Security is an important aspect for all of the human race and the organizations that are run by them. In this paper, an automated multipurpose security and surveillance system is proposed which is useful at highly cri...
详细信息
In recent years, a wide variety of mobile computing devices have emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new ge...
详细信息
ISBN:
(纸本)0769519067
In recent years, a wide variety of mobile computing devices have emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN technology. In this paper we study media access protocols for wireless LAN. We describe an improved carrier-sense multiple access (CSAM) protocol for ad hoc networks, which is different from the RTS/CTS mechanism thoroughly, to improve the performance of system.
The paper proposed a remote monitoring and control system based on JavaFX and Web *** the system, communication stations were disbursed over a wide area. In a cell site, different kinds of sensors communicate with sta...
详细信息
The development of processed coffee in Indonesia has excellent prospects because the growth of coffee drinkers has increased in the last decade. Marketing needs to have creative and innovative ideas, develop well-tune...
详细信息
The emergence of the World Wide Web and the use of social media platforms such as Facebook, Twitter, and Instagram have led to the development of a technique of disseminating information that was not possible before t...
详细信息
Smart Cities uses information and communicationtechnology (ICT) to enhance the infrastructure components, which provides automation and thereby various services of a city become more intelligent, interconnected and e...
详细信息
ISBN:
(纸本)9781509061068
Smart Cities uses information and communicationtechnology (ICT) to enhance the infrastructure components, which provides automation and thereby various services of a city become more intelligent, interconnected and efficient. The proposed work Smart Connected Campus targets on deploying and exploiting smart city technologies and services in an university campus. All the features of a smart campus are networked and communicated through Internet of Things (IoT) solution, by facilitating various objects to be sensed and controlled from any remote location. The proposed smart campus brings in different features viz., university details, on-line resources, emergency contacts, notifications, route map, smart canteen management system, real-time water monitoring system and smart temperature monitoring system all in one platform: Campus Info - an Android application which guarantee fast and reliable delivery of information at run-time.
With the development of cloud computingtechnology, cloud services have been used by more and more traditional applications and products because of their unique advantages such as virtualization, high scalability and ...
详细信息
Cloud computingtechnology is causing a shift in informationcommunicationtechnology usage by transforming the approaches businesses employ informationtechnology services. This benefits computing usage by allowing u...
详细信息
ISBN:
(纸本)9781538625651
Cloud computingtechnology is causing a shift in informationcommunicationtechnology usage by transforming the approaches businesses employ informationtechnology services. This benefits computing usage by allowing users to share hardware resources via multiplexing of virtual machines which are the basic units of cloud computing. Small and new businesses which often lack good financial standing but desire to use the cloud, need not own these resources, but only pay for their use at a reduced price. This alleviates the cost of technological maintenance and operation. However, the services provided by third-party cloud service providers involve inherent security threats. The relocation of corporate resources to an external administrative jurisdiction escalates security concerns such as trust, assurance and transparency. There may be devastating effects to clients, should their financial transactions and corporate information be compromised as a result of a service provider's security challenges. This research employs a quantitative case study to analyse the security challenges of popular cloud computing services existing within the past four years. An overview of security vulnerabilities in cloud computing is presented;a preliminary cloud security framework is developed and the role of computing formalisms is investigated.
The aim of this paper is to examine the role of social media technologies in revolutionizing consumer activism by applying the theory of Task technology Fit (TTF) model. Due to the affordability of getting internet co...
详细信息
ISBN:
(纸本)9783030219024;9783030219017
The aim of this paper is to examine the role of social media technologies in revolutionizing consumer activism by applying the theory of Task technology Fit (TTF) model. Due to the affordability of getting internet connection, there has been a surge in the use of social media platforms which simplify the communication and interaction between people around the world. People now are more enthusiastic to join and use social media platforms to exchange information with people who share same interests. Social media did not just change how people communicate with each other, but it changed how businesses and corporations communicate with their customers. Another common application of social media is activism. With the help of social media platforms, activists can start a social movement immediately and reach a global audience. In the case of activism, the Task technology Fit is evaluating whether the technology's functionality meets the task requirements or not. The technology in this context is social media platforms.
Channel coding is an error control measure that widely used in modern communication system. It uses the relationship between the supervise code and the information code to detect the fault codes that may be existed. I...
详细信息
暂无评论