34 results on '"UÇAR, Erdem"'
Search Results
2. Policy risk and insider trading
3. tüg(ü)zl(ü)g (a)t(ı)γ - eine neue Lesart zu tög(ü)nl(ü)g (a)t(ı)γ in den Tuñuquq-Inschriften (II, Ostseite 4 [= Kolumne 54])
4. Augmenting parametric data synthesis with 3D simulation for OCR on Old Turkic runiform inscriptions: A case study of the Kül Tegin inscription.
5. A New Interpretation of …] süŋ(ü)g(ü)n (a)čd(ı)m(ı)z (I North 4 = 28) in the Tuńuquq Inscription
6. Local corruption and corporate social responsibility
7. Local creative culture and corporate innovation
8. Allergy onset and local investor distraction
9. Local Culture and Dividends
10. Religious holidays, investor distraction, and earnings announcement effects
11. CONTRIBUTIONS TO UIGHUR LEXICOGRAPHY II: REMARKS ON "ČOG"
12. Cyprus International Conference on Educational Research the Effects of Computer Asssited Simulations of Physics Experiments on Learning
13. The Factors Effecting Students’ PC Game Types Preferences
14. The positive outcomes of information security awareness training in companies – A case study
15. Call Admission Control Jointly with Resource Reservation in Cellular Wireless Networks
16. Call Admission Control Jointly with Resource Reservation in Cellular Wireless Networks
17. KABLOSUZ ALGILAYICI AĞLARDA KULLANILAN TEKNOLOJİ VE PROTOKOLLER ÜZERİNE BİR İNCELEME
18. An Inter-Domain Attack Mitigating Solution.
19. SDN Architecture Fundamentals & DOS Prevention Basics: A Case Study With Openflow
20. Sneak path current equivalent circuits and reading margin analysis of complementary resistive switches based 3D stacking crossbar memories: Nadomestna električna vezja za analizo kvarnih tokov in analiza bralne meje pri komplementarnih uporovnih stikalih na osnovi 3-D večplastnih križnih pomnilnikov
21. A novel algorithm for extracting the user reviews from web pages.
22. Using Binary Classifiers for Information Security Risk Analysis A Case Study
23. Software Maintenance Severity Prediction with Soft Computing Approach
24. HYBRID ENERGY PRODUCTION AND DELIVERY USING MULTIPLE RENEWABLE SOURCES
25. Ağ Değişimlerinde Optimal Yolun Bulunması
26. Refinding of the optimal path when the network changes
27. DETECTION OF DRIVER SLEEPINESS AND WARNING THE DRIVER IN REAL-TIME USING IMAGE PROCESSING AND MACHINE LEARNING TECHNIQUES.
28. Reconstructive sensing circuit for complementary resistive switches-based crossbar memories.
29. <bold>Wilkens, Jens:</bold><italic>Buddhistische Erzählungen aus dem alten Zentralasien.</italic> Edition der altuigurischen Daśakarmapathāvadāna mālā. Teile 1–3. 2016.
30. POX CONTROLLER PERFORMANCE FOR OPENFLOW NETWORKS.
31. Can obstructive apnea and hypopnea during sleep be differentiated by using electroencephalographic frequency bands? Statistical analysis of receiver-operator curve characteristics.
32. RFID TECHNOLOGY FOR PSYCHIATRIC EVALUATIONS.
33. AN ULTRASONIC WALKING STICK FOR THE BLIND.
34. İpek Yolu Kavşağının Ölümsüzlük Eserleri.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.