-
The novel Tauberian conditions associated with the $(\overline{N},p,q)$ summability of double sequences
Authors:
Zerrin Önder,
Ekrem Savaş,
İbrahim Çanak
Abstract:
In this paper, our primary objective is to provide a fresh perspective on the relationship between the $(\overline{N},p,q)$ method, which is a product of relevant one-dimensional summability methods, and $P$-convergence for double sequences. To accomplish this objective, we establish certain Tauberian conditions that control the behavior of a double sequence in terms of both $O_L$-oscillation and…
▽ More
In this paper, our primary objective is to provide a fresh perspective on the relationship between the $(\overline{N},p,q)$ method, which is a product of relevant one-dimensional summability methods, and $P$-convergence for double sequences. To accomplish this objective, we establish certain Tauberian conditions that control the behavior of a double sequence in terms of both $O_L$-oscillation and $O$-oscillation in certain senses, building a bridge between $(\overline{N},p,q)$ summability and $P$-convergence, while imposing certain restrictions on the weight sequences. As special circumstances of our findings, we demonstrate that Landau-type $O_L$ condition with respect to $(P_m)$ and $(Q_n),$ as well as Hardy-type $O$ condition with respect to $(P_m)$ and $(Q_n),$ serve as Tauberian conditions for $(\overline{N},p,q)$ summability under particular additional conditions. Consequently, these results encompass all classical Tauberian theorems, including conditions such as slow decrease or slow oscillation in certain senses.
△ Less
Submitted 3 January, 2024; v1 submitted 2 July, 2023;
originally announced July 2023.
-
Measure theoretic results for approximation by neural networks with limited weights
Authors:
Vugar Ismailov,
Ekrem Savas
Abstract:
In this paper, we study approximation properties of single hidden layer neural networks with weights varying on finitely many directions and thresholds from an open interval. We obtain a necessary and at the same time sufficient measure theoretic condition for density of such networks in the space of continuous functions. Further, we prove a density result for neural networks with a specifically c…
▽ More
In this paper, we study approximation properties of single hidden layer neural networks with weights varying on finitely many directions and thresholds from an open interval. We obtain a necessary and at the same time sufficient measure theoretic condition for density of such networks in the space of continuous functions. Further, we prove a density result for neural networks with a specifically constructed activation function and a fixed number of neurons.
△ Less
Submitted 4 April, 2023;
originally announced April 2023.
-
Cryptocurrency wallets: assessment and security
Authors:
Ehsan Nowroozi,
Seyedsadra Seyedshoari,
Yassine Mekdad,
Erkay Savas,
Mauro Conti
Abstract:
Digital wallet as a software program or a digital device allows users to conduct various transactions. Hot and cold digital wallets are considered as two types of this wallet. Digital wallets need an online connection fall into the first group, whereas digital wallets can operate without internet connection belong to the second group. Prior to buying a digital wallet, it is important to define for…
▽ More
Digital wallet as a software program or a digital device allows users to conduct various transactions. Hot and cold digital wallets are considered as two types of this wallet. Digital wallets need an online connection fall into the first group, whereas digital wallets can operate without internet connection belong to the second group. Prior to buying a digital wallet, it is important to define for what purpose it will be utilized. The ease with which a mobile phone transaction may be completed in a couple of seconds and the speed with which transactions are executed are reflection of efficiency. One of the most important elements of digital wallets is data organization. Digital wallets are significantly less expensive than classic methods of transaction, which entails various charges and fees. Constantly, demand for their usage is growing due to speed, security, and the ability to conduct transactions between two users without the need of a third party. As the popularity of digital currency wallets grows, the number of security concerns impacting them increases significantly. The current status of digital wallets on the market, as well as the options for an efficient solution for obtaining and utilizing digital wallets. Finally, the digital wallets' security and future improvement prospects are discussed in this chapter.
△ Less
Submitted 6 March, 2023;
originally announced March 2023.
-
Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Authors:
Ehsan Nowroozi,
Mohammadreza Mohammadi,
Erkay Savas,
Mauro Conti,
Yassine Mekdad
Abstract:
In the past few years, Convolutional Neural Networks (CNN) have demonstrated promising performance in various real-world cybersecurity applications, such as network and multimedia security. However, the underlying fragility of CNN structures poses major security problems, making them inappropriate for use in security-oriented applications including such computer networks. Protecting these architec…
▽ More
In the past few years, Convolutional Neural Networks (CNN) have demonstrated promising performance in various real-world cybersecurity applications, such as network and multimedia security. However, the underlying fragility of CNN structures poses major security problems, making them inappropriate for use in security-oriented applications including such computer networks. Protecting these architectures from adversarial attacks necessitates using security-wise architectures that are challenging to attack.
In this study, we present a novel architecture based on an ensemble classifier that combines the enhanced security of 1-Class classification (known as 1C) with the high performance of conventional 2-Class classification (known as 2C) in the absence of attacks.Our architecture is referred to as the 1.5-Class (SPRITZ-1.5C) classifier and constructed using a final dense classifier, one 2C classifier (i.e., CNNs), and two parallel 1C classifiers (i.e., auto-encoders). In our experiments, we evaluated the robustness of our proposed architecture by considering eight possible adversarial attacks in various scenarios. We performed these attacks on the 2C and SPRITZ-1.5C architectures separately. The experimental results of our study showed that the Attack Success Rate (ASR) of the I-FGSM attack against a 2C classifier trained with the N-BaIoT dataset is 0.9900. In contrast, the ASR is 0.0000 for the SPRITZ-1.5C classifier.
△ Less
Submitted 17 April, 2023; v1 submitted 25 September, 2022;
originally announced September 2022.
-
ML with HE: Privacy Preserving Machine Learning Inferences for Genome Studies
Authors:
Ş. S. Mağara,
C. Yıldırım,
F. Yaman,
B. Dilekoğlu,
F. R. Tutaş,
E. Öztürk,
K. Kaya,
Ö. Taştan,
E. Savaş
Abstract:
Preserving the privacy and security of big data in the context of cloud computing, while maintaining a certain level of efficiency of its processing remains to be a subject, open for improvement. One of the most popular applications epitomizing said concerns is found to be useful in genome analysis. This work proposes a secure multi-label tumor classification method using homomorphic encryption, w…
▽ More
Preserving the privacy and security of big data in the context of cloud computing, while maintaining a certain level of efficiency of its processing remains to be a subject, open for improvement. One of the most popular applications epitomizing said concerns is found to be useful in genome analysis. This work proposes a secure multi-label tumor classification method using homomorphic encryption, whereby two different machine learning algorithms, SVM and XGBoost, are used to classify the encrypted genome data of different tumor types.
△ Less
Submitted 1 February, 2022; v1 submitted 21 October, 2021;
originally announced October 2021.
-
Some new lacunary $f$-statistical $A$-convergent sequence spaces of order $α$
Authors:
Ekrem Savas,
Stuti Borgohain
Abstract:
We study the concept of density for sets of natural numbers in some lacunary $A$-convergent sequence spaces. Also we are trying to investigate some relation between the ordinary convergence and module statistical convergence for evey unbounded modulus function. Morever we also study some results on the newly defined lacunary $f$-statistically $A$-convergent sequence spaces with respect to some Mus…
▽ More
We study the concept of density for sets of natural numbers in some lacunary $A$-convergent sequence spaces. Also we are trying to investigate some relation between the ordinary convergence and module statistical convergence for evey unbounded modulus function. Morever we also study some results on the newly defined lacunary $f$-statistically $A$-convergent sequence spaces with respect to some Musielak-Orlicz function.
△ Less
Submitted 5 August, 2015; v1 submitted 18 June, 2015;
originally announced June 2015.
-
On strongly almost lacunary statistical $A$-convergence defined by Musielak-Orlicz function
Authors:
Ekrem Savas,
Stuti Borgohain
Abstract:
We study some new strongly almost lacunary statistical $A$-convergent sequence space of order $α$ defined by a Musielak-Orlicz function. We also give some inclusion relations between the newly introduced class of sequences with the spaces of strongly almost lacunary $A$-convergent sequence of order $α$. Moreover we have examined some results on Musielak-Orlicz function with respect to these spaces…
▽ More
We study some new strongly almost lacunary statistical $A$-convergent sequence space of order $α$ defined by a Musielak-Orlicz function. We also give some inclusion relations between the newly introduced class of sequences with the spaces of strongly almost lacunary $A$-convergent sequence of order $α$. Moreover we have examined some results on Musielak-Orlicz function with respect to these spaces.
△ Less
Submitted 6 August, 2015; v1 submitted 17 June, 2015;
originally announced June 2015.
-
Note on $f_λ$-statistical convergence
Authors:
Stuti Borgohain,
Ekrem Savas
Abstract:
In this article, we study about the $λ$-statistical convergence with respect to the density of moduli and find some results related to statistical convergence as well. Also we introduce the concept of $f_λ$-summable sequence and try to investigate some relation between the $f_λ$-summability and module $% λ$-statistical convergence.
In this article, we study about the $λ$-statistical convergence with respect to the density of moduli and find some results related to statistical convergence as well. Also we introduce the concept of $f_λ$-summable sequence and try to investigate some relation between the $f_λ$-summability and module $% λ$-statistical convergence.
△ Less
Submitted 30 March, 2016; v1 submitted 17 June, 2015;
originally announced June 2015.
-
Measures of noncompactness in some new lacunary difference sequence spaces
Authors:
Ekrem Savas,
Stuti Borgohain
Abstract:
In this research article, we establish some identities and estimates for the operator norms and the Hausdorff measures of noncompactness of certain operators on some lacunary difference sequence spaces defined by Orlicz function. Moreover, we apply our results to characterize some classes of compact operators on those spaces by using the Hausdorff measure of noncompactness.
In this research article, we establish some identities and estimates for the operator norms and the Hausdorff measures of noncompactness of certain operators on some lacunary difference sequence spaces defined by Orlicz function. Moreover, we apply our results to characterize some classes of compact operators on those spaces by using the Hausdorff measure of noncompactness.
△ Less
Submitted 17 June, 2015;
originally announced June 2015.
-
THRIVE: Threshold Homomorphic encryption based secure and privacy preserving bIometric VErification system
Authors:
Cagatay Karabat,
Mehmet Sabir Kiraz,
Hakan Erdogan,
Erkay Savas
Abstract:
In this paper, we propose a new biometric verification and template protection system which we call the THRIVE system. The system includes novel enrollment and authentication protocols based on threshold homomorphic cryptosystem where the private key is shared between a user and the verifier. In the THRIVE system, only encrypted binary biometric templates are stored in the database and verificatio…
▽ More
In this paper, we propose a new biometric verification and template protection system which we call the THRIVE system. The system includes novel enrollment and authentication protocols based on threshold homomorphic cryptosystem where the private key is shared between a user and the verifier. In the THRIVE system, only encrypted binary biometric templates are stored in the database and verification is performed via homomorphically randomized templates, thus, original templates are never revealed during the authentication stage. The THRIVE system is designed for the malicious model where the cheating party may arbitrarily deviate from the protocol specification. Since threshold homomorphic encryption scheme is used, a malicious database owner cannot perform decryption on encrypted templates of the users in the database. Therefore, security of the THRIVE system is enhanced using a two-factor authentication scheme involving the user's private key and the biometric data. We prove security and privacy preservation capability of the proposed system in the simulation-based model with no assumption. The proposed system is suitable for applications where the user does not want to reveal her biometrics to the verifier in plain form but she needs to proof her physical presence by using biometrics. The system can be used with any biometric modality and biometric feature extraction scheme whose output templates can be binarized. The overall connection time for the proposed THRIVE system is estimated to be 336 ms on average for 256-bit biohash vectors on a desktop PC running with quad-core 3.2 GHz CPUs at 10 Mbit/s up/down link connection speed. Consequently, the proposed system can be efficiently used in real life applications.
△ Less
Submitted 29 September, 2014;
originally announced September 2014.
-
Some Geometric and Topological Properties of a New Sequence Space Defined by De la Vallee-Poussin Mean
Authors:
Necip Simsek,
Ekrem Savas,
Vatan Karakaya
Abstract:
The main purpose of this paper is to introduce a new sequence space by using de la Vallee-Poussin mean and investigate both the modular structure with some geometric properties and some topological properties with respect to the Luxemburg norm.
The main purpose of this paper is to introduce a new sequence space by using de la Vallee-Poussin mean and investigate both the modular structure with some geometric properties and some topological properties with respect to the Luxemburg norm.
△ Less
Submitted 10 October, 2009;
originally announced October 2009.
-
Necessary and sufficient conditions for inclusion relations for absolute summability
Authors:
B E Rhoades,
Ekrem Savas
Abstract:
We obtain a set of necessary and sufficient conditions for $| \bar{N}, p_{n} |_{k} $ to imply $|\bar{N}, q_{n} |_{s}$ for $1 < k \leq s < \infty$. Using this result we establish several inclusion theorems as well as conditions for the equivalence of $| \bar {N}, p_{n} |_{k}$ and $|\bar{N},q_{n} |_{s}$.
We obtain a set of necessary and sufficient conditions for $| \bar{N}, p_{n} |_{k} $ to imply $|\bar{N}, q_{n} |_{s}$ for $1 < k \leq s < \infty$. Using this result we establish several inclusion theorems as well as conditions for the equivalence of $| \bar {N}, p_{n} |_{k}$ and $|\bar{N},q_{n} |_{s}$.
△ Less
Submitted 25 September, 2003;
originally announced September 2003.