IJET Vol. 5, Issue 3, September 2019
Bu koleksiyon için kalıcı URI
Güncel Gönderiler
Öğe Generalized Assignment Problem to Minimize Emergency Evacuation Routing in Istanbul Grand Bazaar(İstanbul Gelişim Üniversitesi Yayınları / Istanbul Gelisim University Press, 2019) Saraçoğlu, İlkay; Yücel, GülIn this study, the exit door assignment problem was discussed to determine routes with the shortest distance and least density for users of Istanbul Grand Bazaar in case of an emergency. The evacuation plan was considered as a Generalized Assignment Problem (GAP) which is a 0-1 mixed integer programming model. The components of the evaluation model consist of length, area, and user density as well as streets in the Grand Bazaar and their connection with the exterior. In the study, 12 gates in the Grand Bazaar which directly open onto roads and 15 nodal points among the junction points which are related to these gates were taken into consideration. A route is suggested with the aim of ensuring safe evacuation with minimum density and in the shortest time in any emergency case. The Grand Bazaar has more than one hundred thousand visitors daily depending on the season due to its characteristics of being the historical trade centre. Based on the study results, it is foreseen that there will be density at some gates in cases of emergency. Any evacuation plan in case of emergency must evaluate these routes and necessary physical precautions should be taken. At the same time, this evaluation may constitute the basis for improvement works devoted to the use of other gates.Öğe TEMPEST Attacks and Cybersecurity(İstanbul Gelişim Üniversitesi Yayınları / Istanbul Gelisim University Press, 2019) Aydın, HakanBroad usage of Information and Communication Technologies (ICT) and the Internet have made cybersecurity a vital issue. One of the less known threat for cybersecurity is TEMPEST (Transient Electromagnetic Pulse Emanation Standard) which has become more apparent today. TEMPEST is an information security term that refers to the examination and control of unwanted electromagnetic energy emissions caused by electrical and electronic devices. As a result of TEMPEST attacks, confidential information such as state secrets, personal information such as bank passwords, and more information can be passed on to the attackers. Unlike other known cyber-attack methods, TEMPEST attack methods are kept secret and those who are exposed to TEMPEST attacks are not aware of these attacks. The concept of TEMPEST is a less known cybersecurity component which can cause much greater damage if the necessary cybersecurity measures are not taken. The purpose of this study is to present a review of TEMPEST attacks and countermeasures. The study also highlights the importance of using national cybersecurity products that passed the national TEMPEST cybersecurity testing certification.