Search
Now showing items 11-20 of 375
A chance constraint based multi-item production planning model using simulation optimization
(IEEE, 2016)
We consider a single stage multi-item production-inventory system under stochastic demand. We had previously proposed a production planning model integrating ideas from forecast evolution and inventory theory to plan work ...
Near- and far-field thermal radiation in metamaterials and the development of NF-RT-FDTD algorithm
(2016-06)
In this dissertation, analysis of near-field regime of thermal radiative transfer in metamaterials supporting surface phonon polaritons (SPhPs) is given. Solutions of electromagnetic fields at subwavelength distances are ...
Essays on pricing anomalies and the limits of arbitrage in emerging markets
(2016-07)
It is a difficult task to explain market anomalies in standard models of asset pricing, as they are all based on the core idea of the law of one price: two assets with equal expected returns have equal values. Otherwise, ...
Diversity techniques for ultraviolet communications
(2016-08)
Strong molecular and aerosol scattering in ultraviolet (UV) wavelengths enable mechanisms where transmitter can communicate with the receiver in the absence of line of sight (LOS) link. Recent advances in solid state ...
Kredi kartı sözleşmeleri
(2016)
N/A
Meeting revenue management challenges: Knowledge, skills and abilities
(Elsevier, 2016-08)
Hospitality industry increasingly recognizes importance of integrating revenue management into their operations and significance of their staff to do so. Yet revenue managers face major challenges from both internal and ...
Temsilci bakımından irade sakatlıklarının özellikleri
(Hacettepe Üniversitesi, 2016)
Temsil ilişkisi, hukuki işlemler arasında üçlü bir ilişki olması nedeniyle, diğer hukuki işlemlere nazaran daha karmaşık bir yapıya sahiptir. İçinde temsil olunan, temsilci ve temsilcinin hukuki işlem ilişkisine girdiği ...
Vulnerability of speaker verification system under replay spoofing attack and investigation of synthetic speech detection
(2016-05)
Security issues have become major subject along with developments in the speaker verification system. Previous studies have shown that performance is still not fully proven for vulnerability. Simple and easy methods may ...
Validating android permission requests by analyzing APP descriptions
(2016-07)
Android applications can access sensitive user data if they are granted certain permissions. Android security model gives users the responsibility to approve permission requests of applications. For this, a user needs to ...
Self-esteem and life satisfaction of working and non-working adolescents in Pakistan
(2016-08)
The present study is a mixed method study conducted with adolescents. The quantitative part of the study aims to examine the level of life satisfaction and selfesteem of a) working and non-working adolescents b) of adolescents ...
Share this page