Başlık için listeleme
Toplam kayıt 5374, listelenen: 1184-1203
-
CR-submanifolds of a nearly δ-Lorentzian trans Sasakian manifold
(Işık University Press, 2018)This paper considers the study of CR-submanifold of a nearly δ-Lorentzian trans Sasakian manifold, generalizing the results of a nearly δ-Lorentzian trans Sasakian manifold and thus those of Sasakian manifolds. We also ... -
Creating a syntactically felicitous constituency treebank for Turkish
(Institute of Electrical and Electronics Engineers Inc., 2020-10-15)In this study, Bakay et. al [1] and Yildiz et. al.'s [2] work on Turkish constituency treebanks were developed further. Compared to the previous work, the most prominent feature of this study is the fact that every annotation ... -
Creating important statement type comments in autocomment: Automatic comment generation framework
(IEEE, 2018-12-06)This study explains important statement comments generated by Autocomment, which is an automatic comment generation framework described in [1]. To create the comments, the source code is not expected to be runnable, but ... -
Crisis project management and the effect of national culture under crisis: A study from Turkey
(Pressacademia, 2016-05-26)Crisis management is a critical function in organizations, specifically developing and emerging countries dealing with crisis in a minor and major scale frequently. Crisis in projects should be handled immediately and ... -
Critical behavior of thermal phase transitions of iota-carrageenan in CaCl2 solution
(Elsevier B.V., 2006-07-15)In situ photon transmission method was applied to study thermal phase transitions of ?-carrageenan in CaCl2 solution. Coil-to-helix (c-h) and helix-to-dimer (h-d) transitions were detected upon cooling. An extra dimer-to-dimer ... -
Critical point approaches to second-order differential systems generated by impulses
(Işık University Press, 2021)Using variational methods and critical point theory, we establish multiplicity results of solutions for second-order differential systems generated by impulses. Indeed, employing two sorts of three critical points theorems, ... -
Critical point results and their applications
(Işık University Press, 2023-10)The purpose of this paper is to study the concept of a critical point in complete cone metric spaces and its application in Ekeland type variational principle. For this, we consider the concept of a λ-space, which is weaker ... -
A Critical question for bariatric surgery candidates: why do you think you need surgery and are you ready for change?
(Springer, 2014-08-26)[No abstract available] -
A critical study of meromorphic starlike functions
(Işık University Press, 2018)An attempt has been made to introduce a new criterion to make it possible to change meromorphic analytic function into a meromorphic starlike function of particular order. This criterion is based on a differential operator ... -
Cross-ethnic friendship self-efficacy: A new predictor of cross-ethnic friendships among children
(SAGE Publications Ltd, 2020-10-01)Across two studies (N-Study 1 = 101; N-Study 2 = 262) conducted among children in the UK, we incorporate Bandura's (1986) self-efficacy theory to intergroup contact literature and introduce the new construct of cross-ethnic ... -
Cross-ethnic friendships, psychological well-being, and academic outcomes: Study of South Asian and White children in the UK
(Psychology Press Ltd., 2017-03-04)We examined whether two interpersonal processes, self-disclosure and affirmation of ideal self, mediated the relationship between cross-ethnic friendships and psychological well-being and academic outcomes. We conducted a ... -
Cross-group friendships and outgroup attitudes among Turkish–Kurdish ethnic groups: does perceived interethnic conflict moderate the friendship-attitude link?
(Wiley, 2017-02)We investigated associations between cross-group friendships, perceived interethnic conflict, and outgroup attitudes in the context of intractable Turkish–Kurdish conflict in Turkey. Measures of cross-group friendship ... -
Cross-group friendships and psychological well-being: A dual pathway through social integration and empowerment
(Wiley, 2018-10-01)This study investigated the associations between cross-group friendships and psychological well-being among a sample of physically disabled adults. A total of 269 disabled people (M-age=39.13, SD=13.80; 114 females, 152 ... -
Cross-sectional thermoacoustic imaging using multi-layer cylindrical media
(IEEE, 2017-11-10)For cross-sectional two-dimensional thermoacustic imaging of breast and brain, we explored solution of the wave equation using layered tissue model consisting of concentric annular layers on a cylindrical cross-section. ... -
Crossing minimization in weighted bipartite graphs
(Springer, 2007)Given a bipartite graph G = (L-0, L-1, E) and a fixed ordering of the nodes in L-0, the problem of finding an ordering of the nodes in L-1 that minimizes the number of crossings has received much attention in literature. ... -
Crossing minimization in weighted bipartite graphs
(Elsevier B.V., 2009-12)Given a bipartite graph G = (L0, L1, E) and a fixed ordering of the nodes in L0, the problem of finding an ordering of the nodes in L1 that minimizes the number of crossings has received much attention in literature. The ... -
Cryptanalysis of a chaos-based image encryption algorithm
(Elsevier Science BV, 2009-03-30)A chaos-based image encryption algorithm was proposed in [Z.-H. Guan, F. Huang, W. Guan, Phys. Lett. A 346 (2005) 153]. In this Letter, we analyze the security weaknesses of the proposal. By applying chosen-plaintext and ... -
Cryptanalysis of a cryptosystem based on discretized two-dimensional chaotic maps
(Elsevier Science BV, 2008-11-17)Recently, an encryption algorithm based on two-dimensional discretized chaotic maps was proposed [Xiang et al., Phys. Lett. A 364 (2007) 252]. In this Letter, we analyze the security weaknesses of the proposal. Using the ... -
Cryptanalysis of a multi-chaotic systems based image cryptosystem
(Elsevier Science BV, 2010-01-15)This paper is a cryptanalysis of a recently proposed multi-chaotic systems based image cryptosystem. The cryptosystem is composed of two shuffling stages parameterized by chaotically generated sequences. We propose and ... -
Cryptanalysis of a new substitution-diffusion based image cipher
(Elsevier Science BV, 2010-07)This paper introduces two different types of attacks on a recently proposed cryptosystem based on chaotic standard and logistic maps. In the two attacks, only a pair of (plaintext/ciphertext) was needed to totally break ...