APPLICATION OF NEW TECHNOLOGIES AND THE POSSIBILITY OF ONLINE DATA TRANSFER IN GEODESY AND CADASTRE

Author(s):  
Jana Zaoralova

2021 ◽  
Vol 1 (132) ◽  
pp. 136-144
Author(s):  
Volodymyr Khandetskyi ◽  
Dmutro Sivtsov ◽  
Kostjantun Panin

Analysis of new technologies IEEE 802.11ac/ax of wireless networks showed that increasing their noise immunity is an actual task. The article studies the efficiency of fragmented data frames transmission. Comparison of the efficiencies in the case of retransmission of the corrupted original frame and in the case of its fragmentation in a wide range of the physical data transfer rates is carried out.



Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 817 ◽  
Author(s):  
Dan Popescu ◽  
Florin Stoican ◽  
Grigore Stamatescu ◽  
Loretta Ichim ◽  
Cristian Dragana

The growing need for food worldwide requires the development of a high-performance, high-productivity, and sustainable agriculture, which implies the introduction of new technologies into monitoring activities related to control and decision-making. In this regard, this paper presents a hierarchical structure based on the collaboration between unmanned aerial vehicles (UAVs) and federated wireless sensor networks (WSNs) for crop monitoring in precision agriculture. The integration of UAVs with intelligent, ground WSNs, and IoT proved to be a robust and efficient solution for data collection, control, analysis, and decisions in such specialized applications. Key advantages lay in online data collection and relaying to a central monitoring point, while effectively managing network load and latency through optimized UAV trajectories and in situ data processing. Two important aspects of the collaboration were considered: designing the UAV trajectories for efficient data collection and implementing effective data processing algorithms (consensus and symbolic aggregate approximation) at the network level for the transmission of the relevant data. The experiments were carried out at a Romanian research institute where different crops and methods are developed. The results demonstrate that the collaborative UAV–WSN–IoT approach increases the performances in both precision agriculture and ecological agriculture.



Author(s):  
Joel Suss ◽  
Alexis Raushel ◽  
Adam Armijo ◽  
Brian White

More and more police departments are equipping their officers with body-worn cameras. To maximize the utility of body cams, designers have considered issues such as camera-mounting position, camera-mount stability, methods of activation, and data transfer methods. The human factors/ergonomics community can make important contributions to the design of body-worn cameras and identify and address issues that could arise from the introduction of new technologies (e.g., biometric identification and automatic detection of concealed weapons). Engaging with this ever-expanding technology will benefit law enforcement agencies and the communities they serve and protect.



Author(s):  
Arshdeep Singh Sachdeva and Shreya Kapoor

Automation replaces human work in repetitive, tedious tasks, and minimizes the quantity of errors. With the correct automation tools, it's possible to automate browser tasks, web testing, and online data extraction, to fill forms, scrape data, transfer data between applications, and generate reports. In this paper we will discuss about Automated E-Commerce website. The research project focuses on automating the task of placing an order of particular set of items from an online website. The idea is to save time and effort of the user by automating every task from signing in to adding products to the cart and filling up all the forms and placing order. The project also aims at providing the user a Real Time notification through mail for any Price Drops for a particular product that the user wishes to buy in future. Therefore, it also acts as a Price Monitoring System. There are various automation tools out of which we will discuss about Puppeteer.



2020 ◽  
Vol 49 (5) ◽  
pp. 58-63
Author(s):  
A. D. Sukharev ◽  
D. B. Piskunov

In the course of research activities in the field of new technologies of information interaction of on-board equipment of objects of rocket-space and aviation equipment, as well as study of protection of information against leakage through technical channels, there was a hypothesis, about stealth of radio channel formed by means of new and promising developing technologies. The article discusses the use of radio wave interference control technologies (on adaptive formation of the sum of the signal phases) for beam formation. The features of the MU-MIMO and OFDMA technologies, which allows several simultaneous outgoing streams (downlink, uplink), providing simultaneous servicing of several devices at once, which increases the performance of the network as a whole, are considered. The implementation of the secrecy of the operation of the radio channel based on the considered technology for potential unauthorized detection of the operation of the radio channel and access to the transmitted information outside the beam pointing points is considered. Based on the description of the technology and on-site experiments, conclusions are drawn and recommendations are formulated on the methodology for detecting unauthorized data transfer implemented on the basis of the technology considered.



Author(s):  
Prabhdeep Singh Bagga, Narinder Kaur

Automation refers to decreasing repetitive human work, tedious tasks, and minimizing the errors. With the correct automation tools, it's possible to automate browser tasks, web testing, and online data extraction, to fill forms, scrape data, transfer data between applications, and generate reports. The research project focuses on automating the task of placing an order of particular set of items from an online website. The main aim of the project is planning the most efficient route to visit all your stoppages and reach your destination. It automates the process of finding the most optimum route and saves a PDF of commute details to your disk.



Author(s):  
Valentin Olenev

Introduction: New technologies are replacing the onboard space networks based on bus topologies. One of these technologies is SpaceWire. New communication protocols are being developed, expanding SpaceWire functionality. The protocol developers should provide all the required technical characteristics for data transmission and processing. Purpose: Analysis of the existing requirements for communication protocols, and development of consolidated set of requirements that will take into account the modern requests of the space industry. Results: The analysis of the existing demands on communication protocols resulted in a set of consolidated requirements for the physical-network layers’ protocols and the transport layer protocols. The requirements cover the speed, latencies, transmission distance, transmitted information amount, fault detection functionality, time synchronization between the devices, quality of service, main user data types, and data transfer modes at the transport level. The existing SpaceWire protocols are defined as a special class of protocols, possessing unique characteristics. Practical relevance: The performed analysis can simplify the implementation of new onboard communication protocols and provide a required level of technique for new generation spacecraft.



Author(s):  
Katarzyna Świerczewska-Pietras

A condition for building up companies’ potential in the period of dynamic economic development is creating solutions which influence their competitiveness. In the era of new technologies – in which time plays a crucial role in the contact with clients, sale of services or data transfer – computers, the Internet and technologically advanced computer systems supporting enterprise management are becoming an indispensable element of the functioning of the SME sector.



Author(s):  
Farida Fozdar ◽  
Mark Israel

Sociology has been at the forefront of scholarly debate about how to engage in social research ethically. This chapter considers sociology’s contribution to some of the key contemporary debates in this area. It begins with an outline of philosophical approaches to the ethics of undertaking social research, considering how these have been applied in sociological research. It also engages with the question of ethics governance models. The chapter then focuses on five established and emerging areas of ethical debate: the nature and formalization of consent; the use of new technologies and online data; the complexities of data sharing; the growing impact of insights from intercultural and indigenous research; and issues in autoethnography. It concludes with a question about the wider implications of sociological research as a social governance strategy.



2020 ◽  
Vol 17 (12) ◽  
pp. 5217-5223
Author(s):  
Supriya Khaitan ◽  
Shrddha Sagar ◽  
Rashi Agarwal

Now is the era of online data and transaction, all this happens on an unsecured channel. With this huge data transfer, comes the need of protecting this data. Thus, to achieve security during transmission, several symmetric key encryption algorithms have been proposed. Inspired from researchers, we propose an asymmetric key image security algorithm based on chaotic tent map integrated with Optimized Salp Swarm Algorithm (SSA) for key generation and encryption for gray scale images. Diffusion and confusion are carried out in each round to mix plain text and key to it more secure. Experimental analysis shown by SSA are encouraging and is secure enough to resist brute force, differential cryptoanalysis and key sensitivity analysis attack and is suitable for practical application.



Sign in / Sign up

Export Citation Format

Share Document