- Eklemek veya çıkarmak istediğiniz kriterleriniz için 'Dahil' / 'Hariç' seçeneğini kullanabilirsiniz. Sorgu satırları birbirine 'VE' bağlacı ile bağlıdır. - İptal tuşuna basarak normal aramaya dönebilirsiniz.
Background and Purpose: The term of Complementary and Alternative Medication (CAM) is described by patients as all types of practices to prevent or treat illnesses, which are not currently considered as a part of conventional medicine. Although the advance in treatment for migraine, some patients prefer CAM therapies due to their concerns about conventional therapies. The aim of this study was to evaluate the association between CAM use and chronicity of migraine among Turkish migraineurs. Methods: Consecutive episodic and chronic migraine patients were recruited. A questionnaire of a list of ...Daha fazlası
In this study, hydroxy (HHO) dry cell performances in terms of voltage, current and temperature were modeled with Rule-Based Mamdani-Type Fuzzy (RBMTF) modeling technique. Input parameters plate combination and time, output parameters voltage, current, temperature were described by RBMTF if-the rules. Current, voltage and temperature were measured for the different membership functions. Numerical parameters of input and output variables were fuzzificated as linguistic variables: very very low (L-1), very low (L-2), low (L-3), negative medium (L-4), medium (L-5), positive medium (L-6), high (L- ...Daha fazlası
In this study, modeling of a helicopter fuselage panel with active vibration control is carried out. In order to represent the helicopter body shell, a cabin panel clamped from four edges is designed. Piezoelectric patches are attached on the body according to the literature. The dynamic characteristics of the structure are obtained by finite element based modal analysis and exporting of state space matrices. The numerical model of the cabin panel is characterized with regard to active vibration control loop. Vibration data obtained from the helicopter operational tests is applied as a distort ...Daha fazlası
There is a reality and danger defined as climate change on the agenda of the world. Climate change poses the greatest threat to humanity. It is obvious that environmental shocks will be more extreme and more frequent. No government or institution can solve this problem alone. Besides, climate risk has now become a financial risk. As such, investors have sought new products across all asset classes that somehow address the challenges of climate change (Jack Morton Auditorium, 2018). Therefore, there was a need for interaction between environmental officials and financial experts, and green bond ...Daha fazlası
Energy is a phenomenon that leads to conflicts, internal conflicts, and antagonism in all areas of life. Considering that we are dependent on foreign countries in the field of energy, the conservation of energy is getting more and more important day by day. A large portion of the energy consumed in Turkey is used to heat houses. It is very important to maintain the heat and keep it on the field as well as to heat the house. It is seen that the best and economical way of keeping the heat is thermal insulation in the apartments. In this study, five apartments in Erzincan which is in the 4th grad ...Daha fazlası
YALÇIN, Serpil | KARASU UYSAL, Ayben | ALICE Collaboration
Resonances are extremely short lived particles (τ ∼ 10-23 s). Due to their lifetime, they may decay, re-scatter and regenerate between chemical and kinetic freeze-outs. For this reason, they are very significant probes to understand the evolution of the medium and particle production mechanism in heavy ion collisions. Different than other particles, resonance properties such as mass, width and yield can be modified by the medium created in the relativistic collisions. Moreover, comparison of resonances produced in different collisions provide evidences about possible in medium effects and syst ...Daha fazlası
Due to wide range of users, email had emerged as one of the preferred method to intrude Local area networks and end users. In this paper we examine the characteristics of various email security threats and the technology used by attackers. In order to counter defense technology, attackers change their mode of operation frequently. The continuous evaluation of attacker's pattern will help the industry to combat attacks effectively. In our study, we collected several thousand spam from a corporate server for a period of 12 months from Jan 2012 to Jan 2013. From the collected data, we identified ...Daha fazlası
6698 sayılı Kişisel Verilerin Korunması Kanunu kapsamında yükümlülüklerimiz ve cerez politikamız hakkında bilgi sahibi olmak için alttaki bağlantıyı kullanabilirsiniz.