Ara
Toplam kayıt 38, listelenen: 31-38
Tectonic and climatic controls on Quaternary fluvial processes and river terrace formation in a Mediterranean setting, the Goksu River, southern Turkey
(Cambridge University Press, 2019-03)
Climate and tectonics effect the fluvial evolution of the Mediterranean Mut basin. The basin contains a river terrace staircase of 16 levels (T16-T1) ranging from 365 to 10m above the current Goksu River in its middle and ...
Photon transmission study on conformational ordering of iota-carrageenan in CaCl2 solution
(Taylor & Francis Inc, 2005-06)
Coil-to-double helix (c-h) and double helix-to-dimer (h-d) phase transitions of iota-carrageenan in CaCl2 solution upon cooling were studied using photon transmission technique. Photon transmission intensity, I-iota r was ...
Enabling 5G indoor services for residential environment using VLC technology
(Elsevier B.V., 2022-03-10)
Visible light communication (VLC) has emerged as a viable complement to traditional radio frequency (RF) based systems and as an enabler for high data rate communications for beyond-5G (B5G) indoor communication systems. ...
Tulczyjew's triplet with an Ehresmann connection I: Trivialization and reduction
(World Scientific, 2023-03-30)
We study the trivialization and the reduction of Tulczyjew's triplet, in the presence of a symmetry and an Ehresmann connection associated to it. We thus establish a geometric pathway for the Legendre transformations on ...
Coherent-array imaging using phased subarrays. Part I: Basic principles
(IEEE-INST Electrical Electronics Engineers Inc, 2005-01)
The front-end hardware complexity of a coherent array imaging system scales with the number of active array elements that are simultaneously used for transmission or reception of signals. Different imaging methods use ...
Cryptanalysis of Fridrich's chaotic image encryption
(World Scientific Publishing, 2010-05)
We cryptanalyze Fridrich's chaotic image encryption algorithm. We show that the algebraic weaknesses of the algorithm make it vulnerable against chosen-ciphertext attacks. We propose an attack that reveals the secret ...
Design of a global extremum seeking algorithm for an omni-directional robot model
(Romanian Soc Control Tech Informatics, 2017-06)
A global extremum seeking algorithm is developed for a mobile robot model where the aim is to find the location of the most powerful signal source among the others. In other words, the control problem is to seek the global ...
A miniature real-time volumetric ultrasound imaging system
(SPIE-Int Soc Optical Engineering, 2005)
Progress made in the development of a miniature real-time volumetric ultrasound imaging system is presented. This system is targeted for use in a 5-mm endoscopic channel and will provide real-time, 30-mm deep, volumetric ...