A Novel Data Encryption Algorithm To Ensure Database SecuritySivan İbrahim, Ahmet Zengin, Selman Hızal, A F M Suaib Akhter, Cevat AltunkayaDOI :10.26650/acin.1134979Research ArticleenP. 1-16Plant Classification Method Using Histogram and Machine Learning for Smart Agriculture ApplicationsOrhan Yaman, Türker TuncerDOI :10.26650/acin.1070261Research ArticleenP. 17-28Determining Online Travel Planning with AHP and TOPSIS MethodsAbdullah Eren, Heersh Azeez KhorsheedDOI :10.26650/acin.1165378Research ArticleenP. 29-45Website Performance Evaluation by Grey Relational Analysis: A Research on Companies in BIST Technology and Informatics IndexHülya Başeğmez, Kadir ÖzdemirDOI :10.26650/acin.1165100Research ArticleenP. 47-58Short-Term Sales Forecasting Using LSTM and Prophet Based Models in E-CommerceAlp Ecevit, İrem Öztürk, Mustafa Dağ, Tuncay ÖzcanDOI :10.26650/acin.1259067Research ArticleenP. 59-70Detection of Orienting Response to Novel Sounds in Healthy Elderly Subjects: A Machine Learning Approach Using EEG FeaturesEmine Elif TülayDOI :10.26650/acin.1234106Research ArticleenP. 71-80Application of Integer Response Optimization Models for the Healthcare ResourcesAbdulkadir AtalanDOI :10.26650/acin.1096774Research ArticleenP. 81-93User Experience Analysis of an Original Website Designed with Simplicity from the Perspective of Technology Acceptance ModelDeniz Canca, Ziya Nazım PerdahçıDOI :10.26650/acin.1235455Research ArticleenP. 95-106Analysis of City Demographics in Turkiye Using Data Mining TechniquesÖzge Doğuç, Kevser Şahinbaş, Gökhan SilahtaroğluDOI :10.26650/acin.1132510Research ArticleenP. 107-123An Intrusion Detection Approach based on the Combination of Oversampling and Undersampling AlgorithmsAhmet Okan Arık, Gülsüm Çiğdem ÇavdaroğluDOI :10.26650/acin.1222890Research ArticleenP. 125-138Machine Learning Models on MOBA Gaming: League of Legends Winner PredictionKaan ArıkDOI :10.26650/acin.1180583Research ArticleenP. 139-151Melting of Privacy with Machine Learning, Big Data, and Social MediaPelin Canbay, Zübeyde DemircioğluDOI :10.26650/acin.1231944Research ArticleenP. 153-163Malware Detection in Forensic Memory Dumps: The Use of Deep Meta-Learning ModelsYalçın ÖzkanDOI :10.26650/acin.1282824Research ArticleenP. 165-172Can the Artificial Intelligence Speak? Subalternity of “Subontologies” and the Death of the ProgrammerHaktan KalırDOI :10.26650/acin.1279545Research ArticleenP. 173-185Social Media Sentiment Analysis for Solar Eclipse with Text MiningAdem Korkmaz, Selma BulutDOI :10.26650/acin.1207100Research ArticleenP. 187-196LISS’nAP: A Peer-Advising Collaborative Learning Approach for Object-Oriented Programming LearningRochdi Boudjehem, Ali Benyounes, Yacine LafifiDOI :10.26650/acin.869786Research ArticleenP. 197-207A Modular Efficiency Determination Formula for Information Retrieval Evaluations and OptimizationsVeli Özcan BudakDOI :10.26650/acin.1198925Research ArticleenP. 209-228