Dağ, Hasan

Loading...
Profile Picture
Name Variants
D., Hasan
Dağ, HASAN
DAĞ, HASAN
Hasan, Dag
HASAN DAĞ
Hasan DAĞ
DAĞ, Hasan
Daǧ H.
Hasan Dağ
Dağ, H.
Dağ,H.
D.,Hasan
Dağ, Hasan
Dag H.
Dag,H.
Dağ H.
Dag,Hasan
Dag, Hasan
H. Dağ
Da?, Hasan
Job Title
Prof. Dr.
Email Address
hasan.dag@khas.edu.tr
Main Affiliation
Management Information Systems
Status
Website
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID
Scholarly Output

83

Articles

17

Citation Count

238

Supervised Theses

24

Scholarly Output Search Results

Now showing 1 - 10 of 83
  • Master Thesis
    The Performance Wise Comparison of the Most Widely Used Nosql Databases
    (Kadir Has Üniversitesi, 2015) Aladily, Ahmed; Dağ, Hasan; Dağ, Hasan
    This work deals with the comparison of the most widely used noSQL databases. Chapter one deals in great details with the SQL databases and the noSQL databases including characteristics and the four types of noSQL databases, the second Chapter deals with the characteristics of the SQL and noSQL databases and the main differences between SQL databases and the noSQL databases. The third chapter deals with the architecture of the Couchdb, Mongodb, Cassandra, and Hbase. Chapter four deals with installation of the Couchdb, Mongodb, Cassandra and Hbase and Chapter five deals with analysis of the four noSQL databases and it also includes the performance wise comparison.
  • Conference Object
    Citation - Scopus: 0
    Power consumption estimation using in-memory database computation
    (Institute of Electrical and Electronics Engineers Inc., 2016) Dag,H.; Dağ, Hasan; Alamin,M.
    In order to efficiently predict electricity consumption, we need to improve both the speed and the reliability of computational environment. Concerning the speed, we use in-memory database, which is taught to be the best solution that allows manipulating data many times faster than the hard disk. © 2016 IEEE.
  • Master Thesis
    Audio detection using machine learning & transfer learning models
    (Kadir Has Üniversitesi, 2021) Acar, Mesut; Dağ, Hasan; Dağ, Hasan
    In this paper, using datasets ESC-50 & ESC-10 of environmental sounds, machine learning algorithms, and feature extraction methods are used to develop recognition performance. K-NN, SVM, Random Forest are used for comparing the recognition results. The different feature extraction methods in the literature are used to get more meaningful attributes from these datasets and obtain a higher accuracy rate. This approach shows that SVM algorithm has a significantly good result with accuracy scores. The best accuracy scores obtained by classic machine learning algorithms are %42,15 for ESC-50 and %77,7 for ESC-10. In addition to this, the experiments have been done with a pre-trained ResNet neural network as a backbone, which achieves successful results despite the machine learning models. In this study, a higher accuracy rate is achieved from baseline machine learning algorithms in literature and using transfer learning with pre-trained Resnet backbones to reach some state of art results. The accuracy scores are %68,95 for ESC-50 and %87,25 for ESC-10.
  • Conference Object
    Citation - WoS: 0
    Parallel Implementation Of Iterative Rational Krylov Methods For Model Order Reduction
    (IEEE, 2010) Yetkin, E. Fatih; Dağ, Hasan; Dağ, Hasan; Yetkin, Emrullah Fatih
    Model order reduction (MOR) techniques are getting more important in large scale computational tasks like large scale electronic circuit simulations. In this paper we present some experimental work on multiprocessor systems for rational Krylov methods. These methods require huge memory and computational power especially in large scale simulations. Therefore these methods are fairly suitable for parallel computing.
  • Article
    Citation - WoS: 0
    Citation - Scopus: 0
    Mathematical Foundations and Implementation of Coniks Key Transparency
    (Mdpi, 2024) Dağ, Hasan; Dag, Hasan; Dimitrova, Vesna
    This research paper explores the CONIKS key management system's security and efficiency, a system designed to ensure transparency and privacy in cryptographic operations. We conducted a comprehensive analysis of the underlying mathematical principles, focusing on cryptographic hash functions and digital signature schemes, and their implementation in the CONIKS model. Through the use of Merkle trees, we verified the integrity of the system, while zero-knowledge proofs were utilized to ensure the confidentiality of key bindings. We conducted experimental evaluations to measure the performance of cryptographic operations like key generation, signing, and verification with varying key sizes and compared the results against theoretical expectations. Our findings demonstrate that the system performs as predicted by cryptographic theory, with only minor deviations in computational time complexities. The analysis also reveals significant trade-offs between security and efficiency, particularly when larger key sizes are used. These results confirm that the CONIKS system offers a robust framework for secure and efficient key management, highlighting its potential for real-world applications in secure communication systems.
  • Conference Object
    Citation - Scopus: 5
    Double Branch Outage Modeling and Its Solution Using Differential Evolution Method
    (2011) Ceylan, Oğuzhan; Dağ, Hasan; Ozdemir, Aydogan; Ceylan, Oğuzhan; Dağ, Hasan
    Power system operators need to check the system security by contingency analysis which requires power flow solutions repeatedly. AC power flow is computationally slow even for a moderately sized system. Thus fast and accurate outage models and approximated solutions have been developed. This paper adopts a single branch outage model to a double branch outage one. The final constrained optimization problem resulted from modeling is then solved by using differential evolution method. Simulation results for IEEE 30 and 118 bus test systems are presented and compared to those of full AC load flow in terms of solution accuracy. © 2011 IEEE.
  • Conference Object
    Citation - WoS: 0
    Power Consumption Estimation using In-Memory Database Computation
    (Ieee, 2016) Dag, Hasan; Dağ, Hasan; Alamin, Mohamed
    In order to efficiently predict electricity consumption, we need to improve both the speed and the reliability of computational environment. Concerning the speed, we use inmemory database, which is taught to be the best solution that allows manipulating data many times faster than the hard disk. For reliability, we use machine learning algorithms. Since the model performance and accuracy may vary depending on data each time, we test many algorithms and select the best one. In this study, we use SmartMeter Energy Consumption Data in London Households to predict electricity consumption using machine learning algorithms written in Python programming language and in-memory database computation package, Aerospike. The test results show that the best algorithm for our data set is Bagging algorithm. We also emphatically prove that R-squared may not always be a good test to choose the best algorithm.
  • Article
    Citation - WoS: 20
    Citation - Scopus: 28
    An ensemble of pre-trained transformer models for imbalanced multiclass malware classification
    (Elsevier Advanced Technology, 2022) Dağ, Hasan; Demirkıran, Ferhat; Unal, Gur; Dag, Hasan
    Classification of malware families is crucial for a comprehensive understanding of how they can infect devices, computers, or systems. Hence, malware identification enables security researchers and incident responders to take precautions against malware and accelerate mitigation. API call sequences made by malware are widely utilized features by machine and deep learning models for malware classification as these sequences represent the behavior of malware. However, traditional machine and deep learning models remain incapable of capturing sequence relationships among API calls. Unlike traditional machine and deep learning models, the transformer-based models process the sequences in whole and learn relationships among API calls due to multi-head attention mechanisms and positional embeddings. Our experiments demonstrate that the Transformer model with one transformer block layer surpasses the performance of the widely used base architecture, LSTM. Moreover, BERT or CANINE, the pre-trained transformer models, outperforms in classifying highly imbalanced malware families according to evaluation metrics: F1-score and AUC score. Furthermore, our proposed bagging-based random transformer forest (RTF) model, an ensemble of BERT or CANINE, reaches the state-of-the-art evaluation scores on the three out of four datasets, specifically it captures a state-of-the-art F1-score of 0.6149 on one of the commonly used benchmark dataset. (C) 2022 Elsevier Ltd. All rights reserved.
  • Conference Object
    Citation - WoS: 0
    On the Selection of Interpolation Points for Rational Krylov Methods
    (Springer-Verlag Berlin, 2012) Yetkin, E. Fatih; Dağ, Hasan; Dağ, Hasan; Yetkin, Emrullah Fatih
    We suggest a simple and an efficient way of selecting a suitable set of interpolation points for the well-known rational Krylov based model order reduction techniques. To do this some sampling points from the frequency response of the transfer function are taken. These points correspond to the places where the sign of the numerical derivation of transfer function changes. The suggested method requires a set of linear system's solutions several times. But they can be computed concurrently by different processors in a parallel computing environment. Serial performance of the method is compared to the well-known H-2 optimal method for several benchmark examples. The method achieves acceptable accuracies (the same order of magnitude) compared to that of H-2 optimal methods and has a better performance than the common selection procedures such as linearly distributed points.
  • Conference Object
    Citation - Scopus: 1
    Heterosim: Heterogeneous Simulation Framework
    (Association for Computing Machinery, 2009) Dursun, Taner; Dağ, Hasan; Dağ, Hasan
    In order to arrange heterogeneous simulation executions it would be useful to have simulation tools that enable easy and fast creation of simulation sessions employing real-time software components beside simulation codes. Although there have been considerable amount of research activities in simulation community the current simulation tools are not sufficiently capable to support such a cooperation between components working in real-time and simulation-time. In this paper we propose a new approach for constructing hybrid simulations that leverages usage of simulation systems. We introduce HeteroSim a Java-based simulation system that can execute discrete event simulations by employing both simulation and real world software entities. This model is applicable to many software related areas such as scenario-based software testing and development of simulators. As a case study we are able to rely on this model in order to build simulations combining both the simulated elements of a High Performance Computing (HPC) system and already implemented elements of our Policy Based Management (PBM) framework so-called POLICE [1][2]. In this manner it may be possible to study the efficiency of POLICE on management of HPC systems.