Erişim şekli için "info:eu-repo/semantics/closedAccess" Enformasyon Teknolojileri Bölümü / Department of Information Technologies listeleme
Toplam kayıt 77, listelenen: 1-20
-
Action readiness and mindset for IT offshoring
(Emerald Group Publishing Limited, 2010)Purpose: The paper aims to examine the degree of changes in action readiness and mindset for the IT offshore outsourcing (offshoring) practice of a number of leading finance and insurance organisations. In particular, the ... -
Algorithmic modifications to SPIHT
(IEEE, 2001)This paper proposes several low complexity algorithmic modifications to the SPIHT (Set Partitioning in Hierarchical Trees) image coding method of [3] The modifications exploit universal traits common to the real world ... -
Assessing the (in-)consistency of same-sex and opposite-sex peer nominations among Turkish elementary-school children
(PsychoeduationalL Corp, 1997-09)Nomination procedures for assessing peer behaviors are in wide use, and mixed-sex peer nominations are often utilized under the assumption that combined same-and opposite-sex nominations yield a representative picture of ... -
Automatic XML schema matching
(2009)As the enterprise systems increasingly use the XML technology in their data presentation, the Enterprise Application Integration is gradually becoming the problem of Xml Schema matching. Different organizations overall ... -
Characterization of Bulgarian oil shale kerogen revealed by oxidative degradation
(Elsevier GMBH, Urban & Fischer Verlag, 2009)A 13-step alkaline permanganate degradation of Bulgarian oil shale kerogen concentrate at ambient temperature was carried out. A high yield of oxidation products (90.1%) and a low yield of gaseous products (2.79%) were ... -
Comments on "upper cutoff frequency of the bound wave and new leaky wave on the slotline"
(IEEE-INST Electrical Electronics Engineers Inc, 1999-05)[No abstract available] -
Comparison of evolutionary techniques for Value-at-Risk calculation
(Springer-Verlag Berlin, 2007)The Value-at-Risk (VaR) approach has been used for measuring and controlling the market risks in financial institutions. Studies show that the t-distribution is more suited to representing the financial asset returns in ... -
The composition of acids in bitumen and in products from saponification of kerogen: Investigation of their role as connecting kerogen and mineral matrix
(Elsevier Science BV, 2008-11-03)In order to obtain more information and to understand the nature of relation between organic and mineral matter in oil shales, the compositions of soluble bitumen fractions obtained by extraction from Bulgarian oil shales ... -
Constraint-based routing in traffic engineering
(IEEE, 2006)Traffic engineering (TE) describes a domain-wide perspective for traffic control as opposed to application-specific concerns of QoS. MPLS is today's most powerful architecture for TE. Constraint-based routing refers to the ... -
Constructing quantum logic gates using q-deformed harmonic oscillator algebras
(Springer, 2014-04)We study two-level q-deformed angular momentum states, and using q-deformed harmonic oscillators, we provide a framework for constructing qubits and quantum gates. We also present the construction of some basic one-qubit ... -
Current benefits and future directions of NFC services
(IEEE, 2010)Near Field Communication (NFC), as an emerging and promising technology, is an integration of Radio Frequency Identification (RFID) technology with mobile devices. NFC-enabled mobile devices can act as contactless smart ... -
Design and implementation of a smart beehive and its monitoring system using microservices in the context of IoT and open data
(Elsevier B.V., 2022-05)It is essential to keep honey bees healthy for providing a sustainable ecological balance. One way of keeping honey bees healthy is to be able to monitor and control the general conditions in a beehive and also outside of ... -
Design of a key exchange protocol between SIM card and service provider
(Institute of Electrical and Electronics Engineers Inc., 2015-11-05)Current capabilities of smart cards, Smartphones, and cellular network provoke companies to provide vast amount of services to the mobile users. Some of those services require end-to-end encryption between a Service Provider ... -
Design science in NFC research
(IEEE, 2010)Near Field Communication (NFC), as one of the promising technological developments, provides means to short range contactless communication for mobile phones and other devices alike. NFC has become an attractive design ... -
Design science perspective on NFC research: Review and research agenda
(Slovensko Drustvo Informatika, 2013)Near Field Communication (NFC), as one of the emerging and promising technological developments, provides means to short range contactless communication for mobile phones and other devices alike. NFC has become an attractive ... -
Deterministic local doubling of W states
(OSA - The Optical Society, 2016-11-01)In large quantum systems, multipartite entanglement can be found in many inequivalent classes. Preparing states of arbitrary size in different classes is important for performing a wide range of quantum protocols. W states, ... -
Development of an indoor navigation system using NFC technology
(IEEE, 2011)Existing indoor navigation systems face with many different technical and usability problems. In this paper we present a Near Field Communication (NFC) based indoor navigation system called NFC Internal in order to eliminate ... -
Effects of olive oil mill waste water (omww) on the frog larvae
(Springer, 2012-08)In this research, acute effect of the olive oil mill wastewater (OMWW) on the frog larvae has been studied. Larvae showed hyperactivity symptoms first and loss of balance and remained motionless due to toxicity of wastewater. ... -
Elucidation of the complete set of H-2 electronic states' vibrational data
(Pergamon-Elsevier Science Ltd, 2004-11)We have previously established that, the vibration period T of a diatomic molecule, can be expressed as T = [4pi(2)/(rootninjh)]rootgM(0)m(e)r(2), where M-0 is the reduced mass of the nuclei, M-e the mass of the electron, ... -
Energy load balancing for fixed clustering in wireless sensor networks
(IEEE, 2012-05-07)Clustering can be used as an effective technique to achieve both energy load balancing and an extended lifetime for a wireless sensor network (WSN). This paper presents a novel approach that first creates energy balanced ...