Search
Now showing items 21-30 of 408
Integrated design and application of a campus-wide distributed-photovoltaic system
(2018-05)
After releasing the regulations on unlicensed electricity generation in Turkey, the main structure of the regulatory mechanism has just finished in 2014 and renewable energy generation started to grow dramatically. Ozyegin ...
Gallium nitride chemical mechanical planarization development through tool set-up, process and post CMP cleaning optimization
(2018-07)
In this thesis, a new Chemical Mechanical Planarization (CMP) process and a complementary tool set-up are introduced to enhance Gallium Nitride (GaN) material removal rates while controlling the post planarization surface ...
A syncronized routing problem for restoring inter-dependent infrastructure networks
(2018-05)
Disasters may cause significant damages in lifeline infrastructure systems (such as gas, power, water) and lead to long-lasting failures. It is important to repair the damaged components and restore the affected infrastructures ...
Kredi kartı sözleşmeleri
(2016)
N/A
Determining thermal comfort in built environment using computational fluid dynamics simulations
(2017-06)
In this thesis, three-dimensional time-dependent Thermal Comfort (TC) conditions in an occupied room is investigated and determined. The room is considered with furniture of varying materials (i.e. steel, wood, etc.) and ...
Optimization and analysis of WLAN RF energy harvesting system architecture for low power wireless applications
(2017-01)
The presented work proposes a radio frequency (RF) energy harvesting circuit design, which scavenges energy from WLAN dual frequency band. In comparison to other available sources for energy scavenging, e.g. solar, wind ...
Vulnerability of speaker verification system under replay spoofing attack and investigation of synthetic speech detection
(2016-05)
Security issues have become major subject along with developments in the speaker verification system. Previous studies have shown that performance is still not fully proven for vulnerability. Simple and easy methods may ...
Validating android permission requests by analyzing APP descriptions
(2016-07)
Android applications can access sensitive user data if they are granted certain permissions. Android security model gives users the responsibility to approve permission requests of applications. For this, a user needs to ...
Adolescent disclosure and secrecy behaviors and psychological well-being in parent and best friend relationship contexts: variable- and person-centered examinations
(2017-01)
The present study examined adolescents' disclosure and secrecy behaviors in their close relationships and their psychological well-being (life satisfaction, problem-solving confidence, and (lower) trait anxiety). In a ...
An exact approach for a dynamic workforce scheduling problem
(2018-01)
Taking into account the global and national rules and regulations, assigning a given number of employees to planned shifts while paying attention to required working hours, rest times and off day/days is one of the most ...
Share this page