Search
Now showing items 81-90 of 148
Biomarkers of Secondhand Smoke Exposure in Waterpipe Tobacco Venue Employees in Istanbul Moscow and Cairo
(Oxford University Press, 2018)
Background: Most smoke-free legislation to reduce secondhand smoke (SHS) exposure exempts waterpipe (hookah) smoking venues. Few studies have examined SHS exposure in waterpipe venues and their employees. Methods: We ...
Attachment anxiety benefits from security priming: Evidence from working memory performance
(Public Library Science, 2018)
The present study investigates the relationship between the attachment dimensions (anxious vs. avoidance) and the cognitive performance of individuals specifically whether the attachment dimensions would predict the working ...
The Turkish Military's Autonomy JDP Rule and the EU Reform Process in the 2000s: An Assessment of the Turkish Version of Democratic Control of Armed Forces (DECAF)
(Routledge Journals Taylor & Francis Ltd, 2010)
This article tackles the question of Europeanization in Turkey's civil-military relations and the extent to which the EU has served as an anchor in the civilian control over the Turkish Armed Forces. We argue that the EU ...
Fully Decentralized and Collaborative Multilateration Primitives for Uniquely Localizing WSNs
(Springer International Publishing Ag, 2010)
We provide primitives for uniquely localizing WSN nodes. The goal is to maximize the number of uniquely localized nodes assuming a fully decentralized model of computation. Each node constructs a cluster of its own and ...
On-Line Transient Stability Assessment Using Matlab Parallel Programming Environment
(IEEE, 2010)
Transient Stability Assessment (TSA) is the major part of Dynamic Security Assessment (DSA) in an electric power system. On-line TSA has gained more importance for power system security in last two decades. The decreasing ...
Relay-Aided Secure Broadcasting for VLC
(IEEE, 2018)
A visible light communication (VLC) broadcast channel is considered in which a transmitter communicates with two receivers in the presence of an external eavesdropper. Trusted cooperative half-duplex relays are deployed ...
Correlation of Experimental Liquid-Liquid Equilibrium Data for Ternary Systems Using NRTL and GMDH-Type Neural Network
(Amer Chemical Soc, 2017)
In this work liquid liquid equilibrium (LLE) data for the ternary systems (water + propionic acid + solvent) were experimentally obtained at atmospheric pressure and 298.2 K. The ternary systems show type-1 behavior of ...
Beliefs of Living Donors About Recipients' End-Stage Liver Failure and Surgery for Organ Donation
(Elsevier Science Inc, 2017)
Background. The concept of beliefs could provide a basis for how donors may perceive recipients' end-stage liver failure (ESLF) and surgery for organ donation. However there is no such quantitative study. Therefore the ...
Power Control and Resource Allocation in TDD-OFDM Based Femtocell Networks with Interference
(IEEE, 2017)
Femtocell technology is a promising solution for different dilemmas in cellular networks. In femtocell power control the interference experienced by the network is divided into two main tiers according to the type of network ...
Introducing a Fairness-Based Theory of Prosecutorial Legitimacy Before The International Criminal Court
(Oxford University Press, 2016)
The International Criminal Court became operative in 2002. The first prosecutor of the Court faced the enormous challenge of setting up a series of policies addressing at the same time the backlog of overriding expectations. ...