incoming message
Recently Published Documents


TOTAL DOCUMENTS

19
(FIVE YEARS 3)

H-INDEX

3
(FIVE YEARS 0)

Author(s):  
J. Sasi Bhanu ◽  
J. K. R. Sastry ◽  
T. Chandrasekhara Reddy

Users use Android-based applications for communicating through emailing, text messaging, and transmission of audio and video objects. The attackers manipulate the email, text, videos, or audio so that users' receipt of the messages causes malware through their handheld devices. A runtime routine is invoked, which causes damage to the local resources of the mobile phone. The manipulation of the messages is done using different signatures, making it difficult to recognize the same using a single approach. Multiple approaches are sometimes required to detect different signature-based incoming messages. Choosing a method that suits the signature of the incoming message is the key. Malware can also enter at the time of installing third-party apps, clicking on the links provided in the messages, installing and invoking the malware in the background. Many issues are involved in dealing with malware detecting, prevention, and curing. A comprehensive architecture is required to deal with every aspect of dealing malware. In this paper, a comprehensive architecture is presented that considers malware's issue, especially concerning malware affected through short message service (SMS) messages operated under the Android operating system. The disection of the SMS messages have been implemented and 99% accuracy has been achieved.



T-Comm ◽  
2021 ◽  
Vol 15 (3) ◽  
pp. 25-29
Author(s):  
Elchin B. Gezalov ◽  

In the article the local communication network, heterogeneous on the intensity of the incoming message flow and the type of messages, with synchronous time access protocol is considered. All communication stations of the considered local network consist of three substations: speech substations, video information substations and data substations. Speech substations form the speech subnet, video information substations form the video information subnet, and data substations form the data subnet. Substations within the same subnet are homogeneous in their activity. A model of the considered local network in discrete time is being carried out, which allows assessing the effect of the failure processes and restoration of substations of network stations and the communication channel on its characteristics. Based on the developed model of the local network, the probability-time characteristics of the considered network are selected and determined.



JURNAL PETIK ◽  
2020 ◽  
Vol 6 (2) ◽  
pp. 81-85
Author(s):  
Siti Husnul Bariyah ◽  
Kuntum An Nisa Imania ◽  
Yuniar Purwanti

Abstract - The Covid-19 pandemic that has been running for several months from April 2020 to September 2020 has caused adjustments in various fields, one of which is the field of education. Based on Circular No. 4 of 2020 concerning the implementation of education in the Covid-19 emergency period, one of the points is that the learning process is carried out from home, thus requiring the school to make a new innovation for the learning process because it does not allow face-to-face classrooms. The school and teachers make an agreement on how the method they will use. This research takes the example of a case in a private school in Bandung regency that implements online learning media through group wa found some of the deficiencies are for teachers there is no neat learning history because of its nature that continues to accumulate when there is an incoming message, for parents there is limited storage memory. which causes many obstacles in accessing the WA group to download teaching materials from the teacher or sending reports on the results of daily learning. Therefore researchers intend to develop a cloud storage-based online learning application prototype by utilizing a variety of technologies including Laravel programming language, react native (mobile ), Firebase for the use of its database and the Google Drive API for file cloud storage. The result of developing this prototype is in the form of a system design consisting of activity diagrams, use case diagrams, class diagrams and mobile-based interface designKeywords — Application, learning, online, cloud, storage Abstrak — Pandemic covid-19 yang telah berjalan beberapa bulan terhitung dari April 2020 sampai sekarang September 2020 telah menyebabkan penyesuaian di berbagai macam bidang salah satu diantaranya adalah bidang Pendidikan. Berdasarkan Surat Edaran No 4 Tahun 2020 tentang pelaksanaan Pendidikan dalam masa darurat covid-19, salah satu point nya adalah proses belajar dilaksanakan dari rumah, sehingga menuntut pihak sekolah untuk membuat sebuah inovasi baru untuk proses pembelajaran karena tidak memungkinkan untuk adanya tatap muka dikelas. Pihak sekolah dan guru membuat sebuah kesepakatan bersama bagaimana metode yang akan mereka gunakan. Penelitian ini mengambil contoh kasus di sebuah sekolah swasta di kab bandung yang menerapkan media pembelajaran daring memalui wa grup ditemukan beberapa kekurangan diantaranya adalah bagi guru tidak adanya histori pembelajaran yang rapih karena sifatnya yang terus menumpuk ketika ada pesan masuk, bagi orang tua adanya keterbatasan memori penyimpanan yang menyebabkan banyak kendala dalam mengakses WA grup untuk mengunduh bahan ajar dari guru atau mengirimkan laporan hasil pembelajaran harian.Oleh karena itu peneliti bermaksud untuk mengembangkan sebuah prototype aplikasi pembelajaran daring berbasis cloud storage dengan memanfaatkan berbagai macam teknologi diantaranya Bahasa pemrograman Laravel, react native (mobile), firebase untuk penggunaan database nya dan google drive API untuk file cloud storage. Hasil dari pengembangan prototype ini adalah berupa perancangan system yang terdiri dari activity diagram, use case diagram, class diagram dan desain antarmuka berbasis mobile.Kata Kunci— aplikasi,  pembelajaran, daring, cloud, strorage



2019 ◽  
Vol 2 (2) ◽  
pp. 113
Author(s):  
Ummul Khair Siti Partimah Fakar

This research was conducted to determine the policy of school literacy movement in excellent primary school Aisyiyah Taman Harapan Curup. This research with the theory implementation Eward III namely: communication, resources, commitment, and bureaucracy structure and will describe the supporting and inhibiting factors in implementation the policy of school literacy movement. This research is a descriptive qualitative research which was carried out in a excellent primary school Aisyiyah Taman Harapan Curup in April-Juli 2018. The research subject were vice principal, head of library, and the fourth grade homeroom teacher. Technique collecting data is interview, observation, and documentation. The result of this research are as follows: (1) The policy implementation supported by: (a) implementing agencies communicate through meeting of school element such as management, parents, and teacher. (b) The resources that support this activity such as the potential of teacher funds from parent of the students as soon as goverment and sponsor. (c) commitment from implementing agencies. (d) Bureaucracy structure from part of school. (2) supporting factors in the form of the availability of means to socialize policies, book grant from parents, time and funds, teacher have a passion for learning, while the inhibiting factor teacher must be still reminded related to the policy Standard Operational Procedure and the program that still need to be done each other busy of ustadzah and ustadz which usually make the literacy process in the library and making wall magazine whic sudden because of limited human resources too. Parent often ignore incoming message via whatsapp need for program development so that it is not monotonous and students become bored.Keyword: School Literacy Movement, SDUA THC.



Instant messaging has changed and simplified the way people communicate, whether in professional or personal life. Most communication is done through instant messaging, and it is common for people to miss important information. This is due to the huge amount of incoming message notifications, so users tend to accidentally ignore them. This is also experienced by Universitas Multimedia Nusantara (UMN) student committees who communicate via LINE instant messenger. This research showed LINE bot was made by using the Naive Bayes algorithm to classify between important messages and unimportant messages on the committee group. The Naive Bayes algorithm is a classification algorithm based on probability and statistical methods. The Naive Bayes algorithm is chosen because it is widely implemented in spam filtering; the method is simple and has good accuracy. The classification process is done by calculating the probability of chat in each class based on the value of the word likelihood which generated in the training process. This research produces spam precision and spam recall as 94.2% and 95.6% respectively









2014 ◽  
Vol 19 (1) ◽  
pp. 106-121 ◽  
Author(s):  
HILARY D. DUNCAN ◽  
NORMAN SEGALOWITZ ◽  
NATALIE A. PHILLIPS

Relational elements of language (e.g. spatial prepositions) act to direct attention to aspects of an incoming message. The listener or reader must be able to use these elements to focus and refocus attention on the mental representation being constructed. Research has shown that this type of attention control is specific to language and can be distinguished from attention control for non-relational (semantic or content) elements. Twenty-two monolinguals (18–30 years) and nineteen bilinguals (18–30 years) completed two conditions of an alternating-runs task-switching paradigm in their first language. The relational condition involved processing spatial prepositions, and the non-relational condition involved processing concrete nouns and adjectives. Overall, monolinguals had significantly larger shift costs (i.e. greater attention control burden) in the relational condition than the non-relational condition, whereas bilinguals performed similarly in both conditions. This suggests that proficiency in a second language has a positive impact on linguistic attention control in one's native language.



2014 ◽  
Vol 513-517 ◽  
pp. 806-811
Author(s):  
Ivan Atencia ◽  
Inmaculada Fortes ◽  
Sixto Sánchez

In this paper we analyze a discrete-time queueing system where the server decides whento upgrade the service depending on the information carried by the incoming message. We carry outan extensive analysis of the system developing recursive formulae and generating functions for thestationary distribution of the number of customers in the queue, the system, the busy period and thesojourntimeas well as some numerical examples.



Sign in / Sign up

Export Citation Format

Share Document