Browsing Faculty of Engineering by Title
Now showing items 97-116 of 3117
-
Angular analysis of the decay B + → K + μ + μ − in proton-proton collisions at √s =8 TeV
(American Physical Society, 2018-12-01)The angular distribution of the flavor-changing neutral current decay B+→K+μ+μ- is studied in proton-proton collisions at a center-of-mass energy of 8 TeV. The analysis is based on data collected with the CMS detector at ... -
Angular analysis of the decay B + → K ∗ (892) +µ +µ − in proton-proton collisions at √s = 8 TeV
(Springer, 2021-01-14)Angular distributions of the decay B+→ K∗(892)+μ+μ− are studied using events collected with the CMS detector in s = 8 TeV proton-proton collisions at the LHC, corresponding to an integrated luminosity of 20.0 fb−1. The ... -
Angular analysis of the decay B0→K*0μ+μ- from pp collisions at s=8 TeV
(Elsevier, 2016-02-10)The angular distributions and the differential branching fraction of the decay B0→K⁎(892)0μ+μ− are studied using data corresponding to an integrated luminosity of 20.5 fb−1 collected with the CMS detector at the LHC in pp ... -
Angular coefficients of Z bosons produced in pp collisions at s=8 TeV and decaying to μ+μ- as a function of transverse momentum and rapidity
(Elsevier, 2015-11-12)Measurements of the five most significant angular coefficients, A0 through A4, for Z bosons produced in pp collisions at View the MathML source and decaying to μ+μ− are presented as a function of the transverse momentum ... -
An antenna for implanted device systems
(IEEE, 2017)In this study, we designed and simulated an embedded spiral-shaped microstrip patch antenna for medical biotelemetry applications. Important design parameters were studied to understand their effect on the antenna performance. ... -
Anti-spoofing for text-independent speaker verification: An initial database, comparison of countermeasures, and human performance
(IEEE, 2016-04)In this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis ... -
Aperture averaging in multiple-input single-output free-space optical systems
(SPIE, 2015-06)Multiple-input single-output systems are employed in free-space optical links to mitigate the degrading effects of atmospheric turbulence. We formulate the power scintillation as a function of transmitter and receiver ... -
Aperture averaging in multiple-input single-output free-space optical systems using partially coherent radial array beams
(The Optical Society, 2016-06)Multiple-input single-output (MISO) techniques are employed in free-space optical (FSO) links to mitigate the degrading effects of atmospheric turbulence. In this paper, for the MISO FSO system, a partially coherent radial ... -
Application of a disturbance observer based controller to improve vehicle ride
(Canadian Acoustical Association, 2019)In this paper the application of a disturbance observer based control algorithm is proposed to improve the vehicle ride performance of a vehicle that has magnetorheological damper (MR Damper) suspension. The vehicle is ... -
Application of a novel friction stir spot welding process on dissimilar aluminum joints
(Elsevier, 2018-10)Intermediate layer friction stir spot welding (IL-FSSW) is introduced in this study as a novel spot welding technique to eliminate the keyhole associated with the conventional friction stir spot welding (FSSW). This process ... -
Application of chemical mechanical polishing process on titanium based implants
(Elsevier, 2016-11-01)Modification of the implantable biomaterial surfaces is known to improve the biocompatibility of metallic implants. Particularly, treatments such as etching, sand-blasting or laser treatment are commonly studied to understand ... -
Application of friction stir spot welding on additive manufactured carbon fiber composite
(Trans Tech Publications Ltd, 2022)Friction stir spot welding as a solid state processing technique is used to join dissimilar and similar metals, composites and polymers. This study illustrates the implementation of friction stir spot welding (FSSW) on ... -
Application of giesekus model for capillary extrusion of rubber compound
(The Society of Chemical Engineers, 2019-02)Extrudate swell is an important phenomenon occurring when high viscoelastic materials, such as rubber and rubber compounds, are extruded. In this work, the effects of relaxation time and relaxation mode on swell predictions ... -
Application of novel constrained groove pressing routes on austenitic stainless steel
(Springer, 2021-11)In this study, a novel set of constrained groove processing routes was put forward especially to underline the variation of strain paths. Namely, 304 stainless steel sheets were processed by five distinctly specified ... -
Application of sequence-dependent traveling salesman problem in printed circuit board assembly
(IEEE, 2013-06)Optimization issues regarding the automated assembly of printed circuit boards attracted the interest of researchers for several decades. This is because even small gains in assembly time result in very important benefits ... -
An application of unrelated parallel machine scheduling with sequence-dependent setups at Vestel Electronics
(Elsevier, 2019-11)In this paper, we analyze a variant of the unrelated parallel machine scheduling problem with the objective of minimizing the total tardiness and earliness in the presence of sequence-dependent setups, unequal release ... -
Application-based scheduling for indoor femtocell networks
(2013-01)This thesis is concerned with designing a QoS-enabled, application-based scheduler for indoor femtocell networks. For this purpose, a novel scheduler is proposed which takes into account the quality of service (QoS) ... -
Applying migrating birds optimization to credit card fraud detection
(Springer Science+Business Media, 2013)We discuss how the Migrating Birds Optimization algorithm (MBO) is applied to statistical credit card fraud detection problem. MBO is a recently proposed metaheuristic algorithm which is inspired by the V flight formation ... -
An approach for detecting inconsistencies between behavioral models of the software architecture and the code
(IEEE, 2012)In practice, inconsistencies between architectural documentation and the code might arise due to improper implementation of the architecture or the separate, uncontrolled evolution of the code. Several approaches have been ... -
An approach for predicting employee churn by using data mining
(IEEE, 2017)Employee churn prediction which is closely related to customer churn prediction is a major issue of the companies. Despite the importance of the issue, there is few attention in the literature about. In this study, we ...
Share this page