5 results listed
With the digital transformation era that we are in, the
systems that we physically process are now transferred to
electronic systems. In these days, Bitcoin [1] that is concept of
virtual money which is one of the popular topics entered our lives.
It is an end-to-end digital payment system over a decentralized
network. This system works with the Blockchain algorithm. We
can apply this technology to other areas in our digitalized life not
only to money transactions. In this project, electronic election
system is proposed and designed using the Blockchain technology
and preserving privacy.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
B. ESEN
M. ÖZKURT
İlhami Muharrem ORAK
Most of the banking systems all over the world
operate with conventional system. This system may depend on
human and local operations. In this study we introduce a design
and implementation of a virtual banking system. This system is
integrated with NFC card payment technology and eliminating
the need for physical branches.
Virtual banking is broadly defined as the provision of banking
services via means other than traditional physical branches.
Currently, virtual banking exists in the forms of ATM, phone
banking and Internet banking.
The system simplifies cashless transactions for individuals and
merchants by eliminating the need for traditional POS machines.
It combines ASP.NET for bank management, .NET Core for
NFC card token management, SHA-256 for token generation,
Arduino with RFID modules for card interaction, and an
Android application as a POS system.
International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES
El Fadel Boukezane
İlhami Muharrem ORAK
In this work, we propose an architecture and interface that enables the management and configuration of a portable crypto device running on an embedded system. The developed system is also designed to be capable of performing management tasks on any embedded system. Since it is not a language dependent architecture, programming language can be changed according to platform requirements. The management system uses a database on the GNU/Linux operating system and runs the necessary commands on the embedded system via an RPC scheme. Measures have been taken for security threats in the developed system using secure transport layer. The system is designed for client and server architecture. The C++ programming language is close to the machine language. For this reason, it runs faster than other common languages. So, it is used on the server side of the management system. Since the Java isolates operating system incompatibilities, it is used on the client side. Since the desktop application uses Java in the interface, it was also developed using Java SWT library
International Conference on Cyber Security and Computer Science
ICONCS
İlhami Muharrem ORAK
O.YILDIZ
By rolling the materials between two rollers with a
cylindrical shape rotating around their axes, the forming process
is called rolling.Rolling systems in the rolling mill sizes are much
higher than the weight of the produced part.The rollers are
subject to sudden cooling and wetting conditions in hot
environment during operation.In such cases, the life of the rollers
should monitor and the roller must be re-heat treated without any
errors.In our study, it was aim to remove the microstructure map
of the roller by taking image replica with non-destructive
examination method on the roller.With this process, an instant
check will make without disassembling and damaging the
roller.The images obtained by the replica method will be
determined using the Deep Learning method in computer
systems.The images will be compare to the actual images by this
modelling and the crack tendency will be estimate.
International Iron & Steel Symposium
UDCS
Selim Özdem
İlhami Muharrem ORAK
Bünyamin ÇİÇEK
The improving usage of internet and attained intensity of usage rate attracts the malicious in around the world. Many preventing systems are offered by researchers with different infrastructures. Very effective preventing system was proposed most recently by the researchers. The previously offered mechanism has prevented the multi-type vulnerabilities after preventing system was put into use. The attack attempts have been recorded. The researchers analysed the results geographically, discussed the obtained results and made some inference of the results. Our assessments show that the geographical findings can be used to retrieve some implication and build an infrastructure which prevents the vulnerabilities by location.
International Workshop on GeoInformation Science
GEOADVANCES
O. Menemencioğlu
İlhami Muharrem ORAK