scholarly journals Application of SMS Gateway on Attendance Detection Systems using RFID

Author(s):  
Dedi Satria ◽  
Taufik Hidayat ◽  
M.Aziz Hidayat ◽  
Zakaria Zakaria

<em>The student attendance monitoring system at school is currently only carried out by the teacher in the form of a student attendance system that is carried out at the beginning of each lesson. And for parents students only get student attendance reports from the final school report. In this case, parental monitoring of student attendance at school on a daily basis cannot be obtained. So it is therefore necessary to have a student attendance detection system that can be monitored remotely. For this reason, the article aims to build a student attendance detection system using RFID that implements sending attendance information to students using SMS to parents of students. The system is built using RFID Tags, RC522 RFID Readers, Arduino Uno and GSM SIM900 modems. The results of the analysis and design of the system, the student attendance detection system has been able to detect the presence of students through RFID tags that are used as student attendance and send attendance information via SMS to parents of students.</em>

Author(s):  
Macarthy Osuo-Genseleke ◽  
Ojekudo Nathaniel

The Intrusion Detection System (IDS) produces a large number of alerts. Many large organizations deploy numerous IDSs in their network, generating an even larger quantity of these alerts, where some are real or true alerts and several others are false positives. These alerts cause very severe complications for IDS and create difficulty for the security administrators to ascertain effective attacks and to carry out curative measures. The categorization of such alerts established on their level of attack is necessary to ascertain the most severe alerts and to minimize the time required for response. An improved hybridized model was developed to assess and reduce IDS alerts using the combination of the Genetic Algorithm (GA) and Support Vector Machine (SVM) Algorithm in a correlation framework. The model is subsequently referred to as GA-SVM Alert Correlation (GASAC) model in this study. Our model was established employing the object-oriented analysis and design software methodology and implemented with Java programming language. This study will be benefitted by cooperating with networked organizations since only real alerts will be generated in a way that security procedures can be quickly implemented to protect the system from both interior and exterior attacks


Author(s):  
Lipsa Das ◽  
Akhilesh Kumar ◽  
Saurav Singh ◽  
Ahmad Raheel Ashar ◽  
Rishab Jangu

Sensors ◽  
2021 ◽  
Vol 21 (8) ◽  
pp. 2674
Author(s):  
Qingying Ren ◽  
Wen Zuo ◽  
Jie Xu ◽  
Leisheng Jin ◽  
Wei Li ◽  
...  

At present, the proposed microwave power detection systems cannot provide a high dynamic detection range and measurement sensitivity at the same time. Additionally, the frequency band of these detection systems cannot cover the 5G-communication frequency band. In this work, a novel microwave power detection system is proposed to measure the power of the 5G-communication frequency band. The detection system is composed of a signal receiving module, a power detection module and a data processing module. Experiments show that the detection frequency band of this system ranges from 1.4 GHz to 5.3 GHz, the dynamic measurement range is 70 dB, the minimum detection power is −68 dBm, and the sensitivity is 22.3 mV/dBm. Compared with other detection systems, the performance of this detection system in the 5G-communication frequency band is significantly improved. Therefore, this microwave power detection system has certain reference significance and application value in the microwave signal detection of 5G communication systems.


2013 ◽  
Vol 380-384 ◽  
pp. 761-764
Author(s):  
Zhen Hua Wang ◽  
Ge Fei Yu

One CNG remote intelligent monitoring system is designed and realized in this article. The monitoring system can receive real time monitoring information and monitor environment of CNG filling station by using GSM short message platform , terminal PC and cell phone based on ARM microprocessor, PTM100GSM module, pressure and temperature detection system, when the pressure, temperature or consistence of gas storage well is over the threshold , the monitoring system will send the alarm signal. Its proved that the monitoring system works stably and reliably and can effectively monitor fatal public danger signal.


Author(s):  
Nicole Gailey ◽  
Noman Rasool

Canada and the United States have vast energy resources, supported by thousands of kilometers (miles) of pipeline infrastructure built and maintained each year. Whether the pipeline runs through remote territory or passing through local city centers, keeping commodities flowing safely is a critical part of day-to-day operation for any pipeline. Real-time leak detection systems have become a critical system that companies require in order to provide safe operations, protection of the environment and compliance with regulations. The function of a leak detection system is the ability to identify and confirm a leak event in a timely and precise manner. Flow measurement devices are a critical input into many leak detection systems and in order to ensure flow measurement accuracy, custody transfer grade liquid ultrasonic meters (as defined in API MPMS chapter 5.8) can be utilized to provide superior accuracy, performance and diagnostics. This paper presents a sample of real-time data collected from a field install base of over 245 custody transfer grade liquid ultrasonic meters currently being utilized in pipeline leak detection applications. The data helps to identify upstream instrumentation anomalies and illustrate the abilities of the utilization of diagnostics within the liquid ultrasonic meters to further improve current leak detection real time transient models (RTTM) and pipeline operational procedures. The paper discusses considerations addressed while evaluating data and understanding the importance of accuracy within the metering equipment utilized. It also elaborates on significant benefits associated with the utilization of the ultrasonic meter’s capabilities and the importance of diagnosing other pipeline issues and uncertainties outside of measurement errors.


Author(s):  
Renan Martins Baptista

This paper describes procedures developed by PETROBRAS Research & Development Center to assess a software-based leak detection system (LDS) for short pipelines. These so-called “Low Complexity Pipelines” are short pipeline segments with single-phase liquid flow. Detection solutions offered by service companies are frequently designed for large pipeline networks, with batches and multiple injections and deliveries. Such solutions are sometimes impractical for short pipelines, due to high cost, long tuning procedures, complex instrumentation and substantial computing requirements. The approach outlined here is a corporate approach that optimizes a LDS for shorter lines. The two most popular implemented techniques are the Compensated Volume Balance (CVB), and the Real Time Transient Model (RTTM). The first approach is less accurate, reliable and robust when compared to the second. However, it can be cheaper, simpler, faster to install and very effective, being marginally behind the second one, and very cost-efective. This paper describes a procedure to determine whether one can use a CVB in a short pipeline.


2013 ◽  
Vol 391 ◽  
pp. 347-351
Author(s):  
Yu Li Jun ◽  
Shao Ying Liu ◽  
Hui Wang ◽  
Shu Qin

Effective temperature control plays a key role in remote monitoring of wood drying. This paper analysis and design a fuzzy PID control strategy under the monitoring and control system by establishing the mathematical model of wood drying system. It can realize the remote communication by using RS485 and achieve the actual operation of the monitoring system control. By experimental data and the experimental curve, the temperature of the system has good tracking effect which can be verified. It can achieve effective remote monitoring.


2018 ◽  
Vol 7 (2.4) ◽  
pp. 10
Author(s):  
V Mala ◽  
K Meena

Traditional signature based approach fails in detecting advanced malwares like stuxnet, flame, duqu etc. Signature based comparison and correlation are not up to the mark in detecting such attacks. Hence, there is crucial to detect these kinds of attacks as early as possible. In this research, a novel data mining based approach were applied to detect such attacks. The main innovation lies on Misuse signature detection systems based on supervised learning algorithm. In learning phase, labeled examples of network packets systems calls are (gave) provided, on or after which algorithm can learn about the attack which is fast and reliable to known. In order to detect advanced attacks, unsupervised learning methodologies were employed to detect the presence of zero day/ new attacks. The main objective is to review, different intruder detection methods. To study the role of Data Mining techniques used in intruder detection system. Hybrid –classification model is utilized to detect advanced attacks.


2021 ◽  
Vol 1774 (1) ◽  
pp. 012039
Author(s):  
Helin Zhang ◽  
Yiqun Huang ◽  
Qingmei Chen ◽  
Kang Zhang

Sign in / Sign up

Export Citation Format

Share Document