RAFT (Remote Accessible Field Trips) provides the possibility for students to participate in field trips from remote locations. This paper reports on two studies to test the RAFT concept. The first study used video-mediated communication... more
RAFT (Remote Accessible Field Trips) provides the possibility for students to participate in field trips from remote locations. This paper reports on two studies to test the RAFT concept. The first study used video-mediated communication (VMC) to allow students to communicate with experts. The second study tested students’ experiences of using off-the-shelf technologies to transfer data while assigned with specific
Heritage tourism is fast becoming a powerful economic force on an international scale, and previously inaccessible archaeological sites are now being opened up across the globe. Yet the destructive impact of visitation can actually... more
Heritage tourism is fast becoming a powerful economic force on an international scale, and previously inaccessible archaeological sites are now being opened up across the globe. Yet the destructive impact of visitation can actually endanger the physical integrity of the sites and monuments the public seek to admire.
To alleviate the potential damage sustained to sites by exaggerated footfall, a number of different approaches may be adopted, including the restriction of public access to varying degrees. In instances where physical entrée is denied, alternative means of engagement may be offered in the form of remote access. But is it possible to gain an embodied understanding of an archaeological site through these means alone?
The following study examines four alternative techniques for the recording and remote presentation of the interior of a fragile ancient structure; House 7 within the Neolithic settlement of Skara Brae, Orkney.
The spatial configuration of this building was remotely presented to eighty members of the public through two- and three-dimensional interfaces; i) traditional scaled elevation drawing plus ii) expressive photography and sketching, were displayed through paper-based media, whilst digital models produced from iii) a laser scanner-generated point cloud and iv) photographic image-based modelling were interacted with via computer. Having examined each rendering, the public were asked to complete a questionnaire assessing the perceived merits and limitations of each technique, and to consider what level and detail of visual access facilitated their effective engagement. Survey questions were targeted to ascertain whether it was possible to achieve an embodied, three-dimensional understanding of the space via means of these representations alone.
The responses have informed a recommendation for the remote presentation of archaeological sites on a wider scale in the hope to facilitate intellectual access without further endangering our finite archaeological resource.
In this project we propose an adaptive application through which one can easily access data if the primary device is misplaced or kept at home by using this application rather online or offline. When accessing data through SMS, only... more
In this project we propose an adaptive application through which one can easily access data if the primary device is misplaced or kept at home by using this application rather online or offline. When accessing data through SMS, only passcode is needed and when accessing data through internet, double verification is needed for the purpose of gaining high security in data transferring. Thus, this application provides more flexibility and ease data transferring over any type of network.
This survey paper reviews all the major factors in validating three-level passwords such as one-factor authentication using passwords and two-factor authentication is not enough to provide better security to the modern digital age with... more
This survey paper reviews all the major factors in validating three-level passwords such as one-factor authentication using passwords and two-factor authentication is not enough to provide better security to the modern digital age with remarkable advances in the field of information technology. Even when single-factor or two-factor authentication was used to secure remote access and the system, hacking tools, were simple computer programs for collecting private keys, as well as private generators have made it difficult to provide security. Security threats based on malware, such as important installed trackers, are always available to improve security risks. This is necessary the use of a safe and easy-to-use object. As a result, Three Level Security is an easy-to-use software. It also proves the use of different techniques used by different authors.
The proposed testbed of the cyber-power system consists of power system simulation, substation automation, and the SCADA system. Scenarios for substation cyber security intrusions and anomaly detection concepts have been proposed. An... more
The proposed testbed of the cyber-power system consists of power system simulation, substation automation, and the SCADA system. Scenarios for substation cyber security intrusions and anomaly detection concepts have been proposed. An attack tree method can be used to identify vulnerable substations and intrusions through remote access points. Specific substation vulnerability scenarios have been tested. Temporal anomaly is determined by data and information acquired at different time points. This is a metric to determine the anomaly between two snapshots. In a distributed intrusion detection algorithm, distributed agents are trained with a large number of scenarios and intended for real-time applications. In a distributed environment, if an anomaly is detected by one agent, it is able to distribute critical information to other agents in the network.
Many geological features of the Earth's lithosphere create variations in the Earth's magnetic field that can be detected by satellites. The resulting magnetic anomaly maps can provide new insights into the tectonic features and broad... more
Many geological features of the Earth's lithosphere create variations in the Earth's magnetic field that can be detected by satellites. The resulting magnetic anomaly maps can provide new insights into the tectonic features and broad structures of the lithosphere. This book documents the acquisition, reduction and analysis of satellite magnetic field data in the study of the Earth's lithosphere. The text considers issues of interpreting data, summarizes various interpretation methods, considers rock magnetism concepts and sources of variation in magnetism, and provides a complete summary of published maps and the methods used to create them. Mapping and interpreting lithospheric fields from satellite magnetic data has resulted in the new subdiscipline of geomagnetism. Advanced students and researchers will find that The Magnetic Field of the Earth's Lithosphere provides a much needed review of this important topic.
The Internet provides a new environment for developing a variety of applications for educational and research purposes. This paper presents the implementation of a web-based laboratory experiment on a coupled tank apparatus. The web-based... more
The Internet provides a new environment for developing a variety of applications for educational and research purposes. This paper presents the implementation of a web-based laboratory experiment on a coupled tank apparatus. The web-based laboratory has been developed to serve students and staff at the University of Kragujevac. The laboratory is an educational tool for teaching students the basic principles and methodology in performing a series of experiments on a coupled tank apparatus at any time and from any ...
This paper presents the architecture of the remote access laboratory for experimentation with the Mitsubishi RV-2AJ manipulator robot. This lab has been developed using Java technology, and a client/server approach based on Servlets has... more
This paper presents the architecture of the remote access laboratory for experimentation with the Mitsubishi RV-2AJ manipulator robot. This lab has been developed using Java technology, and a client/server approach based on Servlets has been specifically implemented. The lab allows users to control and monitor the robot via Internet using a client application. Through this lab, the user can manipulate the robot to obtain its current status and visual feedback of real-time image. This laboratory also supports education process in the field of robotics; it provides students and researchers with an instant access to real experimental interface.
Perkembangan teknologi digital khususnya perkembangan pada teknologi ICT (Information and Communication Technology) atau TIK (Teknologi Informasi dan Komunikasi) membawa dampak yang sangat besar bagi semua aspek kehidupan, tidak hanya... more
Perkembangan teknologi digital khususnya perkembangan pada teknologi ICT (Information and Communication Technology) atau TIK (Teknologi Informasi dan Komunikasi) membawa dampak yang sangat besar bagi semua aspek kehidupan, tidak hanya perkembangan dimasyarakat secara umum baik itu perkembangan peralatan elektronik seperti handphone dan komputer yang sangat pesat dengan menawarkan segudang fitur canggih didalamnya. Dunia industri pun mengalami perubahan yang sangat pesat pula, selain dengan berkembangnya peralatan otomatisasinya sendiri dan sistem monitoring serta akuisisi data, belakangan berkembang sistem remote access yang berfungsi sebagai jembatan untuk mengakses fasilitas pabrik darimanapun dan kapan pun, dengan pengamanan yang terpercaya, karena menggunakan cloud computing dengan layanan Connectivity as a service. Keyword : remote access, cloud computing
Perkembangan teknologi informasi dan komunikasi selain dimanfaatkan oleh perusahaan yang bergerak dibidang tersebut, juga dimanfaatkan oleh hampir semua sektor industri, apalagi dengan memasuki era industri 4.0, dimana penggunaan... more
Perkembangan teknologi informasi dan komunikasi selain dimanfaatkan oleh perusahaan yang bergerak dibidang tersebut, juga dimanfaatkan oleh hampir semua sektor industri, apalagi dengan memasuki era industri 4.0, dimana penggunaan komunikasi berbasis wireless dan pengolahan data dengan skala besar merupakan pokok acuannya. Dewasa ini umumnya para pembuat mesin atau OEM ( Original Equipment Manufacturer ) maupun sistem integrator telah mengaplikasikan fitur remote acces pada setiap produknya, oleh sebab itu maka pengetahuan untuk sistem ini sangat diperlukan, untuk menunjang daya adaptasi kita terhadap perkembangan teknologi. ewon cosy router membuat sebuah koneksi VPN dari mesin ke manapun melalui ewon cloud-base remote connectivity solution. Ada 3 cara yang ditawarkan oleh ewon untuk terkoneksi ke mesin: Client software (eCatcher) Aplikasi mobile (eCatcher mobile) Web Portal (M2Web) remote access juga sangat bermanfaat untuk industri yang sudah mempunyai beberapa plant, sehingga proses monitoring, troubleshooting dan maintenance bisa di lakukan dari satu titik
In this paper, we explain Remote Desktop is actually popular technologies in most over entire world. We currently have numerous handheld control software which can provide the alleviate to manipulate together with examine some kind of... more
In this paper, we explain Remote Desktop is actually popular technologies in most over entire world. We currently have numerous handheld control software which can provide the alleviate to manipulate together with examine some kind of gadgets easily together with effortlessly. In this particular paper proposes the most up-to-date buildings intended for handheld control concerning android operating system cell phones had been created together with completed. By using this application it's possible to Shut down, Reboot and also Firewood away from out of the way consumers applying Android sensible telephones. The particular proposed structure furthermore trades the actual data between consumers PC in order to Android Smartphone's. The principle aim with this paper is actually Screenshot catching and also reside surging in the focused PC.
The smartphone usage among people is increasing rapidly. With the phenomenal growth of smartphone use, smartphone theft is also increasing. This paper proposes a model to secure smartphones from theft as well as provides options to access... more
The smartphone usage among people is increasing rapidly. With the phenomenal growth of smartphone use, smartphone theft is also increasing. This paper proposes a model to secure smartphones from theft as well as provides options to access a smartphone through other smartphone or a normal mobile via Short Message Service. This model provides option to track and secure the mobile by locking it. It also provides facilities to receive the incoming call and sms information to the remotely connected device and enables the remote user to control the mobile through SMS. The proposed model is validated by the prototype implementation in Android platform. Various tests are conducted in the implementation and the results are discussed.
The smartphone usage among people is increasing rapidly. With the phenomenal growth of smartphone use, smartphone theft is also increasing. This paper proposes a model to secure smartphones from theft as well as provides options to access... more
The smartphone usage among people is increasing rapidly. With the phenomenal growth of smartphone use, smartphone theft is also increasing. This paper proposes a model to secure smartphones from theft as well as provides options to access a smartphone through other smartphone or a normal mobile via Short Message Service. This model provides option to track and secure the mobile by locking it. It also provides facilities to receive the incoming call and sms information to the remotely connected device and enables the remote user to control the mobile through SMS. The proposed model is validated by the prototype implementation in Android platform. Various tests are conducted in the implementation and the results are discussed