Browsing Faculty of Engineering by Title
Now showing items 2991-3010 of 3117
-
Trust in robot–robot scaffolding
(IEEE, 2023-12-01)The study of robot trust in humans and other agents is not explored widely despite its importance for the near future human-robot symbiotic societies. Here, we propose that robots should trust partners that tend to reduce ... -
Trust me! I am a robot: an affective computational account of scaffolding in robot-robot interaction
(IEEE, 2021-08-08)Forming trust in a biological or artificial interaction partner that provides reliable strategies and employing the learned strategies to scaffold another agent are critical problems that are often addressed separately in ... -
Trust-based fusion of classifiers for static code analysis
(IEEE, 2014)Static code analysis tools automatically generate alerts for potential software faults that can lead to failures. However, developers are usually exposed to a large number of alerts. Moreover, some of these alerts are ... -
Trustworthiness assessment in multimodal human-robot interaction based on cognitive load
(IEEE, 2022)In this study, we extend our robot trust model into a multimodal setting in which the Nao robot leverages audio-visual data to perform a sequential multimodal pattern recalling task while interacting with a human partner ... -
Tunable near-field radiative transfer by III–V group compound semiconductors
(IOP Publishing, 2019-03-06)Near-field radiative transfer (NFRT) refers to the energy transfer mechanism which takes place between media separated by distances comparable to or much smaller than the dominant wavelength of emission. NFRT is due to the ... -
Turbulence impact on wind turbines: experimental investigations on a wind turbine model
(IOP Publishing, 2016)Experimental investigations have been conducted by exposing an efficient wind turbine model to different turbulence levels in a wind tunnel. Nearly isotropic turbulence is generated by using two static squared grids: fine ... -
Turkish cashier problem with time windows and its solution by Migrating bird optimization algorithm
(IEEE, 2023)A new application of the traveling salesman problem referred to as the Turkish cashier problem (TCP) was recently introduced in literature. The problem revolved around a cashier that must visit several locations and return ... -
Turkish WordNet KeNet
(Global WordNet Association, 2021)Currently, there are two available wordnets for Turkish: TR-wordnet of BalkaNet and KeNet. As the more comprehensive wordnet for Turkish, KeNet includes 76,757 synsets. KeNet has both intralingual semantic relations and ... -
A tutorial on network coded cooperation
(IEEE, 2016)Network Coding (NC) can significantly help increase the efficient use of network resources. However, directly applying NC to wireless networks is not an effective design solution. Wireless channels are prone to bit errors ... -
Two cantilever based sytem for viscosity and density monitoring
(IEEE, 2015)Viscosity and density measurements in liquids in real-time is challenging. Previous MEMS based approaches use frequency sweeps for the purpose and those methods are slow and not real-time. We show that high precision ... -
Two classes of quadratic assignment problems that are solvable as linear assignment problems
(Elsevier, 2011-08)The Quadratic Assignment Problem is one of the hardest combinatorial optimization problems known. We present two new classes of instances of the Quadratic Assignment Problem that can be reduced to the Linear Assignment ... -
Two-part bio-based self-healing repair agent for cement-based mortar
(International Center for Numerical Methods in Engineering, 2020)Factors affecting durability of concrete structures are generally associated with each other. Due to its brittle nature, concrete can crack under stress and these cracks are one of the main reasons for a decrease in service ... -
Two-particle azimuthal correlations in γp interactions using pPb collisions at √sNN = 8.16 TeV
(Elsevier, 2023-09-10)The first measurements of the Fourier coefficients (VnΔ) of the azimuthal distributions of charged hadrons emitted from photon-proton (γp) interactions are presented. The data are extracted from 68.8 nb−1 of ultra-peripheral ... -
A two-phase heuristic algorithm for the label printing problem
(Springer, 2023-04)In this paper, we study the label printing problem (LPP) which has applications in the printing industry. In LPP, the demand for a set of labels is satisfied by printing the labels using templates with multiple slots. Given ... -
A type-2 fuzzy controller for floating tension-leg platforms in wind turbines
(MDPI, 2022-03)This paper proposes a type-2 fuzzy controller for floating tension-leg platforms in wind turbines. Its main objective is to stabilize and control offshore floating wind turbines exposed to oscillating motions. The proposed ... -
UAV-assisted free space optical communication system with amplify-and-forward relaying
(IEEE, 2021-09)In this paper, the performance of an unmanned aerial vehicle (UAV)-based free-space optical relay system with amplify-and-forward relaying is analyzed. In particular, the statistical probability of end-to-end signal-to-noise ... -
UAV-based FSO communications for high speed train backhauling
(IEEE, 2019)In line with the increasing number of high speed train (HST) commuters and their demand for mobile data, railways operators expore means of providing high speed on-board wireless access. The data from all train cars are ... -
Ultraviolet communications for ground-to-air links
(IEEE, 2019)Ultraviolet (UV) communication enables non-line-of-sight (NLOS) wireless connectivity through strong molecular and aerosol scattering. Due to their NLOS nature, UV links bring robustness to blockage or shadowing and relax ... -
Ultraviolet communications for unmanned aerial vehicle networks
(IEEE, 2022)Due to the strong scattering, ultraviolet (UV) communication links enable non-line-of-sight (NLOS) outdoor connectivity and relax the pointing, acquisition, and tracking requirements encountered in infrared links. This ... -
Uncertainty assessment for detection of spoofing attacks to speaker verification systems using a Bayesian approach
(Elsevier, 2022-02)There has been tremendous progress in automatic speaker verification systems over the last decade. Still, spoofing attacks pose a significant challenge to their deployment. Even though there are various attack techniques ...
Share this page