Browsing School of Applied Technology and Management by Issue Date
Now showing items 41-60 of 130
-
Tutorial services for students at Bilkent University an evaluation after five years
(Sense Publishers, 2008)To realize our mission as academic coordinators for engineering students at Bilkent University, we facilitate in different ways tutorial services. These focus on the first year courses for physics, mathematics and computer ... -
Teaching usage of equipments in a remote laboratory
(Sakarya Universitesi, 2008)Remote laboratories are technologies that aim to increase the effectiveness of educational programs. European Remote Radio Laboratory (ERRL) is an e-learning project for students, teachers and technicians who will use very ... -
On determining cluster size of randomly deployed heterogeneous WSNs
(IEEE, 2008)Clustering is an efficient method to solve scalability problems and energy consumption challenges. For this reason it is widely exploited in Wireless Sensor Network (WSN) applications. It is very critical to determine ... -
Entertaining international visitors — the hybrid nature of tourism shows
(Routledge, 2008)Given that a post-modern perspective of tourism has introduced a new gaze of the destination as a construction of both visitor perception and supplier commodification, the language of cultural compression and place ... -
A tool to enhance cooperation and knowledge transfer among software developers
(Springer, Berlin, Heidelberg, 2009)Software developers have been successfully tailoring software development methods according to the project situation and more so in small scale software development organizations. There is a need to share this knowledge ... -
An optimal network dimensioning and initial energy assignment minimizing the monetary cost of a heterogeneous WSN
(IEEE, 2009)In this paper, a novel method is proposed to dimension a randomly deployed heterogeneous Wireless Sensor Network (WSN) of minimum monetary cost satisfying minimum coverage and minimum lifetime requirements. We consider ... -
Which shape representation is the best for real-time hand interface system?
(Springer, Berlin, Heidelberg, 2009)Hand is a very convenient interface for immersive human-computer interaction. Users can give commands to a computer by hand signs (hand postures, hand shapes) or hand movements (hand gestures). Such a hand interface system ... -
An experiment to observe the impact of UML diagrams on the effectiveness of software requirements inspections
(IEEE, 2009)Software inspections aim to find defects early in the development process and studies have found them to be effective. However, there is almost no data available regarding the impact of UML diagram utilization in software ... -
Solutions to challenges of teaching "systems analysis and design" for undergraduate software engineers
(IGI Global, 2009)This study is an enhancement of previous research presented at the 2nd AIS SIGSAND European Symposium on Systems Analysis and Design and its improved version presented at the 3rd National Software Engineering Symposium ... -
Multirelational k-anonymity
(2009)k-Anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-anonymous data set, any identifying information occurs in at least k tuples. Much research has been done to modify a ... -
Geometric random inner product test and randomness of π
(World Scientific Publishing Co. Pte. Ltd., 2009)The Geometric Random Inner Product (GRIP) is a recently developed test method for randomness. As a relatively new method, its properties, weaknesses, and strengths are not well documented. In this paper, we provide a ... -
Are software engineers' responses to incomplete requirements related to project characteristics?
(IEEE, 2009)Software requirements quality affects software product quality. For high-quality software products, software requirements must be complete. When faced with incomplete requirements, software engineers attempt to fill the ... -
Incomplete software requirements and assumptions made by software engineers
(IEEE, 2009)Many software engineers make implicit assumptions when working with incomplete software requirements. To study assumptions made by software engineers while converting incomplete requirements to software design or to ... -
Number guessing
(Australian Association of Mathematics Teachers Inc., 2009) -
The sensitivity of German and British tourists to news shocks
(Emerald Publishing Limited, 2009)Purpose – This study aims to investigate the impact of news shocks on the growth rate of German and British tourist arrivals in Turkey. Design/methodology/approach – This research utilizes GARCH as a detection device to ... -
Examining the effects of moral development level, self-concept, and self-monitoring on consumers’ ethical attitudes
(Springer Netherlands, 2009)This study investigates the possible effects of self-concept, self-monitoring, and moral development level on dimensions of consumers’ ethical attitudes. ‘‘Actively benefiting from illegal activities,’’ ‘‘actively benefiting ... -
The impact of software development companies on software engineers' responses to incomplete requirements
(International Journal of Information Studies, 2009)It is commonly accepted that software requirements quality affects software product quality, and high-quality software products depend on complete requirements. With incomplete requirements, depending on the requirement ... -
ITiCSE'10-Proceedings of the 2010 ACM SIGCSE Annual Conference on Innovation and Technology in Computer Science Education: Foreword
(Association for Computing Machinery, 2010)[No abstract available] -
Balancing energy loads in wireless sensor networks through uniformly quantized energy levels-based clustering
(IEEE, 2010)Clustering is considered a common and an effective method to prolong the lifetime of a wireless sensor network. This paper provides a new insight into the cluster formation process based on uniformly quantizing the residual ... -
Ordinal evaluation and assignment problems
(IEEE, 2010)In many assignment problems, a set of documents such as research proposals, promotion dossiers, resumes of job applicants is assigned to a set of experts for ordinal evaluation, ranking, and classification. A desirable ...