scholarly journals Teledetection System and Management of Intrusions Events, Based on Cloud Infrastructure

This document describes the design and development of a low-cost security system to detect unauthorized access of people in an office, using Arduino microcontroller technology. It used a passive infrared sensor (PIR) to detect movements of people, a Wi-Fi interface to send security alerts to the cloud platform and a GSM modem, in the same way, to send the detected security events to the frame of Cloud. The latter will be used if it is not possible to establish a link to the cloud platform, via the Wi-Fi interface. In addition, the security system sends an SMS (Short Message Service) directly to the security agent's mobile every time a security event is detected. A dual communication interface is used to guarantee the sending of alerts to the cloud platform and, on the other hand, to ensure the delivery of notifications of the alerts detected to the security agent, through the channels: Notify my device (NMD), email, Twitter and SMS. As a result, it has been obtained that the fastest interface to send the detected security alerts to the cloud platform is Wi-Fi and the channel with less time to notify the security agent is NMD. Therefore, this proposed security system represents an ideal solution for security problems, both level domestic and commercial, since it has characteristics of being pervasive, that is, it can be used anywhere and agnostic in so far as of the wireless interface Communication.

Author(s):  
Mohammad Zeyad ◽  
Susmita Ghosh ◽  
S.M. Masum Ahmed

This paper illustrates a portable domestic locker security system which is based on GSM (Global System for Mobile Communications) technology. A handcrafted low-cost touch sensitive box is designed (using Vero board) for the project which is one of the most attractive features of the system. The system will operate in a way that if there is any unexpected user, tries to touch any portion of the touch sensitive box, a feedback system will be turned on immediately. The feedback system will alert the property holder about the unexpected user by sending SMS (Short Message Service) and turning on an alarm system. The alarm system will be turned off only if it receives a specific SMS from the property holder. This system not only has the advantages of high sensitivity, small size and lightweight, but also it is easy to use. This system is featured with an uncomplicated design, convenient use, strong flexibility and reliable performance. Since the circuit in the system is simple and easy to contrivance, the system can be installed without any difficulty at homes & offices. It will also provide a good security in the vehicles and Automated Teller Machine (ATM) booths.


Author(s):  
I Komang Krisna Ade Marta ◽  
I Nyoman Buda Hartawan ◽  
I Kadek Susila Satwika

AbstrakKeamanan server merupakan hal penting yang perlu diberikan perhatian lebih saat melakukan konfigurasi server. Pada umumnya serangan yang terjadi pada server diketahui setelah terjadinya kegagalan pada server dalam memberikan layanan. Pada penelitian ini, dibangun sebuah sistem keamanan server yang dapat melakukan monitoring pada sebuah server ketika terdeteksi adanya aktivitas yang tidak wajar. Pemberitahuan akan dikirimkan melalui SMS (Short Message Service) ke handphone Administrator jaringan. Sistem yang dibangun melakukan pendeteksian intrusi pada server secara realtime menggunakan SNORT. Ketika terjadi akses yang tidak wajar pada server, maka SNORT akan mendeteksi dan mengirimkan informasi terjadinya aktivitas yang tidak wajar ke Administrator jaringan. Sistem ini diujikan dengan lima jenis serangan yakni PING Attack, DoS/DDoS Attack, Port Scanning, Telnet Access dan FTP Access. Parameter yang diamati pada penelitian ini adalah beban aktivitas yang terjadi pada sumber daya server meliputi CPU, Memory (RAM) dan beban jaringan. Hasil penelitian menunjukkan bahwa saat terjadi upaya serangan terhadap server, SNORT dapat menghasilkan alert yang akan disimpan pada log sekaligus dikirimkan ke handphone Administrator melalui SMS. AbstractServer security is an important thing that needs to be given more attention when configuring a server. In general, attacks that occur on the server are known after a failure on the server in providing services. In this study, a server security system was built that could monitor a server when an unusual activity was detected. Notifications will be sent via SMS (Short Message Service) to the network Administrator's smartphone. The system is built to detect intrusions on the server in real time using SNORT. When improper access occurs on the server, SNORT will detect and send information about the occurrence of unusual activity to the network Administrator. This system is tested with five types of attacks namely PING Attack, DoS / DDoS Attack, Port Scanning, Telnet Access and FTP Access. The parameters observed in this study are the activity load that occurs on server resources including CPU, Memory (RAM) and network load. The results showed that when an attempt was made to attack the server, SNORT could produce alerts that would be stored in a log as well as sent to the Administrator's smartphone via SMS.


Author(s):  
Shunichi Ishihara

This study is one of the first likelihood ratio-based forensic text comparison studies in forensic authorship analysis. The likelihood-ratio-based evaluation of scientific evidence has started being adopted in many disciplines of forensic evidence comparison sciences, such as DNA, handwriting, fingerprints, footwear, voice recording, etc., and it is largely accepted that this is the way to ensure the maximum accountability and transparency of the process. Due to its convenience and low cost, short message service (SMS) has been a very popular medium of communication for quite some time. Unfortunately, however, SMS messages are sometimes used for reprehensible purposes, e.g., communication between drug dealers and buyers, or in illicit acts such as extortion, fraud, scams, hoaxes, and false reports of terrorist threats. In this study, the author performs a likelihood-ratio-based forensic text comparison of SMS messages focusing on lexical features. The likelihood ratios (LRs) are calculated in Aitken and Lucy’s (2004) multivariate kernel density procedure, and are calibrated. The validity of the system is assessed based on the magnitude of the LRs using the log-likelihood-ratio cost (Cllr). The strength of the derived LRs is graphically presented in Tippett plots. The results of the current study are compared with those of previous studies.


Author(s):  
C.Anna Palagan

This paper proposes and implements a solution for the navigation difficulty and enhancing the rail transportation in a simple way by combining Wireless Communication and GPS Technology by developing a GPS Based Real Time Personal Destination Predictor. In this method by sending SMS (Short Message Service) and Voice Call to the registered passenger’s mobile phone, we alert the passenger about his destination at the specified time before reaching the destination. If the user sends the PNR (Passenger’s Name Record) number obviously the server responds with a SMS to the mobile phone of the particular ticket received user. Once the request is responded, the GPS (Global Positioning System) which is the train will locate the live position of the train as latitude and longitude value which will be transferred by the wireless communication to the server and the server will response the location from the Google Maps and intimate the passenger before the specified time of the arrival of the destination station of the passenger, which can be known from the PNR details of the passenger, through SMS and Voice Call. Even the person waiting for the passenger in the destination can avail this facility from his mobile phone by registering with the passenger’s PNR number.


2012 ◽  
Vol 4 (3) ◽  
pp. 47-57 ◽  
Author(s):  
Shunichi Ishihara

This study is one of the first likelihood ratio-based forensic text comparison studies in forensic authorship analysis. The likelihood-ratio-based evaluation of scientific evidence has started being adopted in many disciplines of forensic evidence comparison sciences, such as DNA, handwriting, fingerprints, footwear, voice recording, etc., and it is largely accepted that this is the way to ensure the maximum accountability and transparency of the process. Due to its convenience and low cost, short message service (SMS) has been a very popular medium of communication for quite some time. Unfortunately, however, SMS messages are sometimes used for reprehensible purposes, e.g., communication between drug dealers and buyers, or in illicit acts such as extortion, fraud, scams, hoaxes, and false reports of terrorist threats. In this study, the author performs a likelihood-ratio-based forensic text comparison of SMS messages focusing on lexical features. The likelihood ratios (LRs) are calculated in Aitken and Lucy’s (2004) multivariate kernel density procedure, and are calibrated. The validity of the system is assessed based on the magnitude of the LRs using the log-likelihood-ratio cost (Cllr). The strength of the derived LRs is graphically presented in Tippett plots. The results of the current study are compared with those of previous studies.


Author(s):  
Mohammad Shirali-Shahreza ◽  
M. Hassan Shirali-Shahreza

In this chapter, a method is proposed to contact the Police with mobile phones and via SMS (Short Message Service). In this method, when a person wants to contact the Police, he must only press a special key on his mobile phone for a short time to launch a special program. This program sends current location of the person using GPS system and sends it periodically with other useful information such as name, home and work address of that person automatically to the Police Station using SMS. In this method, there is no need to talk and a person can contact the Police easily and tell them the place which crime has occurred. In addition, there is no busy line problem. This method has low cost and can be run on many mobile phones This method is implemented using JavaME (Java Platform Micro Edition) programming language and tested on a Nokia N71 mobile phone by using an ‘Evermore BT-R700’ GPS receiver.


Author(s):  
Larasathi Jiwany ◽  
Alya Nurseptiani ◽  
Rafika Maulindah ◽  
Ruth Christin Aprilia Situmorang ◽  
Vira Putri Rahmadini ◽  
...  

Many large companies today do not pay attention to customer service relationships. Companies that often consider products sold are superior products that are sought after by the public. While good service will make customers loyal to the company. Imagine the amount of loss received if you do not pay attention to customer service. One way to overcome this problem is by using technology and marketing concepts CRM (Customer Relationship Management). Application (Short Message Service) SMS Gateway as a technology used to support effective and efficient CRM concepts. At present, all customers have mobile phones, so SMS is chosen as a good facility to deliver information because it is fast and reaches directly to customers, besides because of its low cost. The purpose of this study is to study the implementation of SMS Gateways that facilitate companies in conveying information to Gaudi Clothing customers. With the SMS Gateway, companies can broadcast attractive promos and new products to customers. It is expected to reduce promotions through brochures due to printing costs and waste. In designing this system, the data collection methods used are literature studies, interviews, observations and questionnaires. Application of SMS Gateway with the help of Nexmo application. Based on the research conducted, the percentage value obtained was 70.75% which was proposed by the AGREE criteria. Gaudi Entrance Clothing. So using the SMS Gateway to support the customer service process on Gaudi Clothing, can be a good solution because it is useful to support the service process and relationships with customers of Gaudi Clothing


Author(s):  
Harold D. Abasolo, MBA ◽  

This research determined the operational strategies of online food delivery businesses in Camarines Norte, Philippines. It assessed the profile of the online food delivery businesses in terms of number of riders, initial capitalization, form of business organization, commonly used digital platform and average weekly deliveries; the operational strategies being implemented and the problems encountered on the aspects of resources and processes. Findings revealed that majority of online food delivery businesses have 11 to 15 riders, under sole proprietorship, uses social media platform, with 201 and above weekly deliveries. The operational strategies of online food delivery businesses include: monitoring of riders’ performances, use of cellular phones, desktop, tablet and laptop for monitoring customer needs; optimizing marketing budget through utilization of low-cost marketing campaigns and promotions; promotion using various social media platforms; and updating customers with their transactions from time-to-time via chat or Short Message Service (SMS). The problems encountered by online food delivery businesses are shortage of available riders during peak hours and threat of new entrants. The study recommended for food delivery business owners to revisit the human resource plans and create operations manual to provide clear guidelines and processes in implementing their operational strategies which are significant to their daily operations.


Sign in / Sign up

Export Citation Format

Share Document