Mathematics / Matematik
Permanent URI for this collectionhttps://hdl.handle.net/11147/8
Browse
458 results
Filters
Settings
Search Results
Article Citation - WoS: 54Citation - Scopus: 59Measurement of the WZ Production Cross Section in pp Collisions at S=13 TeV(Elsevier, 2017) Khachatryan, V.; Sirunyan, A. M.; Tumasyan, A.; Adam, W.; Asilar, E.; Bergauer, T.; Woods, N.The WZ production cross section in proton-proton collisions at root s = 13 Tev is measured with the CMS experiment at the LHC using a data sample corresponding to an integrated luminosity of 2.3 fb(-1). The measurement is performed in the leptonic decay modes WZ -> lVl'l', where l,l'=e,mu. The measured cross section for the range 60<m (l'l') <120 GeV is sigma(pp -> WZ) = 39.9 +/- 3.2(stat)(2.9)(-3.1)(syst)+/- 0.4(theo)+/- 1.3(lumi)pb, consistent with the standard model prediction.Article Citation - WoS: 11Citation - Scopus: 8Local Well-Posedness of the Higher-Order Nonlinear Schrödinger Equation on the Half-Line: Single-Boundary Condition Case(Wiley, 2023) Alkın, Aykut; Mantzavinos, Dionyssios; Özsarı, TürkerWe establish local well-posedness in the sense of Hadamard for a certain third-order nonlinear Schrödinger equation with a multiterm linear part and a general power nonlinearity, known as higher-order nonlinear Schrödinger equation, formulated on the half-line (Formula presented.). We consider the scenario of associated coefficients such that only one boundary condition is required and hence assume a general nonhomogeneous boundary datum of Dirichlet type at (Formula presented.). Our functional framework centers around fractional Sobolev spaces (Formula presented.) with respect to the spatial variable. We treat both high regularity ((Formula presented.)) and low regularity ((Formula presented.)) solutions: in the former setting, the relevant nonlinearity can be handled via the Banach algebra property; in the latter setting, however, this is no longer the case and, instead, delicate Strichartz estimates must be established. This task is especially challenging in the framework of nonhomogeneous initial-boundary value problems, as it involves proving boundary-type Strichartz estimates that are not common in the study of Cauchy (initial value) problems. The linear analysis, which forms the core of this work, crucially relies on a weak solution formulation defined through the novel solution formulae obtained via the Fokas method (also known as the unified transform) for the associated forced linear problem. In this connection, we note that the higher-order Schrödinger equation comes with an increased level of difficulty due to the presence of more than one spatial derivatives in the linear part of the equation. This feature manifests itself via several complications throughout the analysis, including (i) analyticity issues related to complex square roots, which require careful treatment of branch cuts and deformations of integration contours; (ii) singularities that emerge upon changes of variables in the Fourier analysis arguments; and (iii) complicated oscillatory kernels in the weak solution formula for the linear initial-boundary value problem, which require a subtle analysis of the dispersion in terms of the regularity of the boundary data. The present work provides a first, complete treatment via the Fokas method of a nonhomogeneous initial-boundary value problem for a partial differential equation associated with a multiterm linear differential operator. © 2023 Wiley Periodicals LLC.Article Citation - WoS: 8Citation - Scopus: 7Exponential Stability and Boundedness of Nonlinear Perturbed Systems by Unbounded Perturbation Terms(Elsevier, 2023) Şahan, GökhanWe study the exponential stability and boundedness problem for perturbed nonlinear time-varying systems using Lyapunov Functions with indefinite derivatives. As the limiting function for the perturbation term, we use different forms and give stability and boundedness conditions in terms of the coefficients in these bounds. Contrary to most of the available conditions, we allow the coefficients to be unbounded. But instead, we put forward a condition that requires a series produced by coefficients to be limited and exponentially decaying. We perform our results on Linear time-varying systems and generalize many of the available results. & COPY; 2023 The Franklin Institute. Published by Elsevier Inc. All rights reserved.Article Citation - WoS: 5Citation - Scopus: 4A New Construction Method for Keystream Generators(IEEE, 2023) Gül, Çağdaş; Kara, OrhunWe introduce a new construction method of diffusion layers for Substitution Permutation Network (SPN) structures along with its security proofs. The new method can be used in block ciphers, stream ciphers, hash functions, and sponge constructions. Moreover, we define a new stream cipher mode of operation through a fixed pseudorandom permutation and provide its security proofs in the indistinguishability model. We refer to a stream cipher as a Small Internal State Stream (SISS) cipher if its internal state size is less than twice its key size. There are not many studies about how to design and analyze SISS ciphers due to the criterion on the internal state sizes, resulting from the classical tradeoff attacks. We utilize our new mode and diffusion layer construction to design an SISS cipher having two versions, which we call DIZY. We further provide security analyses and hardware implementations of DIZY. In terms of area cost, power, and energy consumption, the hardware performance is among the best when compared to some prominent stream ciphers, especially for frame-based encryptions that need frequent initialization. Unlike recent SISS ciphers such as Sprout, Plantlet, LILLE, and Fruit; DIZY does not have a keyed update function, enabling efficient key changing. © 2005-2012 IEEE.Article Citation - WoS: 5Citation - Scopus: 6Lung Parenchyma Segmentation From Ct Images With a Fully Automatic Method(Springer, 2023) Mousavi Moghaddam, Reza; Aghazadeh, NasserFor the last three years, the world has been facing an infectious disease that primarily affects the human breathing organ. The disease has caused many deaths worldwide so far and has imposed high economic costs on all countries. Therefore, attention to computer-aided detection/diagnosis (CAD) systems to help diagnose and treat diseases related to the human respiratory system should be given more attention so that countries’ health systems can treat patients in epidemics. Considering the importance of CAD systems, we proposed a two-step automatic algorithm. In the first step, we obtain the primary boundary of the lobes in CT lung scan images with the help of some conventional image processing tools. In the second stage, we obtained a more precise boundary of the lung lobes by correcting the unusual dimples and valleys (which are sometimes caused by the presence of juxtapleural nodules). This proposed method has low implementation time. Given that a precise boundary of the pulmonary lobes is essential in the more accurate diagnosis of lung-related diseases, an attempt has been made to ensure that the final segmentation of the lung parenchyma has an acceptable score in terms of evaluation criteria so that the proposed algorithm can be used in the diagnosis procedure. © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.Article Citation - WoS: 9Citation - Scopus: 8A Numerical Method Based on Legendre Wavelet and Quasilinearization Technique for Fractional Lane-Emden Type Equations(Springer, 2023) İdiz, Fatih; Tanoğlu, Gamze; Aghazadeh, NasserIn this research, we study the numerical solution of fractional Lane-Emden type equations, which emerge mainly in astrophysics applications. We propose a numerical approach making use of Legendre wavelets and the quasilinearization technique. The nonlinear term in fractional Lane-Emden type equations is iteratively linearized using the quasilinearization technique. The linearized equations are then solved using the Legendre wavelet collocation method. The proposed method is quite effective to overcome the singularity in fractional Lane-Emden type equations. Convergence and error analysis of the proposed method are given. We solve some test problems to compare the effectiveness of the proposed method with some other numerical methods in the literature.Article Citation - WoS: 1Citation - Scopus: 1Plaintext Recovery and Tag Guessing Attacks on Authenticated Encryption Algorithm Colm(Elsevier, 2022) Ulusoy, Sırrı Erdem; Kara, Orhun; Efe, Mehmet ÖnderThere are three main approaches related to cryptanalysis of Authenticated Encryption with Associated Data (AEAD) algorithms: Simulating the encryption oracle (universal forgery attack), simulating the decryption oracle (plaintext recovery attack) and producing the valid tag of a given ciphertext (tag guessing attack). In this work, we analyze the security of COLM in these approaches. COLM is one of the AEAD algorithms chosen in the final portfolio for defense-in-depth use case of the CAESAR competition. The ciphers in this portfolio are supposed to provide robust security with their multiple layered defense mechanisms. The main motivation of this work is to examine if COLM indeed satisfies defense-in-depth security. We make cryptanalysis of COLM, particularly in the chosen ciphertext attack (CCA) scenario, once its secret whitening parameter L=EK(0) is recovered. To the best of our knowledge, we give the first example of querying an EME/EMD (Encrypt-linearMix-Encrypt/Decrypt) AEAD scheme in its decryption direction for arbitrary ciphertexts, not produced previously by the oracle, namely either a forgery or tag guessing attack. We construct SEBC/SDBC (Simulation models of the Encryption/Decryption oracles of the underlying Block Cipher) of COLM, thereby forming the first examples of these models of an authenticated EME scheme simultaneously. The combination of our SEBC/SDBC is a powerful tool to mount a universal forgery attack, a tag guessing attack and a plaintext recovery attack. All of these attacks have polynomial time complexities once L is recovered in the offline phase, indicating that the security of COLM against plaintext recovery and tag guessing attacks is limited by the birthday bound. Apart from exploiting SEBC/SDBC, we mount a pair of plaintext recovery attacks and another universal forgery attack. Finally, we make some suggestions to prevent our attacks.Article Citation - WoS: 1Citation - Scopus: 1Initial Stages of a Three Dimensional Dam Break Flow(Elsevier, 2022) Fetahu, Elona; Ivanyshyn Yaman, Olha; Yılmaz, OğuzShort time behavior of a three dimensional, gravity-driven free surface flow is studied analytically and numerically. Initially the fluid is at rest, held by a vertical wall. A rectangular section of the wall suddenly disappears and the gravity driven three-dimensional flow starts. In order to describe the flow in the early stage, the potential theory is employed. Viscous effects are ignored for small times. The leading order problem is solved by using the Fourier series method and an integral equation method. Local analysis of the flow field close to the side edges of the rectangular section reveals a square root singularity. The flow velocity is also log-singular at the bottom edge of the rectangular section. In the limiting case, as the width of the rectangular section approaches infinity, the results of the classical two-dimensional dam break flow are recovered. Three dimensional effects become important closer to the side edges of the rectangular section.Article Citation - WoS: 8Citation - Scopus: 9Analysis of Covid 19 Disease With Sir Model and Taylor Matrix Method(American Institute of Mathematical Sciences, 2022) Uçar, Deniz; Çelik, ElçinCovid 19 emerged in Wuhan, China in December 2019 has continued to spread by affecting the whole world. The pandemic has affected over 328 million people with more than 5 million deaths in over 200 countries which has severely disrupted the healthcare system and halted economies of the countries. The aim of this study is to discuss the numerical solution of the SIR model on the spread of Covid 19 by the Taylor matrix and collocation method for Turkey. Predicting COVID-19 through appropriate models can help us to understand the potential spread in the population so that appropriate action can be taken to prevent further transmission and prepare health systems for medical management of the disease. We deal with Susceptible–Infected–Recovered (SIR) model. One of the proposed model’s improvements is to reflect the societal feedback on the disease and confinement features. We obtain the time dependent rate of transmission of the disease from susceptible β(t) and the rate of recovery from infectious to recovered γ using Turkey epidemic data. We apply the Taylor matrix and collocation method to the SIR model with γ, β(t) and Covid 19 data of Turkey from the date of the first case March 11, 2020 through July 3, 2021. Using this method, we focus on the evolution of the Covid 19 in Turkey. We also show the estimates with the help of graphics and Maple.Article Citation - WoS: 3Citation - Scopus: 3A Direct Method for the Low Energy Scattering Solution of Delta Shell Potentials(Springer, 2022) Erman, Fatih; Seymen, SemaA direct method for the bound states and the low energy scattering from a circular and a spherical delta shell potentials is proposed, and the results are compared with the one using the standard partial wave analysis developed for potentials with rotational symmetry. The formulation is presented in momentum space, and the scattering solutions are obtained by considering the elementary use of distributions. In this approach, the outgoing boundary conditions are imposed explicitly in contrast to the iϵ prescription often used in quantum mechanics.
