Amaç, Kapsam, Dayanak, Tanımlar ve İlkeler
MADDE 1 – (1) Bu Yönetmeliğin amacı, Başkanlık tarafından oluşturulacak elektronik tebligat altyapısının işleyişine ilişkin usul ve esasları düzenlemektir.
MADDE 2 – (1) Bu Yönetmelik, Mali Suçları Araştırma Kurulu Başkanlığı tarafından 11/10/2006 tarihli ve 5549 sayılı Suç Gelirlerinin Aklanmasının Önlenmesi Hakkında Kanun ve 7/2/2013 tarihli ve 6415 sayılı Terörizmin Finansmanının Önlenmesi Hakkında Kanun kapsamında yapılacak elektronik tebligatı kapsar.
MADDE 3 – (1) Bu Yönetmelik, 5549 sayılı Suç Gelirlerinin Aklanmasının Önlenmesi Hakkında Kanunun 9/A maddesine dayanılarak hazırlanmıştır.
Source and read the full by-laws:

Time-Aware Applications, Computers, and Communication Systems

A new economy built on the massive growth of endpoints on the internet will require precise and verifiable timing in ways that current systems do not support. Applications, computers, and communications systems have been developed with modules and layers that optimize data processing but degrade accurate timing. State-of-the-art systems now use timing only as a performance metric. Correctness of timing as a metric cannot currently be designed into systems independent of hardware and/or software implementations. To enable the massive growth predicted, accurate timing needs cross-disciplinary research to be integrated into these existing systems. This paper reviews the state of the art in six crucial areas central to the use of timing signals in these systems. Each area is shown to have critical issues requiring accuracy or integrity levels of timing that need research contributions from a range of disciplines to solve.

Authors: Marc A. Weiss; John Eidson; Charles Barry; David Broman; Bob Iannucci; Edward A. Lee; Kevin Stanton, Sr; Leon Goldin

Read the full paper:

HP Cyber Risk Report 2015

In this report we provide a broad view of the 2014 threat landscape, ranging from industry-wide data down to a focused look at different technologies, including open source, mobile, and the Internet of Things. The goal of this Report is to provide security information leading to a better understanding of the threat landscape, and to provide resources that can aid in minimizing security risk.

Read the full report:


Borrow eBooks, audiobooks, and more from your local public library – anywhere, anytime. All you need is a library card.


LTE Uplink Performance with Interference from In-Band Device-to-Device (D2D) Communications

Abstract: Direct device-to-device (D2D) communications between mobile terminals in cellular networks allows operators to offload proximity traffic from the Radio Access Network (RAN) and permits out-of-coverage terminals to maintain peer-to-peer communications. In this study, we consider D2D communications in the context of the Long Term Evolution (LTE) RAN and, in particular, the scenario in which D2D communications share LTE uplink resources. Specifically, we evaluate the performance degradation of the cellular LTE uplink in the presence of interference from in-band (underlay) D2D communications. Through physical layer simulations, we quantify the increase in signal-to-noise ratio (SNR) needed to maintain a certain data rate or coverage criterion as a function of the induced noise rise and under various multipath channel conditions. The results can be used to develop physical layer models for network-layer analyses of D2D and cellular network performance.

Authors: Wen-Bin Yang; Michael R. Souryal; David W. Griffith
Source and read the full paper:

2015-2018 Bilgi Toplumu Stratejisi ve Eylem Planı


Network Error Logging: W3C Working Draft 05 March 2015


This document defines a mechanism enabling web sites to declare a reporting policy that can be used by the user agent to report encountered network errors that prevented it from successfully loading the requested resource, the format of the error reports, and their transmission mechanism.

Source and read the Draft: