scholarly journals SMS User Interface Result Checking System

10.28945/3301 ◽  
2009 ◽  
Author(s):  
Emmanuel Adagunodo ◽  
Oludele Awodele ◽  
Sunday Idowu

In this paper, we present a way to bring information to students by leveraging the availability of phones (with SMS capability), especially cell phones. We review the use of mobile phones for delivering examination results via Short Messaging Service (SMS) in a university, where student who have written examinations and anxious to see their results need to get their grades in a convenient and accessible way, whether in the comfort of their homes, on the road or while at work. Mobile phone seems to be an asset most individuals’ posses, and take almost everywhere with them, it is therefore a highly effective means of bringing information to them faster, easily and on the move. An SMS result checking system not only enables students to request for their grades, the system can also deliver the grades to their phones as soon as the grades become available. This means that they can access their grades even in the remotest locations where internet facility might be unavailable, preventing them from accessing the school’s website. This study shows the implementation of such system and considers the security issues associated. The system enforces security with the use of secret information (password), and also provides access to new and old grades.

Safety ◽  
2021 ◽  
Vol 7 (1) ◽  
pp. 17
Author(s):  
Miroslava Mikusova ◽  
Joanna Wachnicka ◽  
Joanna Zukowska

The topic of the use of mobile devices and headphones on pedestrian crossings is much less explored in comparison to the use of the mobile phone while driving. Recent years have seen many discussions on this issue, especially in foreign countries. The Slovak Republic, however, has not been giving it enough attention (and it is not mentioned in the National Road Safety Plan for the Slovak Republic from 2011 to 2020). This paper aims to draw attention to this issue. It presents basic outputs of a pilot study on pedestrian safety, with a focus on the use of mobile devices and headphones at selected non-signalized pedestrian crossings in three Slovak cities. Overall, 9% of pedestrians used headphones or mobile devices at observed pedestrian crossings (4% of them used headphones, 1% used headphones and at same time used their mobile phone, 2% made phone calls and 2% used their mobile phones). While these numbers can be considered relatively low, the study proved that during weekdays every 2 min someone was using the crossing without fully focusing on crossing the road safely. Another main finding was that although the safety risk at pedestrian crossings is increased by factors such as rush hour traffic or reduced visibility, pedestrian behavior related to the use of mobile phones and headphones does not change. A safety assessment was also carried out at the crossings. The results show that pedestrian behavior is not affected by the level of safety of the crossing (e.g., visibility of the crossing for drivers). The results of the presented analysis suggest that action is needed to change that. Due to the lack of information about accidents involving pedestrians using mobile phones and headsets when crossing the road, no relevant statistical data could be analyzed. The dataset collected can be used as a basis for further investigation or comparisons with other countries of the relevant indicators. In future work, we would like to include a pedestrian–driver interaction factor focusing on driver speed behavior in relation to pedestrians (who are on or are about to step onto a pedestrian crossing) and identify critical situations caused by improper behavior of drivers and/or pedestrians. This will help to understand speed adjustment problems related to pedestrian crossings.


Author(s):  
Thangavel M. ◽  
Divyaprabha M. ◽  
Abinaya C.

Smart devices like mobile phones, tablets, and laptops have become necessities in our lives due to the services they provide. However, in recent days, mobile applications have become a major threat for an attack. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. Each day, a mobile device attack is changing dynamically, and it is very difficult to represent a complete set of threats and vulnerabilities. Mobile phone security has become an important aspect of security issues in wireless multimedia communications. The development of mobile applications has increased drastically; hence, it is our responsibility to protect our devices and the data within them. Being aware is the first step to protect data. Thus, to prevent the mobile from the threats, efforts are required to form the application developer, app market administrator, and user to defend against the malware. This article explores those threats and vulnerabilities of mobile applications.


Author(s):  
River Yan

The research literature on awareness, knowledge, and ability of mobile security of young mobile phone users was reviewed in this article. The existing literature suggests that young mobile phone users are usually not aware of potential mobile security issues when using a mobile phone. Young mobile phone users are often found to lack the knowledge to detect mobile security problems and to defend themselves in the mobile world. Empirical evidence also exists in which some users do not have the mobile security ability to safely use their mobile phones. Overall, it is vital that young users improve their awareness, knowledge, and ability of mobile security so that they can effectively and enjoyably use their mobile phones.


It is difficult to manage a smartphone for useful purposes on the road by a motorcyclist rather than a motorist. A H.U.D or a Head up Display makes it much easier and less hazardous for a motorcyclist to attain proper usage of various on road features provided by a smartphone like navigation, etc. In this paper, a study comparing the usage of a Head up Display unit in a helmet over the smartphone has been conducted. The H.U.D has decreased unnecessary glances and it is conclusive that peripheral vision allows maintaining a better cognizance. Also, the user interface is easy to learn and use and does not require visual attentiveness from the user.


Author(s):  
Nirbhay Kumar Chaubey ◽  
Dhananjay Yadav

<span>Vehicular ad hoc network (VANET) is an emerging technology which can be very helpful for providing safety and security as well as for intelligent transportation services. But due to wireless communication of vehicles and high mobility it has certain security issues which cost the safety and security of people on the road. One of the major security concerns is the Sybil attack in which the attacker creates dummy identities to gain high influence in the network that causes delay in some services and fake voting in the network to misguide others. The early detection of this attack can prevent people from being misguided by the attacker and save them from getting into any kind of trap. In this research paper, Sybil attack is detected by first applying the Poisson distribution algorithm to predict the traffic on the road and in the second approach, analysis of the network performance for packet delivery ratio (PDR) is performed in malign and benign environment. The simulation result shows that PDR decreases in presence of fake vehicles in the network. Our approach is simple and effective as it does not require high computational overhead and also does not violate the privacy issues of people in the network.</span>


Author(s):  
River Yan

The research literature on awareness, knowledge, and ability of mobile security of young mobile phone users was reviewed in this article. The existing literature suggests that young mobile phone users are usually not aware of potential mobile security issues when using a mobile phone. Young mobile phone users are often found to lack the knowledge to detect mobile security problems and to defend themselves in the mobile world. Empirical evidence also exists in which some users do not have the mobile security ability to safely use their mobile phones. Overall, it is vital that young users improve their awareness, knowledge, and ability of mobile security so that they can effectively and enjoyably use their mobile phones.


Author(s):  
Nirbhay Kumar Chaubey ◽  
Dhananjay Yadav

Vehicular ad hoc networks (VANETs) are a class of ad hoc networks in which vehicle communicate with each other to show the traffic situation and any mishappening on the road. VANET is vulnerable to a number of attacks due to its infrastructure-less nature. One of these attacks is the Sybil attack. Security of data dissemination in VANET is very crucial, otherwise any mishappening can occur on road. Sybil attack is very difficult to be defended and detected, especially when it is launched by some conspired attackers using their legitimate identities, and this has become a growing research interest in VANETs in past few years. This chapter studies various dimension of VANETs including its structure, communication architecture, security issues, and critical review of technique to detect Sybil attacks.


2019 ◽  
Vol 7 (2) ◽  
pp. 85-90
Author(s):  
Atanas Ivanov

The paper reviews existing solutions for the application of an acceleration sensor built into a mobile phone. A drawback of the results published in the available literature is that the experimental studies are performed in laboratory conditions and that high-complexity procedures and algorithms are used. It is necessary to perform field surveys, taking into account the factors influencing the measurement of the acceleration with a mobile phone. The studies and results obtained are complementary to those available from the literature in that the measurements are made "on the road". Factors that influence measurement accuracy in real-life conditions are defined. The results obtained show that mobile phones, regardless of brand and model, should be used to make such measurements and comparisons before being used for such purposes in order to make objective results and conclusions in scientific developments.


Author(s):  
Yansen Yansen ◽  
Agus Prijono

Nowadays, cell phones or mobile phones have become a multipurpose tool. The developers of mobile phone/smartphone have added an assortment of features and applications that are very useful for the users. Nokia provides the opportunity for application developers by providing developers such as Qt SDK. Application developers can use Qt SDK to design and create applications that can run on mobile phones based on Symbian. In this research Qt SDK was used to create applications for monitoring a room using a camera and display it on a Symbian-based smartphone. Research also used webcam7 software to monitor the camera and display it on PC screen. The Symbian used was Nokia E71. The camera used webcam M-Tech camera connected to the PC via USB cable, and internal webcam. Virtual routers were used to make the laptop into an access point. Virtual routers created using the netsh command was typed at the command prompt laptop. Symbian smartphone was connected to the wifi on the laptop. By accessing the IP of the laptop, display on a webcam has successfully been seen through a symbian smartphone monitoring application created using Qt SDK.


Sign in / Sign up

Export Citation Format

Share Document