Arama Sonuçları
Listeleniyor 1 - 10 / 1249
Yayın Are your cross-ethnic friends ethnic and/or national group identifiers?The role of own and perceived cross-ethnic friend's identities on outgroup attitudes and multiculturalism(Wiley, 2018-02-01) Bağcı Hemşinlioğlu, Sabahat Çiğdem; Çelebi, ElifWe investigated how own ethnic and national identities and perceived ethnic and national identities of close cross-ethnic friends may predict outgroup attitudes and multiculturalism among Turkish (majority status, N=197) and Kurdish (minority status, N=80) ethnic group members in Turkey (M-age=21.12, SD=2.59, 69.7% females, 30.3% males). Compared with Turkish participants, Kurdish participants were more asymmetrical in rating their cross-ethnic friend's identities relative to their own, reporting higher ethnic identity, but lower national identity for themselves. Own ethnic identity was negatively associated with attitudes and multiculturalism, whereas own national identity was positively associated with only attitudes. Perceived cross-ethnic friend's national identity was positively related to both outgroup attitudes and multiculturalism. Shared national identification (high levels of own and friend's national identity) led to most positive outgroup attitudes and highest support for multiculturalism. Findings were discussed in the light of social identity and common ingroup identity models.Yayın Positive solutions for a sum-type singular fractional integro-differential equation with m-point boundary conditions(Politechnica University of Bucharest, 2017) Aydoğan, Seher Melike; Nazemi, Sayyedeh Zahra; Rezapour, ShahramWe study the existence and uniqueness of positive solutions for a sum-type singular fractional integro-differential equation with m-point boundary condition. Also, we provide an example to illustrate our main result.Yayın Sınıflandırma için diferansiyel mahremiyete dayalı öznitelik seçimi(Gazi Univ, Fac Engineering Architecture, 2018) Var, Esra; İnan, AliVeri madenciliği ve makine öğrenmesi çözümlerinin en önemli ön aşamalarından biri yapılacak analizde kullanılacak verinin özniteliklerinin uygun bir alt kümesini belirlemektir. Sınıflandırma yöntemleri için bu işlem, bir özniteliğin sınıf niteliği ile ne oranda ilişkili olduğuna bakılarak yapılır. Kişisel gizliliği koruyan pek çok sınıflandırma çözümü bulunmaktadır. Ancak bu yöntemler için öznitelik seçimi yapan çözümler geliştirilmemiştir. Bu çalışmada, istatistiksel veritabanı güvenliğinde bilinen en kapsamlı ve güvenli çözüm olan diferansiyel mahremiyete dayalı özgün öznitelik seçimi yöntemleri sunulmaktadır. Önerilen bu yöntemler, yaygın olarak kullanılan bir veri madenciliği kütüphanesi olan WEKA ile entegre edilmiş ve deney sonuçları ile önerilen çözümlerin sınıflandırma başarımına olumlu etkileri gösterilmiştir.Yayın CSR practices in Turkey: Examining CSR reports(Greenleaf Publishing, 2015-07) Uyan Atay, Bilge; Tuncay Çelikel, AslıThis study examines the private companies that publish CSR reports in Turkey. Turkey has a growing economy, located in an international arena with an increasing number of global brands starting to export their products from Turkey with even more multinational enterprises (MNEs) planning to locate in the country. Now, some Turkish companies and subsidiaries of MNEs have started to publish CSR reports. Our findings show that strong Turkish conglomerates are playing a constructive role in macro-level development and governance in Turkey. They are also addressing local problems such as education, human rights, environmental protection and workers' rights. Besides, subsidiaries of MNEs are also having an impact with respect to the application of their headquarters' community programs in Turkish society.Yayın Turkey's Kurdish opening: Long awaited achievements and failed expectations(Routledge Journals, 2014-01-02) Kayhan Pusane, ÖzlemTurkish state actors have used mainly military means to first suppress the Kurdish rebellions and then to end the PKK violence from 1984 onwards. However, after the AKP came to office in 2002, the government challenged the hardline state policy and initiated a Kurdish opening. This policy has the ultimate goal of disarming the PKK and resolving the Kurdish question. However, the Kurdish opening so far has failed to bring about the desired policy outcomes because the parties to the Kurdish question have been highly divided on the side of both the state and the Kurds in Turkey.Yayın Cognitive cooperative MAC with one primary and two secondary users: achievable rates and optimal power control(IEEE-INST Electrical Electronics Engineers Inc, 2014-11) Edemen, Çağatay; Kaya, OnurWe consider a three-user fading cognitive cooperative multiple access channel (MAC) with one primary and two secondary transmitters. We propose two encoding/decoding strategies with varying levels of cooperation, based on block Markov superposition encoding and backward decoding. The first is an overlay model, where the secondary users (SUs) aid the transmission of the primary user (PU) by causally decoding the PU message and forwarding it while also cooperating among each other. The second is an underlay model, where the SUs cooperate by decoding and forwarding each other's messages while treating the signal received from the PU as noise. In either case, the PU is guaranteed to operate at its maximum achievable single user rate. We characterize the achievable SU rate region for both models and maximize this region as a function of the transmit powers. The simulation results show that the SU rate region can be significantly enlarged, particularly using the overlay model.Yayın Equilibrium and stability analysis of delayed neural networks under parameter uncertainties(Elsevier Science Inc, 2012-02-15) Faydasıçok, Özlem; Arik, SabriThis paper proposes new results for the existence, uniqueness and global asymptotic stability of the equilibrium point for neural networks with multiple time delays under parameter uncertainties. By using Lyapunov stability theorem and applying homeomorphism mapping theorem, new delay-independent stability criteria are obtained. The obtained results are in terms of network parameters of the neural system only and therefore they can be easily checked. We also present some illustrative numerical examples to demonstrate that our result are new and improve corresponding results derived in the previous literature.Yayın Mülteci barınaklarının uydu görüntülerinden çoklu-sınıflı çizge-kesme bölütleme ve gölge bilgisi kullanılarak otomatik sezimi(IEEE, 2014-04-23) Kucur Ergünay, Şerife Seda; Kahraman, Fatih; Ateş, Hasan FehmiBu çalışmada, mülteci kamplarında bulunan yaşam alanlarının/barınakların (çadır, konteynır vb.) uydu ve hava görüntülerinden otomatik olarak sezimi ve sayımına yönelik bir yöntem tanıtılmaktadır. Mülteci kamplarındaki barınakların çok yüksek çözünürlüklü (VHR) görüntülerde dahi çok küçük boyuta sahip, belli bir alanda çok sık ve bazen karmaşık şekilde yerleştirilmiş ve arkaplan ile ayrıştırılması zor nesnelere denk geliyor olması otomatik barınak/çadır sezim ve sayımını zorlaştırmaktadır. Bahsedilen problemin çözümüne yönelik olarak çok sınıflı çizge-kesme (graph-cut) bölütlemesi ve gölge bilgisinin kullanıldığı özgün bir yöntem çalışma kapsamında önerilmektedir. Buna göre, ilk adımda çizge-kesme bölütleme yöntemi ve morfoloji işlemleri uygulanarak çadır sezimi yapılmıştır. Bu adımda sezilememiş çadırların bulunabilmesi için ikinci bir adımda çadırların gölge bilgisinden faydalanılmıştır. En son adımda gradyan-tabanlı eşikleme yöntemi ile yanlış tespitlerin elenmesi amaçlanmıştır. Önerilen yöntem, özellikle karmaşık yerleşim düzenine sahip mülteci kampları (çadırkent) üzerinde test edilmiştir. Yöntemin başarımı kesinlik (precision) ve geri getirme (recall) kriterlerine göre belirlenmiştir. Elde edilen ortalama kesinlik ve geri getirme başarımları sırasıyla %91.9 ve %90.0 olup problemin zorluğu göz önünde bulundurulduğunda umut vadedici bir sonuçtur.Yayın A new way of conducting war: Cyberwar, is that real?(Springer-Verlag Berlin Heidelberg, 2014-12-01) Mehmetçik, HakanThere are numerous discussions on both the reality and impact of cyberwar. Most of the critics are based on the Clausewitzian perspective of war in which its political nature must exist, an act of war has to be characteristically violent and has instrumental purposefulness. Therefore cyberwar is generally regarded as a conduct of action that simply doesn't match with these Clausewitzian criteria of war. However during the last two decades, with the advancement of information technology and widening connecters of the world, many incidents such as Estonian and Georgian cases of cyberattacks, Stuxnet worms, and many other politically motivated cyberattacks, show us that we need to think carefully about the terminology that being used by scholars, experts and policy makers. In this chapter, I aim to discuss about the term cyberwar within a broader theory of war in International Relations studies. In doing so, my aim is to bring together related International Relations Theories and the contemporary cyberwar discussion and discuss the issue within a theoretical perspective.Yayın A global optimal control methodology and its application to a mobile robot model(Elsevier B.V., 2016) Dinçmen, ErkinA global optimal control algorithm is developed and applied to an omni-directional mobile robot model. The aim is to search and find the most intense signal source among other signal sources in the operation region of the robot. In other words, the control problem is to find the global extremum point when there are local extremas. The locations of the signal sources are unknown and it is assumed that the signal magnitudes are maximum at the sources and their magnitudes are decreasing away from the sources. The distribution characteristics of the signals are unknown, i.e. the gradients of the signal distribution functions are unknown. The control algorithm also doesn't need any position measurement of the robot itself. Only the signal magnitude should be measured via a sensor mounted on the robot. The simulation study shows the performance of the controller.












