communication technologies
Recently Published Documents





Sanskruti Dharme

Abstract: In terms of house security, the door is pivotal. To keep the hearthstone secure, the proprietor will keep the door locked at all times. Still, owing to a rush when leaving the house, the proprietor may forget to lock the door, or they may be doubtful if they’ve closed the door or not. Wireless security grounded operation have fleetly increased due to the dramatic enhancement of ultramodern technologies. Numerous access control systems were designed and/or enforced grounded on different types of wireless communication technologies by different people. Radio Frequency identification (RFID) is a contactless technology that’s extensively used in several diligences for tasks like access control system, book shadowing in libraries, tollgate system, forced chain operation, and so on. For enforcing this design, we will be using Arduino mega 2560 pro mini, a fingerprint sensor, Keypad module. ESP-32 CAM module, RFID sensor, solenoid lock and ESP8266. We have also created an application for monitoring and controlling the security features of the door lock. We can also open the door through mobile fingerprint. Keywords: Arduino mega 2560 pro mini, ESP32-CAM, ESP8266, Fingerprint sensor, Keypad module, RFID sensor.

2022 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Reyes Gonzalez ◽  
Jose Gasco ◽  
Juan Llopis

Purpose Information and communication technologies (ICTs) are a key player in the food services and restaurants sector; thus, the aim of this work consists in studying the previous research on ICTs in food services and restaurants in the context of tourism and hospitality through a systematic literature review. Design/methodology/approach The systematic literature review is performed on full papers published in journals included in the Journal Citation Report of the WoS in the category of Hospitality, Leisure, Sport and Tourism. A total of 165 articles from 28 journals are analyzed, following different criteria, such as the research methods, perspectives, statistical techniques, geographical focus, topics, technologies, authors and universities. Findings The restaurant sector is more and more based on the creation of experiences and ICTs, through their multiple possibilities, can undoubtedly contribute to adding value to the simple meal and create and recreate experiences to attract and retain customers who are increasingly sophisticated and hooked on ICTs. ICTs are basic for managers taking decision at the highest level in food services and restaurants, so ICTs should not be seen as a technical tool but as an essential element for top management. Research limitations/implications This paper examined articles from very well-known tourism and hospitality journals, leaving aside others as well as different publication formats such as books or papers presented at conferences. Originality/value A significant contribution made with this paper is the availability of a list of topics in the context of ICTs in food services and restaurants. These topics are classified into three areas (Consumers, Suppliers and Environment and Tendencies) that can serve as a future research framework. The paper also provides useful information to restaurant managers about ICTs, to researchers for their future projects and to academics for their courses.

2022 ◽  
Vol 14 (2) ◽  
pp. 113
Selorm Omega ◽  
Esther E. E. Adebote ◽  
Peter K. Omega ◽  
Selorm Akaba ◽  
Omitoyin A. Siyanola

Coronavirus has disrupted aquaculture activities at all levels. The pandemic has had effect on farmer’s input, output, market, revenue, and contact with Extension officers. To reduce the growing effect of the pandemic, the use of Information Communication Technologies has become necessary as farmers can get easy access to extension agents and monitor farm activities while reducing exposure to the virus. Hence, this research was conducted to determine fish farmer’s willingness to pay for improved Information Communication Technologies in bridging the gap caused by the Coronavirus outbreak. The study used cross-sectional survey with data collected from Ibadan, Nigeria. Simple random sampling technique was used to select a sample size of 40 farmers. Primary data was analysed using StataSE13.0 and the results revealed that; 80% of farmers were affected by Coronavirus and acknowledged that Information Communication Technologies play a role in their activities (55%). The probit regression revealed that the scale of operation, age of farmer, household size, status in the household, and usage of Information Communication Technologiess were found to be statistically significant determinants of farmer’s willingness to pay. These points to the fact that improved Information Communication Technologies are relevant to sustain aquaculture output in the face of Coronavirus. The study recommends that the government, the ministry for aquaculture, and stakeholders in aquaculture should support small-scale in the form of training, credit and provision of support systems to help them acquire and use improved ICTs.

Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 655
Andrzej Stateczny ◽  
Krzysztof Gierlowski ◽  
Michal Hoeft

As the number of research activities and practical deployments of unmanned vehicles has shown a rapid growth, topics related to their communication with operator and external infrastructure became of high importance. As a result a trend of employing IP communication for this purpose is emerging and can be expected to bring significant advantages. However, its employment can be expected to be most effective using broadband communication technologies such as Wireless Local Area Networks (WLANs). To verify the effectiveness of such an approach in a specific case of surface unmanned vehicles, the paper includes an overview of IP-based MAVLink communication advantages and requirements, followed by a laboratory and field-experiment study of selected WLAN technologies, compared to popular narrowband communication solutions. The conclusions confirm the general applicability of IP/WLAN communication for surface unmanned vehicles, providing an overview of their advantages and pointing out deployment requirements.

2022 ◽  
pp. 001573252110579
Phan Thanh Hoan ◽  
Duong Thi Dieu My

Vietnam is one of the top information and communication technologies (ICT) exporters globally, and the ICT products constitute nearly one-fifth of Vietnam’s total exports to the European Union (EU). This study empirically investigates the determinants of Vietnam’s ICT exports to the EU by applying the gravity model for trade with panel data from 2000 to 2019. Besides the traditional variables of the gravity model, we added gross capital formation, patent application and exchange rates as explanatory variables. The results show that among factors affecting Vietnam’s ICT export to the EU, market size, patent applications, and exchange rate are the most significant determinants. The article also suggests some policy implications for the development of ICT exports between the two parties. JEL Codes: F14, C2

Network ◽  
2022 ◽  
Vol 2 (1) ◽  
pp. 36-52
Miguel Rosendo ◽  
Jorge Granjal

The constant evolution in communication infrastructures will enable new Internet of Things (IoT) applications, particularly in areas that, up to today, have been mostly enabled by closed or proprietary technologies. Such applications will be enabled by a myriad of wireless communication technologies designed for all types of IoT devices, among which are the Long-Range Wide-Area Network (LoRaWAN) or other Low-power and Wide-Area Networks (LPWAN) communication technologies. This applies to many critical environments, such as industrial control and healthcare, where wireless communications are yet to be broadly adopted. Two fundamental requirements to effectively support upcoming critical IoT applications are those of energy management and security. We may note that those are, in fact, contradictory goals. On the one hand, many IoT devices depend on the usage of batteries while, on the other hand, adequate security mechanisms need to be in place to protect devices and communications from threats against their stability and security. With thismotivation in mind, we propose a solution to address the management, in tandem, of security and energy in LoRaWAN IoT communication environments. We propose and evaluate an architecture in the context of which adaptation logic is used to manage security and energy dynamically, with the goal of guaranteeing appropriate security, while promoting the lifetime of constrained sensing devices. The proposed solution was implemented and experimentally evaluated and was observed to successfully manage security and energy. Security and energy are managed in line with the requirements of the application at hand, the characteristics of the constrained sensing devices employed and the detection, as well as the threat, of particular types of attacks.

Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 567
Muhammad Husnain ◽  
Khizar Hayat ◽  
Enrico Cambiaso ◽  
Ubaid U. Fayyaz ◽  
Maurizio Mongelli ◽  

The advancement in the domain of IoT accelerated the development of new communication technologies such as the Message Queuing Telemetry Transport (MQTT) protocol. Although MQTT servers/brokers are considered the main component of all MQTT-based IoT applications, their openness makes them vulnerable to potential cyber-attacks such as DoS, DDoS, or buffer overflow. As a result of this, an efficient intrusion detection system for MQTT-based applications is still a missing piece of the IoT security context. Unfortunately, existing IDSs do not provide IoT communication protocol support such as MQTT or CoAP to validate crafted or malformed packets for protecting the protocol implementation vulnerabilities of IoT devices. In this paper, we have designed and developed an MQTT parsing engine that can be integrated with network-based IDS as an initial layer for extensive checking against IoT protocol vulnerabilities and improper usage through a rigorous validation of packet fields during the packet-parsing stage. In addition, we evaluate the performance of the proposed solution across different reported vulnerabilities. The experimental results demonstrate the effectiveness of the proposed solution for detecting and preventing the exploitation of vulnerabilities on IoT protocols.

Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 538
Alok Mishra ◽  
Yehia Ibrahim Alzoubi ◽  
Asif Qumer Gill ◽  
Memoona Javeria Anwar

Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also by national security. To safeguard an organization’s cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One part of the cyberdefense mechanism is building an enterprises’ security policies library, for consistent implementation of security controls. Significant and common cybersecurity policies of various enterprises are compared and explored in this study to provide robust and comprehensive cybersecurity knowledge that can be used in various enterprises. Several significant common security policies were identified and discussed in this comprehensive study. This study identified 10 common cybersecurity policy aspects in five enterprises: healthcare, finance, education, aviation, and e-commerce. We aimed to build a strong infrastructure in each business, and investigate the security laws and policies that apply to all businesses in each sector. Furthermore, the findings of this study reveal that the importance of cybersecurity requirements differ across multiple organizations. The choice and applicability of cybersecurity policies are determined by the type of information under control and the security requirements of organizations in relation to these policies.

Александр Викторович Поначугин

Целью статьи является обоснование эффективности проведения поэтапного мониторинга успеваемости обучающихся с применением информационно-коммуникационных технологий. Актуальность темы обусловлена тем, что важным вопросом современного образования является разработка, апробация и дальнейшее внедрение системы мониторинга качества образовательного процесса в ВУЗах. Основным методом является мониторинг, который может улучшить состояние учебного процесса путем выявления проблем и целенаправленной индивидуальной работы. В статье рассматривается алгоритм реализации поэтапного мониторинга с применением информационно-коммуникационных технологий на занятиях. По результатам проведенных исследований сделаны выводы о необходимости внедрения поэтапного мониторинга на занятиях, направленного на управление аудиторией, развитие воспитательной работы и беспристрастную оценку успеваемости обучающихся. The purpose of the article is to substantiate the effectiveness of the stage-by-stage monitoring of students' progress using information and communication technologies. The relevance of the topic is due to the fact that an important issue of modern education is the development of a system for monitoring the quality of the educational process in universities. The main method is monitoring, which can improve the state of the educational process through problems and purposeful work. The article uses the implementation of step-by-step monitoring with the use of information and communication technologies in the classroom, conducted with information technology. Based on the results of the research, conclusions were drawn about the stage-by-stage monitoring in the classroom, aimed at managing the audience, developing educational work and an impartial assessment of students' progress.

Sign in / Sign up

Export Citation Format

Share Document