registered user
Recently Published Documents


TOTAL DOCUMENTS

31
(FIVE YEARS 20)

H-INDEX

2
(FIVE YEARS 1)

Author(s):  
Jenilkumar Patel

Abstract: The Online Discussion Forum system can be used for any sort of discussion. It is a web-based application. The goal of this system is to allow users to connect with each other online and to provide new users with discussion services. It enables users to sign up for our website. A registered user can create new posts and respond to existing ones. The current study uses two primary concepts to support the system at two distinct ends termed the front end and the back end to completely automate the Online Discussion Forum, removing all of the constraints of the manually managed Online Discussion Forum. The front end will be Visual Studio 2010 / ASP.NET, and the back end will be SQL SERVER 8. Other tools utilized in this research are Ajax Toolkit and Jquery. A more accurate system is created in the present study to reduce the manual efforts to achieve easy access to the required information.


2021 ◽  
Vol 11 (4) ◽  
pp. 5564-5576
Author(s):  
Sabari L. Umamaheswari ◽  
Thota Dhana Sekhar ◽  
S. Guna Saideep ◽  
S. Joshua ◽  
Arimani Munirakesh ◽  
...  

In this paper a Door lock system using RFID and IOT Technologies. Using smart phone with Blynk App the Admin or owner can remotely monitor, control (ON & OFF the access) and can get Blynk notifications from the door lock when someone try to access it or if any suspicious activity happens (someone try to break the it). The registered User will receive Gmail’s when he tries to unlock the door. Other features are the admin or owner can remotely unlock and lock the door from any place, and he can disable the switch which is used for getting out from the room, for blocking the unknown persons who went with theft RFID card, it is done by seeing the notifications send to the user when door is unlocked with his card through Admin. For authorized person the lock will be opened and closed automatically after a predetermined delay. If it is an unauthorized person tries it alerts the admin and neighbors through a Blynk notification and buzzer sound. Thus, once implemented, the system will prove An Effective security with minimum cost and increase in comfort for system users and also more efficient compared to existing cost ineffective systems.


2021 ◽  
Vol 10 (02) ◽  
pp. 137-144
Author(s):  
Muthu Krishnan.S ◽  
Angelin Ranjithamani.D ◽  
Deepa .C

Online event management system is an online event management system software project that serves the functionality of an event manager. The system allows registered user login and new users are allowed to register on the application. The system helps in the management of events, users and the aspects related to them. This proposed to be a web application. The project provides most of the basic functionality required for an event type e.g. [technical,Non-technical events,etc]. College students are advanced in thinking, who are senior and specialized professionals trained by the nation. They have independent thinking skills, and often have unique views and opinions on events. In this paper, an index is constructed to solve the difficulty of monitoring the ideological dynamics of college students, since the ideological dynamics of college students is difficulty to be captured. In particular, a visualization management information system is developed to monitor the ideological dynamics of college students based on big data. This system is based on the B/S architecture, which uses the SQL Server database. This system realizes the functions of index modification, document entry, word segmentation statistics, index correlation, keyword search, index analysis, document analysis.


Author(s):  
Yuyun Siti Khoeriyah ◽  
Rosiana Nurwa Indah ◽  
Farah Ruqayah

This study aims to determine the use of the whatsapp gateway service in the loan notification system (SINOPI) at the Pekalongan City Library and Archives Service. The method used in this research is a qualitative method with descriptive analysis. The data collection technique used in this research is by conducting interviews. The informants in the study used purposive sampling technique, namely the technique of determining informants based on certain criteria. This study resulted in the finding that this service could at least minimize the delay in returning books by as much as 20 copies per day. This service has been used by all users who have registered as members of the Pekalongan City Regional Library. With this system, the service for extending the loan period is automatically served by the server without having any officers on guard and without having to come to the library location. This application development is easy to use and understand by its users and easy to access. The obstacles that often occur are notification information that is not conveyed or cannot be read by users due to several factors including; a power cut by PLN so that the server is down and unable to send notifications, the registered user cellphone number is no longer active / changed the number, because the internet subscription (kouta) of the user has run out and notifications are ignored.


2021 ◽  
Vol 21 (3) ◽  
pp. 1-19
Author(s):  
Shehzad Ashraf Chaudhry ◽  
Azeem Irshad ◽  
Khalid Yahya ◽  
Neeraj Kumar ◽  
Mamoun Alazab ◽  
...  

The advancements in the internet of things (IoT) require specialized security protocols to provide unbreakable security along with computation and communication efficiencies. Moreover, user privacy and anonymity has emerged as an integral part, along with other security requirements. Unfortunately, many recent authentication schemes to secure IoT-based systems were either proved as vulnerable to different attacks or prey of inefficiencies. Some of these schemes suffer from a faulty design that happened mainly owing to undue emphasis on privacy and anonymity alongside performance efficiency. This article aims to show the design faults by analyzing a very recent hash functions-based authentication scheme for cloud-based IoT systems with misunderstood privacy cum efficiency tradeoff owing to an unadorned design flaw, which is also present in many other such schemes. Precisely, it is proved in this article that the scheme of Wazid et al. cannot provide mutual authentication and key agreement between a user and a sensor node when there exists more than one registered user. We then proposed an improved scheme and proved its security through formal and informal methods. The proposed scheme completes the authentication cycle with a minor increase in computation cost but provides all security goals along with privacy.


Author(s):  
Prof. Sandip Ganorkar ◽  
Ruchika Dhole ◽  
Maheswari Hirudkar ◽  
Diksha Rangari

The current scenario gives rise to a necessity of a single platform of accommodation facilities. It is very difficult to access all accommodation facilities individually. This website can act as an interface between the owners and the users. In this project, we are going to develop an online website which aims at providing accommodation facilities for people. The facilities available are hostels, mess and rooms/flats. Any person can view the details of the facilities but will not be able to give feedback like comments or ratings unless he is a registered user thus disallowing false defamation of any facility. He/She can contact the owner directly with the contact details. To avoid defamatory publicity, only the registered users can add comments.


Author(s):  
Prof. Kalyani Pendke ◽  
Nishad Wankhede ◽  
Mayur Dhole

The current scenario gives rise to a necessity of a single platform of accommodation facilities. It is very difficult to access all accommodation facilities individually. This website can act as an interface between the owners and the users. In this project, we are going to develop an online website which aims at providing accommodation facilities for people. The facilities available are hostels, mess and rooms/flats. Any person can view the details of the facilities but will not be able to give feedback like comments or ratings unless he is a registered user thus disallowing false defamation of any facility. He/She can contact the owner directly with the contact details. To avoid defamatory publicity, only the registered users can add comments.


2021 ◽  
pp. 000183922110101
Author(s):  
Hatim A. Rahman

Existing research has shown that people experience third-party evaluations as a form of control because they try to align their behavior with evaluations’ criteria to secure more favorable resources, recognition, and opportunities from external audiences. Much of this research has focused on evaluations with transparent criteria, but increasingly, algorithmic evaluation systems are not transparent. Drawing on over three years of interviews, archival data, and observations as a registered user on a labor platform, I studied how freelance workers contend with an opaque third-party evaluation algorithm—and with what consequences. My findings show the platform implemented an opaque evaluation algorithm to meaningfully differentiate between freelancers’ rating scores. Freelancers experienced this evaluation as a form of control but could not align their actions with its criteria because they could not clearly identify those criteria. I found freelancers had divergent responses to this situation: some experimented with ways to improve their rating scores, and others constrained their activity on the platform. Their reactivity differed based not only on their general success on the platform—whether they were high or low performers—but also on how much they depended on the platform for work and whether they experienced setbacks in the form of decreased evaluation scores. These workers experienced what I call an “invisible cage”: a form of control in which the criteria for success and changes to those criteria are unpredictable. For gig workers who rely on labor platforms, this form of control increasingly determines their access to clients and projects while undermining their ability to understand and respond to factors that determine their success.


Author(s):  
Ankit Yadav ◽  
Ankit Kumar Bharti ◽  
Bhawna Parashar ◽  
Avisha Sharma

If we look around present world, we can easily find Global Positioning System (GPS) being used in several areas. A real time automobile theft recovery system using various (GPS, GSM, Arduino etc.) technologies has been proposed in this paper. Through this project the location of the vehicle, which has the device installed, is easy to track down. Soon after the location of the vehicle has been tracked, the data can be seen in the form of latitude and longitude coordinates through a text message on the user’s mobile as well as the coordinates can be seen on the Android app too, as requested by the user. Initially, the inputs from the satellite are obtained by GPS installed in the device and are stored in the microcontroller’s buffer. The coordinates are now stored in the microcontroller, so when the user requests the location of the vehicle then instantly the device is so designed to send a message having the coordinates to the registered user. As soon as the work of GSM is completed (which is after sending a text to the user) it gets deactivated. Then the GPS is activated again for the rest of the process. The android app can also be used to turn the engine ON/OFF and also change the mode from AUTO to MANUAL or vice versa. The hardware part that has been used in the project comprises of GPRS, GSM module, LCD to view the coordinates, ATMega Microcontroller MAX 232, Arduino, RS232 and relay.


2020 ◽  
Vol 5 (1) ◽  
Author(s):  
Shun Kodate ◽  
Ryusuke Chiba ◽  
Shunya Kimura ◽  
Naoki Masuda

AbstractProviders of online marketplaces are constantly combatting against problematic transactions, such as selling illegal items and posting fictive items, exercised by some of their users. A typical approach to detect fraud activity has been to analyze registered user profiles, user’s behavior, and texts attached to individual transactions and the user. However, this traditional approach may be limited because malicious users can easily conceal their information. Given this background, network indices have been exploited for detecting frauds in various online transaction platforms. In the present study, we analyzed networks of users of an online consumer-to-consumer marketplace in which a seller and the corresponding buyer of a transaction are connected by a directed edge. We constructed egocentric networks of each of several hundreds of fraudulent users and those of a similar number of normal users. We calculated eight local network indices based on up to connectivity between the neighbors of the focal node. Based on the present descriptive analysis of these network indices, we fed twelve features that we constructed from the eight network indices to random forest classifiers with the aim of distinguishing between normal users and fraudulent users engaged in each one of the four types of problematic transactions. We found that the classifier accurately distinguished the fraudulent users from normal users and that the classification performance did not depend on the type of problematic transaction.


Sign in / Sign up

Export Citation Format

Share Document