Transformer-Based Turkish Automatic Speech RecognitionDavut Emre Taşar, Kutan Koruyan, Cihan ÇılgınDOI :10.26650/acin.1338604Research ArticleenP. 1-10A Model Design Using Blockchain and Smart Contracts Against Cyberattacks in Smart Home SystemsOsman GülerDOI :10.26650/acin.1349544Research ArticleenP. 11-22Sentiment Analysis on GPT-4 with Comparative Models Using Twitter DataMustafa Özel, Özlem Çetinkaya BozkurtDOI :10.26650/acin.1418834Research ArticleenP. 23-33Network Forensics Analysis of Cyber Attacks on Computer Systems using Machine Learning TechniquesFirdevs Yıldız, Batuhan Gül, Fatih ErtamDOI :10.26650/acin.1444470Research ArticleenP. 34-50The Precarious Pirouette: Artificial Intelligence and Environmental SustainabilityRonald Manhibi, Kudzayi TarisayiDOI :10.26650/acin.1431443Research ArticleenP. 51-59Diagnosis of Internal Frauds using Extreme Gradient Boosting Model Optimized with Genetic Algorithm in RetailingAytek Demirdelen, Pelin Vardarlıer, Yurdagül Meral, Tuncay ÖzcanDOI :10.26650/acin.1475658Research ArticleenP. 60-70An Overview of Paradigm Shift Dynamics in Transportation: Use of Artificial Intelligence in Intelligent Transportation Systems in TürkiyeEsma Dilek, Özgür Talih, Türksel Kaya BensghirDOI :10.26650/acin.1389571Review ArticleenP. 71-87