A computer simulation model for seaport planning

Güler, Işıkhan


A reinforcement learning based algorithm for personalization of digital, just-in-time, adaptive interventions
Gönül, Suat; Namlı, Tuncay; Coşar, Ahmet; Toroslu, İsmail Hakkı (2021-05-01)
Suboptimal health related behaviors and habits; and resulting chronic diseases are responsible for majority of deaths globally. Studies show that providing personalized support to patients yield improved results by preventing and/or timely treatment of these problems. Digital, just-in-time and adaptive interventions are mobile phone-based notifications that are being utilized to support people wherever and whenever necessary in coping with their health problems. In this research, we propose a reinforcement ...
The Rise of Ottoman İzmir as a commercial center
Atik, Tuğçe; Tülüveli, Güçlü; Department of Middle East Studies (2014)
This thesis aims to study external and internal factors which contributed to the rise of İzmir as one of the most important commercial city of the Ottoman Empire from the seventeenth century onwards. In this study, it is argued that beside the political and economic changes took place in the Ottoman Empire, transformations in the world economy affected the rise of İzmir port.
Seismic hazard assessment for the North Anatolian and San Andreas faults based on random field models
Akkaya, AD; Yücemen, Mehmet Semih (1999-12-15)
The North Anatolian fault (NAF), located in northern Turkey and California's San Andreas fault (SAF) show remarkable similarities. A random field model, developed by the authors (Akkaya & Yucemen 1996) is utilized to compare the seismicity characteristics of the two faults on a statistical basis. The seismic hazard model is based on the level-crossing theory of random fields and considers the space-time correlations simultaneously and explicitly through the use of spatial and temporal scales of fluctuation....
An Analysis on efficient polynomial multiplication algorithms for cryptographic purposes
İlter, Murat Burhan; Cenk, Murat; Department of Cryptography (2016)
The idea of Public Key Cryptography showed up after the studies conducted by W. Diffie and M. Hellman in 1976. In the light of these works, RSA, the first Public Key Cryptography algorithm, came into play. In this algorithm, modular exponentiation is highly costly. In addition to this, key sizes of public key cryptography algorithms has become longer in order to ensure the security as the time passes. For these reasons, the speed of algorithms is relatively slower when it is compared to the speed of ones in...
A new species of Calanopia (Copepoda, Calanoida) from the central Red Sea
Unal, E; Shmeleva, AA (Brill, 2002-01-01)
A new species of calanoid copepod, Calanopia kideysi, has been found in the central Red Sea. An adult female and a young male of the 5(th) copepodite stage are described. Comparisons are made between the new species and the other similar Indo-Pacific forms from the Red Sea: Calanopia minor A. Scott, 1902, and Calanopia n. sp. A (Uysal & Shmeleva, submitted). The new copepod is without lateral cephalic hooks and can be distinguished from these other small Calanopia species by the shape of its genital somite ...
Citation Formats
I. Güler, “A computer simulation model for seaport planning,” Ph.D. - Doctoral Program, Middle East Technical University, 1996.