scholarly journals Nolong.in: an android based incident notification application with push notification technology

Author(s):  
Arthur Bachtiar Gunawan ◽  
Seng Hansun ◽  
Marcel Bonar Kristanda

<span lang="EN-GB">In driving, the most important thing to be considered is safety. The incident problem can happen anytime and anywhere without anyone knowing it before, especially in Cikarang where the level of incident is quite high. It is very important for the public community to act and respond quickly at the time on and around the occurring incident. Nolong.in application is an exact solution because it can send real time notifications to its users. This response is meant to assist individuals who have been using Nolong.in to help other users who need urgent help when the time of incident in order to prevent unwanted situations. In this research, push notification method has been implemented by using Firebase Cloud Messaging (FCM). The result of the research is the notification click ratio is 90.91% and the click time is 1 minute and 27 seconds. Based on the questionnaires’ results given to the community conclude that Nolong.in application is very beneficial for Gojek Cikarang community's safety.</span>

Author(s):  
Arthur Bachtiar Gunawan ◽  
Seng Hansun ◽  
Marcel Bonar Kristanda

<span lang="EN-GB">In driving, the most important thing to be considered is safety. The incident problem can happen anytime and anywhere without anyone knowing it before, especially in Cikarang where the level of incident is quite high. It is very important for the public community to act and respond quickly at the time on and around the occurring incident. Nolong.in application is an exact solution because it can send real time notifications to its users. This response is meant to assist individuals who have been using Nolong.in to help other users who need urgent help when the time of incident in order to prevent unwanted situations. In this research, push notification method has been implemented by using Firebase Cloud Messaging (FCM). The result of the research is the notification click ratio is 90.91% and the click time is 1 minute and 27 seconds. Based on the questionnaires’ results given to the community conclude that Nolong.in application is very beneficial for Gojek Cikarang community's safety.</span>


Author(s):  
Jia Hua-Ping ◽  
Zhao Jun-Long ◽  
Liu Jun

Cardiovascular disease is one of the major diseases that threaten the human health. But the existing electrocardiograph (ECG) monitoring system has many limitations in practical application. In order to monitor ECG in real time, a portable ECG monitoring system based on the Android platform is developed to meet the needs of the public. The system uses BMD101 ECG chip to collect and process ECG signals in the Android system, where data storage and waveform display of ECG data can be realized. The Bluetooth HC-07 module is used for ECG data transmission. The abnormal ECG can be judged by P wave, QRS bandwidth, and RR interval. If abnormal ECG is found, an early warning mechanism will be activated to locate the user’s location in real time and send preset short messages, so that the user can get timely treatment, avoiding dangerous occurrence. The monitoring system is convenient and portable, which brings great convenie to the life of ordinary cardiovascular users.


2021 ◽  
Vol 8 (1) ◽  
pp. 205395172110138
Author(s):  
Erika Bonnevie ◽  
Jennifer Sittig ◽  
Joe Smyser

While public health organizations can detect disease spread, few can monitor and respond to real-time misinformation. Misinformation risks the public’s health, the credibility of institutions, and the safety of experts and front-line workers. Big Data, and specifically publicly available media data, can play a significant role in understanding and responding to misinformation. The Public Good Projects uses supervised machine learning to aggregate and code millions of conversations relating to vaccines and the COVID-19 pandemic broadly, in real-time. Public health researchers supervise this process daily, and provide insights to practitioners across a range of disciplines. Through this work, we have gleaned three lessons to address misinformation. (1) Sources of vaccine misinformation are known; there is a need to operationalize learnings and engage the pro-vaccination majority in debunking vaccine-related misinformation. (2) Existing systems can identify and track threats against health experts and institutions, which have been subject to unprecedented harassment. This supports their safety and helps prevent the further erosion of trust in public institutions. (3) Responses to misinformation should draw from cross-sector crisis management best practices and address coordination gaps. Real-time monitoring and addressing misinformation should be a core function of public health, and public health should be a core use case for data scientists developing monitoring tools. The tools to accomplish these tasks are available; it remains up to us to prioritize them.


2016 ◽  
Vol 2016 ◽  
pp. 1-7 ◽  
Author(s):  
Yaovi M. G. Hounmanou ◽  
Murielle S. S. Agonsanou ◽  
Victorien Dougnon ◽  
Mahougnon H. B. Vodougnon ◽  
Ephraim M. Achoh ◽  
...  

A cross-sectional study was conducted in March 2016 to assess the need of mobile phone technologies for health surveillance and interventions in Benin. Questionnaires were administered to 130 individuals comprising 25 medical professionals, 33 veterinarians, and 72 respondents from the public. All respondents possess cell phones and 75%, 84%, and 100% of the public, medical professionals, and veterinarians, respectively, generally use them for medical purposes. 75% of respondents including 68% of medics, 84.8% of veterinarians, and 72.2% of the public acknowledged that the current surveillance systems are ineffective and do not capture and share real-time information. More than 92% of the all respondents confirmed that mobile phones have the potential to improve health surveillance in the country. All respondents reported adhering to a nascent project of mobile phone-based health surveillance and confirmed that there is no existing similar approach in the country. The most preferred methods by all respondents for effective implementation of such platform are phone calls (96.92%) followed by SMS (49.23%) and smart phone digital forms (41.53%). This study revealed urgent needs of mobile phone technologies for health surveillance and interventions in Benin for real-time surveillance and efficient disease prevention.


2021 ◽  
Author(s):  
Ruth E Timme ◽  
Maria Sanchez ◽  
Marc Allard

This protocol outlines the all the steps necessary to become a GenomeTrakr data contributor. GenomeTrakr is an international genomic reference database of mostly food and environmental isolates from foodborne pathogens. The data and analyses are housed at the National Center for Biotechnology Information (NCBI), which is a database freely available to anyone in the world. The Pathogen Detection browser at NCBI computes daily cluster results adding the newly submitted data to the existing phylogenetic clusters of closely related genomes. Contributors to this database can see how their new isolates are related to the real-time foodborne pathogen surveillance program established in the USA and a few other countries, and at the same time adding valuable new data to the reference database. ------ Although originally published as a Chapter in Methods and Protocols, Foodborne Bacterial Pathogens, the protocol has since been adapted and split into four separate protocols all of which are contained in this collection.


2013 ◽  
Vol 79 (24) ◽  
pp. 7654-7661 ◽  
Author(s):  
Andrée F. Maheux ◽  
Ève Bérubé ◽  
Dominique K. Boudreau ◽  
Romain Villéger ◽  
Philippe Cantin ◽  
...  

ABSTRACTWe first determined the analytical specificity and ubiquity (i.e., the ability to detect all or most strains) of aClostridium perfringens-specific real-time PCR (rtPCR) assay based on thecpagene (cpartPCR) by using a bacterial strain panel composed ofC. perfringensand non-C. perfringens Clostridiumstrains. All non-C. perfringens Clostridiumstrains tested negative, whereas allC. perfringensstrains tested positive with thecpartPCR, for an analytical specificity and ubiquity of 100%. ThecpartPCR assay was then used to confirm the identity of 116 putativeC. perfringensisolates recovered after filtration of water samples and culture on mCP agar. Colonies presenting discordant results between the phenotype on mCP agar andcpartPCR were identified by sequencing the 16S rRNA andcpagenes. Four mCP−/rtPCR+colonies were identified asC. perfringens, whereas 3 mCP+/rtPCR−colonies were identified as non-C. perfringens. ThecpartPCR was negative with all 51 non-C. perfringensstrains and positive with 64 of 65C. perfringensstrains. Finally, we compared mCP agar and a CRENAME (concentration andrecovery of microbial particles,extraction ofnucleicacids, andmolecularenrichment) procedure pluscpartPCR (CRENAME +cpartPCR) for their abilities to detectC. perfringensspores in drinking water. CRENAME +cpartPCR detected as few as oneC. perfringensCFU per 100 ml of drinking water sample in less than 5 h, whereas mCP agar took at least 25 h to deliver results. CRENAME +cpartPCR also allows the simultaneous and sensitive detection ofEscherichia coliandC. perfringensfrom the same potable water sample. In itself, it could be used to assess the public health risk posed by drinking water potentially contaminated with pathogens more resistant to disinfection.


Author(s):  
I Komang Krisna Ade Marta ◽  
I Nyoman Buda Hartawan ◽  
I Kadek Susila Satwika

AbstrakKeamanan server merupakan hal penting yang perlu diberikan perhatian lebih saat melakukan konfigurasi server. Pada umumnya serangan yang terjadi pada server diketahui setelah terjadinya kegagalan pada server dalam memberikan layanan. Pada penelitian ini, dibangun sebuah sistem keamanan server yang dapat melakukan monitoring pada sebuah server ketika terdeteksi adanya aktivitas yang tidak wajar. Pemberitahuan akan dikirimkan melalui SMS (Short Message Service) ke handphone Administrator jaringan. Sistem yang dibangun melakukan pendeteksian intrusi pada server secara realtime menggunakan SNORT. Ketika terjadi akses yang tidak wajar pada server, maka SNORT akan mendeteksi dan mengirimkan informasi terjadinya aktivitas yang tidak wajar ke Administrator jaringan. Sistem ini diujikan dengan lima jenis serangan yakni PING Attack, DoS/DDoS Attack, Port Scanning, Telnet Access dan FTP Access. Parameter yang diamati pada penelitian ini adalah beban aktivitas yang terjadi pada sumber daya server meliputi CPU, Memory (RAM) dan beban jaringan. Hasil penelitian menunjukkan bahwa saat terjadi upaya serangan terhadap server, SNORT dapat menghasilkan alert yang akan disimpan pada log sekaligus dikirimkan ke handphone Administrator melalui SMS. AbstractServer security is an important thing that needs to be given more attention when configuring a server. In general, attacks that occur on the server are known after a failure on the server in providing services. In this study, a server security system was built that could monitor a server when an unusual activity was detected. Notifications will be sent via SMS (Short Message Service) to the network Administrator's smartphone. The system is built to detect intrusions on the server in real time using SNORT. When improper access occurs on the server, SNORT will detect and send information about the occurrence of unusual activity to the network Administrator. This system is tested with five types of attacks namely PING Attack, DoS / DDoS Attack, Port Scanning, Telnet Access and FTP Access. The parameters observed in this study are the activity load that occurs on server resources including CPU, Memory (RAM) and network load. The results showed that when an attempt was made to attack the server, SNORT could produce alerts that would be stored in a log as well as sent to the Administrator's smartphone via SMS.


2021 ◽  
Vol 1 (4) ◽  
pp. 183-189
Author(s):  
Sigit Tri Pambudi ◽  
Basuki Agus Suparno

This study focuses on an organizational development especially for an elementary school in which try to stabilize and adopt the changes of teaching and learning processes in relate to pandemic Covid 19 since it has been prevailing one year ago. Through Communicative Constitution of Organization (CCO) approach, it stressed on how elementary school as organization develop and adapt toward the uncertainty situation affected by pandemic covid 19. There are four locations which represent communication events in organization. First, membership negotiation, portraits how member of organization interact each other. Second, self- structuring, reflects how organization norms and culture were internalized within member of organization. Third, activity coordination- the way assignment was conducted and accomplished. It is an important thing in determine organization being successful. And finally, position of institution determines organization to the public. All has important roles to shape and develop organization being success.


Author(s):  
Aritra Paul ◽  
Nischit Bharadwaj ◽  
Jagriti R ◽  
Sameera S

Most college and office goers in India use the public buses for daily commuting. The bus network caters to the need of thousands who find it an affordable means of transport. However, the absence of real-time updates in the system poses some very serious problems during the exit period. Large cohorts leave the workplace at one time, leading to over-crowding, chaos and accidents at local bus stops. To address this issue, we have designed an RFID based system that alerts the commuter at periodic intervals as his desired bus approaches the stop. This paper documents the preliminaries, concept validation stage, and the development of a scaled-down prototype. The objective is to notify commuters of the approach of their desired bus (on request) by SMS.


Sign in / Sign up

Export Citation Format

Share Document