scholarly journals Implementasi User Autentikasi Berbasis SMS Gateway di SMK Al-Farisi Kecamatan Leles

MULTINETICS ◽  
2021 ◽  
Vol 7 (1) ◽  
pp. 30-36
Author(s):  
Mamay Syani ◽  
Shandy Tresnawati ◽  
Dini Rohmayani ◽  
Kevin Junia Rizqi

SMK Al-Farisi Leles currently provides hotspot services which is an area where there is a wireless internet connection that can be accessed through Laptops, Gadgets, and other devices that support the technology. With hotspots in SMK Al-Farisi Leles, users can enjoy internet access in the hotspot area without having to connect by cable. Hotspots in SMK Al-Farisi can be accessed directly by anyone because the authentication system is still conventional which is authentication that enters a password to be connected to the hotspot network, this often results in an unstable connection because there is no limit to being connected to the hotspot network so that people outside the school community who are in the hotspot area can also be connected freely. Therefore, the author implements SMS Gateway-based Authentication User in SMK Al-Farisi where the user is required to request first to obtain a hotspot account via SMS with the provision stipulated by the admin. The results showed that this authentication system runs smoothly and can manage users connected to hotspot networks.

Author(s):  
James Turner ◽  
Terri Rebmann ◽  
Travis Loux ◽  
Donghua Tao ◽  
Alexander Garza

AbstractEmergency planners and first responders often access web-based information resources during disasters; however, these tools require an active Internet connection, which may be unavailable during a disaster. The National Library of Medicine (NLM) provides several free non-web-based disaster response tools. This study assessed intention to use web-based and non-web-based informational and response tools during disasters among emergency responders and librarians. Educational workshops were held in four Missouri cities in spring, 2016. The NLM tools were presented and attendees practiced using the tools during disaster scenarios. Pre- and post-intervention data about NLM tool awareness and intention to use these tools versus other web-based resources was collected. McNemar tests assessed a pre/post change in intention to use each resource. Four workshops were held, with a total of 74 attendees. Intention to use the NLM tools was low prior to the workshops (range: 20.3–39.2%), but increased significantly immediately afterwards (p < .001 for all pre/post comparisons). The workshops resulted in increased NLM tool awareness and increased intention to use the tools during future disasters. This provides evidence of attendees’ perceptions of the usefulness of the non-web-based NLM tools in place of other web-based tools in situations without Internet access.


2021 ◽  
Vol 42 (02) ◽  
pp. 158-164
Author(s):  
Lindsey E. Jorgensen ◽  
Rachel E. Barrett

AbstractTelehealth appointments have grown in popularity due to the COVID-19 global pandemic. Three cases presented in this article show several different perspectives where telehealth was utilized. For the first patient, appointments were successfully completed via telehealth; however, the patient's family opted to continue with an unsecure internet connection at a local laundromat. For the second patient, a stable internet connection could not be obtained in his home, thus making telehealth appointments unavailable. The caregiver of this patient ended up driving to the clinic to have adjustments made in person. For the third patient, telehealth appointments were unavailable due to unstable internet connections as well as difficulty setting up video interpreting services. These cases highlight the idea that telehealth can be incredibly beneficial, when used correctly. For some, the option to attend appointments virtually gives them access to specialists that otherwise may not be available. For other patients, aspects such as access to smart devices and steady internet access must be considered to ensure a successful connection. The hope is that this article sheds light on some of the potential setbacks that can come from the use of telehealth appointments in a practice and provides discussion regarding for whom telehealth may be appropriate, even in pediatric patients. After reading this article, readers should be able to discuss ways in which there could be solutions for these barriers that may prevent some patients from utilizing these types of virtual appointments.


Author(s):  
Anju Ajay

There are no effective face mask detection applications in the current COVID-19 scenario, which is in great demand for transportation, densely populated places, residential districts, large-scale manufacturers, and other organizations to ensure safety. In addition, the lack of big datasets of photographs with mask has made this task more difficult. With the use of Python programming, the Open CV library, Keras, and tensor flow, this project presents a way for recognizing persons without wearing a face mask using the facial recognition methodology. This is a self-contained embedded device that was created with the Raspberry Pi Electronic Development Board and runs on battery power. We make use of a wireless internet connection using USB modem. In comparison to other existing systems, our proposed method is more effective, reliable, and consumes significantly less data and electricity


2019 ◽  
Vol 10 (03) ◽  
pp. 114-121
Author(s):  
Armanto Armanto

ABSTRACT The problem in this study is that more and more internet users in the Bina Insan Lubuklinggau University building specifically the Faculty of Computer internet connection often experience problems, the internet network is still unstable, and ways to divide internet access points in the Computer Faculty. This study uses data collection methods by observing and recording directly at the research site (Observation), conducting question and answer directly to the source (Interview), and documentation by reading literature books. The results showed that the internet is often experiencing constraints and unstable internet networks and ways to divide internet access points at the Computer Faculty of the University of Bina Insan Lubuklinggau by using Policy Base Routing and Failover Implementation using a Mikrotik Router. It can be concluded that the internet network connection is stable and shows the results of the distribution of internet access points at the Faculty of Computer Bina Insan Lubuklinggau. Keywords: Mikrotik, Policy Base Routing, Failover


Author(s):  
Shafi Al-Shafi

This chapter examines the adoption of free wireless Internet parks (iPark) by Qatari citizens as a means of accessing electronic services from public parks. The Qatar government has launched the iPark concept with a view of providing free internet access for all citizens while enjoying the outdoors. This concept is enabled by an ICT infrastructure and broadband facilities, which is considered as regional good practice. By offering free wireless Internet access, the Qatari government encourages its citizens to actively participate in the global information society with a view of bridging the digital divide. Using a survey based study this research set out to examine the Qatari citizens’ perceptions of the iPark initiative. Results of the survey showed that there is a positive level of relation between the independent variables, usefulness, ease of use, Internet safety, and Internet speed/response time and one dependent variable, intention to use the iPark in Qatar. The chapter provides a discussion on the key findings, research implications, limitations, and future directions for the iPark initiative in Qatar.


Author(s):  
Shafi Al-Shafi ◽  
Vishanth Weerakkody

The Qatari government has launched Wireless Internet Parks (iPark) concept under their national electronic government (e-government) initiative with a view of providing free internet access for all citizens while enjoying the outdoors. By offering free wireless Internet access, the Qatari government hopes to increase accessibility of e-government services and encourage their citizens to actively participate in the global information society with a view of bridging the digital divide. This research proposes an extended unified theory of acceptance and use of technology (UTAUT) model for examining the adoption and diffusion of iPark services in Qatar. A pilot survey was conducted of iPark users using an extended version of the UTAUT model to explain the intention to use. The results of a multiple regression analysis are consistent with our predictions that effort expectancy, perceived technology, and Wireless Internet trust significantly influence intention to use. Implications of these results for practice and research are discussed.


Sign in / Sign up

Export Citation Format

Share Document