Scopus İndeksli Yayınlar Koleksiyonu

Permanent URI for this collectionhttps://gcris.khas.edu.tr/handle/20.500.12469/1248

Browse

Recent Submissions

Now showing 1 - 20 of 2901
  • Book Part
    Luxury Tourism
    (Springer Nature, 2025) Correia, A.; Kozak, M.
  • Conference Object
    Feedback-Based Quantum Algorithm for Constrained Optimization Problems
    (Springer Science and Business Media Deutschland GmbH, 2025) Abdul Rahman, S.; Karabacak, Ö.; Wisniewski, R.
    The feedback-based algorithm for quantum optimization (FALQON) has recently been proposed to find ground states of Hamiltonians and solve quadratic unconstrained binary optimization problems. This paper efficiently generalizes FALQON to tackle quadratic constrained binary optimization (QCBO) problems. For this purpose, we introduce a new operator that encodes the problem’s solution as its ground state. Using control theory, we design a quantum control system such that the state converges to the ground state of this operator. When applied to the QCBO problem, we show that our proposed algorithm saves computational resources by reducing the depth of the quantum circuit and can perform better than FALQON. The effectiveness of our proposed algorithm is further illustrated through numerical simulations. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
  • Book Part
    Scholars
    (Springer Nature, 2025) Kozak, M.
  • Article
    A Nano-Scale Design of Arithmetic and Logic Unit for Energy-Efficient Signal Processing Devices Based on a Quantum-Based Technology
    (Springer, 2025) Zohaib, M.; Navimipour, N.J.; Aydemir, M.T.; Ahmadpour, S.-S.
    Signal processing had a significant impact on the development of many elements of modern life, including telecommunications, education, healthcare, industry, and security. The semiconductor industry is the primary driver of signal processing innovation, producing ever-more sophisticated electronic devices and circuits in response to global demand. In addition, the central processing unit (CPU) is described as the “brain” of a computer or all electronic devices and signal processing. CPU is a critical electronic device that includes vital components such as memory, multiplier, adder, etc. Also, one of the essential components of the CPU is the arithmetic and logic unit (ALU), which executes the arithmetic and logical operations within all types of CPU operations, such as addition, multiplication, and subtraction. However, delay, occupied areas, and energy consumption are essential parameters in ALU circuits. Since the recent ALU designs experienced problems like high delay, high occupied area, and high energy consumption, implementing electronic circuits based on new technology can significantly boost the performance of entire signal processing devices, including microcontrollers, microprocessors, and printed devices, with high-speed and low occupied space. Quantum dot cellular automata (QCA) is an effective technology for implementing all electronic circuits and signal processing applications to solve these shortcomings. It is a transistor-less nanotechnology being explored as a successor to established technologies like CMOS and VLSI due to its ultra-low power dissipation, high device density, fast operating speed in THz, and reduced circuit complexity. This research proposes a ground-breaking ALU that upgrades electrical devices such as microcontrollers by applying cutting-edge QCA nanotechnology. The primary goal is to offer a novel ALU architecture that fully utilizes the potential of QCA nanotechnology. Using a new and efficient approach, the fundamental gates are skillfully utilized with a coplanar layout based on a single cell not rotated. Furthermore, this work presents an enhanced 1-bit and 2-bit arithmetic logic unit in quantum dot cellular automata. The recommended design includes logic, arithmetic operations, full adder (FA) design, and multiplexers. Using the powerful simulation tools QCADesigner, all proposed designs are evaluated and verified. The simulation outcomes indicates that the suggested ALU has 42.48 and 64.28% improvements concerning cell count and total occupied area in comparison to the best earlier single-layer and multi-layer designs. © The Author(s) 2025.
  • Conference Object
    Optimizing Network Lifetime in Wireless Sensor Networks Through Efficient Data Transmission
    (Institute of Electrical and Electronics Engineers Inc., 2025) Basara, B.; Dag, T.
    Wireless sensor networks (WSNs) are integral to modern applications ranging from environmental monitoring to military operations. Despite their utility, the limited energy capacity of sensor nodes remains a critical challenge, particularly during the most energy-intensive task of data transmission. This paper introduces a novel clustering-based communication protocol designed to optimize energy efficiency and extend the network lifetime. Unlike traditional protocols such as LEACH and SEP, the proposed algorithm minimizes redundant data transmission by employing a control mechanism that detects and skips identical data in successive rounds. This innovation reduces energy consumption during communication between non-cluster head nodes, cluster heads (CHs), and the base station (BS). Simulations conducted in static, semi-dynamic, and dynamic environments demonstrate significant improvements in network stability, energy efficiency, and overall lifespan. These results position the proposed protocol as a robust solution for energy-constrained WSNs. © 2025 IEEE.
  • Article
    A New Median Filter Circuit Design Based on Atomic Silicon Quantum-Dot for Digital Image Processing and Iot Applications
    (Institute of Electrical and Electronics Engineers Inc., 2025) Ahmadpour, S.-S.; Avval, D.B.; Navimipour, N.J.; Rasmi, H.; Heidari, A.; Kassa, S.; Patidar, M.
    Digital Image Processing (DIP) is the ability to manipulate digital photographs via algorithms for pattern detection, segmentation, enhancement, and noise reduction. In addition, the Internet of Things (IoT) acts as the eye and system for all DIP in various applications. It can possess a camera or another image sensor in order to capture real-time data from its environment. All vital data is processed by image processing in such a way that it recognizes the object, detects an anomaly, and automatically decides in real-time. In addition, in an IoT system, the median filter is the technique used for noise reduction by substituting the value of the pixel with the central value of the surrounding pixels. It provides speed and efficiency for quick analysis in all IoT systems. However, the images can get corrupted, especially in resource-constrained IoT devices with small cameras, because of random glitches. Moreover, using new quantum technology like atomic-scale silicon dangling bond (DB) logic circuits, which have advanced in fabrication and become a strong contender for field-coupled nano-computing, can solve previous problems in IoT systems. In this paper, we propose a unique quantum CSM based on two new proposed Mux and De-mux. The proposed CSM can be used for computational circuits like median filter circuits (MFC) in a wide range of digital circuits, specifically IoT devices. The proposed design is verified and validated using the powerful SiQAD tool. When comparing CSM to the newest designs, the suggested quantum circuit uses 85% less energy and takes up 61% less area. © 2014 IEEE.
  • Book
    International Case Studies in Food Tourism
    (Taylor and Francis, 2025) Kim, A.; Aktaş, G.; Kozak, M.
    This international case study book provides 28 expertly curated case studies on the topic of food tourism, each with detailed implementation instructions for the instructor to maximise student participation and learning. Embellished with questions, diagrams and data throughout, these case studies have been developed by academic and industry experts with the aim of creating a more interactive teaching experience focused on 'real-world' scenarios within food tourism. Each case study is logically structured and includes an aim and objectives, expected learning outcomes, required background knowledge, steps of implementation in class or online, as well as suggestions for further reading resources. Topics covered range from locally oriented gastronomy identity to innovation and sustainability, with the aim of preparing future professionals and equipping them with the necessary skills and competencies to succeed within the industry. Easy to use and international in scope, this volume is an ideal study resource for use in higher and vocational education, and its unique, teaching-led approach positions it as a vital study tool for instructors and students alike. © 2025 selection and editorial matter, Aise Kim, Gürhan Aktaş and Metin Kozak.
  • Book Part
    Destination Benchmarking
    (Springer Nature, 2025) Kozak, M.
  • Article
    Blockchain-Enabled Healthcare Supply Chain Management: Identification and Analysis of Barriers and Solutions Based on Improved Zero-Sum Hesitant Fuzzy Game Theory
    (Elsevier Ltd, 2025) Razavian, S.B.; Tirkolaee, E.B.; Simic, V.; Ali, S.S.; Görçün, Ö.F.
    Blockchain technology has emerged as a transformative approach in the health sector, enhancing efficiency, transparency, and security in Healthcare Supply Chain Management (HSCM). It addresses critical issues such as data privacy, traceability, and fraud reduction, providing a secure and reliable platform. However, significant barriers to its implementation must be overcome to ensure effective healthcare supply chain operations. This study proposes a two-stage decision-making model for identifying barriers and optimizing blockchain adoption solutions in HSCM under uncertainty. The first stage employs the Hesitant Fuzzy Best-Worst Method (HFBWM) to prioritize barriers. Compared to traditional methods such as Analytic Hierarchy Process (AHP), HFBWM achieves high accuracy with fewer pairwise comparisons. In the second stage, the Improved Zero-Sum Hesitant Fuzzy Game Theory (IZSHFG) model, based on the Weighted Sum Operator (WSO) under Hesitant Fuzzy Sets (HFSs), determines the optimal combination of strategies for blockchain application in HSCM. The challenges are modeled as one player and the solutions as another, with the decision matrix established using WSO under HFS. The obtained results indicate the worst-case scenario involves the simultaneous occurrence of four critical barriers: “Lack of Sufficient Knowledge about Blockchain in HSCM” (0.011217), “Lack of Access to Skilled Technical Personnel” (0.025457), “High Maintenance and Support Costs” (0.056076), and “Security Risks of Patients' Data” (0.069367). These findings highlight the need for targeted strategies to address these barriers, ensuring blockchain's successful integration into HSCM. © 2025 Elsevier Ltd
  • Book Part
    Advertisements
    (Springer Nature, 2025) Kurultay, A.B.
  • Article
    Colonialism in Sub-Saharan Africa, Access To Finance, and Firm Growth
    (Elsevier B.V., 2025) Ngalim, L.; Togan, A.
    Whether adequate access to external finance matters for firm-growth remains an unsettled debate in the finance literature, mainly because of endogeneity concerns. In this paper, we approach these concerns with two instruments constructed from colonial history that plausibly explain the current variations in financial development across sub-Saharan African (SSA) economies. We conjecture that these instruments–– the firm's distance from a colonial railway station and whether it is located in an area that had colonial settlements—provide potential channels of impact that identify the present-day effects of access to finance on firm-growth across SSA. By using these instruments, empirical results underscore the primacy of access to finance in firm-growth and consistently suggest that firms with access to finance are more likely to experience higher revenue growth and asset growth. Overall, our results are consistent and robust to alternative specifications and highlight the importance of access to finance for firms. Our findings provide policy implications on the development of the banking sector as well as private sector development. © 2025 Elsevier B.V.
  • Article
    Circular Economy in the Food Systems: a Review
    (John Wiley and Sons Inc, 2025) Rizwan, D.; Kirmani, S.B.R.; Masoodi, F.A.
    The traditional linear economy model, characterized by the unsustainable “take-make-dispose” approach, leads to substantial resource depletion, environmental degradation, and excessive waste generation. The burgeoning need for a sustainable food system calls for a shift from the traditional open-loop linear model towards a circular economy. This review explores the transformative potential of circularity principles across various levels of food production. The closed-loop circular economy model, put forward by Walter Stahel, prioritizes efficient utilization of resources and waste minimization. It focuses on closing the loop with the food system by promoting regenerative agricultural practices, minimizing the generation of food waste and losses across the supply chain, and encouraging the valorization of waste and by-products. While acknowledging the challenges associated with this transformation, the review underscores the importance of a systematic transition. The transformation from linear to circular food systems necessitates the collective efforts of all the stakeholders, including farmers, producers, processors, retailers, and consumers. Moreover, the government and policymakers have a crucial role to play in terms of infrastructure development and crafting supportive policies to pave the way for successful transformation. By fostering educational initiatives that raise awareness about waste reduction, management, and valorization, alongside incentivizing circular economy practices, the food system can evolve into a more sustainable and closed-loop model, contributing to a more resilient future. © 2025 Wiley Periodicals LLC.
  • Conference Object
    Comprehensive Examination of Network Access, Logging, and Auditing Strategies in Public and Private Institutions: Safeguarding Information Security, Resilience, and Compliance in the Digital Era
    (Springer Science and Business Media Deutschland GmbH, 2025) Mollakuqe, E.; Dimitrova, V.; Dag, H.; Atanasovski, S.
    This research paper delves into the intricacies of network access and communication, logging, and auditing practices within the contexts of public and private institutions. Network access and communication are vital components of information security, encompassing elements such as access controls, authentication, encryption, and network management. The study explores how institutions manage network access and communication to mitigate unauthorized access and ensure data integrity. Through a series of questions and features, we analyze the varying requirements and restrictions imposed on network accessibility, emphasizing the importance of tailored security measures. Additionally, the paper investigates the logging and auditing mechanisms employed by these institutions. Logging involves recording events within systems or networks, while auditing entails reviewing these logs for compliance and anomaly detection. A comparative analysis reveals similarities and differences in how public and private institutions handle sensitive data, link actions to users, and log successful or unsuccessful accesses. Furthermore, it explores the retention periods for logs, critical for compliance, auditing, and security. The research also highlights the significance of business continuity and disaster recovery plans in both sectors, ensuring data restoration and operational resilience during emergencies. By shedding light on the practices and policies in place, this paper offers valuable insights into the strategies employed by institutions to fortify their information security, resilience, and regulatory compliance in the digital age. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
  • Article
    The Relationship Between Perfectionism and Stress Generation: the Moderating Role of Looming Cognitive Style
    (Springer, 2025) Abdulcebbar, A.; Altan-Atalay, A.
    The stress generation hypothesis suggests that certain maladaptive personality traits significantly contribute to the generation of negative life events (NLEs) in people’s lives through inherent maladaptive mechanisms. Previous research indicated that the impact of stress generating risk factors might be augmented or weakened by other transdiagnostic risk factors such as the looming cognitive style (LCS) which includes physical and social looming that have been found to predict different domains of life stressors. Therefore, the present study aimed to examine the moderating roles of the dimensions of the LCS separately, in the relationship between perfectionism (i.e., socially prescribed perfectionism) and stress generation in a group of emerging adults. One-hundred and ninety nine (134 females) undergraduate students aged 18–25 (M = 20.23, SD = 1.56) completed an online questionnaire that measured their level of perfectionism, LCS, and NLEs twice over a six-week interval. The results showed that only social looming significantly moderated the relationship between socially prescribed perfectionism (SPP) and interpersonal NLEs at time 2. These findings show the augmenting impact of social looming on the stress generating effect of elevated SPP, highlighting the importance of examining co-occuring vulnerabilities rather than single risk factors in the stress generation process. © The Author(s) 2025.
  • Conference Object
    Privacy Preservation for Machine Learning in Iiot Data Via Manifold Learning and Elementary Row Operations
    (Science and Technology Publications, Lda, 2025) Yetkin, E.F.; Ballı, T.
    Modern large-scale production sites are highly data-driven and need large computational power due to the amount of the data collected. Hence, relying only on in-house computing systems for computational workflows is not always feasible. Instead, cloud environments are often preferred due to their ability to provide scalable and on-demand access to extensive computational resources. While cloud-based workflows offer numerous advantages, concerns regarding data privacy remain a significant obstacle to their widespread adoption, particularly in scenarios involving sensitive data and operations. This study aims to develop a computationally efficient privacy protection (PP) approach based on manifold learning and the elementary row operations inspired from the lower-upper (LU) decomposition. This approach seeks to enhance the security of data collected from industrial environments, along with the associated machine learning models, thereby protecting sensitive information against potential threats posed by both external and internal adversaries within the collaborative computing environment. © 2025 by SCITEPRESS – Science and Technology Publications, Lda.
  • Conference Object
    Developing Ai Literacy in the Classroom: Ai–human Collaboration and Ethical Ai
    (Springer Science and Business Media Deutschland GmbH, 2025) Akin, A.I.
    This study aims to exemplify the development of AI literacy in the classroom in an undergraduate setting in Turkey. Learning methods, competencies, and ethical concerns regarding AI literacy are discussed through the assignments, assignment questions, and an after-class survey. Results show that students are aware of AI tools but they do not have a full grasp on writing to-the-point prompts to acquire the results they desire. Though they are eager to embrace AI tools because of the easy and time-efficient ways of reading, doing research, editing, and getting inspiration, they are hesitant because of ethical concerns such as plagiarism, restrictions on creative thinking, biases, false information, and laziness that might arise because of the ease and speed with which they can gather information. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2025.
  • Conference Object
    Towards Better Energy Efficiency Through Coil-Based Electricity Consumption Forecasting in Steel Manufacturing
    (Institute of Electrical and Electronics Engineers Inc., 2024) Koca, A.; Erdem, Z.; Dag, H.
    Forecasting electricity consumption with the possibly-highest accuracy is crucial for cost optimization, operational efficiency, competitiveness, contract negotiation, and achieving the global goals of sustainable development in steel manufacturing. This study focuses on identifying the most appropriate prediction algorithm for coil-based electricity consumption and the most effective implementation purposes in a steel company. Random Forest, Gradient-Boosted Trees, and Deep Neural Networks are preferred because they are suitable for the given problem and widely used for forecasting. The performance of the prediction models is evaluated based on the root mean squared error (RMSE) and the coefficient of determination (R-squared). Experiments show that the Random Forest model outperforms the Gradient-Boosted Trees and Deep Neural Network models. The results will provide benefits for many different purposes. Firstly, during contract negotiations, it will enable us to gain a competitive advantage when purchasing electricity in the day-ahead market. Secondly, in the production scheduling phase, the ones with the highest electricity consumption will be produced during the hours when there is the least demand at the most affordable prices. Finally, when prioritizing sales orders, the use of the existing capacity for orders with lower energy intensity or a higher profit margin will be ensured. © 2024 IEEE.
  • Conference Object
    Permissioned Blockchain-Based Monitoring Framework for Der-Integrated Distribution Networks
    (Institution of Engineering and Technology, 2024) Angın, P.; Zehir, A.; Ceylan, O.; Eissa, M.A.A.S.; Yüksel, M.C.; Deveci, U.; Göl, M.
    SCADA systems are used for real-time monitoring of key systems and the status of critical assets in both transmission and distribution networks. The trend towards different types of”new” loads and sources such as photovoltaic (PV), electric vehicle (EV) charging stations and battery storage systems is changing the operational approach of distribution grids. Well-known fit-and-forget philosophy is being replaced and requires more operational activities and more thorough monitoring of end devices in new active distribution networks (ADNs). In this paper, a permissioned blockchain-based monitoring framework for distribution networks hosting different types of distributed energy resources (DERs) is presented. The proposed tool operates independently of the SCADA system while it can utilise SCADA measurements for anomaly and fraud detection. In addition, seamless integration and visibility is facilitated by the flow of information between DERs and the distribution system operator through adapters between the blockchain network and the main protocols used for smart metering, inverter management and EV charging stations. The coordinated use of SCADA and the proposed framework will provide a redundant set of observations that will contribute to unbiased state estimation and successful anomaly detection. © The Institution of Engineering & Technology 2024.
  • Book Part
    Design of Alienation in Video Games
    (Springer International Publishing, 2024) Akay, K.; Simsek, C.N.
  • Book Part
    Prosumer Economy in Practice: Building a Community of Smes With Deepened Circular Supply Networks
    (Springer, 2024) Korğali, A.D.; Uslu, D.; Özesmi, U.
    The dominant economic paradigm is dysfunctional, both in its ecological and social dimensions. A planetary boundaries framework update reports that currently, 6 out of 9 boundaries are already transgressed, indicating the earth isn't a safe space for humanity anymore (Richardson et al. in Science Advances 9, 2023). The normalization of unjust economic practices is the root cause of the polycrisis humanity experiences. Solving the polycrisis may only be possible by shifting the dominant economic paradigm.We set out to create a prosumer economy as an alternative sustainable economic paradigm. The prosumer economy is defined as "a macroscale circular economy with minimum negative or positive ecological and social impact, an ecosystem of producers and prosumers, who have synergistic and circular relationships with deepened circular supply networks, where leakage of wealth out of the system is minimized" (Özesmi in The prosumer economy- Being like a forest, 2019). This prosumer economy system was implemented in Good4Trust.org where more than 25.000 prosumers and 770 producers (SMEs) came together and are working together. Good4Trust is an online bazaar that brings ecologically and socially fair producers and prosumers together to create a full ecosystem. It doesn't reinforce competition like a marketplace but solidarity and symbiosis like a local bazaar where producers all help each other and work together. Exchanges include retail, wholesale, services, and contractual sales. Good4Trust also has an inbuilt community currency called "Trust". Every time a prosumer supports a producer, by buying a product from them, they create "Trust". These trusts then, can be gifted, transferred, or used in other exchanges. We discuss Good4Trust as a viable sustainable ecosystem and demonstrate how the prosumer economy may help in the creation of a needed paradigm shift to solve the polycrisis. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.