Zobrazeno 1 - 10
of 2 631
pro vyhledávání: '"Ongun A"'
Carbon biphenylene network (C-BPN), which is an ultra-thin material consisting of carbon atoms arranged in square-hexagonal-octagonal (4-6-8) periodic rings, has intriguing properties for nano-scale device design due to its unique crystal structure.
Externí odkaz:
http://arxiv.org/abs/2408.14006
Publikováno v:
ACS Omega, Vol 9, Iss 42, Pp 43219-43232 (2024)
Externí odkaz:
https://doaj.org/article/f2358777b1c8469e8a8103c888df7cff
Autor:
Ceren Hıdıroğlu Ongun
Publikováno v:
Psikiyatride Güncel Yaklaşımlar, Vol 16, Iss 3, Pp 554-568 (2024)
Social cognitive functions make it possible to correctly recognize and interpret the emotions and mental states of others in the social environment, to understand their intentions correctly and to react accordingly. Therefore, these functions arecrit
Externí odkaz:
https://doaj.org/article/56860ce5843d49018552911a85cf100d
Publikováno v:
Frontiers in Pediatrics, Vol 12 (2024)
BackgroundThis study aimed to investigate the effectiveness of intranasal dexmedetomidine in reducing pain scores during retinopathy of prematurity (ROP) screening examinations in preterm infants.MethodsInfants born at ≤32 weeks of gestational age,
Externí odkaz:
https://doaj.org/article/aa99b7e9fdf749458bcde7dde4757ea9
The cyber-threat landscape has evolved tremendously in recent years, with new threat variants emerging daily, and large-scale coordinated campaigns becoming more prevalent. In this study, we propose CELEST (CollaborativE LEarning for Scalable Threat
Externí odkaz:
http://arxiv.org/abs/2205.11459
Publikováno v:
In Energy & Buildings 15 December 2024 325
Autor:
Sengupta, Abantika, Al Assaad, Douaa, Berk Kazanci, Ongun, Shinoda, Jun, Breesch, Hilde, Steeman, Marijke
Publikováno v:
In Building and Environment 1 November 2024 265
Autor:
Ongun, Talha, Spohngellert, Oliver, Miller, Benjamin, Boboila, Simona, Oprea, Alina, Eliassi-Rad, Tina, Hiser, Jason, Nottingham, Alastair, Davidson, Jack, Veeraraghavan, Malathi
Recent self-propagating malware (SPM) campaigns compromised hundred of thousands of victim machines on the Internet. It is challenging to detect these attacks in their early stages, as adversaries utilize common network services, use novel techniques
Externí odkaz:
http://arxiv.org/abs/2112.13798
Autor:
Ongun, Talha, Stokes, Jack W., Or, Jonathan Bar, Tian, Ke, Tajaddodianfar, Farid, Neil, Joshua, Seifert, Christian, Oprea, Alina, Platt, John C.
In recent years, enterprises have been targeted by advanced adversaries who leverage creative ways to infiltrate their systems and move laterally to gain access to critical data. One increasingly common evasive method is to hide the malicious activit
Externí odkaz:
http://arxiv.org/abs/2111.15039
Publikováno v:
Korean Journal of Anesthesiology, Vol 77, Iss 4, Pp 484-485 (2024)
Externí odkaz:
https://doaj.org/article/af979c3f55cc4abd8f9a11b0e9bf94bb