Search
Now showing items 1-10 of 16
After the Crimean crisis: towards a greater Russian maritime power in the Black Sea
(Routledge Journals Taylor & Francis Ltd, 2014)
The modernization of the Black Sea Fleet currently underway is believed to be one of the most ambitious parts of the Russian State Arms Procurement programme 2011-2020. Up to 18 units are being built and are expected to ...
The Only Thing We Have to Fear: Post 9/11 Institutionalization of In-security [Korkmamız gereken tek şey: 11 Eylül sonrasında güvensizliğin kurumsallaşması]
(Uluslararası İlişkiler Konseyi Derneği, 2012)
During the last decade billions of dollars have been spent to increase security measures in the United States. New institutions including a department for homeland security have been established new security tools have ...
A Novel Image Steganography Technique based on Similarity of Bits Pairs
(IEEE, 2017)
Steganography is one of the most important information hiding mechanism which can be used along with cryptography for providing adequate data security. The common Steganographic mediums used are text image audio and video ...
Escalating rivalries and diverging interests: prospects for stability and security in the Black Sea region
(Routledge Journals Taylor & Francis Ltd, 2010)
The Black Sea region is increasingly becoming a priority on the international agenda. In fact a regional approach is emerging as actors understand that common problems need to be addressed jointly. Nevertheless cooperation ...
Performance Improvement of Threshold Based Audio Steganography Using Parallel Computation
(Science & Information SAI Organization Ltd, 2016)
Audio steganography is used to hide secret information inside audio signal for the secure and reliable transfer of information. Various steganography techniques have been proposed and implemented to ensure adequate security ...
Perception or Discourse? Security Threats in Copenhagen School and Neoclassical Realism
(2011)
This article compares the perceptive approach of neoclassical realist security understanding with the discursive constructivist methodology of the Copenhagen School in analyzing the emergence of security threats. It departs ...
6750 SAYILI TİCARİ İŞLEMLERDE TAŞINIR REHNİ KANUNU'NA İLİŞKİN BAZI TESPİTLER*
(Yeditepe Üniversitesi adına Prof. Sultan Tahmazoğlu Üzeltürk, 2016)
Çalışmamızda, 20.10.2016 tarihinde kabul edilen ve 01.01.2017 tarihinde yürürlüğe girecek olan 6750 sayılı Ticari İşlemlerde Taşınır Rehni
Kanunu’nın amacı ve uygulama alanı, rehnin konusu, rehin sözleşmesinin
tarafları, ...
Algı mı, söylem mi? Kopenhag Okulu ve yeni-klasik gerçekçilikte güvenlik tehditleri
(Uluslararası İlişkiler Konseyi Derneği İktisadi İşletmesi, 2011)
Bu makale, güvenlik tehditlerinin ortaya çıkışı bakımından yeni-klasik gerçekçilikteki algısal yaklaşımla, Kopenhag Okulunun söylemle inşaya dayalı yöntemini karşılaştırmaktadır. Makalenin hareket noktası, güvenlik ...
Terror as potentiality - the affective rhythms of the political
(Routledge Journals, 2018)
The paper addresses the ways in which the cultural, the affective and the political intersect, counter and/or feed upon one another in the context of contemporary terror. Initially, building upon Machiavelli and Hobbes, ...
Contending Agendas For The Black Sea Region: A Turkish Alternative
(Genelkurmay ATASE SAREM Başkanlığı, 2010)
Soğuk Savaşın sona ermesi yüzlerce yıl çok sayıda çatışmaya tanıklık etmiş olan
Karadeniz havzasında çok taraflı iş birliğine dayalı yeni bir siyasi çerçevenin
gelişmesini mümkün kıldı. Avrasya’nın ortasındaki stratejik ...