WoS İndeksli Yayınlar Koleksiyonu
Permanent URI for this collectionhttps://gcris.khas.edu.tr/handle/20.500.12469/4465
Browse
Browsing WoS İndeksli Yayınlar Koleksiyonu by Scopus Q "N/A"
Now showing 1 - 20 of 89
- Results Per Page
- Sort Options
Article Citation - WoS: 0Ab Hukuk Düzeni ve Emca’da Anonim Ortaklıklarda Çoğunluğun Kötüye Kullanımının Etkilerinin Azaltılması: İzole ve Halka Kapalı Türk Anonim Ortaklıklarında Azınlığın Korunması İçin Esinlenmek Mümkün Mü?(Istanbul Univ, Fac Law, 2024) Görmez, OnurAB mevzuatında, çoğunluğun kötüye kullanılması hususunu düzenleyen genel bir hüküm bulunmamaktadır. Üye devletlerde ise konuya dair iki ayrı yaklaşım bulunmaktadır. Bunlardan Fransa’da kabul gören çift eşikli yaklaşım olarak adlandırılabilecek ilki hem azınlığın hem de ortaklığın çıkarının zedelenmesini aramaktadır. Almanya ve İskandinav ülkeleri gibi bazı ülkelerde kabul gören tek aşamalı yaklaşım olarak adlandırılabilecek diğer yaklaşımda yalnızca azınlığın çıkarının zedelenmesi yeterli görülmektedir. AB düzenlemeleri de dikkate alınarak akademisyenler tarafından hazırlanan bir model yasa çalışması olan EMCA’da da kendisine yer bulan ikinci yaklaşım azınlık pay sahipleri için daha iyi bir koruma sunmaktadır; özellikle izole ve halka kapalı anonim ortaklıkların azınlık pay sahipleri yönünden. Adalet Divanı’nın Audiolux kararıyla da ortaya konduğu üzere AB Hukuku’nda pay sahipleri yönünden uygulama alanı bulacak genel geçer bir eşit işlem ilkesi söz konusu değildir. EMCA’da olduğuna benzer şekilde TTK m.357’de ise eşit şartlardaki pay sahiplerinin eşit işleme tabi tutulması gerekliliğini öngören hüküm uyarınca, Türk hukukunda da ortaklıkta çoğunluğun kötüye kullanılmasının tartışma konusu olduğu hallerde, kötüye kullanmayı tespit için tek eşikli yaklaşım yeterli olmalıdır. İzole ve halka açık olmayan anonim ortaklıklarda azınlık pay sahiplerinin etkin bir şekilde korunması için uygulanabilecek yöntemler bakımından ise, sınır aşan tür değiştirme, birleşme ve bölünmeler yönünden 2017/1132 sayılı Yönerge seviyesinde de öngörülen azınlığa ortaklıktan çıkma hakkı tanıyan bir düzenlemenin getirilmesi yerinde olacaktır. Haklı nedenle feshi düzenleyen TTK m.531’in değiştirilmesi suretiyle azınlık pay sahiplerine, paylarını satarak ortaklıktan çıkmayı doğrudan mahkemeden talep edebilecekleri bir düzenleme getirilmesi de düşünülmelidir. EMCA Bölüm 11.35 ve Bölüm 11.37’deki pay sahiplerinin paylarını satarak ortaklıktan çıkması ile payların satın alınmasını talep etme veya paylarını satmaya zorlama hususlarında öngörülen hükümlerden TTK için de esinlenilebilir.Book Part Citation - WoS: 1Citation - Scopus: 1Accelerated Trends in Tourism Marketing and Tourist Behaviour(Routledge, 2023) Kozak, Metin; Kozak, Metin; Kozak, Metin[No Abstract Available]Article Citation - WoS: 6Citation - Scopus: 5The acquisition and use of relative clauses in Turkish-learning children's conversational interactions: a cross-linguistic approach(Cambridge University Press, 2019) Arslan Uzundağ, Berna; Küntay, Aylin C.Using a cross-linguistic approach, we investigated Turkish-speaking children's acquisition and use of relative clauses (RCs) by examining longitudinal child-caregiver interactions and cross-sectional peer conversations. Longitudinal data were collected from 8 children between the ages of 8 and 36 months. Peer conversational corpus came from 78 children aged between 43 and 64 months. Children produced RCs later than in English (Diessel, 2004) and Mandarin (Chen & Shirai, 2015), and demonstrated increasing semantic and structural complexity with age. Despite the morphosyntactic difficulty of object RCs, and prior experimental findings showing a subject RC advantage, preschool-aged children produced object RCs, which were highly frequent in child-directed speech, as frequently as subject RCs. Object RCs in spontaneous speech were semantically less demanding (with pronominal subjects and inanimate head nouns) than the stimuli used in prior experiments. Results suggest that multiple factors such as input frequency and morphosyntactic and semantic difficulty affect the acquisition patterns.Book Part Citation - WoS: 4Citation - Scopus: 4Alternative Credit Scoring and Classification Employing Machine Learning Techniques on a Big Data Platform(Institute of Electrical and Electronics Engineers Inc., 2019) Dağ, Hasan; Kiyakoğlu, Burhan Yasin; Rezaeinazhad, Arash Mohammadian; Korkmaz, Halil Ergun; Dağ, HasanWith the bloom of financial technology and innovations aiming to deliver a high standard of financial services, banks and credit service companies, along with other financial institutions, use the most recent technologies available in a variety of ways from addressing the information asymmetry, matching the needs of borrowers and lenders, to facilitating transactions using payment services. In the long list of FinTechs, one of the most attractive platforms is the Peer-to-Peer (P2P) lending which aims to bring the investors and borrowers hand in hand, leaving out the traditional intermediaries like banks. The main purpose of a financial institution as an intermediary is of controlling risk and P2P lending platforms innovate and use new ways of risk assessment. In the era of Big Data, using a diverse source of information from spending behaviors of customers, social media behavior, and geographic information along with traditional methods for credit scoring prove to have new insights for the proper and more accurate credit scoring. In this study, we investigate the machine learning techniques on big data platforms, analyzing the credit scoring methods. It has been concluded that on a HDFS (Hadoop Distributed File System) environment, Logistic Regression performs better than Decision Tree and Random Forest for credit scoring and classification considering performance metrics such as accuracy, precision and recall, and the overall run time of algorithms. Logistic Regression also performs better in time in a single node HDFS configuration compared to a non-HDFS configuration.Conference Object Citation - WoS: 0Citation - Scopus: 1Analysis and Optimization of the Network Throughput in IEEE 802.15.13 based Visible Light Communication Networks(IEEE, 2021) Baykaş, Tunçer; Elamassie, Mohammed; Baykas, Tuncer; Uysal, MuratIn line with the growing interest on visible light communication (VLC), IEEE has initiated standardization efforts on this emerging technology. In this work, we consider IEEE 802.15.13 Optical Wireless Personal Area Networks (OWPAN) standard draft. The underlying MAC protocol uses contention free and contention access periods. For a standard-compliant VLC network, we analyze the network load and propose an algorithm to improve the network throughput by proper selection of period lengths. Our suggested algorithm improves the network performance by at least 5% in the case of variable network traffic up to 15 active users.Conference Object Citation - WoS: 1Citation - Scopus: 5Analysis of deep learning based path loss prediction from satellite images(IEEE, 2021) Baykaş, Tunçer; Ates, Hasan F.; Baykas, Tuncer; Gunturk, Bahadir K.Determining the channel model parameters of a wireless communication system, either by measurements or by running electromagnetic propagation simulations, is a time-consuming process. Any rapid deployment of network demands faster determination of at least major channel parameters. In this paper, we investigate the idea of using deep convolutional neural networks and satellite images for channel parameters (i.e., path loss exponent n and shadowing factor sigma) prediction in a cellular network with aerial base stations. Specifically, we investigate the performance dependency of the method on three different factors: height of the transmitter antenna, quantization levels of the channel parameters and architectural design of CNN. The results presented in this paper show a high prediction accuracy of the channel parameters in real-time.Article Citation - WoS: 1An analysis of social media content shared by right-wing extremist groups in the United States, the Great Britain and Australia(Istanbul Univ, Fac Communication, 2023) Baş, Özen; Bas, OzenThe extreme right movements have increasingly appeared on social media, especially on Twitter and Facebook, coinciding with the 2019 New Zealand attack, the 2019 El Paso incident, and Britain's exit from the European Union in 2020. This study examines the content and the form of extreme right-wing activities on Facebook and Twitter to promote their ideologies. A qualitative content analysis was conducted on posts shared by extreme-right groups on public Facebook and Twitter accounts in Great Britain, the United States and Australia. The sample spans from March 15, 2019 to February 5, 2020. The posts were coded according to a coding instrument developed based on the existing literature spreading extremist ideologies on social media. The coding instrument consisted of categories and subcategories such as 'the protection of western values', 'anti-LGBT activism', 'anti-feminism', 'anti-Islam', 'anti-immigrant sentiments', 'fostering the white race', and 'anti-elitist populism'. Findings suggest that the most prevalent extremist ideologies on Facebook and Twitter posts were 'anti-elitist populism' and 'the protection of western values'. Also, extremist groups heavily shared posts that combined texts and images to spread their ideologies on social media.Article Citation - WoS: 79Citation - Scopus: 95The association of the severity of obstructive sleep apnea with plasma leptin levels(Amer Medical Assoc., 2003) Öztürk, Levent; Ünal, Murat; Tamer, Lülüfer; Çelikoğlu, FiruzObjective: To examine whether circulating leptin levels correlate with the severity of disease in patients with obstructive sleep apnea. Design: Prospective nonrandomized study. Setting: Referral sleep laboratory for patients with sleep-disordered breathing and biochemistry laboratory. Patients: Thirty-two subjects (mean+/-SD age 47+/-12 years) who were referred for suspected sleep apnea underwent an overnight sleep study and fasting morning venous blood sampling. Patients were divided into 3 groups with respect to apnea-hypopnea index: (1) severe sleep apnea (n=8) apnea-hypopnea index greater than 20Conference Object Citation - WoS: 10Citation - Scopus: 11Automatic Adaptation of Hypermutation Rates for Multimodal Optimisation(Assoc Computing Machinery, 2021) Çörüş, Doğan; Oliveto, Pietro S.; Yazdani, DonyaPrevious work has shown that in Artificial Immune Systems (AIS) the best static mutation rates to escape local optima with the ageing operator are far from the optimal ones to do so via large hypermutations and vice-versa. In this paper we propose an AIS that automatically adapts the mutation rate during the run to make good use of both operators. We perform rigorous time complexity analyses for standard multimodal benchmark functions with significant characteristics and prove that our proposed algorithm can learn to adapt the mutation rate appropriately such that both ageing and hypermutation are effective when they are most useful for escaping local optima. In particular, the algorithm provably adapts the mutation rate such that it is efficient for the problems where either operator has been proven to be effective in the literature.Article Citation - WoS: 4Citation - Scopus: 4Balance sheet effects of foreign currency debt and real exchange rate on corporate investment: evidence from Turkey(Elsevier B.V., 2021) Demirkılıç, SerkanI analyze the balance sheet channels of depreciation of the Turkish non-financial corporations for 2003–2015. Having constructed a novel, hand-collected firm-level dataset on the composition and term structure of foreign currency assets and liabilities, I show that foreign currency debt and mismatch has a significant negative balance sheet effect on capital investment following a depreciation. The results remain same even after controlling for foreign currency assets and exports. This implies that the contractionary net worth effect of depreciation dominates its expansionary competitiveness effect. The result is more pronounced for the firms with short-term foreign currency exposures.Conference Object Citation - WoS: 0Block Elimination Distance(Springer international Publishing Ag, 2021) Yaşar Diner, Öznur; Giannopoulou, Archontia C.; Stamoulis, Giannos; Thilikos, Dimitrios M.We introduce the parameter of block elimination distance as a measure of how close a graph is to some particular graph class. Formally, given a graph class G, the class B(G) contains all graphs whose blocks belong to G and the class A(G) contains all graphs where the removal of a vertex creates a graph in G. Given a hereditary graph class G, we recursively define G((k)) so that G((0)) = B(G) and, if k >= 1, G((k)) = B(A(G((k-1)))). The block elimination distance of a graph G to a graph class G is the minimum k such that G is an element of G((k)) and can be seen as an analog of the elimination distance parameter, defined in [J. Bulian & A. Dawar. Algorithmica, 75(2):363-382, 2016], with the difference that connectivity is now replaced by biconnectivity. We show that, for every non-trivial hereditary class G, the problem of deciding whether G. G(k) is NPcomplete. We focus on the case where G is minor-closed and we study the minor obstruction set of G((k)) i.e., the minor-minimal graphs not in G((k)). We prove that the size of the obstructions of G((k)) is upper bounded by some explicit function of k and the maximum size of a minor obstruction of G. This implies that the problem of deciding whether G is an element of G((k)) is constructively fixed parameter tractable, when parameterized by k. Our results are based on a structural characterization of the obstructions of B(G), relatively to the obstructions of G. Finally, we give two graph operations that generate members of G((k)) from members of G((k-1)) and we prove that this set of operations is complete for the class O of outerplanar graphs. This yields the identification of all members O boolean AND G((k)), for every k is an element of N and every non-trivial minor-closed graph class G.Conference Object Citation - WoS: 0Citation - Scopus: 0Channel Estimation and Physical Layer Security in Optical MIMO-OFDM based LED Index Modulation(IEEE, 2023) Panayırcı, Erdal; Panayırcı, Erdal; Khalighi, Mohammad AliIn this paper, we propose a new and low-complexity channel estimation algorithm for the generalized LED index modulation (GLIM), recently proposed for visible-light communication systems based on multi-input multi-output (MIMO) and orthogonal frequency-division multiplexing (OFDM). For this scheme, denoted by GLIM-OFDM, we investigate the bit-error rate (BER), the mean-square error (MSE) of channel estimation, as well as the Cramer-Rao bound on the latter. Furthermore, we present a novel physical layer security (PLS) technique for the GLIM-OFDM scheme using precoding at the transmitter assuming it has the channel state information (CSI) between the LEDs and a legitimate user, but no knowledge of the CSI corresponding to eavesdroppers. The efficiency of the proposed PLS technique is demonstrated through numerical results.Conference Object Citation - WoS: 2Citation - Scopus: 3Channel Estimation Using Optical MIMO OFDM Based LED Index Modulation(IEEE, 2021) Panayırcı, Erdal; Panayırcı, ErdalIn this paper, a new MIMO channel estimation technique is proposed for generalized LED index modulation (GLIM-OFDM) developed for multi-input multi-output (MIMO) orthogonal frequency division multiplexing (OFDM) based VLC systems. The mean square error (MSE) of the channel estimation algorithm, the bit error rate (BER) and the Cramer-Rao (CR) lower-bound of the system were obtained analytically and the performance of the algorithm according to the signal-to-noise ratio was investigated by computer simulations. From the obtained MSE, BER and CR curves it is concluded that the MSE performance of the proposed channel estimation algorithm is very high and the BER performance of the system obtained with the estimated channel information is very close to the BER performance in the case of perfect knowledge of the channel.Article Citation - WoS: 0The Choice of Law in the Infringement of Intellectual Property Rights by Soft Law Provisions(Istanbul Univ, 2020) Ömeroğlu, EkinThis study deals with the party autonomy principle as a connecting factor in the infringement of intellectual property rights in the light of soft law provisions. The territoriality principle and the lex loci protectionis rule govern as the main doctrines of law applicable to intellectual property infringement disputes. However, several academic projects from all over the world (the Principles by the American Law Institute, the Principles by the European Max Planck Group on Conflict of Laws in Intellectual Property, the Japanese Transparency Proposal, the Joint Principles drafted by members of the Private International Law Association of Korea, Japanese Waseda University Global COE Project and the Draft Guidelines on Intellectual Property in Private International Law of The International Law Association Intellectual Property and Private International Law Committee) suggested the party autonomy principle for the infringement of intellectual property rights in contrast to Article 8(3) of the Rome II Regulation. All these principles have no legally binding effect, but they are a set of principles that could be used both by international and national legislative bodies and courts. Moreover, the party autonomy principle in intellectual property infringement cases has been accepted by Turkish Private International Law Act (PILA), Swiss PILA and Chinese PILA. The purpose of this study is to analyse both soft law and national law provisions comparatively. Although the common aspect of the legal principles is to accept the will of the party, all of the provisions differ in several aspects. This study attempts to analyse and evaluate the suggested developments of the choice of law for intellectual property infringement cases.Book Part Co-Insurance and Rights of Subrogation Post-gard Marine and Energy V China National Chartering Company Ltd(Edward Elgar Publishing Ltd, 2024) Noussia, Kyriaki; Aslan, Yavuz CanArticle Citation - WoS: 106Citation - Scopus: 126Cognitive impairment in amyotrophic lateral sclerosis: evidence from neuropsychological investigation and event-related potentials(Elsevier Science Bv, 2002) Hanagasi, Hasmet A.; Gurvit, I. Hakan; Ermutlu, Numan; Kaptanoğlu, Gulustu; Karamürsel, Sacit; Idrisoğlu, Halil A.; Emre, Murat; Demiralp, TamerThe presence of subclinical cognitive impairment in patients with amyotrophic lateral sclerosis (ALS) is investigated using neuropsychological assessment and event-related potential recordings (ERP). An extensive battery of neuropsychological tests assessing the domains of attention memory language visuo-spatial and executive functions were administered to 20 non-demented patients with sporadic ALS and 13 age- and education-matched healthy control subjects. Mismatch negativity (MMN) P3b P3a (novelty P300) and contingent negative variation (CNV) were recorded. ALS patients were significantly impaired in tests of working memory sustained attention response inhibition naming verbal fluency and complex visuo-spatial processing. The memory impairment seemed to be secondary to deficits in forming learning strategies and retrieval. In ERP recordings P3a and P3b amplitudes of ALS patients were lower compared with the controls P3a latencies were significantly longer and mean CNV amplitudes were higher. These results indicate subclinical impairment of cognitive functions in patients with ALS. The pattern of cognitive impairment suggests the dysfunction of the frontal network. (C) 2002 Elsevier Science B.V. All rights reserved.Conference Object Citation - WoS: 0Citation - Scopus: 0Comparing Deep Neural Networks and Machine Learning for Detecting Malicious Domain Name Registrations(Institute of Electrical and Electronics Engineers Inc., 2024) Ecevit, Mert İlhan; Çolhak,F.; Ecevit,M.İ.; Dağ, Hasan; Daǧ,H.; Creutzburg,R.This study highlights the effectiveness of deep neural network (DNN) models, particularly those integrating natural language processing (NLP) and multilayer perceptron (MLP) techniques, in detecting malicious domain registrations compared to traditional machine learning (ML) approaches. The integrated DNN models significantly outperform traditional ML models. Notably, DNN models that incorporate both textual and numeric features demonstrate enhanced detection capabilities. The utilized Canine + MLP model achieves 85.81% accuracy and an 86.46% Fl-score on the MTLP Dataset. While traditional ML models offer advantages such as faster training times and smaller model sizes, their performance generally falls short compared to DNN models. This study underscores the trade-offs between computational efficiency and detection accuracy, suggesting that their superior performance often justifies the added costs despite higher resource requirements, © 2024 IEEE.Letter Citation - WoS: 14Citation - Scopus: 18Decrease in Staphylococcus aureus surgical-site infection rates after orthopaedic surgery after intranasal mupirocin ointment(W B Saunders Co Ltd, 2004) Coskun, D; Aytac, J[Abstract Not Available]Article Citation - WoS: 1Defining Italian Neorealism: A Compulsory Movement(Univ Pittsburgh, Univ Library System, 2013) Kartal, EsmaBeing one of the most influential cinematic movements in film history, Italian neorealism has not been very easy to define. Although one can easily recognize a neorealist film, not all neorealist films share the exact same characteristics. In this paper, four films that have often been labeled as neorealist will be discussed in light of their makers' views on neorealism and the general characteristics of neorealism as a movement. These films are Roberto Rossellini's Germania anno zero (1948), Vittorio De Sica's Ladri di biciclette (1948) and Umberto D. (1952), and lastly Federico Fellini's La strada (1954).Article Citation - WoS: 0DESIGN TABLE FORMATION OF STEPPED IMPEDANCE PROTOTYPE FILTERS(Istanbul Univ, Fac Engineering, 2010) Şengül, MetinIn literature, there exist some tables containing normalized element values, to design low-pass lumped-element prototype filters with several different responses like maximally flat or equal-ripple. In this work, an algorithm is presented, to form such tables for stepped impedance prototype filters. By using the proposed algorithm, a table for 0.5 dB equal-ripple stepped impedance prototype filter is formed. Then a design example is given, to show the utilization of the formed table.