Graduate School of Applied Mathematics, Conference / Seminar

Browse
Search within this collection:

Filters

Entity Type
Publication (121)

Has File(s)
No (113)
Yes (8)

Author
Weber, Gerhard Wilhelm (25)
Kestel, Sevtap Ayşe (17)
Karasözen, Bülent (16)
Cenk, Murat (13)
Yücel, Hamdullah (8)

Subject
Clustering (3)
Continuous optimization (3)
Elliptic curve cryptography (3)
Algorithm (2)
Block cipher (2)

Date Issued
1998 - 1999 (1)
2000 - 2009 (28)
2010 - 2019 (87)
2020 - 2021 (5)

Recent Submissions

Multi-fidelity aerodynamic dataset generation of a fighter aircraft
Kurt, Huseyin Burak; Millidere, Murat; Gomec, Fazıl Selcuk; Uğur, Ömür (2021-01-01)
© 2021, American Institute of Aeronautics and Astronautics Inc, AIAA. All rights reserved.High-fidelity aerodynamic dataset generation is one of the most significant components of the aircraft flight simulation, and, it is...
TMVP-Friendly Primes for Efficient Elliptic Curve Cryptography
Taskin, Halil Kemal; Cenk, Murat (2020-12-03)
© 2020 IEEE.The need for faster and practical cryptography is a research topic for decades. In case of elliptic curve cryptography, which was proposed by Koblitz and Miller in 1985 as a more efficient alternative to RSA, t...
Comparison of Randomized Solutions for Constrained Vehicle Routing Problem
Demirci, Ibrahim Ethem; Ozdemir, Saziye Ece; Yayla, Oğuz (2020-06-01)
© 2020 IEEE.In this short paper, we study capacity constrained vehicle routing problem (CVRP) and its solution by randomized Monte Carlo methods. For solving CVRP we use some pseudorandom number generators commonly used in...
Kalman based neural network analysis with resampling methods for longitudinal aerodynamic coefficient estimation
Millidere, Murat; Kurt, Huseyin Burak; Balli, Hakan; Uğur, Ömür (2020-01-01)
© 2020, American Institute of Aeronautics and Astronautics Inc, AIAA. All rights reserved.Accurateness of the approximated aerodynamic characteristics of an unstable aircraft is considerably significant in flight control s...
A Parallel GPU Implementation of SWIFFTX
Ulu, Metin Evrim; Cenk, Murat (2020-01-01)
© 2020, Springer Nature Switzerland AG.The SWIFFTX algorithm is one of the candidates of SHA-3 Hash Competition that uses the number theoretic transform (NTT). It has 256-byte input blocks and 65-byte output blocks. In thi...
Modal analysis of elastic vibrations of incompressible materials based on a variational multiscale finite element method
Codina, Ramon; Türk, Önder (null; 2019-10-04)
In this study, we extend the standard modal analysis technique that is used to approximate vibration problems of elastic materials to incompressible elasticity. In modal analysis, the second order time derivative of the d...
Discontinuous Galerkin Methods for Convection Diffusion Equations with Random Coefficients
Çiloğlu, Pelin; Yücel, Hamdullah (null; 2019-09-11)
Partial differential equations (PDEs) with random input data is one of the most powerful tools to model oil and gas production as well as groundwater pollution control. However, the information available on the input dat...
Risk Classification with Artificial Neural Networks Models in Motor Third Party Liability
Yıldırak, Şahap Kasırga; Kestel, Sevtap Ayşe; Gür, İsmail (null; 2019-06-29)
One of the most fundamental requirements in todays insurance sector is the determination of fair premium for the insured. In order for this purpose to be fulfilled, the correct risk classification is required for each insu...
Süperpikseller ve İmza Tabanlı Yöntemler Kullanarak Hiperspektral Hedef Tespiti
Kütük, Mustafa; Koz, Alper; Alatan, Abdullah Aydın (2019-06-27)
Spectral signature based methods which form the mainstream in hyperspectral target detection can be classified mainly in three categories as the methods using background modeling, subspace projection based methods, and hyb...
Uzun Ömürlülük Risk Analizi: Kredibilite Yaklaşımı
Yıldırım Külekci, Bükre; Kestel, Sevtap Ayşe (2019-06-24)
Efficient GeMSS Based Ring Signature Scheme
Demircioğlu, Murat; Akleylek, Sedat; Cenk, Murat (2019-06-18)
The ring signature scheme has an important usage area of public key crypto-system. It can be used for e-voting,as well as leaking information without revealing identity within a group. However, mostof these syst...
Single-Family Houses Portfolio Optimization under Impact of Large Investors in Housing Markets
Yılmaz, Bilgi; Korn, Ralf; Kestel, Sevtap Ayşe (null; 2019-06-14)
Hydro Inflow Forecasting and Virtual Power Plant Pricing in the Turkish Electricity market
Çabuk, Sezer; Kestel, Sevtap Ayşe; Kalaycı, Erkan (2019-05-23)
Hydro inflow forecasting with most accurate quantitative models is a very crucial subject for effective hydro optimization, virtual power plant pricing, volume risk management and weather derivatives pricing in the Turkish...
Open-TEE is No Longer Virtual: Towards Software-only Trusted Execution Environments Using White-box Cryptography
BIÇAKCI, KEMAL; Ak, Ihsan Kagan; Ozdemir, Betul Askin; Gozutok, Mesut (2019-01-01)
Trusted Execution Environments (TEEs) provide hardware support to isolate the execution of sensitive operations on mobile phones for improved security. However, they are not always available to use for application develope...
Multi-objective Aggregate Production Planning Model Considering Overtime and Outsourcing Options Under Fuzzy Seasonal Demand
Tirkolaee, Erfan Babaee; Goli, Alireza; Weber, Gerhard Wilhelm (2019-01-01)
This paper investigates a novel fuzzy multi-objective multi-period Aggregate Production Planning (APP) problem under seasonal demand. As two of the main real-world assumptions, the options of workforce overtime and outsour...
Compact and Simple RLWE Based Key Encapsulation Mechanism
Alkim, Erdem; Bilgin, Yusuf Alper; Cenk, Murat (2019-01-01)
n this paper, we propose a key encapsulation scheme based on NewHope and Kyber, two NIST post-quantum standardization project candidates. Our scheme is based on NewHope, thus it is simple and has fast implementation while ...
On plateaued functions, linear structures and permutation polynomials
Mesnager, Sihem; Kaytancı, Kübra; Özbudak, Ferruh (2019-01-01)
We obtain concrete upper bounds on the algebraic immunity of a class of highly nonlinear plateaued functions without linear structures than the one was given recently in 2017, Cusick. Moreover, we extend Cusick’s class to ...
Ideal factorization method and its applications
Kurt, Sibel; Yayla, Oğuz (2019-01-01)
© Springer Nature Switzerland AG 2019.In this work the unsolvability of certain equations is studied in the case of cyclotomic number fields whose ring of integers is not a principal ideal domain. Winterhof et al. consider...
An improved algorithm for iterative matrix-vector multiplications over finite fields
Mangır, Ceyda; Cenk, Murat; Manguoğlu, Murat (2018-11-09)
Cryptographic computations such as factoring integers and computing discrete logarithms over finite fields require solving a large system of linear equations. When dealing with such systems iterative approaches such as Wie...
Discontinuous Galerkin Methods for Unsteady Convection Diffusion Equation with Random Coefficients
Çiloğlu, Pelin; Yücel, Hamdullah (null; 2018-10-21)
Partial differential equations (PDEs) with random input data is one of the most powerful tools to model oil and gas production as well as groundwater pollution control. However, the information available on the input data ...
Citation Formats