Search
Now showing items 191-200 of 2199
Hareketli kameralarda örtücü tespiti
(IEEE, 2012)
In this work, we propose a novel method for detection of moving or static objects which are not part of the background in an image sequence captured by a moving camera. The method is composed of two stages, namely, ...
Determining thermal comfort in built environment using computational fluid dynamics simulations
(2017-06)
In this thesis, three-dimensional time-dependent Thermal Comfort (TC) conditions in an occupied room is investigated and determined. The room is considered with furniture of varying materials (i.e. steel, wood, etc.) and ...
Optimization and analysis of WLAN RF energy harvesting system architecture for low power wireless applications
(2017-01)
The presented work proposes a radio frequency (RF) energy harvesting circuit design, which scavenges energy from WLAN dual frequency band. In comparison to other available sources for energy scavenging, e.g. solar, wind ...
Vulnerability of speaker verification system under replay spoofing attack and investigation of synthetic speech detection
(2016-05)
Security issues have become major subject along with developments in the speaker verification system. Previous studies have shown that performance is still not fully proven for vulnerability. Simple and easy methods may ...
Validating android permission requests by analyzing APP descriptions
(2016-07)
Android applications can access sensitive user data if they are granted certain permissions. Android security model gives users the responsibility to approve permission requests of applications. For this, a user needs to ...
The senior discount: biases against older career changers
(Wiley, 2013-02)
This study examined age discrimination in between- vs. within-career job transitions. We expected that older workers transitioning into a new field would experience greater age discrimination than those who change jobs ...
The challenge of negotiation in the game of diplomacy
(Springer Nature, 2019)
The game of Diplomacy has been used as a test case for complex automated negotiations for a long time, but to date very few successful negotiation algorithms have been implemented for this game. We have therefore decided ...
Adolescent disclosure and secrecy behaviors and psychological well-being in parent and best friend relationship contexts: variable- and person-centered examinations
(2017-01)
The present study examined adolescents' disclosure and secrecy behaviors in their close relationships and their psychological well-being (life satisfaction, problem-solving confidence, and (lower) trait anxiety). In a ...
An exact approach for a dynamic workforce scheduling problem
(2018-01)
Taking into account the global and national rules and regulations, assigning a given number of employees to planned shifts while paying attention to required working hours, rest times and off day/days is one of the most ...
"Old oxen cannot plow": Stereotype themes of older adults in Turkish folklore
(Oxford Publishing, 2015)
Purpose of the Study: Although much research has established the nature of attitudes and stereotypes toward older adults, there are conflicting explanations for the root cause of ageism, including the sociocultural view ...
Share this page