The Research of Wisdom Campus Construction and Development Based on Internet of Things

2014 ◽  
Vol 989-994 ◽  
pp. 5439-5443 ◽  
Author(s):  
Yi Peng Wang

With the continuous development of science and technology, new information technologies such as Internet of Things, Mobile Internet quickly get into various industries. The vast majority of colleges and universities are actively constructing wisdom campus based on Internet of Things to effectively integrate campus personnel identification, library management, campus id and other information, and to ensure digital resources integration and sharing. This article mainly aims at further exploration of the construction and development of wisdom campus based on the characteristics of Internet of Things.

2009 ◽  
Vol 31 (4) ◽  
pp. 27-32 ◽  
Author(s):  
Thaddeus Guldbrandsen ◽  
Catherine Amidon

The use of new information technologies is one aspect of the broad changes in American higher education that have altered the conduct of research, publication, education, and interaction with diverse constituencies. Facing economic challenges, universities have sought more economical ways to deliver their services, new opportunities to diversify funding streams, innovative marketing opportunities to bolster their public image, and strategic collaboration to leverage resources among multiple partners.1 Within this context, web-based communication and other information technologies have uncertain implications for universities. They hold the promise of helping to solve complex problems, even as they are part of the changing environment to which university leaders and scholars aim to adapt. As anthropologists and other scholars develop new uses for information technology in their research, service, and teaching that are increasing participatory dialogue, many questions arise insofar as the technology facilitates faster, multi-directional communication and decentralizes access to knowledge and expertise.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Yan Hong

The grain supply chain not only broadens the financing channels for small and medium-sized enterprises in the supply chain and strengthens the cohesion of the supply chain but also opens up new business models and sources of profit for commercial banks. This article aims to study the use of advanced information technologies such as mobile Internet, Internet of Things (IoT) transmission, BT, and other advanced information technologies to design intelligent grain depot integrated systems based on the IoT technology, in accordance with the principles of practicality and advancement, to realize the informatization of the daily management of the grain depot and provide construction experience for the informatization construction of the food industry. This article proposes a detailed summary of several models of agricultural supply chain finance from the perspective of supply chain management and analyzes the applicable conditions and basic processes of these models. It also analyzes the structure of the agricultural supply chain through typical cases, introduces the operation of supply chain finance, and evaluates and analyzes its effectiveness and problems. The experimental results in this paper show that, compared with other storage methods, this solution has obvious advantages in data query efficiency and data storage cost. Without a central server, the entire distributed system will have a certain degree of efficiency, reliability, and cost-effectiveness. When the amount of grain data reaches 100,000, 1 million, and 10 million, the system data integrity check time is 0.0263 seconds, 0.3251 seconds, and 1.5032 seconds, respectively. The program seems very useful.


2020 ◽  
Vol 39 (6) ◽  
pp. 8997-9005
Author(s):  
Linghan Li ◽  
Yan Feng ◽  
Lei Li

As the COVID-19 epidemic continues to spread, the government has managed to prevent people from gathering. The audit work can only be carried out through the network, which puts forward higher requirements for the accuracy and effectiveness of the audit work. Under the background of the continuous development of big data and other information technologies, big data audit has gained important technical support and played an increasingly important role. Units at all levels gradually attach importance to the enterprise management mode based on the financial sharing service mode. This paper analyzes the related problems of big data audit under the financial sharing service mode, involving big data flow, big data preprocessing, big data audit process and other issues, in order to provide useful reference for the implementation of big data audit by using the financial sharing service mode under the influence of COVID-19.


2020 ◽  
Vol 3 (1) ◽  
pp. 58
Author(s):  
Xiaolin Ma ◽  
Mengmeng Zhu ◽  
Hangqi Zhang

With the continuous development and improvement of social science and technology, the “learning-oriented” teaching method is proposed, the traditional experimental teaching methods in colleges and universities are insufficient to meet the needs of experimental teaching. By studying the role and advantages of digital animation technology in experimental teaching, analyzing the application principle of digital animation in laboratory teaching, it is proposed to strengthen the application of digital animation technology in experimental teaching, give full play to the advantages of digital animation technology, and improve the quality of  experimental teaching to promote students’ learning efficiency in experimental teaching.


2020 ◽  
Vol 4 (10) ◽  
Author(s):  
Yu Song ◽  
Hongbo Chu ◽  
Zhongwei Zhao ◽  
Mingxing Wang

The advancement of science and technology and the advent of a new era have made my country's medical education field show more vigorous vitality in the continuous development of the times. Therefore, how to improve the medical education reform in colleges and universities under the current social background has become a problem that needs to be solved by people. From different angles, the author looks for specific ways to promote reforms in an orderly manner, hoping to provide references for other medical educators.


2021 ◽  
pp. 28-35
Author(s):  
Vadim Shevtsov ◽  
◽  
Nikita Kasimovsky ◽  

IoT and IIoT are new information technologies. They are very efficient solutions for home, industry and infrastructure. A lot of complex processes can be implemented using this systems. The popularity of the industrial Internet of things is steadily growing along with the development of the Internet of things. Both of these approaches involve the exchange of data over the Internet, use of common hardware platforms and are managed by using specialized software, and this leads to an increase in the number of common vulnerabilities and possible attacks on industrial facilities. The Frost & Sullivan report shows that industrial and IT infrastructures are becoming more transparent. First of all, this is due to the development of the Industrial 4.0 standard and the refusal to isolate industrial facilities, which entails common vulnerabilities, the use of security services based on the SaaS model for industrial facilities, as well as the use of hardware devices that a potential attacker can access quite easily. But very actual problems of IoT and IIoT are information security. Many of this systems are critical and little error can stop the entire system. This is not hard for hackers because that complex system has sensitive components usually. For example simple router can have a lot of vulnerabilities. There an attacker takes a root easily in every system. To solve the problem successfully it is recommended to use complex security actions. These are secure configurations of network devices, using safe devices and protocols, regular audit, using backups, using actual politics of information security.


2017 ◽  
Vol 20 (3) ◽  
Author(s):  
Francisco Javier Díaz ◽  
Alejandra Schiavoni ◽  
Alejandra Osorio ◽  
Ana Paola Amadeo ◽  
Ivana Harari ◽  
...  

In the LINTI, New Information Technologies Research Laboratory at the Computer Science School, in the National University of La Plata, it is being developed a project that involves the integration of the repository, implemented using DSpace, with different tools and platforms used in academic tasks. Accessibility is a process that cuts across all software development stages, so when using a free software product it is important to evaluate it in order to correct faults if it´s necessary. This article describes a DSpace repository accessibility validation, using screen readers for manual test, automatic validation with software tools and experimental test with users with and without disabilities. The evaluation involves the proper basic functions and the implemented extensions. The original DSpace software was extended through the integration with different tools and platforms, such as Moodle LMS, the library management system called Meran, file management services like DropBox and GoogleDrive and the social network Facebook.  The tools used during accessibility evaluation were Examinator, Google ChromeVox and one entirely implemented in the LINTI, called SiMor. The experimental tests were made with blind and deaf persons, most of them college students. All the validation results are detailed using tables and graphs, where it can observe the measured values. It is also described the changes that was necessary to carry out in the repository to improve the user experience and ensure Web service accessibility.


2014 ◽  
Vol 687-691 ◽  
pp. 1888-1891
Author(s):  
Yu Dong ◽  
Jun Hua Guo

As a new generation network model, Internet of Things (IOT) is the integration and expansion of traditional network and technology. Traditional network security and technical security problems still exist in the system of IOT, but it also add more private information and involve a number of confidential information. Security management, security and other information security issues has been put forward higher requirements. This paper gives simple description for the concept of things, the architecture and core technology and summarily describes the response to network security networking security technology.


Author(s):  
Larisa E. Kresova

The activities of the American Memory Library, aimed at on activization of children’ reading interests in Germany are considered. The history, the collection composition, the material and technical basis and the organization of library space, as well as the usage of new information technologies in children's libraries of Germany are illuminated.


Sign in / Sign up

Export Citation Format

Share Document