Browsing by Access Type "info:eu-repo/semantics/openAccess"
Now showing items 641-660 of 3158
-
Detection of Click Spamming in Mobile Advertising
(Springer Science and Business Media B.V., 2020)Most of the marketing expenditures in mobile advertising are conducted through real-time bidding (RTB) marketplaces, in which ad spaces of the sellers (publishers) are auctioned for the impression of the buyers’ (advertisers) ... -
Detection of fraudulent activities in mobile display advertising
(Kadir Has Üniversitesi, 2017)Most of the marketing expenditures in mobile advertising are conducted through realtime bidding (RTB) marketplaces in which ad spaces of the sellers (publishers) are auctioned for the impression of the buyers’ (advertisers) ... -
Detection of interdependent multiband systems for cognitive radios and ultra-wideband systems
(Kadir Has Üniversitesi, 2012)As a result of advances in the wireless technology new systems have been proposed and hence more frequency bands are occupied in the spectrum. Therefore the number ofavailable frequency bands for future wireless communication ... -
Detection of interdependent primary systems using wideband cognitive radios
(Elsevier GMBH Urban & Fischer Verlag, 2013)Cognitive radios (CRs) may be sharing multiple frequency bands with primary systems if the CR is a wideband or an ultra wideband (UWB) system. In that case the CR should ensure all the coexisting primary systems in these ... -
Detection of jointly active primary systems
(IEEE, 2012)Recent studies in cognitive radios consider the detection of multiple bands for a better utilization of the spectrum. If the cognitive radio (CR) is an ultra wideband (UWB) or a wideband system then the CR should ensure ... -
Detection of Multiple Primary Systems Using DAA UWB-IRs
(IEEE, 2009)Underlay ultra wideband (UWB) systems have to be able to detect the presence of primary systems operating in the same band for detect-and-avoid (DAA) operation. In this paper the performances of joint and independent ... -
Detection of Trojans in integrated circuits
(IEEE, 2012)This paper presents several signal processing approaches in Trojan detection problem in very large scale integrated circuits. Specifically wavelet transforms spectrograms and neural networks are used to analyze power ... -
Determinants of bank lending 'Evidence from BRICS countries'
(Kadir Has Üniversitesi, 2023-01)This thesis aims to investigate the determinants of bank lending for the countries forming BRICS, namely Brazil, Russia, India, China, and South Africa. The empirical analysis is performed using a sample of 130 listed ... -
Determinants of Currency Crises in Turkey Some Empirical Evidence
(M.E Sharpe Inc., 2010)Currency crises have become a serious threat for developing countries especially since the financial deregulation process and the collapse of the Bretton Woods system. In the past two decades Turkey has experienced two ... -
Determinants of investment in the manufacturing sector in Turkey
(Kadir Has Üniversitesi, 2017)This dissertation focuses on the determinants of investment in Turkish manufacturing sector. it gives a detailed framework and complementary analysis of the determinants of investment in Turkish manufacturing sector. First ... -
Determinants of young people's civic and political participation in Turkey
(Routledge Journals Taylor & Francis Ltd, 2017)This special section provides a timely reflection on current debates that are of extreme relevance in order to gain a better understanding of the concepts of citizenship and active citizenship in Turkey by looking at the ... -
Determination of a diffusion coefficient in a quasilinear parabolic equation
(De Gruyter Open Ltd, 2017)This paper investigates the inverse problem of finding the time-dependent diffusion coefficient in a quasilinear parabolic equation with the nonlocal boundary and integral overdetermination conditions. Under some natural ... -
Determination of growth kinetics and size dependent structural morphological optical characteristics of sol-gel derived silica nanoparticles in silica matrix
(De Gruyter Poland Sp Zoo, 2019)Nanocomposite silica thin films made using the sol-gel method were studied. The nano-silica films were prepared using a mixture of tetraethyl orthosilicate (TEOS) deionized water ethanol and ammonia solution. To control ... -
Determination of Law Applicable to the Foster Family from a Private International Law Perspective
(Istanbul Univ, 2022)In the protection of children who cannot be brought up in their biological family, the institution of foster family, which is the placement of the child with an unrelated family as alternative care, has been widely accepted. ... -
Determination of time-of-use prices in electricity markets using clustering analyses
(Kadir Has Üniversitesi, 2016)in this thesis a clustering analysis to determine the blocks (clusters) of hours for time-of-use (TOU) pricing scheme is proposed and different clustering algorithms are compared using different measures i.e. change in ... -
Determining and making sense of recruitment practices for tourism academics in the UK
(Emerald Group Publishing Ltd, 2022)Purpose This study aims to examine the influence of neoliberalism and managerialism on the recruitment of tourism academics in the UK. The study analyses how sustainable the recruitment and retention of talents are in the ... -
Determining the critical point of a sigmoidal curve via its fourier transform
(Institute of Physics Publishing, 2016)A sigmoidal curve y(t) is a monotone increasing curve such that all derivatives vanish at infinity. Let tn be the point where the nth derivative of y(t) reaches its global extremum. In the previous work on sol-gel transition ... -
Developing adaptive multi-device applications with the Heterogeneous Programming Library
(Springer, 2015)The usage of heterogeneous devices presents two main problems. One is their complex programming a problem that grows when multiple devices are used. The second issue is that even if the codes for these devices can be ... -
Developing novel techniques for spatial domain LSB i̇mage steganography
(Kadir Has Üniversitesi, 2019)Steganography is one of the most noteworthy information hiding mechanism, which is used as an alternative to cryptography in order to provide adequate data security. Image steganography is one of the key types of ... -
Development of a parallel 3D navier–stokes solver for sediment transport calculations in channels
(MDPI AG, 2020)We propose a method to parallelize a 3D incompressible Navier–Stokes solver that uses a fully implicit fractional-step method to simulate sediment transport in prismatic channels. The governing equations are transformed ...