Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   3  
      Service Oriented ArchitectureWeb ServiceRemote Access
RAFT (Remote Accessible Field Trips) provides the possibility for students to participate in field trips from remote locations. This paper reports on two studies to test the RAFT concept. The first study used video-mediated communication... more
    • by 
    •   9  
      Information SystemsPsychologyCognitive ScienceComputer Supported Collaborative Learning
    • by  and +1
    •   12  
      Distance LearningResource useLearning EnvironmentGroup work
    • by 
    •   15  
      Mobile TechnologyUser InterfaceHome automationMobile Communication
Heritage tourism is fast becoming a powerful economic force on an international scale, and previously inaccessible archaeological sites are now being opened up across the globe. Yet the destructive impact of visitation can actually... more
    • by 
    •   6  
      Heritage ConservationCultural Heritage Recording, Documentation and Information SystemsHeritage Management3D Laser Scanning (Archaeology)
In this project we propose an adaptive application through which one can easily access data if the primary device is misplaced or kept at home by using this application rather online or offline. When accessing data through SMS, only... more
    • by 
    •   2  
      Mobile application developmentRemote Access
    • by 
    •   7  
      Image ProcessingImage AnalysisGraphic User Interface DesignFeature Extraction
    • by 
    •   9  
      Civil EngineeringAugmented RealityVideo StreamingHuman Machine Interface
This survey paper reviews all the major factors in validating three-level passwords such as one-factor authentication using passwords and two-factor authentication is not enough to provide better security to the modern digital age with... more
    • by 
    •   3  
      Network SecurityRemote AccessTwo-factor Authentication
The proposed testbed of the cyber-power system consists of power system simulation, substation automation, and the SCADA system. Scenarios for substation cyber security intrusions and anomaly detection concepts have been proposed. An... more
    • by  and +4
    •   15  
      Network SecurityPower SystemComputer SecurityAnomaly Detection
    • by 
    •   15  
      Biomedical EngineeringAccess ControlIndustrial AutomationCommunication System
    • by 
    •   11  
      EngineeringCollaborationVirtual RealityVirtual Environment
    • by 
    •   12  
      Distributed ComputingElectromagnetic CompatibilityIntelligent Transport SystemSatellite Communication
Many geological features of the Earth's lithosphere create variations in the Earth's magnetic field that can be detected by satellites. The resulting magnetic anomaly maps can provide new insights into the tectonic features and broad... more
    • by 
    •   10  
      Rock magnetismSpace SciencePlanetary explorationMagnetic field
The Internet provides a new environment for developing a variety of applications for educational and research purposes. This paper presents the implementation of a web-based laboratory experiment on a coupled tank apparatus. The web-based... more
    • by 
    •   9  
      Process ControlData acquisitionLaboratory experimentReal Time
This paper presents the architecture of the remote access laboratory for experimentation with the Mitsubishi RV-2AJ manipulator robot. This lab has been developed using Java technology, and a client/server approach based on Servlets has... more
    • by 
    •   8  
      Software ArchitectureInternet UseTeleroboticsVisual Feedback
    • by  and +4
    •   5  
      Information TechnologyEarthquake EngineeringCollaborative ResearchLarge Scale
Perkembangan teknologi digital khususnya perkembangan pada teknologi ICT (Information and Communication Technology) atau TIK (Teknologi Informasi dan Komunikasi) membawa dampak yang sangat besar bagi semua aspek kehidupan, tidak hanya... more
    • by 
    •   2  
      Cloud ComputingRemote Access
    • by 
    •   13  
      Decision Support SystemsTechnology developmentDecision support systemDSS
Perkembangan teknologi informasi dan komunikasi selain dimanfaatkan oleh perusahaan yang bergerak dibidang tersebut, juga dimanfaatkan oleh hampir semua sektor industri, apalagi dengan memasuki era industri 4.0, dimana penggunaan... more
    • by 
    •   2  
      OEMRemote Access
    • by 
    •   3  
      Distance LearningHigh performanceRemote Access
    • by 
    •   10  
      Higher EducationVirtual LaboratoryJob MarketInternet Access
    • by  and +1
    •   17  
      Remote SensingPrecision AgricultureInternet Routing ProtocolInformation and Communication technology
    • by 
    •   11  
      CollaborationWindowsLinuxiPad
    • by 
    •   4  
      Focus GroupLaboratory experimentRemote Accessremote laboratory
    • by 
    •   3  
      Virtual WorldsRemote AccessMultiple Views
    • by 
    •   11  
      Harmonic AnalysisEngineering EducationEnergy EngineeringData acquisition
In this paper, we explain Remote Desktop is actually popular technologies in most over entire world. We currently have numerous handheld control software which can provide the alleviate to manipulate together with examine some kind of... more
    • by 
    • Remote Access
The smartphone usage among people is increasing rapidly. With the phenomenal growth of smartphone use, smartphone theft is also increasing. This paper proposes a model to secure smartphones from theft as well as provides options to access... more
    • by 
    •   13  
      Computer ScienceInformation SecurityComputer SecurityNetwork and Mobile IPv6 Security
    • by 
    •   14  
      Engineering EducationSignal ProcessingTelecommunicationsAudio Signal Processing
    • by  and +1
    •   7  
      Image fusionWavelet TransformMedical DeviceMedical Image
    • by 
    •   8  
      Grid ComputingPower GridHigh performanceGeographic distribution
    • by  and +1
    •   5  
      Decision MakingDigital PreservationDigital LibraryWeb Service
    • by 
    •   2  
      Statistical disclosure controlRemote Access
    • by  and +1
    •   13  
      Information SystemsDistributed ComputingGrid ComputingScience Communication
    • by 
    •   2  
      Statistical disclosure controlRemote Access
    • by 
    •   7  
      Distributed ComputingInformation SecurityDigital InvestigationOpen Source
The smartphone usage among people is increasing rapidly. With the phenomenal growth of smartphone use, smartphone theft is also increasing. This paper proposes a model to secure smartphones from theft as well as provides options to access... more
    • by 
    •   12  
      Computer ScienceInformation SecurityComputer SecurityMobile Security
    • by 
    •   13  
      Mechanical EngineeringSoftware MaintenanceControl systemMessage Oriented Middleware
    • by  and +1
    •   9  
      Learning EnvironmentGroup workLearning StrategiesWeb Service
    • by 
    •   8  
      Network SecurityKey ManagementComparative AnalysisCommunication Channels
    • by 
    •   8  
      Fuzzy LogicFuzzy ControlAir ConditioningEnergy Saving
    • by 
    •   7  
      Speaker RecognitionAccess ControlSpeech RecognitionSpeaker Identification
    • by 
    •   2  
      JARINGANRemote Access
    • by 
    •   11  
      PhysicsImage ProcessingCosmologyHigh School
    • by 
    •   2  
      Statistical disclosure controlRemote Access
    • by 
    •   5  
      Wireless NetworkWireless InternetDesign and ImplementationRemote Access
    • by 
    •   9  
      Distributed ComputingSoftware ArchitectureLinear AlgebraDiscrete Mathematics
    • by 
    •   8  
      EngineeringEducationVirtual LaboratoryLaboratory experiment
    • by 
    •   17  
      Remote SensingPrecision AgricultureInternet Routing ProtocolInformation and Communication technology