Search Results

Now showing 1 - 10 of 241
  • Conference Object
    Citation - WoS: 5
    Citation - Scopus: 3
    Evaluation of Efficiencies of Diffuse Allochthonous and Autochthonous Nutrient Input Control in Restoration of a Highly Eutrophic Lake
    (I W A Publishing, 2002) Muhammetoglu, A; Muhammetoglu, H; Soyupak, S
    Mogan Lake is an important recreational area for Metropolitan Ankara-Turkey. It is a shallow eutrophic lake with a dense growth of macrophytes. The main contributors of nutrients and other pollutants to the lake are the creeks carrying the runoff water from the watershed and upland farming land, in addition to the domestic and industrial wastewater discharges from a nearby town and industries. Hydrodynamic and water quality modeling techniques were used to determine the optimum management schemes for the lake restoration and diffuse pollution control. Management scenarios were devised and tested to control allochthonous and autochthonous nutrient inputs to the lake. Phosphorus and nitrogen load reductions were the main test elements for the control of allochthonous nutrient inputs. The scenario analysis revealed that reduction of phosphorus and nitrogen loads from diffused sources will have a marginal effect on controlling eutrophication if macrophyte growth is left uncontrolled. Scenarios employing macrophyte harvesting and sediment dredging have been evaluated for autochthonous nutrient input control. Sediment dredging alone has been shown to yield the most favorable conditions for water quality improvement in Mogan Lake. Further, control of diffuse pollution was an essential final step to achieve an acceptable long-term sustainable water quality improvement in the lake.
  • Conference Object
    Complexity Engineering, Evolution and Optimality of Structures
    (Morgan Kaufmann Pub inc, 1999) Kundu, S
    Complexity Engineering deals with harnessing the power of Cellular Automata (CA) like simple models to solve real life difficult and complex engineering problems, dealing with systems that have very simple components that collectively exhibit complex behaviors. The state transition rules are generally fixed in a CA, but evolution of the rules, is considered here. To evolve the local rules, we use the Genetic Algorithm (GA) model. The example application described here will serve to demonstrate that the GAs can discover CA rules that give rise to emergent computational strategies by self-organization and exhibit globally coordinated tasks for optimization, with simple local interactions only.
  • Conference Object
    Analysis of Force-Indentation Measurements on Anisotropic Metals
    (Edizioni libreria progetto, 2005) Koray,E.; Topcu,N.; Tekkaya,A.E.
    Indentation tests are widely used with simultaneous measurements of indentation depth and force especially for determining material properties. In this study, findings on parameters affecting the force-displacement curves obtained from indentations on anisotropic metals using special not self-similar indenters will be presented. Parameters such as specimen dimensions, friction, surface roughness, specimen clamping and indentation spacing have been investigated by finite element analysis and by experiments. Optimum values of these parameters to achieve higher repeatability and accuracy are determined.
  • Conference Object
    Citation - WoS: 1
    A Cognitive Evaluation for Meetings in Software Development Process
    (Springer-verlag Berlin, 2009) Misra, Sanjay; Akman, Ibrahim
    Software development; includes number of different type of meetings in the whole development process. The cognitive activities also play an important role in decision making activities in these meetings since they are carried out, by human being. In this paper, we evaluated the relevance of meetings in different phases of the software development process with reference to cognitive aspects.
  • Conference Object
    Citation - WoS: 4
    A Layered Security Architecture for Corporate 802.11 Wireless Networks
    (Ieee, 2004) Erten, YM; Tomur, E
    In this study we have investigated the security aspects of wireless local area networks and discussed the weaknesses associated with various conventional 802.11 security protocols such as WEP and 802.1x. We propose an architecture to control access to corporate 802.11 wireless networks, based on the privileges and location of users, using the tested wired network components such as VPNs and Firewalls. The presented architecture reduces the security risks in enterprise level deployment of wireless LANs.
  • Conference Object
    A Bayes decision model for RSS based location estimation
    (Ieee, 2007) Dincer, Zeynep; Oektem, Rwen; Aydin, Elif
    This work introduces a location estimation method based on Bayes Decision Theory using Radio Signal Strengths for indoor environment. Signal Strengths are observed through three transmitters at three distinct frequencies in UHF band, an active RFID tag and a modem connected to a computer. The test environment is 2100cmx720cm, which is divided into classed of square grids. For each class, a set of received signal strengths are measured and processed. Assuming that the class in which the RFID tag was located in the previous time of measurement is known, the next location (class) is estimated using Bayes Decision Theory. Proposed method is tested in a laboratory environment with obstacles. Results show that proposed method will be successful in location estimation where the estimation error stays within around 2m.
  • Conference Object
    Is Change and Rfid Deployment Protocol: a Collaboration of Two Models
    (World Scientific and Engineering Acad and Soc, 2009) Pusatli, Tolga; Lutton, Eugene; Regan, Brian
    This paper presents our approach to explain information systems (IS) change in organisations and its applicability in the RFID (radio frequency identification) application management. It aims to investigate collaboration of these two models: an IS change model (Information System Maintenance/Replacement Model (ISMRM)) and RFID deployment model. Similar to other changes in business process and IT infrastructure, RFID deployment requires a business commitment, combined with a thorough analysis, planning and control to enable the organisation to obtain an optimal solution. To assist and guide an organisation in this activity a RFID Rationale and Deployment Methodology was developed, recently. As reported in the literature, this methodology is divided into three phases and has phase transitional motivators that are utilised to support the decision making during the possible deployment of RFID technology. Meanwhile, the ISMRM model lends support and extends the decision making process, within the RFID Rationale and Deployment Methodology, so that decision to implement such technology can be approved with additional factors of productivity, error/failure rate, available support facilities, user feedback, system specialisation and maintenance. This exploratory research concludes that there is a considerable potential for further research including implementation, testing and validation of the true linkages and purpose of the melding of these models.
  • Conference Object
    Citation - Scopus: 14
    Software Process Improvement Methodologies for Small and Medium Enterprises
    (2008) Mishra,D.; Mishra,A.
    Today, the software industry is one of the most rapidly growing sectors and small software development companies play an important role in economy. Many such organizations have been interested in Software Process Improvement (SPI). It has been observed that the successful implementation of SPI methodologies is generally not possible within the context of small and medium-sized software enterprises (SMEs) because they are not capable of bearing the cost of implementing these software process improvement programs. Further the proper implementation of software engineering techniques is difficult task for SMEs as they often operate on limited resources and with strict time constraints. There are number of methodologies to address these issues. In this paper, various SPI methodologies for SMEs are discussed and compared. This will lead towards maturity of software process improvement in SMEs and also facilitates in development of automation tools for SPIs in future. © 2008 Springer-Verlag Berlin Heidelberg.
  • Conference Object
    Citation - Scopus: 3
    How To Teach Usage of Equipments in a Remote Laboratory
    (2007) Alparslan,N.C.; Ozen,M.; Cagiltay,N.E.; Aydin,E.
    European Remote Radio Laboratory (ERRL) is an e-learning project for students, teachers and technicians of the universities who will use the very important devices of this laboratory remotely. These devices are very expensive to buy and can be broken easily while they have been using by the people who does not really know how to use them professionally. As a solution we have developed an e-learning system which aims to support the ERRL learners while studying on how to use equipments in the system. The system is developed according to the electronic performance support systems (EPSS) approach. An EPSS is a computer-based, well-structured system which improves the performance of individuals. It is an electronic infrastructure that contains, stores and distributes personal (individual) or corporate knowledge to enable people to reach necessary levels of performance in the fastest possible time and with minimum teaching support of other people. This paper discusses how the content for such a system is developed and how this content is interactively used in the EPSS platform. The technical details of the developed EPSS are also discussed in this study. We believe that this paper will help instructional system designers for designing different alternatives to improve learners' performance. © 2007 IEEE.
  • Conference Object
    Citation - WoS: 1
    The Generalized Divergence Theorem and Its Application To Harmonic Maps
    (Pergamon-elsevier Science Ltd, 2001) García-Río, E; Kupeli, DN
    A survey of divergence theorems in semi-Riemannian geometry is made. The generalization of a divergence theorem to vector fields along a map is given in semi-Riemannian geometry and an application of it is made in Riemannian geometry to obtain some sufficient conditions for a map to be harmonic.