Home   /   YTE   /  All Research Series Publications

All Research Series Publications


Comparison of REST API and gRPC Architectural Styles


gRPC and REST API are two different architectural styles commonly used in modern application development. While gRPC, developed by Google, is focused on performance and efficiency, REST API is a more generic architecture built on usability and simplicity. gRPC converts data into binary format using a serialization format called Protobuf, enabling high-speed communication with low memory usage. REST API, on the other hand, usually uses the JSON format to transfer data.
The purpose of this paper is to guide the reader in choosing the right architectural style by considering factors such as application needs, performance, data integrity and platform independence.


Spring Framework



Spring Framework is an open source development platform that provides comprehensive infrastructure support for developing Java applications. It has recently increased its popularity among current technologies and has become one of the most preferred application frameworks.
Spring Framework is recognized as one of the most important tools used when developing applications in Java language. This framework aims to eliminate the difficulties often encountered during the development of Java applications. It facilitates the process and stages of application writing by eliminating the effort of writing the entire program code from scratch.
Within the scope of this study, topics such as Spring Framework concepts, features, areas where it can be used, what can be done, and preferences are discussed in general.


Use of Authentication Engines


There are many technologies for user authentication and authorization. These include Apereo CAS, Keycloak, Gluu, Okta, Shibboleth, WSO2, AWS Cognito. In this study, Apereo CAS and Keycloak technologies, which provide secure single sign-on (SSO) services for web-based applications due to their open source, extensibility and scope, are examined. Alternatives for user login and authorization technologies, which are an important part of software projects, have been researched and the integration of these alternative technologies with the Spring Framework has been tested. This study is handled in a framework that can be used by all public institutions and private sectors that want to add a security layer to their software projects.


Micro Frontend Architecture



We live in a period when the world is increasingly digitalized and everything is transferred to the virtual environment. The changing desires of end users over time have led to different needs, different needs have led to new technologies, and new technologies have led to the realization of software projects that meet these needs. New technologies and architectures have developed and are constantly evolving in order to make digital transformations easier in a productive cycle. Microservices and micro frontend architectures, which have become very popular today, have emerged as a result of this cycle. In this study, micro frontend architecture, which enables large and complex projects to be created in a more sustainable way with lower costs, is analyzed.


CI/CD Process Management


Recently, the software development sector has been undergoing a slow but real transformation. While software is increasingly becoming a part of everything, software developers are trying to cope with this increasing demand through more automation. Due to the high demand for the rapid deployment of new features and applications, the principles of Continuous Integration (CI) and Continuous Delivery (CD) have become increasingly and more effectively used. The aim of this study is to overcome delivery problems by improving the delivery timeline, test load steps and benchmarking tasks with the CI/CD pipeline approach.


Functional Programming in Java


Functional programming tools in Java provide a lot of convenience in writing and reading practical functions. Complex loops can be simplified thanks to the Stream API; some controls and functions can be easily read, debugged, tested and managed using functional interfaces that can be called from many places. The working principle of each of the benefits counted in this study is explained separately and code examples and outputs are indicated for understanding.


(SGE) Cyber Security Institute

The Cyber Security Institute, which was established to carry out studies to increase the national cyber security capacity, carries out research and development activities in the field of cyber security; carries out solutions-oriented projects for military institutions, public institutions and organizations and the private sector.

The main fields of activity of our institute, which has made a significant contribution to the creation of cyber security knowledge and tactical infrastructure in our country with many successful projects to date, are secure software development, penetration tests and vulnerability analysis.

6-yze card logo

(IZE) Artificial Intelligence Institute

Artificial Intelligence Institute is the first institute established within the scope of TUBITAK centers and institutes, which cuts the sectors and research fields horizontally and focuses directly on the emerging technology field. For this reason, it constitutes an innovative model in terms of both the open innovation and co-development approach of the institute and its focus on emerging technology.

Artificial Intelligence Institute aims to develop core technologies in the field of artificial intelligence and bring these innovations from the forefront of science to the use of the industry as soon as possible. Focusing on the transformative potential of artificial intelligence, it will continue to play its part in pioneering efforts to create and sustain artificial intelligence-based innovation, growth and productivity in Turkey. Working with industry and public institutions in Turkey, together with other organizations within the artificial intelligence ecosystem, spreading the use of artificial intelligence and increasing the workforce specialized in this field are among its primary goals.


Discover institutes laboratories technologies products projects of BİLGEM.

Competence Centers

MILSEC 4 - Secure IP Terminal


While the MİLSEC-4 terminal offers an up-to-date solution for next-generation secure communication (voice, data and video) in IP networks, it provides an uninterrupted communication service by maintaining the compatibility of secure voice communication in PSTN networks with PSTN secure phones in use.

Configuration, surveillance and software update processes of MILSEC-4 terminals are carried out securely remotely using the Security Management Center (GYM). MİLSEC-4 terminal is capable of IP Network Key Loading (IPAAY) through secure communication with GYM without the need for an additional device.

MİLSEC-4 terminals are interoperable with MİLSEC-1A and MİLSEC-2 phones and offer the opportunity to replace MİLSEC-1A and MİLSEC-2 phones without interruption in the gradual transformation of PSTN networks to next generation IP networks.


  • End-to-end secure voice communication in PSTN networks
  • End-to-end secure voice, image and data transmission in IP networks
  • NATO SCIP compliance on IP networks
  • Compatibility with commercial SIP products
  • Interoperability with MILSEC1A and MILSEC2 secure phones
  • National and AES crypto algorithms
  • Remote software update
  • Easy operation with touch screen

It is subject to the sales license to be given by the Ministry of National Defense.