Graduate School of Applied Mathematics

Browse
Search within this community and its collections:
Collections in this community

Filters

Entity Type
Publication (707)
Thesis (444)
Project (89)
Researcher (40)
Open Course (1)

Has File(s)
No (671)
Yes (610)

Author
Weber, Gerhard Wilhelm (216)
Karasözen, Bülent (98)
Kestel, Sevtap Ayşe (92)
Uğur, Ömür (57)
Cenk, Murat (47)

Subject
Natural Sciences (82)
Cryptography. (55)
Engineering and Technology (50)
Applied Mathematics (41)
Management Science and Operations Research (37)

Date Issued
1991 - 1999 (10)
2000 - 2009 (177)
2010 - 2019 (642)
2020 - 2026 (452)

Item Type
Journal Article (471)
Master Thesis (306)
Conference Paper (167)
Ph.D. Thesis (138)
Project (70)

Recent Submissions

HESITANT FUZZY LINGUISTIC MATRIX GAME AND ITS APPLICATION IN MCDM PROBLEM
Jana, Jishu; Roy, Sankar Kumar; Weber, Gerhard Wilhelm (2026-01-01)
. This study focuses on how to establish a connection between game theory and decision making under an uncertain environment. To tackle this uncertainty, an expansion of the hesitant fuzzy set and linguistic term set, i.e....
Multi-criteria group decision-making method using Spherical Fuzzy Z-Numbers for smart technology revolution in municipal waste management
Ashraf, Shahzaib; Naeem, Muhammad; Jana, Chiranjibe; Akram, Maria; Weber, Gerhard Wilhelm (2025-12-01)
Due to the new phenomenon of globalization and the fast growing cities, there is drastic pressure on the conventional methods of waste management hence the need for innovative management wastage that is proactive to the th...
Linearly Implicit Exponential Integrators for Damped Hamiltonian Pdes
UZUNCA, MURAT; Karasözen, Bülent (2025-09-29)
We construct second-order structure-preserving two-step linearly implicit exponential integrators for Hamiltonian partial differential equations with linear constant damping combining discrete gradient methods and polariza...
Spatio-temporal crop yield prediction using time-varying copula and actuaries climate index
Yavrum, Cem; Kestel, Sevtap Ayşe; Garrido, José (2025-09-10)
Climate anomalies pose significant threats to agricultural productivity and food security by severely disrupting crop yields. While weather conditions at harvest time are important, extreme climate anomalies occurring du...
An Analaysis on Quantum Implementation ofLightweiht Hash Algorithm
Akkocaoğlu, Hande; Yayla, Oğuz; Department of Cryptography (2025-9-5)
The rapid advancements in quantum technologies have introduced significant threats to the security of conventional cryptographic systems. In particular, the evaluation of quantum resource requirements—measured in terms of ...
INSURANCE FRAUD DETECTION VIA MACHINE LEARNING AND EXPLAINABLE ARTIFICIAL INTELLIGENCE (XAI)
Tezel, Cihan; TEMOÇİN, Büşra Zeynep; Department of Actuarial Sciences (2025-9-1)
This thesis studies insurance fraud detection with machine learning (ML) methods and explainable artificial intelligence (XAI) tools. The dataset contains insurance policies and their related claims, where fraud is marked ...
CLIMATE-ADJUSTED LONGEVITY RISK ON SECOND PILLAR PENSION SYSTEM MODELLING: TURKIYE CASE
Narlıoğlu, Tuğba; Kestel, Ayşe Sevtap; Department of Actuarial Sciences (2025-9-1)
This thesis aims to assess the longevity risk in the second pillar pension system (SPPS) by combining demographic mortality modelling with climate-driven mortality estimation. In the case of Turkiye, its demographic data i...
Hybrid-Triggered CAT Bond Pricing For Flood Risk Using Copula-EVT Models
Biçer Gürgen, Tuğçe; Kestel, A. Sevtap; Yıldırım Külekci, Bükre; Department of Actuarial Sciences (2025-9-01)
This thesis develops a hybrid triggered catastrophe (CAT) bond pricing model for flood risk. As a case study we employ the data from Harris County, Texas where three trigger indicators are selected for their relevance to e...
Expected Index of First Occurrence for Binary Patterns of Length 3 in Random Sequences
Ulusman, Burcu; Yayla, Oğuz; Department of Actuarial Sciences (2025-8-31)
This report presents the expected value calculations of the index at which a fixed binary pattern of length three first appears in a random sequence. The theoreti- cal background is based on the graph-theoretic approach pr...
Mixed Arithmetic-Binary Circuits in Fluid MPC Against Honest Majority of 4-Party and Its Applications Against Semi-Honest Adversary
Çabaş, Furkan Kerim; Yayla, Oğuz; Department of Cryptography (2025-8-28)
Secure multi-party computation (MPC) protocols that enable conversion between arithmetic and binary data types, initiated by Rotaru et al. with daBits and extended by Escudero et al. through edaBits, provide arithmetic sha...
Generator Matrices of Quasi-Cyclic Codes
Bayraktar, Gözde Cennet; Özkaya, Buket; Özbudak, Ferruh; Department of Cryptography (2025-8-27)
We give a complete solution to an open problem by using the spectral method on the polynomial generator matrices of quasi-cyclic codes of an arbitrary index, with the corresponding reduced Gröbner basis of the given quasi-...
Infrared Small Target Detection with YOLO: Performance Analysis and Optimization
Atrash, Abdulkarim; Uğur, Ömür; ERTEKİN BOLELLİ, ŞEYDA; Department of Scientific Computing (2025-8-27)
Infrared Small Target Detection (IRSTD) is a challenging problem with critical applications in defense and surveillance. It involves detecting tiny, low-contrast targets in cluttered infrared scenes. Single-frame IRSTD (SI...
Quantum Implementations of Block Ciphers
Çıldıroğlu, Hasan Ozgur; Yayla, Oğuz; Department of Cryptography (2025-8-26)
The emergence of quantum computing demands rigorous reassessment of classical cryptographic primitives, particularly lightweight block ciphers (LBCs). This work addresses this critical need by presenting the first comprehe...
A Study Of Single Secret Leader Election Protocol Constructions For Robust Proof Of Stake Consensus
Fettuh, Tegrid; Yayla, Oğuz; Department of Cryptography (2025-8-26)
As blockchains move from energy intensive Proof-of-Work to more sustainable Proof-of-Stake (PoS), scalable and secure leader election protocols, which is key to PoS systems, have become a major focus. Single Secret Leader ...
An optimal pairs trading strategy based on the inhomogeneous geometric Brownian motion
Karakurt, Caner; Uğur, Ömür; Hekimoğlu, Alper Ali; Department of Financial Mathematics (2025-7-29)
This study develops an optimal pairs trading strategy based on the inhomogeneous geometric Brownian motion (IGBM) process. The proposed model aims to identify an upper boundary that maximizes the expected return of the str...
FUZZY-INFERRED PCA AND HIERARCHICAL HMM PATTERN RECOGNITION FRAMEWORK FOR REGIME DETECTION AND INFLATION FORECASTING
Koç, Oğuz; Kestel, Sevtap Ayşe; Department of Financial Mathematics (2025-7-14)
Precise inflation forecasting is critical for sound economic decision-making across various sectors, including policy development, budget allocation, and financial planning. Traditional theoretical models, while valuable, ...
JOINT DISTRIBUTIONS OF THE MAXIMUM DRAWDOWN AND MAXIMUM DRAWUP IN LÉVY PROCESSES
Akdoğan, Emre; Vardar Acar, Ceren; Department of Financial Mathematics (2025-7-7)
The maximum drawdown and maximum drawup variables in a certain time period have attracted the attention of investors and have been used as dynamic risk measures. This thesis aims to derive the joint probability distributio...
Extended LP Bound for LCD codes and New Binary and Ternary LCD Codes
Emre, Karabakla; Buket, Özkaya; Department of Cryptography (2025-7-3)
The linear‐programming (LP) methodology proposed by Dougherty et al. originally formulated for binary LCD codes, is generalized herein to arbitrary $q$-ary settings. A unified LP bound is derived that subsumes and strengt...
STRUCTURE PRESERVING SIGNATURES WITH KEY BLINDING
Çelik, Emircan; Yayla, Oğuz; Department of Cryptography (2025-7-02)
While digital signatures serve to confirm message integrity and the identity of the signer, the inherent link between the public key and the signer’s identity can pose challenges in anonymized networks or applications focu...
Quantum-Resistant Verifiable Timed Signature Schemes
Uslu, Erkan; Yayla, Oğuz; Department of Cryptography (2025-6-26)
Verifiable Timed Signatures (VTS) are cryptographic constructions that ensure a digital signature can only be obtained at a specific point in the future, while also providing a proof to the verifier that the signature alre...
Citation Formats