4 Operasyonel Saat Frekansı . . . . . . . . . . . . . . . . . . . . . . . 21 3.5 Lineer Geri Beslemeli Ötelemeli Saklayıcı (LFSR) . . . . . . . . . . . . . . 22 3.6 Lineer Olmayan Geri Beslemeli Ötelemeli Saklayıcı (NLFSR) . . . . . . . 23 3.7 A5/1 Algoritmasına Hızlı Bakış . . . . . . . . . . . . . . . . . . . . . . . . 23 3.7.1 Kayan Anahtar Üretecinin Tasarımı . . . . . . . . . . . . . . . . . 24 3.7.2 İlklendirme Fazı . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 3.8 Trivium Algoritmasına Hızlı Bakış . . . . . . . . . . . . . . . . . . . . . . 26 3.9 Espresso Algoritmasına Hızlı Bakış . . . . . . . . . . . . . . . . . . . . . . 26
4 Anahtarlı Güncelleme Fonksiyonu olan Kayan Anahtar Üreteçleri 28 4.1 Tanımlar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 4.2 Sprout Algoritması . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 4.2.1 Çıkış Noktası . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 4.2.2 Tasarım . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 4.2.3 İlklendirme Fazı . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 4.2.4 Gerçekleştirilen Saldırılar . . . . . . . . . . . . . . . . . . . . . . . 35
5 ABGBF-KAÜ Ailesine Yönelik Genel Kapsamlı Saldırı 36 5.1 Saldırının Açıklaması . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 5.1.1 Tahmin Kapasitesi (Prg) . . . . . . . . . . . . . . . . . . . . . . . 37 5.1.2 Çıktı Kapasitesi (θ) . . . . . . . . . . . . . . . . . . . . . . . . . . 37 5.1.3 Karavana İhtimali () . . . . . . . . . . . . . . . . . . . . . . . . . 38 5.1.4 Sonlandırma Değeri (αter) . . . . . . . . . . . . . . . . . . . . . . 38 5.1.5 Eşik Değeri (αthr) . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 5.1.6 İç Durum Zaafiyet Göstergesi (d) . . . . . . . . . . . . . . . . . . . 38 5.2 İç Durum Geri Kazanım Algoritması . . . . . . . . . . . . . . . . . . . . . 38 5.2.1 İDGK Sözde Kodu . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 5.3 Determine Algoritması . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 5.4 Check & Guess Algoritması . . . . . . . . . . . . . . . . . . . . . . . . . . 41 5.5 Anahtar Geri Kazanım Fazı . . . . . . . . . . . . . . . . . . . . . . . . . . 42
6 Geliştirilmiş Saldırı Algoritması 44 6.1 Mevcut Algoritmadaki Darboğaz Noktaları . . . . . . . . . . . . . . . . . . 44 6.2 Hata Düzeltmesi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 6.2.1 Sözde Kodlar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 6.3 İyileştirme No:1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 6.3.1 İyileştirilmiş Algoritma . . . . . . . . . . . . . . . . . . . . . . . . . 46 6.3.2 Sözde Kodlar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 6.3.3 İyileştirmenin Performansa Etkisi . . . . . . . . . . . . . . . . . . . 47 6.4 İyileştirme No:3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 6.4.1 Sözde Kodlar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 6.5 Geliştirilmiş Algoritmanın Nihai Tasarımı . . . . . . . . . . . . . . . . . . 51 6.5.1 Sözde Kodlar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
7 Geliştirilmiş Algoritmanın Performans Analizi 53 7.1 Ön Bilgiler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 7.1.1 Benzetimin Bilgisayar Ortamında Gerçeklenmesi . . . . . . . . . . 53 7.1.2 Test Sistemi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 7.1.3 Test Senaryosu ve Test Fonksiyonları . . . . . . . . . . . . . . . . . 54 7.1.4 Performans Metrikleri . . . . . . . . . . . . . . . . . . . . . . . . . 56 7.2 Test Sonuçları . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 7.2.1 Grafiklerin Yorumlanması . . . . . . . . . . . . . . . . . . . . . . . 60
8 Sonuç 64 8.1 Yeni Algoritmanın Tasarımı . . . . . . . . . . . . . . . . . . . . . . . . . . 64 8.2 Bulgular . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 8.3 Bilinen Kısıtlar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 8.4 İleriye Yönelik Araştırma Konuları . . . . . . . . . . . . . . . . . . . . . . 65 8.5 Son Yorumlar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
A KE Algoritması Bellek Kullanımı Raporu 67
B Benzetim Uygulaması Kaynak Kodları 69 B.1 Geliştirme Süreci . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 B.2 Proje Yapısı . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 B.3 Proje 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 B.4 Proje 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Kaynaklar 7
Analogtan dijitale:aile fotoğrafının dönüşümü
Photography is part and parcel of our everyday lives. Its representational and
communicative capability has made it an indispensable medium for both institutions
and individuals alike. With the advent of digital photography, one can observe its impact in every corner of social and cultural sphere. The purpose of this study is to
attempt to understand the transition from analogue to digital photography with
regard to its impact on socio-cultural practices and contexts. To this end, at the center
of the discussion in this study is family photography, for its transformation, I believe,
is indicative of the transformation of social and cultural practices around
photography in the transition. Family photographs, are objects that have material
and social aspects, have long functioned as the transmitter of familial networks,
relations, rituals and memory. The coming of digital technologies and ubiquity of
photography as well as the changes in its form and function, has also transformed
social and cultural practices around family photography. As the methodology for this
study, a qualitative research approach was chosen. The data gathered from sixteen
one-to-one semi structured interviews serve as the basis for this study. As a result,
this study indicates the following findings. Firstly, social practices around family
photography prevail, but in different complex and multi-layered forms. However, the
family album does not seem to be a sustainable ritual because of the over-abundance
of photography. Secondly, the intension behind taking photos has changed from
storing for memory to forming identity as family photography has replaced with what
may be called friendship photography. And finally, all these transformations create a
blurred boundary between privacy and publicity.Abstract ....................................................................................................................... iv
Öz ................................................................................................................................. v
Dedication………………………………………………………………………………………..……………..……..vi
Acknowledgements .................................................................................................... vii
Table of Contents ………………………………………………………………….……………………………. viii List of Figures .............................................................................................................. ix
CHAPTERS 1. Introduction ............................................................................................................. 1 1.1. Setting the Problem .......................................................................................... 4 1.2. Methodology ..................................................................................................... 7 1.3. Literature Review ............................................................................................ 10 1.4. This Study ........................................................................................................ 18 2. Analogue Photography: Materiality, Memory and Narrative ................................ 20 2.1 Introduction ..................................................................................................... 20 2.2 Family Photography as a Form of Representation ........................................... 20 2.3 Family Photography as a Material Object ........................................................ 34 2.4 Family Photography as a Social Practice .......................................................... 38 2.4.1 Family Album ............................................................................................. 39 2.4.2 Narrative/Imagetext.................................................................................. 41 2.5 Photography as a Mnemonic tool .................................................................... 43 2.5.1 Memory and Narrativity............................................................................ 47 2.5.2 Cultural Memory ....................................................................................... 48 3. Digital Photography: Concerns and New Modes of Communication .................... 50 3.1 Introduction ..................................................................................................... 50 3.2 The New Face of Family Photography.............................................................. 52 3.3 From Family Albums to Computer Folders ...................................................... 59 3.4 Publicity and Privacy: Novel Performances and Concerns .............................. 64 3.5 Memory in The Digital Age ............................................................................... 71 4. Conclusion .............................................................................................................. 75 References .................................................................................................................. 8