Mathematics / Matematik

Permanent URI for this collectionhttps://hdl.handle.net/11147/8

Browse

Search Results

Now showing 1 - 10 of 16
  • Article
    The Application of a Finite Difference Method To a Dynamical Interface Problem
    (Acad. Publications, 2003) Tanoğlu, Gamze; Ağıroğlu, İzzet Onur
    A multiple-order-parameter model for Cu-Au system on a face cubic centered lattice was recently developed in the presence of anisotropy. In that model, three order parameters (non-conserved) and one concentration order parameter (conserved), which has been taken as a constant, were considered. Later on, the model has been extended, so that, concentration has been taken as a variable. It has been seen that two models were in a good agreement near critical temperature since the non-conserved order parameter behaves like a constant near critical temperature in both models.
  • Conference Object
    Can Cpt Be Violated Through Extended Time Reversal?
    (World Scientific Publishing, 2001) Erdem, Recai; Ufuktepe, Ünal
    We consider the implications of the extension of time reversal through Wigner types and group extensions. We clarify its physical content and apply the results in a toy model. Finally we point out the possibility of violation of CPT in this framework.
  • Conference Object
    Holomorphic Realization of Non-Commutative Space-Time and Gauge Invariance
    (IOP Publishing, 2003) Mir-Kasimov, Rufat M.
    The realization of the Poincare Lie algebra in terms of noncommutative differential calculus over the commutative algebra of functions is considered. The algebra of functions is defined on the spectrum of the unitary irreducible representations of the De Sitter group. Corresponding space-time carries the noncommutative geometry. Gauge invariance principle consistent with this noncommutative space is considered.
  • Conference Object
    Derivative and Integration on Time Scale With Mathematica
    (Imperial College Press, 2003) Yantır, Ahmet
    Mathematical modelling of time dependent systems is always interesting for applied mathematicians. First continuous and then discrete mathematical models were built in the mathematical development from ancient to modem times. With the discovery of time scale, the problem of irregular systems was solved in the 1990s. In this paper we explain the derivative and integral of functions of time scales and the solution of some basic calculus problems using Mathematica.
  • Conference Object
    Partial Differential Equations With Webmathematica
    (Imperial College Press, 2003) Ufuktepe, Ünal
    The growing popularity of the internet, and the increasing number of computers connected to it, make it an ideal framework for remote education. Many disciplines are rethinking their traditional philosophies and techniques to adapt to the new technologies. Web-based education is an effective framework for such learning, which simplifies theory understanding, encourages learning by discovery and experimentation and undoubtedly makes the learning process more pleasant. There is a need for adequate tools to help in the elaboration of courses that might make it possible to express all the possibilities offered by www teaching. webMathematica is a web-based technology developed by Wolfram Research that allows the generation of dynamic web content with Mathematica. With this technology, distance education students should be able to explore and experiment with mathematical concepts. In this paper we present a sample lecture for Partial Differential Equations in webMathematica for the distance learning environment.
  • Conference Object
    Citation - Scopus: 1
    Hipokampüsün El ve Atlas Tabanlı Otomatik Bölütlenmesinin Hacimsel Olarak Karşılaştırılması
    (Institute of Electrical and Electronics Engineers Inc., 2009) Kutucu, Hakan; Eker, Çağdaş; Kitiş, Ömer; Gönül, Ali Saffet
    High-resolution Magnetic resonance imaging (MRI) is helpful in diagnosing diseases such as schizophrenia, alzheimer, dementia etc. Brain segmentation is an important preprocess in medical imaging applications. In this study we compare atlas based segmentation and manual segmentation of hippocampus for volumetric measures. A statistically difference was obtained between automatic and manual measurement. We conclude that contemporary techniques are not adequate to obtain sensitive data in some barin structures such as hippocampus core.
  • Article
    Hirota Method for Solving Reaction-Diffusion Equations With Generalized Nonlinearity
    (World Academic Press, 2006) Tanoğlu, Gamze
    The Hirota Method is applied to find an exact solitary wave solution to evolution equation with generalized nonlinearity. By introducing the power form of Hirota ansatz the bilinear representation for this equation is derived and the traveling wave solution is constructed by Hirota perturbation. We show that velocity of this solution is naturally fixed by truncating the Hirota’s perturbation expansion. So in our approach, this truncate on works similarly to the way Ablowitz and Zeppetella obtained an exact travelling wave solution of Fisher’s equation by finding the special wave speed for which the resulting ODE is of the Painleve type. In the special case the model admits N shock soliton solution and the reduction to Burgers’ equation.
  • Article
    Citation - WoS: 89
    Obtaining a Secure and Efficient Key Agreement Protocol From (h)mqv and Naxos (extended Version)
    (International Association for Cryptologic Research, 2009) Ustaoğlu, Berkant
    LaMacchia, Lauter and Mityagin recently presented a strong security definition for authenticated key agreement strengthening the well-known Canetti-Krawczyk definition. They also described a protocol, called NAXOS, that enjoys a simple security proof in the new model. Compared to MQV and HMQV, NAXOS is less efficient and cannot be readily modified to obtain a one-pass protocol. On the other hand MQV does not have a security proof, and the HMQV security proof is extremely complicated. This paper proposes a new authenticated key agreement protocol, called CMQV (`Combined' MQV), which incorporates design principles from MQV, HMQV and NAXOS. The new protocol achieves the efficiency of HMQV and admits a natural one-pass variant. Moreover, we present a simple and intuitive proof that CMQV is secure in the LaMacchia-Lauter-Mityagin model.
  • Article
    Efficient Key Exchange With Tight Security Reduction
    (International Association for Cryptologic Research, 2009) Wu, Jiang; Ustaoğlu, Berkant
    In this paper, we propose two authenticated key exchange (AKE) protocols, SMEN and SMEN−, which have efficient online computation and tight security proof in the extended Canetti-Krawczyk (eCK) model. SMEN takes 1.25 exponentiations in online computation, close to that (1.17 exponentiations) of the most efficient AKEs MQV and its variants HMQV and CMQV. SMEN has a security reduction as tight as that of NAXOS, which is the first AKE having a tight security reduction in the eCK model. As a comparison, MQV does not have a security proof; both HMQV and CMQV have a highly non-tight security reduction, and HMQV needs a non-standard assumption; NAXOS takes 2.17 exponentiations in online computation; NETS, a NAXOS variant, takes two online exponentiations in online computation. SMEN simultaneously achieves online efficiency and a tight security proof at a cost of 0.17 more exponentiations in offline computation and the restriction that one party is not allowed to establish a key with itself. SMEN− takes 1.29 exponentiations in online computation, but SMEN− does not use the static private key to compute the ephemeral public key (as does in SMEN, NAXOS, CMQV, and NETS), and hence reduces the risk of leaking the static private key.
  • Article
    Citation - WoS: 25
    Comparing Sessionstatereveal and Ephemeralkeyreveal for Diffie-Hellman Protocols (extended Version)
    (International Association for Cryptologic Research, 2009) Ustaoğlu, Berkant
    Both the ``eCK'' model, by LaMacchia, Lauter and Mityagin, and the ``CK01'' model, by Canetti and Krawczyk, address the effect of leaking session specific ephemeral data on the security of key establishment schemes. The CK01-adversary is given a \SessionStateReveal{} query to learn session specific private data defined by the protocol specification, whereas the eCK-adversary is equipped with an \RevealEphemeralKey{} query to access all ephemeral private input required to carry session computations. \SessionStateReveal{} \emph{cannot} be issued against the test session; by contrast \RevealEphemeralKey{} \emph{can} be used against the test session under certain conditions. On the other hand, it is not obvious how \RevealEphemeralKey{} compares to \SessionStateReveal{}. Thus it is natural to ask which model is more useful and practically relevant. While formally the models are not comparable, we show that recent analysis utilizing \SessionStateReveal{} and \RevealEphemeralKey{} have a similar approach to ephemeral data leakage. First we pinpoint the features that determine the approach. Then by examining common motives for ephemeral data leakage we conclude that the approach is meaningful, but does not take into account timing, which turns out to be critical for security. Lastly, for Diffie-Hellman protocols we argue that it is important to consider security when discrete logarithm values of the outgoing ephemeral public keys are leaked and offer a method to achieve security even if the values are exposed.