367 research outputs found

    UTP e-Summon @nywhere

    Get PDF
    This paper covers the development of the UTP e-Summon @nywhere as a mobile application. The report consists of FIVE (5) major topics. First, Chapter 1 Introduction explains background of the study, problem statement, system objectives and scope, the relevancy of the project, and the feasibility of the project within the scope and time frame. Second, Chapter 2 Literature Review discusses the literature review from journals, books, magazines, and the Internet as the major references for the project. Third, Chapter 3 System Approach describes the approach to be implemented to develop the project including the system development methodology and requirements-gathering techniques. Fourth, Chapter 4 Result and Discussion explains the findings of the project including the database design, graphical user interfaces, and security measures ofthe system. Finally, Chapter 5 Conclusion entails the overall development of the system including the system future enhancements and the future usage ofthe system. The methodology that will be implemented for system development is phased development-based methodology and to elicit the system information requirements, several methodologies will be adopted including one-toone interview with the security guards, observations, and document analyses. The results explain on the interfaces and the output of the system. As a conclusion, UTP e-Summon @nywhere is developed as a mobile summon application in Universiti Teknologi PETRONAS as part ofthe existing computerized summon applicatio

    UTP e-Summon @nywhere

    Get PDF
    This paper covers the development of the UTP e-Summon @nywhere as a mobile application. The report consists of FIVE (5) major topics. First, Chapter 1 Introduction explains background of the study, problem statement, system objectives and scope, the relevancy of the project, and the feasibility of the project within the scope and time frame. Second, Chapter 2 Literature Review discusses the literature review from journals, books, magazines, and the Internet as the major references for the project. Third, Chapter 3 System Approach describes the approach to be implemented to develop the project including the system development methodology and requirements-gathering techniques. Fourth, Chapter 4 Result and Discussion explains the findings of the project including the database design, graphical user interfaces, and security measures ofthe system. Finally, Chapter 5 Conclusion entails the overall development of the system including the system future enhancements and the future usage ofthe system. The methodology that will be implemented for system development is phased development-based methodology and to elicit the system information requirements, several methodologies will be adopted including one-toone interview with the security guards, observations, and document analyses. The results explain on the interfaces and the output of the system. As a conclusion, UTP e-Summon @nywhere is developed as a mobile summon application in Universiti Teknologi PETRONAS as part ofthe existing computerized summon applicatio

    Riley v. California and the Stickiness Principle

    Get PDF
    In Fourth Amendment decisions, different concepts, facts and assumptions about reality are often tethered together by vocabulary and fact, creating a ‘Stickiness Principle.’ In particular, form and function historically were considered indistinguishable, not as separate factors. For example, “containers” carried things, “watches” told time, and “phones” were used to make voice calls. Advancing technology, though, began to fracture this identity and the broader Stickiness Principle. In June 2014, Riley v. California and its companion case, United States v. Wurie, offered the Supreme Court an opportunity to begin untethering form and function and dismantling the Stickiness Principle. Riley presented the question of whether cell phone searches incident to a lawful arrest were constitutional. The Court, which had clung to pre-digital concepts such as physical trespass well into the twenty-first century, appeared ready to explore how technology is reshaping historically understood conceptions of privacy. From a broader perspective, the case offers an initial step in reconciling pre-digital rules based on outdated spatial conceptions of physical things with the changing realities of a technology driven world

    Use of SPAN for Identified Network Traffic via Machine Learning

    Get PDF
    Few years back the number of wireless devices and their use in our daily life has been increased a lot. All devices cell phones, laptops, tablets, camera, TVs, home appliances have become a part of network now. As the network devices are growing and getting connected to each other the security risks are getting higher. All the companies and organizations are now establishing and implanting the public and private wireless networks. Organization have to pay heavy cost to implement and integrate all devices together on a network. As wireless networks are more vulnerable to threats and in security's a huge network all the devices should be identified whenever they enter or leave a network traffic pool the experimental work in this paper will elaborate the methods to identify the network traffic identification under encryption. This paper emphases on identification of devices based on layer 2 functionality by MAC (Media Access Code). Later on, the identification was improved using labeled or tagged traffic methods by use of SPAN (Switch port analyzer technique) technology or protocol with assistance ofVirtual Local Area Network. Many Supervised learning methods were examined during experiment and were referenced on data collected by real time traffic. The network traffic of multiple deceives gradually passes through network so incremental learning method is implemented as classification for streaming data

    Providing First Responders with Real-Time Status of Cellular Networks During a Disaster

    Get PDF
    Existing systems for reporting cellular outages do not provide adequate geographical granularity and do not provide a real-time view of the state of the communication network. This work presents a system for real-time measurement of both coverage and quality of service via crowdsourced measurements from consumer and first responder phones. Baseline coverage and quality of service data is collected prior to a major disaster. During a major disaster, real-time data is compared to baseline to identify areas of congestion or outages. Such information can be used by incident commanders to more effectively deploy resources during major disasters. Furthermore, such system state information can be used to support automatic deployment of temporary cellular network base stations, such as on drones

    The Cord Weekly (April 2, 1992)

    Get PDF

    Communicating During Emergencies: Toward Interoperability and Effective Information Management

    Get PDF
    Symposium: The Crisis in Public Safety Communications. Held at the Mercatus Center at George Mason University, December 8, 2006. To change the culture and realities of public safety communications, this Article calls on policymakers to develop a new architecture for the use of information and communications technologies and provide a framework for leadership to transition to a next generation system for public safety communications. Such a culture change would include not only an embrace of new technologies, but a new framework for technology leadership--at the state or regional level-that spurs decision making in a coordinated fashion (and not through ad hoc decisions by over 50,000 different local agencies). In short, this Article explains what new technologies can transform public safety communications and what intergovernmental relations strategy will be necessary to facilitate the implementation of such technologies
    • …
    corecore