Search
Now showing items 21-30 of 418
A Novel Selective Deep Eutectic Solvent Extraction Method for Versatile Determination of Copper in Sediment Samples by ICP-OES
(SPRINGER, 2017)
In the present study, a simple, mono step deep eutectic solvent (DES) extraction was developed for selective extraction of copper from sediment samples. The optimization of all experimental parameters, e.g. DES type, ...
Laparoscopy-assisted micropercutaneous choledocholithotripsy with holmium laser in a cholecystectomized patient: an initial report
(TERMEDIA PUBLISHING HOUSE LTD, 2017)
We present a novel minimally invasive technique, laparoscopy-assisted micropercutaneous choledocholithotripsy, for choledocholithiasis that cannot be treated with other endoscopic techniques. This technique includes standard ...
STURM-LIOUVILLE OPERATOR WITH PARAMETER-DEPENDENT BOUNDARY CONDITIONS ON TIME SCALES
(TEXAS STATE UNIV, 2017)
In this study, we consider a boundary-value problem generated by a Sturm-Liouville dynamic equation on a time scale with boundary conditions depending on a spectral parameter. We introduce the operator formulation of the ...
Truncation thresholds: a pair of spike detection thresholds computed using truncated probability distributions
(TUBITAK SCIENTIFIC & TECHNICAL RESEARCH COUNCIL TURKEY, 2017)
We describe a method for computing a pair of spike detection thresholds, called 'truncation thresholds', using truncated probability distributions, for extracellular recordings. In existing methods the threshold is usually ...
Numerical taxonomy of Ormyrus Westwood, 1832 (Ormyridae: Hymenoptera) species based on general morphology in Sivas
(ENTOMOLOGICAL SOC TURKEY, EGE UNIV, 2017)
The main objectives of the study were to determine the adequacy and reliability of characters used for identification of Ormyrus (Ormyridae: Hymenoptera) species, and the relationships between species within the genus by ...
Attribute based privacy impact assessment method for the protection of personal data
(GAZI UNIV, FAC ENGINEERING ARCHITECTURE, 2017)
Personal data is sensitive information asset primarily needed to be protected. In order to protect personal data, privacy-protected rules, designs, guidelines, and legal arrangements have been developed so far. Especially, ...
Interparental Conflict and Adolescents' Relational Aggression and Loneliness: The Mediating Role of Maternal Psychological Control
(SPRINGER, 2017)
Research has shown that frequent, intense, and poorly resolved conflict between parents relates to adolescents' adjustment problems but the mechanisms that explain such a link have not been fully uncovered. In this prospective ...
Real-world stroke prevention strategies in nonvalvular atrial fibrillation in patients with renal impairment
(WILEY, 2017)
BackgroundThe data regarding stroke prevention strategies in nonvalvular atrial fibrillation (NVAF) are limited especially in patients with renal impairment (RI). We sought to evaluate management dilemmas in patients with ...
EIGENVALUES OF STURM-LIOUVILLE OPERATORS AND PRIME NUMBERS
(TEXAS STATE UNIV, 2017)
We show that there is no function q(x) is an element of L-2(0, 1) which is the potential of a Sturm-Liouville problem with Dirichlet boundary condition whose spectrum is a set depending nonlinearly on the set of prime ...
The Preschool Classroom Management and Inclusion in Turkey
(ANADOLU UNIV, 2017)
This study evaluates classroom management of preschool teachers by using the data collected from 147 teachers who have and do not have children with disabilities in their classrooms. The Turkish Form of the Teacher Strategies ...