scholarly journals RANCANG BANGUN DAN MONITORING IP CAMERA B ERBASIS OPEN-WRT PADA KANTOR PDAM TIRTA BERKAH PANDEGLANG

2019 ◽  
Vol 2 (1) ◽  
pp. 19-38
Author(s):  
Saleh Dwiyatno ◽  
Muhamad Rosi Sadi ◽  
Muhamad Natsir

The development of CCTV technology makes it easier for a user in monitoring and monitoring a room or environment. But the lack of CCTV is a price that is still not reached by all levels of society. Because of this, it is necessary to build a new system that has the same features with CCTV tools in circulation but with a more affordable price.The new system is built by utilizing the openWRT operating system. The openWRT operating system will be installed on a wireless router with some additional tools to support its functionality such as speakers, soundcards, loudspeakers, webcam and flashdrive. The resulting system will have the ability to detect motion, the system is also capable of storing images, video and send snapshots via email when detected suspicious motion. In addition, this system also has some other features such as alarm alerts, motion detection scheduling so that its usage can be set as needed and easy access via internet so that can be accessed anywhere as long as connected to the internet

Author(s):  
Arif Setiawan ◽  
Ahmad Subhan Yazid ◽  
M Didik Rohmad Wahyudi

The development of Closed Circuit Television (CCTV) technology makes it easier for a user to monitor a room. However, the use of CCTV still cannot reach all levels of society due to the price is relatively expensive. Therefore, it is necessary to build a new system that has the same features as CCTV devices in general but at a more affordable price. This system was built using the OpenWRT operating system. The operating system will be installed on a wireless router with several additional tools to support its functionality such as speakers, GSM modems, webcams, and flash drives. The resulting system has the ability to detect movement and store images and videos when suspicious movements are detected. In addition, this system also has several other features such as alarm alerts, Short Message Service (SMS) warnings, user email reports, and easy access via WIFI and the internet.


Author(s):  
Vishnu Sharma ◽  
Vijay Singh Rathore ◽  
Chandikaditya Kumawat

Software reuse can improve software quality with the reducing cost and development time. Systematic reuse plan enhances cohesion and reduces coupling for better testability and maintainability. Software reuse approach can be adopted at the highest extent if relevant software components can be easily searched, adapted and integrated into new system. Large software industries hold their own well managed component libraries containing well tested software component with the project category based classification .Access to these repositories are very limited. Software reuse is facing so many problems and still not so popular. This is due to issues of general access, efficient search and adoption of software component. This paper propose a framework which resolves all of the above issues with providing easy access to components, efficient incremental semantics based search, repository management, versioning of components.


Author(s):  
Elly Mufida ◽  
David Wardana Agus Rahayu

The VoIP communication system at OMNI Hospital Alam Sutera uses the Elastix 2.5 server with the Centos 5.11 operating system. Elastix 2.5 by the developer has been declared End of Life. The server security system is a serious concern considering that VoIP servers can be accessed from the internet. Iptables and fail2ban applications are applications that are used to limit and counteract those who try to attack the VoIP server. One application that can be used as an open source VoIP server is the Issabel Application version 4.0. The migration process from Elastix 2.5 application to Issabel 4.0 by backing up all configurations in the Elastix 2.5 application through a web browser including the configuration of endpoints, fax, e-mail, asterisk. After the backup file is downloaded then upload the backup file to the Issabel 4.0 application then run the migration process. Adding a backup path as a failover connection is needed because the VoIP communication protocol between the OMNI Hospitals Group still uses one path so that when there is a problem in the connection path, the communication protocol will stop. The tunnel EoIP is a protocol used as a backup path between the OMNI Hospitals Group site.


2019 ◽  
Vol 9 (2) ◽  
pp. 103-105
Author(s):  
S. Saravana Raj ◽  
K. Vijayakumar

The present study deals with Utilization of ICT among the faculty members of Siddha Colleges and various level of operating system with the information accessed by the faculty through the internet. The survey was conducted with the help of the questionnaire and personal interview. The responses received from the available faculty are presented in tables and data is analyzed by using simple statistical method. The findings reveals that the access of electronic information is an important component of research activities for faculty members like E-Journals, E-books, E-databases are most preferred electronic information resources.


Author(s):  
Diana Elizabeth Moreno Carrillo ◽  
Gustavo Adolfo León Duarte ◽  
Carlos René Contreras Cázarez

ABSTRACTSociety has been transforming throughout the last years. The easy access to Internet has made two important institutions, family and school, cope to new challenges. Teenagers in different countries have access to Internet. However, understanding how these changes affect them, their families, their education, their community and the risks they cope help us get to empiric research. The main inquiry is to identify the use and the role parents have around the Internet and technological devices. The research is based in a mixed approach, combining qualitative and quantitative methods, using a questionnaire and a focus group to collect data.RESUMENLa sociedad ha venido transformándose durante las últimas décadas. El fácil acceso al Internet ha hecho que dos importantes instituciones, la familia y la escuela, se enfrenten a nuevos retos. En distintos países alrededor del mundo, los adolescentes tienen acceso al Internet. Sin embargo, para entender como estos cambios los afecta a ellos, a sus familias, a su educación, a su comunidad y los riesgos que enfrentan, es posible llevar a cabo la investigación empírica. La pregunta central es conocer el uso y el rol que tienen los padres en torno al Internet y a los dispositivos tecnológicos. Como parte de la metodología, la construcción del objeto de estudio se basa en la implementación de un enfoque mixto. La combinación de enfoques cualitativos y cuantitativos conlleva al diseño de dos fases en las que se utilizarán dos herramientas, la encuesta y el grupo focal. Contacto principal: [email protected]


Author(s):  
Ravikiran Kamate ◽  
Sulakshna Baliga ◽  
M. D. Mallapur

Background: Internet addiction is not clinical diagnosis, but a potentially pathological behavioral pattern with symptoms: a loss of control over the behavior, preoccupation with the Internet, using the Internet to modify mood, and withdrawal symptoms. Easy access and low cost of Internet packs- are main cause of development of increased internet use in India. Internet addiction – factors like gender, environmental factors, socioeconomic status, etc. have effect on internet use.Methods: Cross-sectional study conducted during January 2016 to February 2016. Data was collected among 500 engineering students of four engineering colleges of Belagavi city using young's questionnaire. Analysis was performed using SPS 20. Chi-square applied as statistical test of significance for the association between age, sex, residence, SES and schooling. P<0.01 was considered to be statistically significant.Results: The present study revealed that 16.2 and 6.2% of participants had moderate and severe form of internet addiction respectively. With increase in age prevalence of addiction increased. Internet addiction was more among Males when compared to females. Addiction was seen more in students whose both parents were working.Conclusions: Internet addiction is an emerging form of addiction among students with males more than females mostly among engineering students who are dependent on internet for their work, carrier and completion of course Hence it's time to develop comprehensive intervention approach to promote healthy and safe internet use from family, college and peers.


Nordlit ◽  
2008 ◽  
Vol 12 (1) ◽  
pp. 235 ◽  
Author(s):  
Leif Longva

A living discourse needs to be communicated and disseminated. The Internet is a very powerful tool in this respect. Internet has been around for a while now, but how to utilize the Internet as a communication and dissemination tool, is still evolving (Tananbaum, 2007).NAROS is a planned service. The intention of NAROS is to utilize the possibilities of the Internet to improve the awareness and the accessibility of scholarly works on topics related to northern areas, thus hopefully paving the way for expanding the arctic discourses. NAROS will collect information on applicable documents through a standard way of automatically harvesting metadata, and utilize the fast growing trend of making scholarly works available through open archives and open access journals. Through the search service of NAROS, researchers, students, and others will have easy access to scholarly documents within the thematic scope of the northern areas.


Author(s):  
Harol Heder García Quiceno ◽  
Vícter Alejandro García Zapata

Resumen El crecimiento de firmware en Linux, ha llegado a desarrollar varias herramientas que permitan adaptar equipos inalámbricos a las necesidades de sus compradores. Así mismo la facilidad de acceder a la documentación y soporte que se prestan en Internet con referente a estos sistemas es suficiente, para las personas que tengan poco conocimiento y deseen implementar estas herramientas. Por lo anterior se inicia con la actividad de consultar en la región, sobre implementaciones de sistemas embebidos en Linux para router inalámbricos, pero los resultados fueron negativos, Eso da paso a que surja una investigación en Internet de sistemas embebidos para Linux y por ende innovar con la instalación del DD-WRT y algunos servicios de red en un dispositivo Linksys WRT54GL. Con los pasos anteriores, de este artículo, se espera que sea el inicio para que otras personas hagan uso de estas herramientas, que no solo están en el área de las comunicaciones, sino incursionando en los hogares, y que buscan beneficios de tipo: económico, colaborativo, y una adecuada utilización recursos. Palabras ClaveLinksys, router, Linux, Firmware, Wireless, Wifi   AbstractThe growth of firmware in Linux, has come to develop several tools that enable wireless devices to adapt to the needs of their buyers. Also the ease of access to documentation and support that are provided on the internet with regards to these systems is sufficient for people who have some knowledge and want to deploy these tools.‪It starts with the previous consultation activity in the region, embedded systems implementations on Linux wireless router, but the results were negative, That leads to the emergence of a research on the Internet for Linux embedded systems and innovate with the installation of DD-WRT and some network services on a device Linksys WRT54GL.With the previous steps in this article, expected for that is the beginning for others to use these tools, which are not only in the area of communications, but making inroads into our homes, and who seek such benefits: economic, collaborative, and appropriate resource utilization It’s a text with a longitude between 60 and 300 words, that it guides the reader to identify the basic content and its relevance, because it presents in a clear and brief way the reach of the article, the main discoveries and the conclusions. Keywords Linksys, router, Linux, Firmware, Wireless, Wifi


2016 ◽  
Vol 13 (1) ◽  
pp. 204-211
Author(s):  
Baghdad Science Journal

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.


2002 ◽  
Vol 29 (4) ◽  
pp. 321-324 ◽  
Author(s):  
Patricia A. Connor-Greene ◽  
Dan J. Greene

The proliferation of information on the Internet introduces new challenges for educators. Although the Internet can provide quick and easy access to a wealth of information, it has virtually no quality control. Consequently, the Internet has rendered faculty more essential than ever as teachers of the analytic and evaluative skills students need to become educated consumers of information. In this article we describe an exercise using small-group discussion and individual problem-based learning to teach critical thinking about the Internet. Data from the exercise and from student evaluations support both its need and students' perceptions of its effectiveness.


Sign in / Sign up

Export Citation Format

Share Document