Person: CUHACI, LEVENT
Loading...
Email Address
Birth Date
Research Projects
Organizational Units
Job Title
Dr. Öğr. Üyesi
Last Name
CUHACI
First Name
LEVENT
Name
5 results
Search Results
Now showing 1 - 5 of 5
Publication Metadata only A Microsoft Visual Basic software for B spline solution of the one dimensional heat equation(2009) Çağlar, Hikmet; Çağlar, Nazan; Özer, Mehmet; CUHACI, LEVENT; 114368; 112369; 110809; 2509Publication Metadata only A Visual Basic Software For Computing of the One Dimensional Heat Equation by Using B Spline Solution(2009-07) Çağlar, Hikmet; Çağlar, Nazan; Özer, Mehmet; CUHACI, LEVENT; 112369Microsoft Visual Basic® has been used for developing a software for the one- dimensional heat equation. We have solved the equation by means of a computer and developed user-friendly software with a graphical user interface. The numerical solution of the equation is visually illustrated. The software does not require familiarity with any new environment and is highly flexible; it can also easily be adapted to other experimental methods.Publication Metadata only A microsoft visual Basic software for B-Spline solution of the one-dimensional heat equation(2008) Çağlar, Hatice Nazan; Çağlar, Süleyman Hikmet; Özer, Mehmet; CUHACI, LEVENT; 110809; 114368; 2509; 112369Publication Metadata only Önder Denetimli Takım Canlandırma Sistemlerinde Tıkanıklık Çözüm Algoritmaları(2008) Akgün; CUHACI, LEVENT; 112369Publication Metadata only Intrusion detection systems with deep learning: A systematic mapping study(2019) Ösken, Sinem; Yıldırım, Ecen Nur; BAYDOĞMUŞ, GÖZDE KARATAŞ; CUHACI, LEVENTIn this study, a systematic mapping study was conducted to systematically evaluate publications on Intrusion Detection Systems with Deep Learning. 6088 papers have been examined by using systematic mapping method to evaluate the publications related to this paper, which have been used increasingly in the Intrusion Detection Systems. The goal of our study is to determine which deep learning algorithms were used mostly in the algortihms, which criteria were taken into account for selecting the preferred deep learning algorithm, and the most searched topics of intrusion detection with deep learning algorithm model. Scientific studies published in the last 10 years have been studied in the IEEE Explorer, ACM Digital Library, Science Direct, Scopus and Wiley databases.