Search
Now showing items 171-180 of 1892
Observation of a new Xi(b) baryon
(American Physical Society, 2012-06-22)
The observation of a new b baryon via its strong decay into Xi(-)(b)pi(+) (plus charge conjugates) is reported. The measurement uses a data sample of pp collisions at root s = 7 TeV collected by the CMS experiment at the ...
Öbekleme eniyilemesi ve sağlamlığı için yinelemeli bir yaklaşım
(IEEE, 2012)
Clustering is a common technique, in all areas where information is obtained from the collected data. In this work, three well-known clustering algorithms namely, K-means, Spectral and DBSCAN are investigated in terms of ...
Hareketli kameralarda örtücü tespiti
(IEEE, 2012)
In this work, we propose a novel method for detection of moving or static objects which are not part of the background in an image sequence captured by a moving camera. The method is composed of two stages, namely, ...
Determining thermal comfort in built environment using computational fluid dynamics simulations
(2017-06)
In this thesis, three-dimensional time-dependent Thermal Comfort (TC) conditions in an occupied room is investigated and determined. The room is considered with furniture of varying materials (i.e. steel, wood, etc.) and ...
Optimization and analysis of WLAN RF energy harvesting system architecture for low power wireless applications
(2017-01)
The presented work proposes a radio frequency (RF) energy harvesting circuit design, which scavenges energy from WLAN dual frequency band. In comparison to other available sources for energy scavenging, e.g. solar, wind ...
Vulnerability of speaker verification system under replay spoofing attack and investigation of synthetic speech detection
(2016-05)
Security issues have become major subject along with developments in the speaker verification system. Previous studies have shown that performance is still not fully proven for vulnerability. Simple and easy methods may ...
Validating android permission requests by analyzing APP descriptions
(2016-07)
Android applications can access sensitive user data if they are granted certain permissions. Android security model gives users the responsibility to approve permission requests of applications. For this, a user needs to ...
The senior discount: biases against older career changers
(Wiley, 2013-02)
This study examined age discrimination in between- vs. within-career job transitions. We expected that older workers transitioning into a new field would experience greater age discrimination than those who change jobs ...
Adolescent disclosure and secrecy behaviors and psychological well-being in parent and best friend relationship contexts: variable- and person-centered examinations
(2017-01)
The present study examined adolescents' disclosure and secrecy behaviors in their close relationships and their psychological well-being (life satisfaction, problem-solving confidence, and (lower) trait anxiety). In a ...
An exact approach for a dynamic workforce scheduling problem
(2018-01)
Taking into account the global and national rules and regulations, assigning a given number of employees to planned shifts while paying attention to required working hours, rest times and off day/days is one of the most ...
Share this page