Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection

Permanent URI for this collectionhttps://hdl.handle.net/11147/7148

Browse

Search Results

Now showing 1 - 10 of 610
  • Article
    Citation - WoS: 54
    Citation - Scopus: 59
    Measurement of the WZ Production Cross Section in pp Collisions at S=13 TeV
    (Elsevier, 2017) Khachatryan, V.; Sirunyan, A. M.; Tumasyan, A.; Adam, W.; Asilar, E.; Bergauer, T.; Woods, N.
    The WZ production cross section in proton-proton collisions at root s = 13 Tev is measured with the CMS experiment at the LHC using a data sample corresponding to an integrated luminosity of 2.3 fb(-1). The measurement is performed in the leptonic decay modes WZ -> lVl'l', where l,l'=e,mu. The measured cross section for the range 60<m (l'l') <120 GeV is sigma(pp -> WZ) = 39.9 +/- 3.2(stat)(2.9)(-3.1)(syst)+/- 0.4(theo)+/- 1.3(lumi)pb, consistent with the standard model prediction.
  • Article
    Citation - WoS: 11
    Citation - Scopus: 8
    Local Well-Posedness of the Higher-Order Nonlinear Schrödinger Equation on the Half-Line: Single-Boundary Condition Case
    (Wiley, 2023) Alkın, Aykut; Mantzavinos, Dionyssios; Özsarı, Türker
    We establish local well-posedness in the sense of Hadamard for a certain third-order nonlinear Schrödinger equation with a multiterm linear part and a general power nonlinearity, known as higher-order nonlinear Schrödinger equation, formulated on the half-line (Formula presented.). We consider the scenario of associated coefficients such that only one boundary condition is required and hence assume a general nonhomogeneous boundary datum of Dirichlet type at (Formula presented.). Our functional framework centers around fractional Sobolev spaces (Formula presented.) with respect to the spatial variable. We treat both high regularity ((Formula presented.)) and low regularity ((Formula presented.)) solutions: in the former setting, the relevant nonlinearity can be handled via the Banach algebra property; in the latter setting, however, this is no longer the case and, instead, delicate Strichartz estimates must be established. This task is especially challenging in the framework of nonhomogeneous initial-boundary value problems, as it involves proving boundary-type Strichartz estimates that are not common in the study of Cauchy (initial value) problems. The linear analysis, which forms the core of this work, crucially relies on a weak solution formulation defined through the novel solution formulae obtained via the Fokas method (also known as the unified transform) for the associated forced linear problem. In this connection, we note that the higher-order Schrödinger equation comes with an increased level of difficulty due to the presence of more than one spatial derivatives in the linear part of the equation. This feature manifests itself via several complications throughout the analysis, including (i) analyticity issues related to complex square roots, which require careful treatment of branch cuts and deformations of integration contours; (ii) singularities that emerge upon changes of variables in the Fourier analysis arguments; and (iii) complicated oscillatory kernels in the weak solution formula for the linear initial-boundary value problem, which require a subtle analysis of the dispersion in terms of the regularity of the boundary data. The present work provides a first, complete treatment via the Fokas method of a nonhomogeneous initial-boundary value problem for a partial differential equation associated with a multiterm linear differential operator. © 2023 Wiley Periodicals LLC.
  • Article
    Citation - WoS: 8
    Citation - Scopus: 7
    Exponential Stability and Boundedness of Nonlinear Perturbed Systems by Unbounded Perturbation Terms
    (Elsevier, 2023) Şahan, Gökhan
    We study the exponential stability and boundedness problem for perturbed nonlinear time-varying systems using Lyapunov Functions with indefinite derivatives. As the limiting function for the perturbation term, we use different forms and give stability and boundedness conditions in terms of the coefficients in these bounds. Contrary to most of the available conditions, we allow the coefficients to be unbounded. But instead, we put forward a condition that requires a series produced by coefficients to be limited and exponentially decaying. We perform our results on Linear time-varying systems and generalize many of the available results. & COPY; 2023 The Franklin Institute. Published by Elsevier Inc. All rights reserved.
  • Article
    Citation - WoS: 5
    Citation - Scopus: 4
    A New Construction Method for Keystream Generators
    (IEEE, 2023) Gül, Çağdaş; Kara, Orhun
    We introduce a new construction method of diffusion layers for Substitution Permutation Network (SPN) structures along with its security proofs. The new method can be used in block ciphers, stream ciphers, hash functions, and sponge constructions. Moreover, we define a new stream cipher mode of operation through a fixed pseudorandom permutation and provide its security proofs in the indistinguishability model. We refer to a stream cipher as a Small Internal State Stream (SISS) cipher if its internal state size is less than twice its key size. There are not many studies about how to design and analyze SISS ciphers due to the criterion on the internal state sizes, resulting from the classical tradeoff attacks. We utilize our new mode and diffusion layer construction to design an SISS cipher having two versions, which we call DIZY. We further provide security analyses and hardware implementations of DIZY. In terms of area cost, power, and energy consumption, the hardware performance is among the best when compared to some prominent stream ciphers, especially for frame-based encryptions that need frequent initialization. Unlike recent SISS ciphers such as Sprout, Plantlet, LILLE, and Fruit; DIZY does not have a keyed update function, enabling efficient key changing. © 2005-2012 IEEE.
  • Article
    Citation - WoS: 5
    Citation - Scopus: 6
    Lung Parenchyma Segmentation From Ct Images With a Fully Automatic Method
    (Springer, 2023) Mousavi Moghaddam, Reza; Aghazadeh, Nasser
    For the last three years, the world has been facing an infectious disease that primarily affects the human breathing organ. The disease has caused many deaths worldwide so far and has imposed high economic costs on all countries. Therefore, attention to computer-aided detection/diagnosis (CAD) systems to help diagnose and treat diseases related to the human respiratory system should be given more attention so that countries’ health systems can treat patients in epidemics. Considering the importance of CAD systems, we proposed a two-step automatic algorithm. In the first step, we obtain the primary boundary of the lobes in CT lung scan images with the help of some conventional image processing tools. In the second stage, we obtained a more precise boundary of the lung lobes by correcting the unusual dimples and valleys (which are sometimes caused by the presence of juxtapleural nodules). This proposed method has low implementation time. Given that a precise boundary of the pulmonary lobes is essential in the more accurate diagnosis of lung-related diseases, an attempt has been made to ensure that the final segmentation of the lung parenchyma has an acceptable score in terms of evaluation criteria so that the proposed algorithm can be used in the diagnosis procedure. © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.
  • Article
    Citation - WoS: 9
    Citation - Scopus: 8
    A Numerical Method Based on Legendre Wavelet and Quasilinearization Technique for Fractional Lane-Emden Type Equations
    (Springer, 2023) İdiz, Fatih; Tanoğlu, Gamze; Aghazadeh, Nasser
    In this research, we study the numerical solution of fractional Lane-Emden type equations, which emerge mainly in astrophysics applications. We propose a numerical approach making use of Legendre wavelets and the quasilinearization technique. The nonlinear term in fractional Lane-Emden type equations is iteratively linearized using the quasilinearization technique. The linearized equations are then solved using the Legendre wavelet collocation method. The proposed method is quite effective to overcome the singularity in fractional Lane-Emden type equations. Convergence and error analysis of the proposed method are given. We solve some test problems to compare the effectiveness of the proposed method with some other numerical methods in the literature.
  • Article
    Citation - WoS: 1
    Citation - Scopus: 1
    Plaintext Recovery and Tag Guessing Attacks on Authenticated Encryption Algorithm Colm
    (Elsevier, 2022) Ulusoy, Sırrı Erdem; Kara, Orhun; Efe, Mehmet Önder
    There are three main approaches related to cryptanalysis of Authenticated Encryption with Associated Data (AEAD) algorithms: Simulating the encryption oracle (universal forgery attack), simulating the decryption oracle (plaintext recovery attack) and producing the valid tag of a given ciphertext (tag guessing attack). In this work, we analyze the security of COLM in these approaches. COLM is one of the AEAD algorithms chosen in the final portfolio for defense-in-depth use case of the CAESAR competition. The ciphers in this portfolio are supposed to provide robust security with their multiple layered defense mechanisms. The main motivation of this work is to examine if COLM indeed satisfies defense-in-depth security. We make cryptanalysis of COLM, particularly in the chosen ciphertext attack (CCA) scenario, once its secret whitening parameter L=EK(0) is recovered. To the best of our knowledge, we give the first example of querying an EME/EMD (Encrypt-linearMix-Encrypt/Decrypt) AEAD scheme in its decryption direction for arbitrary ciphertexts, not produced previously by the oracle, namely either a forgery or tag guessing attack. We construct SEBC/SDBC (Simulation models of the Encryption/Decryption oracles of the underlying Block Cipher) of COLM, thereby forming the first examples of these models of an authenticated EME scheme simultaneously. The combination of our SEBC/SDBC is a powerful tool to mount a universal forgery attack, a tag guessing attack and a plaintext recovery attack. All of these attacks have polynomial time complexities once L is recovered in the offline phase, indicating that the security of COLM against plaintext recovery and tag guessing attacks is limited by the birthday bound. Apart from exploiting SEBC/SDBC, we mount a pair of plaintext recovery attacks and another universal forgery attack. Finally, we make some suggestions to prevent our attacks.
  • Article
    Citation - WoS: 1
    Citation - Scopus: 1
    Initial Stages of a Three Dimensional Dam Break Flow
    (Elsevier, 2022) Fetahu, Elona; Ivanyshyn Yaman, Olha; Yılmaz, Oğuz
    Short time behavior of a three dimensional, gravity-driven free surface flow is studied analytically and numerically. Initially the fluid is at rest, held by a vertical wall. A rectangular section of the wall suddenly disappears and the gravity driven three-dimensional flow starts. In order to describe the flow in the early stage, the potential theory is employed. Viscous effects are ignored for small times. The leading order problem is solved by using the Fourier series method and an integral equation method. Local analysis of the flow field close to the side edges of the rectangular section reveals a square root singularity. The flow velocity is also log-singular at the bottom edge of the rectangular section. In the limiting case, as the width of the rectangular section approaches infinity, the results of the classical two-dimensional dam break flow are recovered. Three dimensional effects become important closer to the side edges of the rectangular section.
  • Article
    Citation - WoS: 106
    Citation - Scopus: 108
    Search for New Particles in Events With Energetic Jets and Large Missing Transverse Momentum in Proton-Proton Collisions at Root S=13 Tev
    (Springer, 2021) Karapınar, Güler; CMS Collaboration
    A search is presented for new particles produced at the LHC in proton-proton collisions at root s = 13 TeV, using events with energetic jets and large missing transverse momentum. The analysis is based on a data sample corresponding to an integrated luminosity of 101 fb(-1), collected in 2017-2018 with the CMS detector. Machine learning techniques are used to define separate categories for events with narrow jets from initial-state radiation and events with large-radius jets consistent with a hadronic decay of a W or Z boson. A statistical combination is made with an earlier search based on a data sample of 36 fb(-1), collected in 2016. No significant excess of events is observed with respect to the standard model background expectation determined from control samples in data. The results are interpreted in terms of limits on the branching fraction of an invisible decay of the Higgs boson, as well as constraints on simplified models of dark matter, on first-generation scalar leptoquarks decaying to quarks and neutrinos, and on models with large extra dimensions. Several of the new limits, specifically for spin-1 dark matter mediators, pseudoscalar mediators, colored mediators, and leptoquarks, are the most restrictive to date.
  • Article
    Citation - WoS: 10
    Citation - Scopus: 16
    Observation of Tw Production in the Single-Lepton Channel in Pp Collisions at Root S=13 Tev
    (Springer, 2021) Karapınar, Güler; CMS Collaboration
    A measurement of the cross section of the associated production of a single top quark and a W boson in final states with a muon or electron and jets in proton-proton collisions at root s = 13 TeV is presented. The data correspond to an integrated luminosity of 36 fb(-1) collected with the CMS detector at the CERN LHC in 2016. A boosted decision tree is used to separate the tW signal from the dominant t (t) over bar background, whilst the subleading W+jets and multijet backgrounds are constrained using data-based estimates. This result is the first observation of the tW process in final states containing a muon or electron and jets, with a significance exceeding 5 standard deviations. The cross section is determined to be 89 +/- 4 (stat) +/- 12 (syst) pb, consistent with the standard model.