Dağ, Hasan

Loading...
Profile Picture
Name Variants
D., Hasan
Dağ, HASAN
DAĞ, HASAN
Hasan, Dag
HASAN DAĞ
Hasan DAĞ
DAĞ, Hasan
Daǧ H.
Hasan Dağ
Dağ, H.
Dağ,H.
D.,Hasan
Dağ, Hasan
Dag H.
Dag,H.
Dağ H.
Dag,Hasan
Dag, Hasan
H. Dağ
Da?, Hasan
Job Title
Prof. Dr.
Email Address
Main Affiliation
Management Information Systems
Status
Current Staff
Website
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID

Sustainable Development Goals

15

LIFE ON LAND
LIFE ON LAND Logo

3

Research Products

16

PEACE, JUSTICE AND STRONG INSTITUTIONS
PEACE, JUSTICE AND STRONG INSTITUTIONS Logo

0

Research Products

14

LIFE BELOW WATER
LIFE BELOW WATER Logo

1

Research Products

6

CLEAN WATER AND SANITATION
CLEAN WATER AND SANITATION Logo

0

Research Products

3

GOOD HEALTH AND WELL-BEING
GOOD HEALTH AND WELL-BEING Logo

2

Research Products

17

PARTNERSHIPS FOR THE GOALS
PARTNERSHIPS FOR THE GOALS Logo

3

Research Products

4

QUALITY EDUCATION
QUALITY EDUCATION Logo

2

Research Products

2

ZERO HUNGER
ZERO HUNGER Logo

0

Research Products

10

REDUCED INEQUALITIES
REDUCED INEQUALITIES Logo

0

Research Products

7

AFFORDABLE AND CLEAN ENERGY
AFFORDABLE AND CLEAN ENERGY Logo

2

Research Products

13

CLIMATE ACTION
CLIMATE ACTION Logo

0

Research Products

1

NO POVERTY
NO POVERTY Logo

0

Research Products

9

INDUSTRY, INNOVATION AND INFRASTRUCTURE
INDUSTRY, INNOVATION AND INFRASTRUCTURE Logo

14

Research Products

12

RESPONSIBLE CONSUMPTION AND PRODUCTION
RESPONSIBLE CONSUMPTION AND PRODUCTION Logo

0

Research Products

8

DECENT WORK AND ECONOMIC GROWTH
DECENT WORK AND ECONOMIC GROWTH Logo

2

Research Products

11

SUSTAINABLE CITIES AND COMMUNITIES
SUSTAINABLE CITIES AND COMMUNITIES Logo

2

Research Products

5

GENDER EQUALITY
GENDER EQUALITY Logo

0

Research Products
Documents

84

Citations

919

h-index

13

Documents

45

Citations

223

Scholarly Output

98

Articles

19

Views / Downloads

1195/8945

Supervised MSc Theses

25

Supervised PhD Theses

3

WoS Citation Count

432

Scopus Citation Count

829

WoS h-index

8

Scopus h-index

12

Patents

0

Projects

0

WoS Citations per Publication

4.41

Scopus Citations per Publication

8.46

Open Access Source

53

Supervised Theses

28

Google Analytics Visitor Traffic

JournalCount
Proceedings - 7th International Conference on Computer Science and Engineering, UBMK 20222
Computers & Security2
TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES2
UBMK 2023 - Proceedings: 8th International Conference on Computer Science and Engineering -- 8th International Conference on Computer Science and Engineering, UBMK 2023 -- 13 September 2023 through 15 September 2023 -- Burdur -- 1938732
UBMK 2024 - Proceedings: 9th International Conference on Computer Science and Engineering -- 9th International Conference on Computer Science and Engineering, UBMK 2024 -- 26 October 2024 through 28 October 2024 -- Antalya -- 2049062
Current Page: 1 / 10

Scopus Quartile Distribution

Competency Cloud

GCRIS Competency Cloud

Scholarly Output Search Results

Now showing 1 - 10 of 98
  • Master Thesis
    The Performance Wise Comparison of the Most Widely Used Nosql Databases
    (Kadir Has Üniversitesi, 2015) Aladily, Ahmed; Dağ, Hasan
    This work deals with the comparison of the most widely used noSQL databases. Chapter one deals in great details with the SQL databases and the noSQL databases including characteristics and the four types of noSQL databases, the second Chapter deals with the characteristics of the SQL and noSQL databases and the main differences between SQL databases and the noSQL databases. The third chapter deals with the architecture of the Couchdb, Mongodb, Cassandra, and Hbase. Chapter four deals with installation of the Couchdb, Mongodb, Cassandra and Hbase and Chapter five deals with analysis of the four noSQL databases and it also includes the performance wise comparison.
  • Conference Object
    Power consumption estimation using in-memory database computation
    (Institute of Electrical and Electronics Engineers Inc., 2016) Dag,H.; Alamin,M.
    In order to efficiently predict electricity consumption, we need to improve both the speed and the reliability of computational environment. Concerning the speed, we use in-memory database, which is taught to be the best solution that allows manipulating data many times faster than the hard disk. © 2016 IEEE.
  • Conference Object
    Post-outage state estimations for outage management
    (IFAC Secretariat, 2011) Ceylan, Oğuzhan; Ozdemir, Aydogan; Dağ, Hasan
    Real time outage information is required to the utility operators for outage management process. In addition to some basic information regarding the outage post-outage system status will help to improve the response to outages and management of system reliability. This paper presents particle swarm optimization based reactive power estimations for branch outages. Post outage voltage magnitudes and reactive power flows results for IEEE 14 and IEEE 30 bus systems are given. Simulation results show that post outage voltage magnitudes and reactive power flows can be computed with a reasonable accuracy. © 2011 IFAC.
  • Conference Object
    Citation - Scopus: 1
    Heterosim: Heterogeneous Simulation Framework
    (Association for Computing Machinery, 2009) Dursun, Taner; Dağ, Hasan
    In order to arrange heterogeneous simulation executions it would be useful to have simulation tools that enable easy and fast creation of simulation sessions employing real-time software components beside simulation codes. Although there have been considerable amount of research activities in simulation community the current simulation tools are not sufficiently capable to support such a cooperation between components working in real-time and simulation-time. In this paper we propose a new approach for constructing hybrid simulations that leverages usage of simulation systems. We introduce HeteroSim a Java-based simulation system that can execute discrete event simulations by employing both simulation and real world software entities. This model is applicable to many software related areas such as scenario-based software testing and development of simulators. As a case study we are able to rely on this model in order to build simulations combining both the simulated elements of a High Performance Computing (HPC) system and already implemented elements of our Policy Based Management (PBM) framework so-called POLICE [1][2]. In this manner it may be possible to study the efficiency of POLICE on management of HPC systems.
  • Article
    Citation - WoS: 2
    Citation - Scopus: 6
    Branch Outage Simulation Based Contingency Screening by Gravitational Search Algorithm
    (Praise Worthy Prize Srl, 2012) Ceylan, Oğuzhan; Özdemir, Aydoğan; Dağ, Hasan
    Power systems contingency analysis is an important issue for electric power system operators. This paper performs branch outage simulation based contingency screening using a bounded network approach. Local constrained optimization problem representing the branch outage phenomena is solved by the gravitational search algorithm. The proposed method is applied to IEEE 14 30 57 and 118 Bus Test systems and its performance from the point of capturing violations is evaluated. In addition false alarms and the computational accuracy of the proposed method are also analyzed by using scattering diagrams. Finally the proposed gravitational search based contingency screening is compared with full AC load flow solutions from the point of computational speed. Copyright (C) 2012 Praise Worthy Prize S.r.l. - All rights reserved.
  • Conference Object
    Comprehensive Examination of Network Access, Logging, and Auditing Strategies in Public and Private Institutions: Safeguarding Information Security, Resilience, and Compliance in the Digital Era
    (Springer Science and Business Media Deutschland GmbH, 2025) Mollakuqe, E.; Dimitrova, V.; Dag, H.; Atanasovski, S.
    This research paper delves into the intricacies of network access and communication, logging, and auditing practices within the contexts of public and private institutions. Network access and communication are vital components of information security, encompassing elements such as access controls, authentication, encryption, and network management. The study explores how institutions manage network access and communication to mitigate unauthorized access and ensure data integrity. Through a series of questions and features, we analyze the varying requirements and restrictions imposed on network accessibility, emphasizing the importance of tailored security measures. Additionally, the paper investigates the logging and auditing mechanisms employed by these institutions. Logging involves recording events within systems or networks, while auditing entails reviewing these logs for compliance and anomaly detection. A comparative analysis reveals similarities and differences in how public and private institutions handle sensitive data, link actions to users, and log successful or unsuccessful accesses. Furthermore, it explores the retention periods for logs, critical for compliance, auditing, and security. The research also highlights the significance of business continuity and disaster recovery plans in both sectors, ensuring data restoration and operational resilience during emergencies. By shedding light on the practices and policies in place, this paper offers valuable insights into the strategies employed by institutions to fortify their information security, resilience, and regulatory compliance in the digital age. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
  • Conference Object
    Citation - Scopus: 1
    Resource-Efficient Ensemble Learning for Edge Iiot Network Security Against Osint-Based Attacks
    (Institute of Electrical and Electronics Engineers Inc., 2024) Ecevit, M.I.; Çukur, Z.; Izgün, M.A.; Ui Ain, N.; Daǧ, H.
    The rise of Edge IIoT networks has transformed industries by enabling real-time data processing, but these networks face significant c ybersecurity risks, particularly from OSINT-based attacks. This paper presents a resource-efficient ensemble learning framework designed to detect such attacks in Edge IIoT environments. The framework integrates machine learning models, including RandomForest, K-Nearest Neighbors, and Logistic Regression, optimized with Principal Component Analysis (PCA) to reduce data dimensionality and computational overhead. GridSearchCV and StratifiedKFold cross-validation were employed to fine-tune the models, resulting in high detection accuracy. This approach ensures robust and efficient security for resource-constrained Edge IIoT networks. © 2024 IEEE.
  • Master Thesis
    Applying Machine Learning Algorithms in Sales Prediction
    (Kadir Has Üniversitesi, 2019) Sekban, Judi; Dağ, Hasan
    Makine öğrenimi bir çok endüstride üzerinde yoğun çalışmalar yapılan bir konu olmuştur, ve neyse ki şirketler kendi problemlerini çözebilecek çeşitli machine learning yaklaşımları hakkında günden güne daha fazla bilgi sahibi oluyorlar. Fakat, farklı makine öğreniminin modellerinden en iyi şekilde sonuç almak ve verimli sonuçlara ulaşabilmek için, modellerin uygulanış biçimlerini ve verinin doğasını iyi anlamak gerekir. Bu tez, belli bir tahmin görevi için, uygulanan farklı makine öğreniminin algoritmalarını ne kadar iyi sonuç verdiklerini araştırır. Bu amaçla tez, 4 faklı algoritma, bir istifleme topluluğu tekniği ve modeli geliştirmek için belirli bir özelllik seçme yaklaşımı sunar ve uygular. Farklı konfigürasyonlar uygulayarak sonuçlar birbiriyle test edilir. Bütün bu işlemler, gerekli veri önislemeleri ve özellik mühendisliği adımları tamamlandıktan sonra yapılır.
  • Editorial
    Preface
    (Association for Computing Machinery, 2025) Batmaz, A.; Barrera-Machuca, M.; Ortega, F.; Zielasko, D.; Kim, K.; Skarbez, R.; Weissker, T.
  • Conference Object
    Citation - Scopus: 2
    Comparison of Cost-Free Computational Tools for Teaching Physics
    (IEEE, 2010) Er, Neslihan Fatma; Dağ, Hasan
    It is widely accepted that it is quite difficult to engage today's students, from high schools to university, both in educational activities in class and "teaching" them physics due to their prejudices about the complexity of physics. The difficulty in capturing students' attention in class for a long time also plays a role in less effective teaching during learning activities. Research shows that students learn little from traditional lectures. According to constructivist learning theories, visual aids and hands-on activities play a major role in learning physics. In addition to laboratory work there are many computational tools for teaching physics, which help teachers and students in constructing a conceptual framework. With this in mind, this paper compares freeware and open source computational tools for teaching physics.