Graduate School of Applied Mathematics

Browse
Search within this community and its collections:
Collections in this community

Filters

Entity Type
Publication (516)
Thesis (339)
Project (77)
Person (25)
Open Course (1)

Has File(s)
No (510)
Yes (448)

Author
Weber, Gerhard Wilhelm (173)
Karasözen, Bülent (95)
Kestel, Sevtap Ayşe (64)
Uğur, Ömür (42)
Cenk, Murat (36)

Subject
Cryptography. (55)
Applied Mathematics (41)
Management Science and Operations Research (37)
Data encryption (Computer science). (30)
Finance. (28)

Date Issued
1991 - 1999 (10)
2000 - 2009 (176)
2010 - 2019 (617)
2020 - 2022 (155)

Item Type
Journal Article (340)
Master Thesis (240)
Conference Paper (112)
Ph.D. Thesis (99)
Project (69)

Recent Submissions

Stochastic discontinuous Galerkin methods with low–rank solvers for convection diffusion equations
Çiloğlu, Pelin; Yücel, Hamdullah (2022-02-01)
© 2021 IMACSWe investigate numerical behaviour of a convection diffusion equation with random coefficients by approximating statistical moments of the solution. Stochastic Galerkin approach, turning the original stochastic...
Default and prepayment options pricing and default probability valuation under VG model
Yilmaz, Bilgi; Hekimoglu, A. Alper; Kestel, Sevtap Ayşe (2022-01-01)
In this paper, a new approach, the Variance Gamma (VG) model, which is used to capture unexpected shocks (e.g., Covid-19) in housing markets, is proposed to contribute to the standard option-based mortgage valuation method...
Impact of Outlier-Adjusted Lee–Carter Model on the Valuation of Life Annuities
Yavrum, Cem; Kestel, Sevtap Ayşe (Springer, London/Berlin , 2022-01-01)
Annuity pricing is critical to the insurance companies for their financial liabilities. Companies aim to adjust the prices using a forecasting model that fits best to their historical data, which may have outliers influ...
Structure-preserving reduced-order modeling of Korteweg–de Vries equation
Uzunca, Murat; Karasözen, Bülent; Yıldız, Süleyman (2021-10-01)
© 2021 International Association for Mathematics and Computers in Simulation (IMACS)Computationally efficient, structure-preserving reduced-order methods are developed for the Korteweg–de Vries (KdV) equations in Hamiltoni...
Viable medical waste chain network design by considering risk and robustness
Lotfi, Reza; Kargar, Bahareh; Gharehbaghi, Alireza; Weber, Gerhard-Wilhelm (2021-10-01)
Medical waste management (MWM) is an important and necessary problem in the COVID-19 situation for treatment staff. When the number of infectious patients grows up, the amount of MWMs increases day by day. We present medic...
MDS Matrices Over Rings For Designing Lightweight Block Cİpher
Yetişer, Gökçe; Yayla, Oğuz; Department of Cryptography (2021-9-30)
The primary intention of this thesis is to generate lightened Maximum Distance Separable (MDS) matrices so as not to have a high implementation cost while providing solid diffusion to a cipher. In this direction, lightweig...
SOME STUDIES ON c-DIFFERENTIAL UNIFORMITY OF SWAPPED INVERSE FUNCTION
ÜNVER, BETÜL; ÖZBUDAK, FERRUH; Department of Cryptography (2021-9-28)
Lately, Ellingsen et al created a new concept by making minor changes on the old concept of (multiplicative) differential. This new definition which has potential to be capable of extending differential cryptanalysis in a ...
Some Studies on CCZ-Equivalence of the Inverse Function
Fidan, Mehtap; ÖZBUDAK, Ferruh; Department of Cryptography (2021-9-28)
Most cryptographic systems, like block ciphers, depend heavily on vectorial Boolean functions. A function with good cryptological properties should have low differential uniformity which is invariant under some equivalence...
Cryptographic Misuse Detection Tools
Koru, Emine Selin; Cenk, Murat; Gürkan Balıkçıoğlu, Pınar; Department of Cryptography (2021-9-24)
Today digital devices are an inevitable part of our lives. We use these devices for things like sharing photos, communicating with friends, and exchanging money. All these actions need privacy. In fact, properly used crypt...
ANALYSIS AND IMPLEMENTATION OF BINARY POLYNOMIAL MULTIPLICATION
OLUDO, Mary Achieng; Cenk, Murat; Department of Cryptography (2021-9-09)
N. Koblitz and V. Miller originally proposed the concept of elliptic curve cryptography in 1985. It is fast gaining popularity in public key cryptosystems as it boasts of an advantage over current public key cryptosystems,...
STUDIES ON IMPLEMENTATION OF SOME MRD CODES
Özkerim, Rıdvan; Özbudak, Ferruh; Department of Cryptography (2021-9-09)
With the development of quantum computers that can process much faster than classical com- puters, the classical cryptosystems used today began to be strengthened or replaced with other cryptosystems. Parallel to this aim,...
Extension of Leap Condition in Approximate Stochastic Simulation Algorithms of Biological Networks
Demirbüken, Saliha; Purutçuoğlu Gazi, Vilda; Uğur, Ömür; Department of Scientific Computing (2021-9-08)
The approximate stochastic simulation (ASS) algorithms are the alternative approaches to generate the complex biological systems with a loss in accuracy by gaining from computational demand. There are a number of approxima...
IMPLEMENTATION ANALYSIS OF CRYPTOGRAPHY TOOLBOX IN HYPERLEDGER
ŞİMŞEK, Ahmet; Yayla, Oğuz; Department of Cryptography (2021-9-7)
Hyperledger was set up with the aim of being an open-source platform targeted at accelerating industry-wide collaboration hosted by The Linux Foundation for developing robust and dependable blockchain and distributed ledge...
Stochastic Discontinuous Galerkin Methods with Low-Rank Solvers for Convection Diffusion Equations
Çiloğlu, Pelin; Yücel, Hamdullah (2021-09-06)
To simulate complex kinds of behavior in physical systems, one makes predictions and hypotheses about certain outputs of interest with the help of simulation of mathematical models. However, due to the lack of knowledge or...
On Measuring Security Bounds of Some Ciphers Using Mixed Integer Linear Programming (MILP) Approach
Türesin, Can; Doğanaksoy, Ali; Koçak, Onur; Department of Cryptography (2021-9-6)
Block ciphers are one of the symmetric key encryption algorithms that are used in many devices. Its increasing popularity has led to the emergence of new cryptanalysis methods. Therefore, measuring block cipher's security ...
Residual based a posteriori error estimation for Dirichlet boundary control problems
Yücel, Hamdullah (2021-09-01)
We study a residual–based a posteriori error estimate for the solution of Dirichlet boundary control problem governed by a convection diffusion equation on a two dimensional convex polygonal domain, using the local discont...
Preface: Special Issue on Modeling, Simulation, and Optimization in Operational Research
Weber, Gerhard-Wilhelm; Thomas, J. Joshua; Saucedo, Jose Antonio Marmolejo; Fiore, Ugo; Litvinchev, Igor; Vasant, Pandian (2021-09-01)
Time varying control of magnetohydrodynamic duct flow
Evcin, Cansu; Uğur, Ömür; Tezer, Münevver (2021-09-01)
© 2021 Elsevier Masson SASOptimal control of the unsteady, laminar, fully developed flow of a viscous, incompressible and electrically conducting fluid is considered under the effect of a time varying magnetic field B0(t) ...
An Introduction to the Special Issue on Numerical Techniques Meet with OR - Part II
Gurbuz, Burcu; Weber, Gerhard-Wilhelm (2021-09-01)
The special issue: "Numerical Techniques Meet with OR" of the Foundations of Computing and Decision Sciences consists of two parts which are of the main theme of numerical techniques and their applications in multi-discipl...
Gradient-based grey wolf optimizer with Gaussian walk: Application in modelling and prediction of the COVID-19 pandemic
Khalilpourazari, Soheyl; Hashemi Doulabi, Hossein; Özyüksel Çiftçioğlu, Aybike; Weber, Gerhard-Wilhelm (2021-09-01)
© 2021 Elsevier LtdThis research proposes a new type of Grey Wolf optimizer named Gradient-based Grey Wolf Optimizer (GGWO). Using gradient information, we accelerated the convergence of the algorithm that enables us to so...
Citation Formats