Search
Now showing items 1-10 of 963
Our Memories over M. Turker Acaroglu...
(Turkish Librarians Assoc, 2016)
In this article versatile and distinguished colleague Mehmet Turker Acaroglu's last years of his life I witnessed and the process that led us to publishing the book of Librarian's Mission (Kutuphanecinin Gorevi) are mentioned.
Turkish Business in The Kurdistan Region of Iraq
(Turkish Policy Quarterly, 2016)
In the Kurdistan Region of Iraq (KRI) economic development and infrastructure recovery expanded at a monumental pace over the last decade. However the economic boom also had negative aftershocks including a significant ...
Project Management Method Adoption: A Service Industry Case Study
(IGI Global, 2017)
The purpose of this research is to understand what aspects of brand-named project management method (Project Management Institute - PMI) have been adopted in a service organization and how. The case context examined ...
Parallel Implementation Of Iterative Rational Krylov Methods For Model Order Reduction
(IEEE, 2010)
Model order reduction (MOR) techniques are getting more important in large scale computational tasks like large scale electronic circuit simulations. In this paper we present some experimental work on multiprocessor systems ...
Power Consumption Estimation Using In-Memory Database Computation
(IEEE, 2016)
In order to efficiently predict electricity consumption we need to improve both the speed and the reliability of computational environment. Concerning the speed we use inmemory database which is taught to be the best ...
Parallel Contingency Analysis Using Differential Evolution Based Solution For Branch Outage Problem
(IEEE, 2010)
Contingency analysis is one of the most fundamental work an electricity management center operator has to perform regularly. If both bus voltage magnitudes and reactive power flowing on the branches during any type of ...
Performance Improvement of Threshold Based Audio Steganography Using Parallel Computation
(Science & Information SAI Organization Ltd, 2016)
Audio steganography is used to hide secret information inside audio signal for the secure and reliable transfer of information. Various steganography techniques have been proposed and implemented to ensure adequate security ...
Conformal And Generalized Concircular Mappings Of Einstein-Weyl Manifolds
(Elsevier Science Inc, 2010)
In this article after giving a necessary and sufficient condition for two Einstein-Weyl manifolds to be in conformal correspondence we prove that any conformal mapping between such manifolds is generalized concircular if ...
Comparison of cation effects on phase transitions of kappa and iota carrageenan
(European Polymer Federation, 2010)
Phase transitions of kappa and iota carrageenan in KCl NaCl and CaCl2 solutions were separately studied during heating and cooling processes by using fluorescence technique. Scattered light I-SC and fluorescence intensity ...
Classification Of Distinct Conformers Of Beta < 2-Adrenergic Receptor (Beta 2-AR) Based On Binding Affinity Of Ligands Through Docking Studies
(Amer Chemical Soc, 2016)
B2AR reseptörü, akciğerlerin rahatlamasında ve kardiyovasküler fizyolojide rol oynamasıyla önemli bir ilaç hedefidir. Bu çalışmada, çeşitli B2AR konformasyonlarını aktif veya inaktif olarak sınıflandırmak amacıyla, ...