use of internet
Recently Published Documents


TOTAL DOCUMENTS

1327
(FIVE YEARS 551)

H-INDEX

27
(FIVE YEARS 7)

Agronomy ◽  
2022 ◽  
Vol 12 (1) ◽  
pp. 212
Author(s):  
Maira Sami ◽  
Saad Qasim Khan ◽  
Muhammad Khurram ◽  
Muhammad Umar Farooq ◽  
Rukhshanda Anjum ◽  
...  

The use of Internet of things (IoT)-based physical sensors to perceive the environment is a prevalent and global approach. However, one major problem is the reliability of physical sensors’ nodes, which creates difficulty in a real-time system to identify whether the physical sensor is transmitting correct values or malfunctioning due to external disturbances affecting the system, such as noise. In this paper, the use of Long Short-Term Memory (LSTM)-based neural networks is proposed as an alternate approach to address this problem. The proposed solution is tested for a smart irrigation system, where a physical sensor is replaced by a neural sensor. The Smart Irrigation System (SIS) contains several physical sensors, which transmit temperature, humidity, and soil moisture data to calculate the transpiration in a particular field. The real-world values are taken from an agriculture field, located in a field of lemons near the Ghadap Sindh province of Pakistan. The LM35 sensor is used for temperature, DHT-22 for humidity, and we designed a customized sensor in our lab for the acquisition of moisture values. The results of the experiment show that the proposed deep learning-based neural sensor predicts the real-time values with high accuracy, especially the temperature values. The humidity and moisture values are also in an acceptable range. Our results highlight the possibility of using a neural network, referred to as a neural sensor here, to complement the functioning of a physical sensor deployed in an agriculture field in order to make smart irrigation systems more reliable.


2022 ◽  
Vol 9 (1) ◽  
pp. 1-8
Author(s):  
Adegboyega Oyebode ◽  
Adebisi Ilesanmi Adeyemo ◽  
Sunday Oladipo Oladeji

This study aimed to assess the perception of tourists on the usage of information and communication technology at Old Oyo National Park, Ikogosi Warm Spring Resort and Lacampagne Tropicana by using structured questionnaire directed at 384 tourists randomly; 20 tourists at Old Oyo National Park, 150 tourists at Ikogosi Warm Spring Resort and 214 tourists at Lacampagne Tropicana. Data was analyzed and presented descriptively using tables and inferentially using one way analysis of variance (ANOVA). Results indicated that the tourists mostly made use of internet and social media at the sites. The tourists also perceived that the use of Information Communication Technology would be an innovative approach to solving some of the problems of sustainable tourism development and that use of Information Communication Technology has made work easier and faster. Furthermore, the study indicated significant differences in some socio-demographic characteristics as well as perception on the usage of ICT at the sites (P<0.05). Management of ecotourism sites should therefore create more awareness on the usage of other forms of information communication technology at their sites so as to further enhance tourists’ satisfaction.


Author(s):  
Nurbaiti Nurbaiti ◽  
Nadhrah Al Aflah ◽  
Supardi Supardi

Almost all corners of the world have been affected or affected by this Covid-19 virus disease, even some countries have set a lockdown status and other anticipations for the spread of the Covid-19 virus. The alternative used in this bold learning activity system is to utilize the internet network, namely the Zoom Meeting and Classroom application. This study aims to determine students' perceptions of the use of internet networks such as zoom meetings and classrooms used and how effective learning is during the Covid-19 pandemic. The research conducted here uses descriptive qualitative research methods. And the results of this study indicate that the zoom application is an application that is very effective and preferred by students because it is easier to use and very efficient when the learning process is bold and shows that some students who give their perception of the application used during learning that are brave are the Zoom Meeting application, namely the application. Zoom Meeting. by 66.7%, followed by the Google Meet application at 22.2% and the Classrom application at 11.1%.  


2022 ◽  
pp. 33-46
Author(s):  
Yashonidhi Srivastava ◽  
Sahil Virk ◽  
Souvik Ganguli ◽  
Suman Lata Tripathi
Keyword(s):  

2022 ◽  
pp. 163-188
Author(s):  
Suruchi Pandey ◽  
Swati Tiwari

This chapter is designed to interpret and understand the difference between parents and their children with reference to their usage of internet and its influence in their daily lives. Teenagers between the age of 13 and 16 are the most vulnerable and most prone to cyber bullying and other crimes. Children's effective use of internet relies heavily on the factors surrounding them that not only includes their parents but also their peer and school and neighbourhood. Parents believe that depriving their children of internet access or tools can stop them from accessing the web or restrict their skills and learning about social media. They do not believe that internet use affects family relations negatively. The chapter presents a study undertaken of parents and their children. This presents differences in perception and understanding of internet usage.


2022 ◽  
pp. 132-144
Author(s):  
Sneha Padhiar ◽  
Kuldip Hiralal Mori

With the rise in use of internet in various fields like education, military, government sector, banking, the security and privacy of the info has been the foremost concern. As in today's era, most of the handling of data and transactions are done online. When the data is transferred from the one end of sender to the other end of receiver online, it's eavesdropped by an intruder and thus could be a threat to the secrecy or confidentiality of the info. The hottest technique that protects the confidentiality of the data is cryptography which converts the plain text into scrambled form which is unreadable. Then the receiver applies a reverse mechanism to decrypt the unreadable data to readable form. This mechanism is known as encryption-decryption process or cryptography. Cryptography can be both symmetric and asymmetric. Here the authors discuss symmetric and asymmetric algorithms.


Author(s):  
Sampada N. Lolge

Abstract: The air quality in metropolises is demeaning as a result of a complex commerce between natural and artificial environmental conditions. With the increase in urbanization and industrialization and lack of control on emigrations and use of catalytic transformers, a great quantum of particulate and poisonous feasts is produced. The ideal of this design is to cover air pollution on roads and track vehicles which beget pollution over a specified limit. Increased use of motorcars is a serious problem that has been around for a veritably long time. This paper gives check of different systems used to cover vehicular pollution and proposes use of Internet of Effects (IoT) to address this problem. Then, combination of Poisonous Gas Detectors and Radio Frequency Identification (RFID) trailing system is used to cover vehicular pollution records anytime anywhere. Keywords: loT, WS, Arduino, RFlD, Gas Sensor


Author(s):  
Павлина Лозанова ◽  

The progressive development of societies and economies is marked increasingly by the growing role of digital knowledge and information technologies. With the creation of a global information space, the digitization of society and the wider use of internet technologies through traditional and electronic media, the development of e-Government is becoming increasingly popular and functional. Nowadays, the organization of public administration on the basis of electronic means of processing, transmitting and disseminating information, providing services to public authorities, businesses and citizens electronically, the information interaction of public authorities and society using information telecommunications technologies, and ensuring free access for citizens to the relevant state information, are the main components of a comprehensive transformation of governance into the e-government format.


Sign in / Sign up

Export Citation Format

Share Document