Bilgisayar Mühendisliği Bölümü Makale Koleksiyonu
Bu koleksiyon için kalıcı URI
Güncel Gönderiler
Öğe Robust pixel-level image encryption algorithm using 3D infinite collapse coupling map(Springer, 2025) Song, Okchol; Pak, Chanil; Jong, Cholmin; Erkan, Uğur; Ri, MyongsongChaotic map, due to its excellent unpredictability and complexity, is widely used in various fields, such as information security, information communication, and system control, etc., thus research work is being intensified to improve its chaotic characteristics. In this work, based on the published literatures, we proposed a noble 3D-ICCM (3D Infinite Collapse Coupling Map) by combining three 1D infinite collapse maps, so as to improve its chaotic performance and evaluated its chaotic characteristics. As can be seen from the bifurcation characteristic diagram from experiments, the distribution is very uniform and Lyapunov exponent has an average value of 2.5 over the whole chaotic characteristic range, and the information entropy also has a value of over 7.99. In addition, it has a value of over 0.1 for all 15 test parameters of NIST (National Institute of Standards and Technology) statistical tests. This demonstrates that the proposed 3D-ICCM is completely random, and has better chaotic properties than the previous 3D maps, especially the 3D-ICM (3D Infinite Collapse Map). In addition, in order to validate applicability of the proposed 3D-ICCM to image encryption, simple-structured pixel-level image encryption algorithm with our 3D-ICCM is designed and its robustness is verified through experiments. The experimental results convinced that the proposed image encryption algorithm has a sufficient key sensitivity and super ability to resist differential, Chosen-plaintext, cropping and noise attacks. The experimental results are fully uncovered in tables and images in this paper. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.Öğe Design and practical implementation of a novel hyperchaotic system generator based on Apéry's constant(Elsevier B.V., 2025) Koçak, Ömer; Erkan, Uğur; Babaoğlu, İsmailModern chaotic systems necessitate high levels of randomness and complexity, which can be achieved through adaptable seed functions. This paper proposes a new 2D Apéry chaotic system generator (2D-ACG) based on Apéry numbers to fulfill this need. The 2D-ACG generates various chaotic systems using classical seed functions. The effectiveness and the capabilities of 2D-ACG are demonstrated on three well-known example chaotic maps using pairs of seed functions such as Cos-Cos, Sin-Sin and Cos-Sin. The reliability of chaos metrics, such as the Lyapunov exponent (LE), sample entropy (SE), correlation dimension (CD), Kolmogorov entropy (KE), C0 test, and sensitivity, confirms the chaotic performance of these maps. This is further supported by a comparison with reported 2D chaotic systems. Furthermore, one of the maps derived from 2D-ACG has been implemented into an image encryption algorithm and has successfully passed the cryptanalysis tests. Additionally, the hardware implementation of 2D-ACG has been tested on a field programmable gate array (FPGA), thereby confirming its efficacy. The superior results obtained indicate that the proposed 2D-ACG, with its enhanced diversity and complex structure derived from the Apéry's constant, exhibits higher-performance chaotic characteristics.Öğe Novel hyperchaotic system: Implementation to audio encryption(Elsevier Ltd, 2025) Zhou, Shuang; Erkan, Uğur; Toktas, Abdurrahim; Yin, Yanli; Zhang, YingqianTo overcome the limitations of existing low-dimensional chaotic systems, particularly their vulnerability to degradation, this study introduces a novel family of discrete hyper-chaotic systems, designed using a one-dimensional quadratic map. The dynamic behavior of the systems is analysed using Lyapunov exponents and sample entropy to evaluate their complexity and robustness. The results demonstrate that the proposed systems exhibit higher ergodicity, greater Lyapunov exponents and better randomness compared to existing chaotic systems. Exploiting these systems, a novel fractal K-means audio encryption (FKM-AE) algorithm is proposed, integrating fractal algorithms with the K-means grouping approach. Simulations reveal that the proposed method effectively reduces the correlation of audio messages across adjacent time intervals and robustly resists various attacks, demonstrating its high performance. © 2025 Elsevier LtdÖğe A parallel color image encryption algorithm based on a 2d logistic-rulkov neuron map(Institute of Electrical and Electronics Engineers Inc., 2025) Gao, Suo; Zhang, Zheyi; Ho-Ching Iu, Herbert; Ding, Siqi; Erkan, Uğur; Toktaş, AbdurrahimImages are widely used in social networks, necessitating efficient and secure transmission, especially in bandwidth-constrained environments. This paper aims to develop a color image encryption algorithm that enhances security while optimizing computational efficiency. A novel parallel color image encryption algorithm based on the 2D Logistic-Rulkov neuron map (2D-LRNM) is proposed. In this approach, the three channels of the color image are first separated. Cross-channel information interaction is introduced to form three new channels, which are then processed in parallel. During the encryption process of each channel, a block-wise parallel encryption mechanism is applied, ensuring simultaneous encryption of each block. This block-wise strategy effectively leverages parallel computing resources and balances the task load. To meet the demand for a large number of keystreams during encryption, the 2D-LRNM is introduced. It combines the simplicity and chaotic properties of the Logistic map with the multi-timescale dynamics and neurodynamic behaviors of the Rulkov map. By overcoming the dimensional limitations inherent in the single Logistic map, this approach extends the system to a two-dimensional framework, significantly increasing the complexity of chaotic behavior and improving its unpredictability. Experimental results demonstrate that the proposed encryption algorithm achieves high security and reduces computation time by approximately 83.3%. © 2014 IEEE.Öğe Design, Dynamical Analysis, and Hardware Implementation of a Novel Memcapacitive Hyperchaotic Logistic Map(IEEE-Inst Electrical Electronics Engineers Inc, 2024) Gao, Suo; Ho-Ching Iu, Herbert; Erkan, Uğur; Şimşek, Cemaleddin; Mou, Jun; Toktaş, Abdurrahim; Wu, RuiCurrently, discrete memristors are a focal point in the study of chaotic maps. Similar to memristors, memcapacitors-another type of memory circuit component-have not received widespread attention in the design of chaotic maps. In this article, we propose a 4-D memcapacitive hyperchaotic logistic map (4D-MHLM) by integrating memcapacitors with the logistic map. The dynamical behavior of the 4D-MHLM is analyzed using Lyapunov exponent analysis, and the impact of different parameters on system performance is discussed. The complexity of generating pseudo-random sequences with the 4D-MHLM is investigated through complexity analysis, including spectral entropy complexity and C0 complexity. Notably, attractor analysis reveals a unique phenomenon of infinite coexisting attractors within the 4D-MHLM. Finally, the chaotic attractor generated by the 4D-MHLM is successfully implemented on a hardware platform. Theoretical analysis and digital circuit implementation results indicate that the 4D-MHLM exhibits rich dynamical behavior and higher complexity, offering significant value for practical applications.Öğe Temporal action segmentation for video encryption(Pergamon-Elsevier Science Ltd, 2024) Gao, Suo; Iu, Herbert Ho-Ching; Mou, Jun; Erkan, Uğur; Liu, Jiafeng; Wu, Rui; Tang, XianglongVideos contain temporal information, enabling them to capture the dynamic changes of actions and provide richer visual effects. Traditional video encryption methods involve decomposing videos into frames and encrypting them frame by frame, which results in significant resource consumption. This paper proposes a video encryption method based on temporal action segmentation. This methodology involves the identification and extraction of pivotal frames from a video dataset, followed by the encryption of these significant key frames. This approach serves to enhance the efficacy of the video encryption algorithm. The method consists of three modules. The first module uses temporal action segmentation to classify video frames and extract important frames for the second module's input. The second module encrypts the extracted key frames using a chaos-based encryption algorithm, thereby reducing the time cost of video encryption. The third module outputs the encrypted video. During the encryption process, a large amount of key stream is required. To address this, the paper introduces a new pseudo-random sequence generation method called two-dimensional Gramacy&Lee map (2D-GLM). Comprehensive comparative analysis clearly demonstrates that compared to other systems, 2D-GLM exhibits superior performance and can generate a large number of high-performance pseudo-random sequences. The proposed algorithm is tested on GTEA, and the simulation results demonstrate that it can accomplish video encryption tasks with high security.Öğe Mathematical Model Developed Using Heat Transfer Coefficient and Clothing Permeability Factor Parameters to Prevent Pressure Ulcer(Prof. Dr. Mehmet Zeki SARIKAYA, 2022) Öğülmüş Demircan, Fadime; Yücedağ, İbrahim; Toz, MetinPressure ulcers are wounds that occur in bedridden patients as a result of staying in the same position for a long time, due to external causes such as pressure, friction, shearing and moisture. Pressure ulcer is a serious problem all over the world when evaluated in terms of hospital capacity, nurse employment and treatment costs. Prevention studies gain importance as the cost of pressure ulcer prevention is less than the cost of treatment. In this study, we improved a mathematical model obtained in one of our previous study in order to prevent pressure ulcers or delay wound formation. In addition to the previous model, the new model calculates the effect of hc (heat transfer coefficient) and Fpcl (clothing permeability factor) parameters on the risk of pressure ulcer formation through the body area value. The effects of these parameters on the formation of pressure ulcers are shown in graphics. The results obtained from the new model shown that the sensitivity in the determination of the risk of pressure ulcer formation has increased. Thus, early detection of wound formation was provided by calculating the risk of pressure ulcer formation. © 2022, Prof. Dr. Mehmet Zeki SARIKAYA. All rights reserved.Öğe 3D3A class of parallel mechanisms: Design and performance evaluation(Elsevier B.V., 2025) Yılmaz, Savaş; Küçük, Serdar; Toz, MetinThis paper presents a study of 20 six-degrees-of-freedom (DoF) Generalized Stewart–Gough Platform (GSP) type mechanisms in 3D3A class. These mechanisms are characterized by three distance and three angular constraints between their base platforms (BPs) and moving platforms (MPs). The mechanisms are categorized into two groups based on the geometric shapes of their BPs and MPs. The platform shapes are determined by the types of joints and their connection configurations on the platforms. The platforms are designed with regular polygonal shapes. Two groups are generated according to whether the geometric shapes of the platforms are the same or different. There are 10 types of mechanisms in the first group, where the BP and the MP shapes of each are the same. The second group also includes 10 types of mechanisms, each with two design variations, resulting in 20 designs. Thus, a total of 30 mechanisms are designed. The reachable workspaces and dexterities of these manipulators are computed to assess the impact of design parameters such as the ratio between the BP and MP radii and the rotation of one end of the BP edges. The reachable workspace volume and the Global Conditioning Index (GCI) are selected as the performance metrics. The results of all mechanisms are presented in the paper, with a comparison of the two best mechanisms against the classical 3×3 Stewart Platform. The study shows that the D43A13 type mechanism achieves a large reachable workspace while maintaining a high GCI value. © 2024 Elsevier B.V.Öğe Designing human–robot ınteraction algorithms for developing metacognitive skills(John Wiley and Sons Inc, 2025) Barın Özkan, Sibel; Burak İnner, A.; Toz, Metin; Ünlü, BerkeIn today's technology, robots are involved in all life aspects. Therefore, it is inconceivable that robots will not affect the field of education either. Robot simulators can help developers test and improve intelligent systems before putting them in natural environments. In this study, the use of robots in education has been discussed in relation to the development of metacognitive abilities. A simulation environment was prepared for testing and developing the methods that follow learning models in human–robot interaction. The simulation is about a humanoid robot making an engineering lesson plan. It has been tested on a group of academicians consisting of 64 (32 persons in the experimental group and 32 persons in the control group) persons working in Computer Engineering in the 2021–2022 academic year. The application process includes an 8-week course period. The data as the result of the test were collected from both groups using the MCQ-30 scale and from the experimental group by the metacognitive strategy questions after preparing the engineering lesson plans made by robot simulation. Evaluation of the data showed that the robot simulation was effective in the metacognition scores of the people in the experimental group, and the success level of the people in the control group did not change significantly, considering the results of the pretest and the posttest. © 2024 Wiley Periodicals LLC.Öğe Securing dual-channel audio communication with a 2-D infinite collapse and logistic map(IEEE-Inst Electrical Electronics Engineers Inc, 2024) Wu, Rui; Gao, Suo; Iu, Herbert Ho-Ching; Zhou, Shuang; Erkan, Uğur; Toktaş, Abdurrahim; Tang, XianglongTo provide robust security measures for audio data during transmission, this article has developed a novel dual-channel audio encryption scheme based on chaos theory. Specifically, a new 2-D chaotic system called 2-D infinite collapse with logistic map (2-D-ICLM) is designed in this article. Compared to traditional 2-D chaotic systems, the 2-D-ICLM exhibits a larger parameter space, complexity, and richness, along with high unpredictability and randomness. These characteristics provide potential advantages and applications in the field of encryption. In the proposed encryption scheme, audio information serves as input to a hash function, which generates the initial values and parameters for the 2-D-ICLM, producing the keystream for the cryptographic system. Considering the correlation between the two channels of audio information, the information from the left and right channels is fused to create a new audio signal for encryption. Scrambling and diffusion processes are performed synchronously in the encryption algorithm, with the ciphertext information from the left channel utilized in the encryption of the right channel audio. The experimental results prove the effectiveness of the suggested audio encryption technique, effectively countering various conventional attack methods and showcasing its robust security features. The correlation of adjacent elements of ciphertext audio is 0.0013, the NSCR and UACI is around 0.9960 and 0.3345, and the efficiency is 0.0003 s/KB.Öğe Complex dynamics of a new multiscroll memristive neural network(Springer Science and Business Media B.V., 2024) Chen, Yidan; Lai, Qiang; Zhang, Yongxian; Erkan, Uğur; Toktaş, AbdurrahimIn this paper, a cyclic memristive neural network structure is proposed. There are counterclockwise connections between the neurons. The system generates a controllable number of multi-scroll chaos by means of memristors with multi-segment nonlinear functions, which can produce a controllable infinite coexistence of heterogeneous attractors with initial offsets and a large range of amplitude-modulation properties. Through numerical simulations, the phenomenon of multi-scroll chaos is demonstrated and the coexisting attractors are found to exhibit extreme multi-stability as well as parameter-dependent amplitude-modulation properties. In addition, the feasibility of the system is verified by the construction of the circuit platform, the results of the digital hardware experiments are given, and the PRNG is constructed by applying this circular memristor neural network system.Öğe Cross-channel color image encryption through 2D hyperchaotic hybrid map of optimization test functions(Elsevier Ltd., 2024) Toktaş, Feyza; Erkan, Uğur; Yetgin, ZekiThe security of chaos-based Image Encryption (IE) algorithms inherently depends on the permutation and diffusion strategy of the algorithm and the dynamic performance of chaotic maps. However, the existing studies suffer from low disordering capability, poor dynamic performance, and lack of sensitivity of the chaotic maps. In order to address these limitations, a Cross-Channel Color IE (CCC-IE) algorithm is presented, which has high shuffling ability with diagonal permutation and bi-directional sequential diffusion through a novel 2D hyperchaotic hybrid map of optimization test functions. The proposed 2D hyperchaotic map, namely 2D-RG map, is designed by hybridizing the Rastrigin and Griewank functions. Their chaotic nature, such as high complexity and fluctuation, makes them suitable for design of chaotic map. The 2D-RG map-based CCC-IE algorithm diagonally scrambles the pixels of the image across RGB channels and sequentially manipulates the pixel values in bi-direction for improving resistance of the algorithm to the cyberthreats. The dynamic performance of the 2D-RG map and the reliability of the CCC-IE algorithm are separately investigated and validated through a detailed comparison with the state of the art. The results manifest that the CCC-IE not only visually but also numerically is the more reliable algorithm thanks to the superior chaotic characteristics of the 2D-RG map.Öğe A new approach based on collective ıntelligence to solve traveling salesman problems(Multidisciplinary Digital Publishing Institute (MDPI), 2024) Kıran, Mustafa Servet; Beşkirli, MehmetThis paper presents a novel approach based on the ant system algorithm for solving discrete optimization problems. The proposed method is based on path construction, path improvement techniques, and the footprint mechanism. Some information about the optimization problem and collective intelligence is used in order to create solutions in the path construction phase. In the path improvement phase, neighborhood operations are applied to the solution, which is the best of the population and is obtained from the path construction phase. The collective intelligence in the path construction phase is based on a footprint mechanism, and more footprints on the arc improve the selection chance of this arc. A selection probability is also balanced by using information about the problem (e.g., the distance between nodes for a traveling salesman problem). The performance of the proposed method has been investigated on 25 traveling salesman problems and compared with state-of-the-art algorithms. The experimental comparisons show that the proposed method produced comparable results for the problems dealt with in this study.Öğe Index-based simultaneous permutation-diffusion in image encryption using two-dimensional price map(Springer, 2024) Lai, Qiang; Zhang, Hui; Üstün, Deniz; Erkan, Uğur; Toktaş, AbdurrahimThis paper proposes an index-based simultaneous permutation-diffusion image encryption algorithm (ISPD-IEA) based on chaos theory and a permutation-diffusion coupled encryption mechanism. The proposed method introduces a novel two-dimensional (2D) Price map derived from the Price function and classical maps, exhibiting superior chaotic dynamical properties compared to existing alternatives. By integrating the permutation-diffusion process, ISPD-IEA effectively diffuses minor changes in pixel values while altering their positions, enhancing both encryption efficiency and resistance against differential analysis attacks. Experimental results and thorough security analysis confirm the outstanding security and high encryption efficiency of ISPD-IEA. The algorithm not only achieves excellent encryption performance but also demonstrates its ability to resist various attacks commonly encountered in image encryption scenarios.Öğe Parametric dataset-based formulation of rated torque of a brushless DC motor for electric vehicle(Springer Science and Business Media Deutschland GmbH, 2024) Yılmaz, Ahmet; Şimşek, Cemaleddin; Balcı, SelamiThis study aims to determine the mechanical response of a brushless DC motor (BLDC) used in two-wheeled electric vehicles by analyzing torque values through finite element analysis. The motor features a three-phase stator structure and four permanent magnets on its rotor. The study investigates the relationship between torque, pulse degree, excitation voltage, and stator current using RMxprt software. A parametric dataset consisting of 600 data points is generated to model the BLDC motor system. Genetic programming (GP) is employed to establish a formula that correlates the motor’s output torque with the input variables. The resulting simplified formula, created with GP, achieves a mean absolute percentage error (MAPE) of 0.085 and an R-squared (R2) value of 0.989, indicating high accuracy in torque prediction based on simulation parameters. This research provides a torque formulation based on parametric finite element analysis, offering potential benefits for electric bicycles and potentially eliminating the need for certain sensors. Thus, before experimental studies in the process of determining BLDC motor torque behavior, a dataset approach based on FEA parametric simulation studies and a GP formulation developed based on the dataset obtained from parametric simulations were proposed.Öğe A new application for reading optical form with standard scanner by using image processing techniques(2023) Eldem, Ayşe; Özcan, Fatih TahaMultiple choice exams appear as the most common method used to measure student success in education systems in Turkey and around the world. Evaluation of multiple choice exams is usually done by optical form reading systems using expensive optical forms and optical scanners. The most important reason for using optical form reading systems is to reduce the error rate to zero in the evaluation process. In this study, an alternative system is proposed for the evaluation of multiple choice exams. The designed system is a web-based software with high accuracy on evaluating that contains optical form design module, session planning module and evaluation module. The form in which the designed template will be printed on A4 paper instead of a special optical form and the system in which standard scanners will be used instead of the optical scanner, uses the image processing algorithms in the OpenCV library in the evaluation process which is an intermediate library developed in C#. The proposed system is coded to run in parallel to speed up the evaluation process. In order to determine the performance of the proposed system, the optical forms filled by 208 students studying at Karamanoğlu Mehmetbey University, Department of Computer Engineering were evaluated. The accuracy rate of the system has been determined as 99.97%. It has been determined that 1 optical evaluation time, calculated by dividing the total time obtained by running in parallel, by the number of evaluated optical forms, varies between 1.7 seconds and 15 seconds, depending on the scanning resolution.Öğe A simple method for obtaining artificial 3D forms of 2D mammograms in diagnosis of breast cancer(Taylor and Francis Ltd., 2023) Toz, GülizBreast cancer is one of the most common types of cancer among women worldwide and mammography is the primary method which plays a major role in early diagnosis of breast cancer. Mammograms can be obtained in two-dimensional (2D) or three-dimensional (3D) forms. 3D images contain more information than their 2D forms, however, they involve more computational and time complexities and are more challenging to produce. This study proposes a simple method to convert mammograms into artificial 3D forms. In this method, first, the gray level values of a 2D image are defined as an artificial third dimension for the same image and then the obtained image is saved in a different viewpoint again in the 2D form to make it include more information than its original form. Both, the original mammograms and their converted forms are classified as mass or normal mammograms using the ResNet. The method is tested on masses and normal mammograms taken from MIAS, INBreast and CBIS-DDSM databases, which are frequently used in the literature. The results show that the classification performed on the images obtained with the original 2D forms provided 82.4% accuracy for MIAS, 86.7% for INbreast and 96.7% for CBIS-DDSM databases. Whereas the transformed forms provided 97.8% accuracy for MIAS, 100% for INbreast and 100% for CBIS-DDSM databases, in terms of mass and normal classification. According to these results, it is seen that the transformed forms of the images provided an average of 10.67% higher accuracy for all three databases compared to their original forms.Öğe Two design proposals and working space comparison for 3-CCC type robot with 6 degrees of freedom(Gazi University, 2022) Yılmaz, Savaş; Küçük, Serdar; Toz, MetinIn this study, inverse kinematic analysis of 3-CCC type asymmetric parallel mechanism, which is one of the 3D3A class parallel robot structures with 6 degrees of freedom, was made and two design proposals were performed. Working spaces of the proposed designs have been calculated. In the designs, CPAC (P: Active prismatic joint) leg structure provided with D4 type constraint and CPAC (A: Active rotational joint) leg structure provided with A1 type constraint were used. In addition, the CPAC (A: Active rotational joint, P: Active prismatic joint) leg structure obtained by using two active joints in a single leg was also used in the designs. This robot type is also referred to as a 3-CCC mechanism in the literature. In the first design proposal, the fixed and mobile platforms were determined to be equilateral triangles with cylindrical joints. Platforms are connected to each other by 3 CCC leg types. In the second design proposal, the movable platform with fixed cylindrical joints placed in XY, XZ and YZ planes and pointwise end-effector is connected with 3 CCC leg types. The lengths of the cylindrical joints used in the fixed and mobile platform were kept the same in both designs. While calculating the working spaces, the limit points that the end functionalist can reach were determined and the inside area was scanned at 5 mm intervals and its accessibility was checked. Working spaces are calculated by first holding the mobile platform fixed at 0o and then rotating it between -30 degrees + 30 degrees angles. With the results obtained, it has been seen that the working space can be expanded with different designs.Öğe Parameter optimization of chaotic system using Pareto-based triple objective artificial bee colony algorithm(Springer Science and Business Media Deutschland GmbH, 2023) Toktaş, Abdurrahim; Erkan, Uğur; Üstün, Deniz; Wang, XingyuanChaotic map is a kind of discrete chaotic system. The existing chaotic maps suffer from optimal parameters in terms of chaos measurements. In this study, a novel approach of optimization of parametric chaotic map (PCM) using triple objective optimization is presented for the first time. A PCM with six parameters is first conceived and then optimized using Pareto-based triple objective artificial bee colony (PT-ABC) algorithm. Pareto optimality is employed to catch the trade-off among the objectives: Lyapunov exponent (LE), sample entropy (SE), and Kolmogorov entropy (KE). A global optimal design including the six parameters is selected for minimizing the reciprocal of the three objectives independently. The chaotic performance of PCM is verified through an evaluation with bifurcation diagram, attractor, LE, SE, KE, and correlation dimension. The results are also validated by comparison with those of which reported elsewhere. Furthermore, the applicability of PCM is examined over image encryption and the results are compared with existing chaos-based IEs. Therefore, the PCM manifests the best ergodicity and complexity thanks to its PT-ABC algorithm.Öğe Optimal insulation assessment, emission analysis, and correlation formulation for ındian region(MDPI, 2023) Kallioğlu, Mehmet Ali; Yılmaz, Ahmet; Sharma, Ashutosh; Mohamed, Ahmed; Dobrotă, Dan; Alam, Tabish; Khargotra, Rohit; Singh, TejThe current study depicts the effects of different insulation materials and fuel types on the cooling and heating performance of buildings situated in hot and dry, warm and humid, composite, and cold climatic conditions in India. Ten different locations chosen from diverse climatic regions were selected, and various potential parameters for expanded polystyrene and extruded polystyrene insulation materials were evaluated. Potential parameters, such as optimal insulation thickness, annual savings, and payback period, were computed for cooling and heating requirements and were found in the ranges of 0.0428–0.891 m, 10.83–19.19 $/m2, and 1.49–2.36 years for cooling, as well as 0.0063–0.1522 m, 0.29–55.92 $/m2, and 0.95–6.52 years for heating, respectively. An emission analysis was also carried out for the estimation of greenhouse gas (GHG) emissions by the engagement of optimal insulation thickness for heating. The GHG emissions from natural gas, coal, and diesel by the employment of various insulating materials were found in the ranges of 5.39–11.28, 9.47–32.68, and 2.26–4.51 kg/m2-year, respectively. A correlation formulation (power) for optimal insulation thickness was also carried out. For checking the preciseness of the developed mathematical models, statistical tools were utilized, and their obtained values in the satisfactory range signified the accurateness of the developed models.