2 results listed
The main objective of this research is design and realization of a wireless, secure, remote monitoring, control and feedback systemusing GSM technology for the patient health. In this study, CRUD (Create, Read, Update and Delete) operations can be performed on a Windows Communication Foundation (WCF) server using the developed mobile application andMySQL database. This system also includes a ripped QR scanner that prevents the browsers from entering QR code information because a crypto QR definition of the patient's identity number was developed. All the patients’ assay results and their radiological views are recorded along their reports. Patients who need regular follow-up can send their daily, weekly and monthly results to the physician using this application. In an instant panic situation, this system can communicate to the 112-emergency services and by the help of a push-to-talk button, system can send the patient's instant location to the phone number indicated by short message service (SMS). If 112-emergency departments support the connection, system can also send this location information automatically to 112-emergency systems. Transmitted data is archived and visualized both on a mobile phone and on a central server. The experiments on the proposed system gave promising results that is accurate in scanning, clear in monitoring, intelligent in decision making and reliable in communication.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
Hilal Kaya
F.V. ÇELEBİ
T. YILMAZ
M.B. MURATOĞLU
S. ERARSLAN
Nowadays, rightly so, the concept of cyber security
is very important. The most effective weapon in this area is
undoubtedly malicious software. Therefore, it is more important
to analyze malware effectively and to prevent possible harms.
One of the techniques to analyze the malware is sandboxing.
There are too many sandbox options in the wild that can be
preferred depending on situations and the service provided. In
this paper, the differences between free open source and
commercial sandboxes have been discussed. There have been
several advantages and disadvantages between them that is
mentioned in the result.
International Conference on Cyber Security and Computer Science
ICONCS
G.Kale
Erkan Bostanci
F.V. ÇELEBİ