scholarly journals Chat Tracking and Monitoring System

Author(s):  
Himanshu Bhatia

Abstract: With the expanding utilization of instant chat messengers to share data, Suspicious exercises have additionally expanded. There are numerous sources to share the data however moment talk couriers and informal communication sites are fast, simply intended to share anything. In some cases, even new stories are at first separated via online media locales and further on talk couriers rather than any news channel and paper and so forth. Because of these innovation progressions, a few individuals are using these applications inappropriately to share suspicious messages and make arrangements to accomplish something unlawful. With the headway of web innovation and the change in the method of correspondence, it is discovered that much direct news has been examined in Internet discussions well before they are accounted for in conventional broad communications. Additionally, this correspondence channel gives a viable channel to criminal operations, for example, communicating of copyrighted films, compromising messages and internet betting and so on. Our Proposed Framework will examine online plain text messages from chosen conversation gatherings and our framework will choose which post is legitimate and unlawful. It will detect the suspicious keyword from the chatting and give a warning message to the user and also a mail will be sent to admin which will include all the details of the user. Keywords: Suspicious Chat, Chat Monitoring, Abusive word, Terrorist activities, Chat Tracking.

2020 ◽  
Vol 12 (15) ◽  
pp. 5997
Author(s):  
Byungho Park ◽  
Moon Young Kang ◽  
Jiwon Lee

The success of Barack Obama’s 2008 U.S. presidential campaign led politicians and voters all over the world to pay attention to social media. Including Donald Trump for his upcoming 2020 re-election, many politicians around the world have used social media for their political campaigns. While some social media can deliver information in various forms (i.e., video, audio, and interactive content), some popular ones, such as Twitter, are still focused mostly on plain text messaging. With political marketing using simple text messages via social media, there is a need to examine ways of creating messages that ultimately help shape voters’ perception of politicians and eventually win the election. Based on communication science, this study attempts to test the limited capacity model of motivated mediated message processing by examining whether this model can be applied to the simplest form of mediated message, which is plain text. In order to do so, structural features of text messages exchanged on social media engaged in political campaigns, namely linguistic formality and network-mediated human interactivity, are manipulated in an experiment. Findings suggest that linguistic formality and human interaction in plain text messages influence perceived friendliness, truthfulness, and dependability of the message source (politicians), as well as the receivers’ (constituents’) behavioral intent to vote for the message source in an upcoming election. This implies that politicians should pay more attention on sustainable political marketing through appropriate manipulation of structural features in social media messages.


2020 ◽  
Vol 1 (3) ◽  
pp. 53-58
Author(s):  
Hasahatan Hutahaean ◽  
Berton Bostang Hamonangan Silaban

This Community Service is aimed at the youth category for Bible study activities. In the pandemic era since the end of February 2020, various activities in the realm of stewardship must also participate in government recommendations as part of breaking the chain of coronavirus transmission. Therefore, online media is used to create youth coaching by selecting the zoom application in its implementation. The coaching method starts with planning, implementing, finding partners for cooperation, and implementing activities. Of course, it ends with an evaluation of the activities. The Bible study model used this time is reading the Bible from the narrative genre. The community service team found great passion in youth while participating in Bible study coaching using the Bible Digging Method (BGA). The method was felt to be simple, practical, and able to bring Bible readers to find text messages. The implementation of community service must be carried out and pursued even in a pandemic situation. Youth spirituality is very important to build their future. The Word of God is a powerful material for developing youth spirituality, for a fresh, strong, and alert spiritual life


2020 ◽  
Vol 8 (2) ◽  
pp. 141
Author(s):  
Setyadhi Putra Deriyanto ◽  
Heru Agus Santoso

This study was conducted on the emergency response system that has been implemented in Demak, Kendal and Batang districts, namely Tanggapin. This system provides services in the form of reporting and actions, as well as information about the health sector, from the availability of hospital rooms to the availability of blood at PMI. Tanggapin uses a mobile-based and web-based platform, where the web is used as a medium for operators to input data and validate incoming reports. Due to complex system services with various supporting features, it requires a microservices architecture to operate independently and in a distributed manner. Because of this dynamic system, realtime monitoring support for server performance is needed via Telegram Bot. The monitoring system was built using the PPDIOO Lifecycle Approach to Network Design and Implementation method because it is reliable and the flow of a process never breaks. The format used to exchange data uses the JSON (Javascript Object Notation) format. This study shows that the monitoring system run well because every test carried out gives the expected results, namely the admin receives a warning message via the Telegram Bot.


Author(s):  
Nadia Mahmood Hussien ◽  
Yasmin Makki Mohialden ◽  
Nada Thanoon Ahmed ◽  
Mostafa Abdulghafoor Mohammed ◽  
Tole Sutikno

<p><span>A gas leaks lead to personal and financial damage. Much effort has been dedicated to preventing such leaks and developing reliable techniques for leak detection and leakage localization using sensors. These sensors usually sound an alarm after detecting a dangerous gas in its vicinity. This paper describes a system for detecting a gas leakage from cylinders which notifies the user via the GSM network. The system consists of an LPG gas leakage detector which sends a warning signal to Arduino Uno Microcontroller. The system uses the GSM network to send notifications, a liquid crystal display (LCD) monitor to display the warning message and buzzer to sound the alert.</span></p>


Author(s):  
Anuroop Gaddam ◽  
G. Sen Gupta ◽  
S. C. Mukhopadhyay

Sensors are increasingly being employed to determine different activities of a person living at home. Numerous sensors can be used to obtain a variety of information. While many sensors may be used to make a system, it is important to look into the availability, cost, installation, mechanism, and performance of sensors. This chapter investigates different sensors and their usefulness in a smart home monitoring system. A smart home monitoring system provides a safe, sound, and secure living environment for elderly people. Statistics show that the population of elderly people is increasing around the world and this trend is not going to change in the near future. The authors have developed a smart home that consists of an optimum number of wireless sensors that includes current flow, water flow, and bed usage sensors. The sensors provide information that can be used for monitoring elderly people by detecting abnormal patterns in their daily activities. The system generates and sends an early warning message to the caregiver when an unforeseen abnormal condition occurs.


2013 ◽  
Vol 427-429 ◽  
pp. 1028-1031
Author(s):  
Ling Yun Zhang ◽  
Hua Zhang ◽  
Peng Fei Zhang ◽  
Qiu Hong Yuan

The edible fungus industry has relatively high output rate and high added value. In the production of edible fungus, the environmental factors have great impacts. This paper studies the intelligent monitoring system for producing environment of the factory-farmed edible fungus based on the internet of things and aiming at online real-time management. The monitoring system can realize real-time surveillance and visual operation during production by dynamically regulating the environmental factors needed for growing edible fungus and early warning of the environmental parameters fluctuation with traceable history records at any time. When parameters like temperature and humidity are beyond reasonable range, warning will be sent via text messages and equipments such as air conditioners and warming devices will be automatically adjusted for on and off so as to raise management level, increase the output, improve the quality and lower the risks.


2020 ◽  
Vol 4 (2) ◽  
pp. 92-97
Author(s):  
Abd Charis Fauzan ◽  
Veradella Yuelisa Mafula

Security and confidentiality of documents stored on a computer is an important aspect in the field of computer or information system security. Documents will no longer be useful if they are intercepted or hijacked by unauthorized people, they will even endanger the document owner, if documents containing important information are misused by irresponsible people. Therefore the documents on the computer must be preserved so that they are only accepted and used by interested persons. One of the solutions to prevent eavesdropping of documents is to use cryptography. This study aims to increase cryptographic complexity using a combination of hill cipher algorithms and block chaining cipher modes. The combination of the two methods is expected to be able to cover the shortcomings of each method so that the cryptographic complexity can be increased. The method in this study consists of two stages, namely the document encryption and document decryption stages. The encryption stage is to change the plaintext document into a ciphertext document, on the other hand, the decryption stage is to change the ciphertext document back into a plaintext document. The stages for document encryption include; 1) retrieve plain text messages in the document so that they can be processed by the system (parsing); 2) encryption to convert plaintext documents into ciphertext documents using the hill cipher algorithm; 3) encryption to convert plaintext documents into cipher text documents using cipher block chaining mode. While the methods for decryption are 1) taking the ciphertext message in the document so that it can be processed by the system (parsing); 2) decryption to convert ciphertext documents into plaintext documents using cipher block chaining mode; 3) decryption to convert ciphertext documents into plaintext documents using a hill cipher.


The purpose of this study entitled Arduino-based Control and Monitoring System of Household Appliances status using Android Application is to help the people to have control over the house by means of switching on/off and monitor the loads that are plugged into the outlet by the use of cellphones/ tablets. This project provides the simple way to access loads that are left running and forgotten to unplug at home. The structure of the prototype is made up of HardieFlex physical appearance making it fire retardant consisting of 3 sockets available. The 2 outlets are for the normal house sockets while the other one is separated for the Air-condition unit. The circuit breaker is on the upper left side corner dividing the wires of each sockets. The Android Application uses text messages to send information then received by the GSM (Global System for Mobile) and translates it to the Arduino. The Arduino commands the relays to cut and provide electricity for the outlets. This device can notify an individual if there are loads left running, wherein the current sensor able to read the current from the outlet to determine if it has a working load that are plugged into the outlet. The study implements power interruption notification in terms of using the voltage sensor to acquire information of possible power outage occurrences. Based on the results of the evaluation, 95.83% believe that the project was made conveniently, that they are now aware of their surroundings giving them the idea of their house is beyond their reach, and also 95.83% of the respondents are certain that the system is relevant and beneficial to the society.


2019 ◽  
Vol 8 (4) ◽  
pp. 1676-1679

One of the Precious and important resource in the earth maybe water. Now a days people need everything happen smarter other than olden days techniques used. In this paper Internet of Things (IOT) Based on the concept that to define energy conservation in tank level water monitoring system(sense and monitor). The Main objective is to have a sensor which detects the level of water and it should notify the user about the water level which is currently available in the tank. The Ultrasonic Sensor is placed at the top of the tank in which we will measure the level of water and the if the distance of the water from the sensor gets increased, it means that the water in the tank gets low and finally after reaching to an extent the system should notify a warning message to the user. The Major requirement would be Ultrasonic sensor which senses level of water (in distance)from the top of the tank to the bottom of the tank. The sensor is connected to the system using the Wi-Fi of NODE MCU (ESP8266) .The Blynk library is installed and connected in the arduino. The Blynk application is used to get the values and the notification send to the mobile for the user purpose. The user can get notified that the tank is empty and can take further steps to fill the water in the tank.


Sign in / Sign up

Export Citation Format

Share Document