Tehdit ve Muhafazakarlık Arasındaki İlişkiyi Yeniden Düşünmek

2019-12-21
Sayılan, Gülden
Cingöz Ulu, Banu
Weber, Christopher
3. Sosyal Psikoloji Kongresi (2019)

Suggestions

A new offline path search algorithm for computer games that considers damage as a feasibility criterion
Bayılı, Serhat; Polat, Faruk; Department of Computer Engineering (2008)
Pathfinding algorithms used in today’s computer games consider path length or a similar criterion as the only measure of optimality. However, these games usually involve opposing parties, whose agents can inflict damage on those of the others’. Therefore, the shortest path in such games may not always be the safest one. Consequently, a new suboptimal offline path search algorithm that takes the threat sources into consideration was developed, based on the A* algorithm. Given an upper bound value as the tole...
Tehcir Savaş Makinası ve İnşaat
Sargın, Güven Arif (null; 2015-12-27)
Aggression and video games: the effect of justification of violence and presence of a stereotyped target
Koçer, Birsen; Öner Özkan, Bengi; Department of Psychology (2015)
The purpose of the current study is to examine how some of the factors in violent video games affect subsequent aggression. Firstly, the effect of violent content in video games was examined with a prior study. 42 participants (22 female, 20 male) were randomly assigned to play a violent or a neutral game. Results showed that game type did not have an effect on post-gaming aggression. Disregarding the effects of in-game variables was suggested to be the reason for this result. Thus, a second study was condu...
Risk ve Belirsizlik Durumlarındaki Davranışlar
Özdemir, Özlem (Ticaret Bakanlığı, 2018-05-01)
A computational model of memory processes in the expectation-violation effect
Özyörük, Nilüfer; Say, Bilge; Department of Cognitive Sciences (2004)
This thesis focuses on modeling Expectation-Violation Effect, which is the superior recall of weakly associated pairs of words over strongly associated pairs. The goal of this thesis is to provide an exploratory computational model. A virtual experiment is conducted based on the datasets used in the psychological experiment by Amster et al. (1992). The computational modeling of this phenomenon is carried in the medium of ACT-R cognitive architecture.
Citation Formats
G. Sayılan, B. Cingöz Ulu, and C. Weber, “Tehdit ve Muhafazakarlık Arasındaki İlişkiyi Yeniden Düşünmek,” presented at the 3. Sosyal Psikoloji Kongresi (2019), İstanbul, Türkiye, 2019, Accessed: 00, 2021. [Online]. Available: https://hdl.handle.net/11511/70931.