Home   /   YTE   /  All Research Series Publications

All Research Series Publications


Foundations of Microservices Architecture

Microservices architecture represents a significant transformation in the approach to developing and managing large and complex software applications. By breaking down software applications into small and independent services, it operates each as a separate microservice. Microservices are typically distributed using lightweight container technologies, enabling rapid scalability. This study discusses the fundamental concepts, advantages, costs, and implementation of microservices architecture.

Integration Test Writing Techniques with Testcontainers

Integration tests are essential types of tests in projects. They ensure that independently developed parts of the system are tested together in an integrated manner to ensure the correctness of their communication protocols. However, integration tests can easily be influenced by external factors, leading to incorrect negative results. This situation can decrease confidence in integration tests over time and may result in the oversight of real errors. The purpose of this study is to demonstrate the general working logic, scope, and how to use the Testcontainers library in integration tests written in Java, facilitating the integration testing process.

Software Testing and Use of Test-Driven Development Approach

Software development life cycle; It consists of many stages including requirements analysis, design, development, testing and maintenance. Each stage is tested. Therefore, various levels of testing and There are techniques.
In the projects worked on, customers and end users; It is desired to offer products that are high quality, error-free and where customer satisfaction can be kept at high levels. In this study, software tests, testing methods and approaches are examined and it is explained how to apply Test Driven Development as a software testing approach in the software development process.

Cloud Usage


The increasing importance of software technologies and the use of applications developed with these technologies have also increased the requirements for information technology infrastructure for these applications. These requirements vary in terms of cost, capacity, security, and other factors depending on the type and usage of the developed application. Software organizations, while managing their own IT infrastructure, are faced with the problem of not being able to meet these needs and, as an alternative solution, encounter cloud computing systems. In this study, the problems faced by organizations that do not use the cloud are categorized and exemplified.


Comparison of REST API and gRPC Architectural Styles


gRPC and REST API are two different architectural styles commonly used in modern application development. While gRPC, developed by Google, is focused on performance and efficiency, REST API is a more generic architecture built on usability and simplicity. gRPC converts data into binary format using a serialization format called Protobuf, enabling high-speed communication with low memory usage. REST API, on the other hand, usually uses the JSON format to transfer data.
The purpose of this paper is to guide the reader in choosing the right architectural style by considering factors such as application needs, performance, data integrity and platform independence.


Spring Framework



Spring Framework is an open source development platform that provides comprehensive infrastructure support for developing Java applications. It has recently increased its popularity among current technologies and has become one of the most preferred application frameworks.
Spring Framework is recognized as one of the most important tools used when developing applications in Java language. This framework aims to eliminate the difficulties often encountered during the development of Java applications. It facilitates the process and stages of application writing by eliminating the effort of writing the entire program code from scratch.
Within the scope of this study, topics such as Spring Framework concepts, features, areas where it can be used, what can be done, and preferences are discussed in general.


Use of Authentication Engines


There are many technologies for user authentication and authorization. These include Apereo CAS, Keycloak, Gluu, Okta, Shibboleth, WSO2, AWS Cognito. In this study, Apereo CAS and Keycloak technologies, which provide secure single sign-on (SSO) services for web-based applications due to their open source, extensibility and scope, are examined. Alternatives for user login and authorization technologies, which are an important part of software projects, have been researched and the integration of these alternative technologies with the Spring Framework has been tested. This study is handled in a framework that can be used by all public institutions and private sectors that want to add a security layer to their software projects.


Micro Frontend Architecture



We live in a period when the world is increasingly digitalized and everything is transferred to the virtual environment. The changing desires of end users over time have led to different needs, different needs have led to new technologies, and new technologies have led to the realization of software projects that meet these needs. New technologies and architectures have developed and are constantly evolving in order to make digital transformations easier in a productive cycle. Microservices and micro frontend architectures, which have become very popular today, have emerged as a result of this cycle. In this study, micro frontend architecture, which enables large and complex projects to be created in a more sustainable way with lower costs, is analyzed.


CI/CD Process Management


Recently, the software development sector has been undergoing a slow but real transformation. While software is increasingly becoming a part of everything, software developers are trying to cope with this increasing demand through more automation. Due to the high demand for the rapid deployment of new features and applications, the principles of Continuous Integration (CI) and Continuous Delivery (CD) have become increasingly and more effectively used. The aim of this study is to overcome delivery problems by improving the delivery timeline, test load steps and benchmarking tasks with the CI/CD pipeline approach.


Functional Programming in Java


Functional programming tools in Java provide a lot of convenience in writing and reading practical functions. Complex loops can be simplified thanks to the Stream API; some controls and functions can be easily read, debugged, tested and managed using functional interfaces that can be called from many places. The working principle of each of the benefits counted in this study is explained separately and code examples and outputs are indicated for understanding.


(SGE) Cyber Security Institute

The Cyber Security Institute, which was established to carry out studies to increase the national cyber security capacity, carries out research and development activities in the field of cyber security; carries out solutions-oriented projects for military institutions, public institutions and organizations and the private sector.

The main fields of activity of our institute, which has made a significant contribution to the creation of cyber security knowledge and tactical infrastructure in our country with many successful projects to date, are secure software development, penetration tests and vulnerability analysis.

6-yze card logo

(IZE) Artificial Intelligence Institute

Artificial Intelligence Institute is the first institute established within the scope of TUBITAK centers and institutes, which cuts the sectors and research fields horizontally and focuses directly on the emerging technology field. For this reason, it constitutes an innovative model in terms of both the open innovation and co-development approach of the institute and its focus on emerging technology.

Artificial Intelligence Institute aims to develop core technologies in the field of artificial intelligence and bring these innovations from the forefront of science to the use of the industry as soon as possible. Focusing on the transformative potential of artificial intelligence, it will continue to play its part in pioneering efforts to create and sustain artificial intelligence-based innovation, growth and productivity in Turkey. Working with industry and public institutions in Turkey, together with other organizations within the artificial intelligence ecosystem, spreading the use of artificial intelligence and increasing the workforce specialized in this field are among its primary goals.



By joining TÜBİTAK BİLGEM as a Researcher, you can contribute to developments in the fields of information technology, information security, and advanced electronics. You'll have the opportunity to make your mark on innovations, closely follow advancements, enhance your skills, and shape your future by advancing in your career.

You can apply to our currently open positions through the TÜBİTAK Job Application System .

Application Conditions

Conditions for Job Application:

  • Foreign language proficiency: Attaining appropriate scores in the exam types specified in the announcement or studying in a program that is 100% in English for undergraduate education.
  • Fulfilling specific requirements stated in the announcement (such as undergraduate department, years of experience, expertise, etc.).
  • Satisfying the formula score:

For Candidates with Less than 3 Years of Experience:

Weighted Graduation Average + (10,000 / University Placement Exam Ranking) + Additional Score* >= 3.20


For Candidates with 3 Years and More of Experience:

Weighted Graduation Average + (10,000 / University Placement Exam Ranking) + 5*[1 / (1 + e^(5 - years of experience) ) ] + Additional Score* >= 3.20

*Candidates who have achieved rankings and awards in national and international competitions will receive an additional score of 0.3.


Competence Centers

Candidate Researcher

Students in the 3rd and 4th years of relevant engineering departments at universities can apply to our Part-Time Candidate Researcher positions through our Job Application System at kariyer.tubitak.gov.tr. By doing so, they can gain work experience at TÜBİTAK BİLGEM during their university years.

This program does not have an end date. Candidate Researcher personnel working part-time during their university period can seamlessly transition to full-time employment as Researcher personnel at TÜBİTAK BİLGEM without interrupting their career journey after graduating from the undergraduate program.

Application Conditions

Conditions for the Candidate Researcher Program:

  • Being a 3rd or 4th-year student in the relevant departments specified in the announcements at universities.
  • Foreign language proficiency: Achieving appropriate scores in the exam types specified in the announcement or studying in a program that is 100% in English for undergraduate education.
  • Satisfying the formula score:

Weighted Graduation Average + (10,000/University Placement Exam Ranking) + Additional Score* >= 3.20

*Candidates who have achieved rankings and awards in national and international competitions will receive an additional score of 0.3.


Discover institutes laboratories technologies products projects of BİLGEM.


TÜBİTAK BİLGEM builds its basic strategy for the future on qualified knowledge and qualified people focused on national targets in the research, technology development and innovation ecosystem.

Starting from the understanding that "the most important resource of a country is generally people, specifically scientists," TÜBİTAK encourages and supports our youth from an early age. In this context, providing young minds with early exposure to technology production is crucial for the success of our National Technology Move. Accordingly, TÜBİTAK BİLGEM offers internship opportunities to undergraduate students from universities every year.

You can follow internship announcements and submit your applications through the Career Gateway at https://kariyerkapisi.cbiko.gov.tr.

Application Conditions
  • Students enrolled in undergraduate (2nd year and above) and associate degree programs in departments offering education in universities and conducting insurance procedures through the higher education institution to which they are affiliated can benefit from the internship opportunity.
  • For undergraduate and associate degree students, a minimum Weighted Grade Point Average (GPA) of 2.50 out of 4 is required. The GPA of candidates with a 100-point system is converted to a 4-point system based on the "Conversion Table of Grades from the 4-Point System to the 100-Point System" published by the Higher Education Council.
  • There is no requirement for a foreign language certificate during the internship application process.
  • Students enrolled in departments such as Forensic Computing Engineering, Computer Sciences, Computer Science and Engineering, Computer Engineering, Computer and Informatics, Computer and Software Engineering, Information Systems Engineering, Electrical and Electronics Engineering, Control Engineering, Control and Computer Engineering, Control and Automation Engineering, Mechanical Engineering, Mechatronics Engineering, Telecommunication Engineering, or Software Engineering in universities can apply for internships.

Internship applications are accepted between December and January, and the internship period covers June, July, and August.



Scholar assignments are made for research and development activities for undergraduate, master's, doctoral students, and post-doctoral researchers. In our center, scholars are appointed for practical purposes in externally funded, TARAL, or European Union projects.

You can contact us via the email address bilgem.yetenekkazanimi@tubitak.gov.tr to apply to be a scholar.
Application Conditions

(1) The conditions for undergraduate scholars in externally funded projects conducted by the institution are specified below:

  •  Being a student continuing undergraduate education at higher education institutions established in Turkey (excluding foreign language preparatory students).
  • Having a weighted cumulative GPA for previous years, excluding preparatory years, based on the university's grading system, which satisfies the formula score and foreign language requirements in the recruitment criteria.
  • Completing at least the first semester of the first year of undergraduate education.
  • Having a GPA of "+3.00" and a University Placement Exam Ranking of "10,000 ≥" for undergraduate general average.
  • For foreign students placed in Turkish universities without taking the ÖSYM exam or for those who completed undergraduate education through exams such as Vertical Transfer Exam, the lowest university placement ranking of the department from the year the candidate started the undergraduate program is considered in the ranking formula.

(2) The conditions for master's degree scholars in externally funded projects conducted by the institution are specified below:

  • Being a student continuing master's degree education at higher education institutions established in Turkey (excluding special students and foreign language preparatory students).
  • Currently pursuing a master's degree in the project's field of responsibility.

(3) The conditions for doctoral students in externally funded projects conducted by the institution are specified below:

  • Being a student continuing doctoral education at higher education institutions established in Turkey (excluding special students and foreign language preparatory students).
  • Currently pursuing a doctorate in the project's field of responsibility or conducting a doctorate in areas determined within the framework of the YÖK-TÜBİTAK Doctoral Program Project Collaboration Protocol. (Students in medical specialization and artistic proficiency are accepted as doctoral students.)

MILSEC 4 - Secure IP Terminal


While the MİLSEC-4 terminal offers an up-to-date solution for next-generation secure communication (voice, data and video) in IP networks, it provides an uninterrupted communication service by maintaining the compatibility of secure voice communication in PSTN networks with PSTN secure phones in use.

Configuration, surveillance and software update processes of MILSEC-4 terminals are carried out securely remotely using the Security Management Center (GYM). MİLSEC-4 terminal is capable of IP Network Key Loading (IPAAY) through secure communication with GYM without the need for an additional device.

MİLSEC-4 terminals are interoperable with MİLSEC-1A and MİLSEC-2 phones and offer the opportunity to replace MİLSEC-1A and MİLSEC-2 phones without interruption in the gradual transformation of PSTN networks to next generation IP networks.


  • End-to-end secure voice communication in PSTN networks
  • End-to-end secure voice, image and data transmission in IP networks
  • NATO SCIP compliance on IP networks
  • Compatibility with commercial SIP products
  • Interoperability with MILSEC1A and MILSEC2 secure phones
  • National and AES crypto algorithms
  • Remote software update
  • Easy operation with touch screen

It is subject to the sales license to be given by the Ministry of National Defense.