SEARCH RESULT

Year

Subject Area

Broadcast Area

Document Type

Language

2 results listed

2018 112 Emergency Call Positioning Message Support Application for Smartphones

In this study, an application sending location via short message(SMS) has been developed for smartphones using Android operating system while internet is disabled in case of emergency. If Global Position System(GPS) of user’s phone is disabled, the application warns the user by vibration and screen message. In emergency calls is to inform emergency call center by sending SMS or to send SMS to a predetermined number about the coordinate of caller by using A-GPS(Assisted GPS) feature.eveloped application has tested both indoors and outdoors as well as on different brands and models of Android. The error rate of outdoor tests is approximately 10-15 meters and the indoor result is approximately 15-30 meters. Transmission times of SMS are 14-32 seconds and 20-92 seconds respectively. SMS transmission time differs from region to region depending on connection time to base station and magnetic pollution.

International Conference on Cyber Security and Computer Science
ICONCS

Abdurrahman HAZER İbrahim ÖZER Remzi YILDIRIM

348 423
Subject Area: Computer Science Broadcast Area: International Type: Oral Paper Language: English
2018 CONFIDENTIAL DATA TRANSPORT IN NOISE IMAGE

In this work, cryptography has been developed to ensure that confidential information is communicated securely. As a method, a randomly generated phase mask and a grey level picture made entirely of noise is used. The information that is corrupted in phase is placed in this noisy image according to a predetermined algorithm. First of all, the image is closed with a randomly generated phase mask and then the pixel values of the image whose phase value is completely corrupted are scattered into the carrier by sliding along with certain mathematical operations. In order to recover the encrypted image and information, carrier and randomly generated phase keys are used respectively. It has been tested that the reliability of the algorithm developed with two keys and robustness of the algorithm to noise attacks. In addition, the reliability of the developed algorithm is also tested with techniques such as correlation, histogram and contrast stretching.

International Conference on Cyber Security and Computer Science
ICONCS

Abdurrahman HAZER İbrahim ÖZER Remzi YILDIRIM

243 179
Subject Area: Computer Science Broadcast Area: International Type: Oral Paper Language: English