Search results

1 – 10 of over 1000
Article
Publication date: 10 June 2014

Stevan Stankovski, Gordana Ostojic, Nikola Djukic, Srdjan Tegeltija and Aleksandar Milojkovic

– The purpose of this paper is to describe an approach of using mobile phones with Bluetooth technology to enter/exit restricted area.

Abstract

Purpose

The purpose of this paper is to describe an approach of using mobile phones with Bluetooth technology to enter/exit restricted area.

Design/methodology/approach

Applied Bluetooth technology implemented in mobile phones enables the user to perform the identification and the state of presence while entering/exiting the parking space without stopping the vehicle. For the successful implementation of this method for presence detection and proper identification, it is necessary to determine the values of the Bluetooth signal.

Findings

This paper discuses a case study that has been done at entry/exit of parking lots. The obtained experimental results show that mobile phones with the Bluetooth technology can be successfully applied as presence detection sensors, as well as in processes for the identification of the user/object in the move.

Practical implications

The paper gives a primer how mobile phones with Bluetooth technology, in addition to their basic purpose, can be used as identification devices to enter/exit restricted area.

Originality/value

The users have possibilities to access restricted area using a common device – a mobile phone with Bluetooth technology. Successful implementation of developed access control system is based on determining the proper value of the Bluetooth signal strength field that extends around the control cabinet in which the Bluetooth devices are situated.

Details

Sensor Review, vol. 34 no. 3
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 1 May 2006

Abdul Malik S. Al‐Salman

Wireless technologies have enhanced applications mobility in no small way. They have created new and increasing number of human‐related challenges particularly in the areas of…

Abstract

Wireless technologies have enhanced applications mobility in no small way. They have created new and increasing number of human‐related challenges particularly in the areas of wireless‐based applications such as Mobile Marketing (Marketing). Bluetooth wireless technology is a completely new method through which devices within a short radius can communicate effectively. This paper explores wireless technologies world for marketing purposes, focusing on Bluetooth as an example to build a system that provides an interactive Bluetooth station for marketing purposes. The Bluetooth station includes Bluetooth profile (OBEX), server, and client applications.

Details

International Journal of Web Information Systems, vol. 2 no. 2
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 23 November 2012

Margaret Tan and Kathrine Sagala Aguilar

Various research investigations have found that students' awareness of information security issues continues to be poor and this is indeed a concern especially when students use…

2035

Abstract

Purpose

Various research investigations have found that students' awareness of information security issues continues to be poor and this is indeed a concern especially when students use information technologies pervasively to communicate, to socialize as well as to work on academic assignments. As it is important to understand students' behaviors towards information security and safety in the digital cyberspace, the purpose of this paper is to investigate their awareness and perception, in particular, of Bluetooth security threats and risks, and whether they are able to take preventive measures to protect themselves from such security vulnerabilities. Bluetooth technology is used in this study as it is a widely used form of wireless networks that facilitates computing resources to be connected anytime anywhere; however, it has security weaknesses like any other digital networks.

Design/methodology/approach

A field survey was conducted to collect the empirical data from students at a local university. The survey instrument/questionnaire was developed based on various literatures on Bluetooth applications, Bluetooth security vulnerabilities, and users' usage and perception on computer security and safety.

Findings

The results show that most students do not take precautions to mitigate against security vulnerabilities; however, there is a difference on students' perceptions based on their academic major or domain knowledge, for instance, engineering students have demonstrated significant awareness of security risks compared to students from the business and social science colleges. It is therefore not surprising to note that engineering students are more cautious users of Bluetooth, hence are more secure users of technologies.

Practical implications

The findings provide useful information for academic institutions to understand students' behavior towards security risks especially in terms of identity theft, unsecured systems and inadequate security practices. Indeed, the findings of this study highlight or emphasize the importance of promoting security awareness to student cohorts especially on the use of mobile computing applications such as Bluetooth or wireless. Perhaps, universities should design curriculum to incorporate the study of information and cyber security so as to inculcate a culture of cyber safety as well as to prepare these prospective employees as more secured users when they enter the workplace. Indeed, considering the increasing number of users who tend to be naïve on security vulnerabilities, this research adds a critical message also to manufacturers and software developers to design more robust security features so as to minimize security breaches.

Originality/value

This paper provides further evidence to the body of research investigations on information and computing security threats and students' perceptions and behavior towards security risks and vulnerabilities. More important, this paper confirms that most students are not secure users, and it seems they not very capable of protecting themselves from security threats.

Details

Information Management & Computer Security, vol. 20 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 4 December 2017

Sonya Rapinta Manalu, Jurike Moniaga, Dionisius Andrian Hadipurnawan and Firda Sahidi

Low-cost microcomputers such as the Raspberry Pi are common in library makerspaces. This paper aims to create an OBD-II technology to diagnose a vehicle’s condition.

Abstract

Purpose

Low-cost microcomputers such as the Raspberry Pi are common in library makerspaces. This paper aims to create an OBD-II technology to diagnose a vehicle’s condition.

Design/methodology/approach

An OBD-II scanner plugged into the OBD-II port or usually called the data link connector (DLC), sends diagnostics to the Raspberry Pi.

Findings

Compared with other microcontrollers such as Arduino, the Raspberry Pi was chosen because it sustains the application to receive real-time diagnostics, process the diagnostics and send commands to automobiles at the same time, rather than Arduino that must wait for another process finished to run another process.

Originality/value

This paper also represents the history of mobile technology and OBD-II technology, comparison between Arduino and Raspberry Pi and Node.

Details

Library Hi Tech News, vol. 34 no. 10
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 1 December 2003

Ian Watson and David Joseph Lightfoot

This paper presents a definition of mobile working. The paper looks at mobile and remote working and then the benefits are of these forms of working. It also outlines the…

2071

Abstract

This paper presents a definition of mobile working. The paper looks at mobile and remote working and then the benefits are of these forms of working. It also outlines the limitations of mobile and remote working. The paper goes on to detail the type of mobile working used by Connexions (an organisation that formerly titled the Tyne and Wear Careers Service) what hardware and software are used by the company and how it is used. The paper concludes by identifying what the future holds for Connexions with this form of working. It argues that the staff expectations are not fully met by the technology now available.

Details

Facilities, vol. 21 no. 13/14
Type: Research Article
ISSN: 0263-2772

Keywords

Article
Publication date: 22 June 2012

G.S. Thyagaraju and U.P. Kulkarni

The purpose of this paper is to propose an intelligent service recommendation model. The paper formulates the service adaptation process by using artificial intelligence…

Abstract

Purpose

The purpose of this paper is to propose an intelligent service recommendation model. The paper formulates the service adaptation process by using artificial intelligence techniques like Bayesian Network, fuzzy logic and rule based reasoning.

Design/methodology/approach

The authors formulate the service adaptation process by using artificial intelligence techniques like Bayesian Network, fuzzy logic and rule based reasoning. Bayesian Network is used to classify the incoming call (high priority call, low priority call and unknown calls), fuzzy linguistic variables and membership degrees to define the context situations, the rules for adopting the policies of implementing a service, fitness degree computation and service recommendation. In addition to this the paper proposes maximum to minimum priority based context attributes matching algorithm for rule selection based on fitness degree of rules. The context aware mobile is tested for library and class room scenario to exemplify the proposed service recommendation engine and demonstrate its effectiveness.

Findings

First, it was found that there was reduction in application searching time in different contexts. For example, if user enters into the library, the proposed mobile will be adapted to the library situation automatically by configuring its desktop and internal settings to facilitate the library services like book search, web link, silent mode and friends search. Second, the design of the recommendation engine, utilizing contextual parameters like Location (class room, college campus, house, etc.) Personal (age, name), Temporal (time, date), Physical (fall, normal), and schedule agendas, was found to be of importance.

Originality/value

Exploitation of hybrid fuzzy system, Bayesian Networks and the utility theory (usage history and context history) for modeling and implementation.

Details

International Journal of Pervasive Computing and Communications, vol. 8 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 May 2005

Wenxi Chen, Daming Wei, Shuxue Ding, Michael Cohen, Hui Wang, Shigeru Tokinoya and Naotoshi Takeda

To meet the increasing needs for ubiquitous healthcare, a mobile phone‐based system for monitoring multiple vital signs is under development. In this paper, design and…

Abstract

To meet the increasing needs for ubiquitous healthcare, a mobile phone‐based system for monitoring multiple vital signs is under development. In this paper, design and implementation of the system architecture are described. The hierarchy of this system comprises three layers, which respectively handle multiple vital signs sensing, data/command communication via either wireless or wired means, and healthcare management. The fundamental basis of the sensing layer is a wearable cordless sensor device for monitoring vital signs without discomfort to the user during daily activities. The data communication layer performs bi‐directional information exchange between the sensing layer and the management layer. The uppermost management layer conducts data mining and analysis for risk factors assessment and healthcare. Overall considerations of implementation method and prototype fabrication are outlined. Finally, applicability to a variety of real‐world situations, and provision of customizable solutions not only for home healthcare but also for other vital signs‐related domains (such as emergency rescue and safety guarantee) are discussed. Three of the most promising applications based upon this system are described.

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 16 May 2023

Santosh Kharat, Shubhada Nagarkar and Bhausaheb Panage

The purpose of this study is to systematically examine the existing literature published on the circulation methods used in academic libraries and to discuss a proposed model for…

Abstract

Purpose

The purpose of this study is to systematically examine the existing literature published on the circulation methods used in academic libraries and to discuss a proposed model for the self-check-in and check-out methods using quick response (QR) codes.

Design/methodology/approach

A systematic literature review (SLR) provided a complete overview of circulation systems used in academic libraries for the last more than 140 years. Preferred reporting items for systematic reviews and meta-analyses (PRISMA) method for SLR was used. Several databases such as ProQuest, Emerald, Library and Information Science Abstracts, EBSCO and Google Scholar were searched. Out of 277 papers retrieved in the search, 43 most relevant papers were taken up for the SLR. These were classified into four themes based on the systems of circulation used, namely, manual (5), mechanized (13), automated (5) and networked system (20). Based on the findings of the SLR, a model of circulation system in which QR code technology has been used.

Findings

The result of SLR identified 33 systems used in above mentioned four groups. Among this, a large number 48.48% of mechanized systems were found. Each system has limitations either because of devices used or of technology. The present study proposes a QR code-based model at the circulation desk, for which a prototype of Android app has been designed. This would help to initiate the new “self-services” facility to users at the circulation desk.

Practical implications

The proposed model, after its successful implementation, can be adopted by academic libraries. Guidelines and a graphical representation of this study can be used by any researcher for further experimentation.

Originality/value

To the best of the authors’ knowledge, this is the first kind of study in which a QR code-based Android app model has been proposed for library circulation records.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 1 October 2005

T.M. Kwan

To present a combination of Bluetooth handoff techniques and scatternet formation to adapt to varying topologies and traffic changes.

1311

Abstract

Purpose

To present a combination of Bluetooth handoff techniques and scatternet formation to adapt to varying topologies and traffic changes.

Design/methodology/approach

Through ad hoc networking with Bluetooth, devices could participate in multiple piconets, which form the scatternet. Although the details of scatternet implementation are not specified in the Bluetooth specification, much research has been carried out to propose different models of implementation. This paper presents a combination of the techniques of handoff and scatternet formation to adapt to varying topologies and traffic changes. Analysis of network performance is presented to confirm the feasibility of real implementation.

Findings

Provides a novel and practical design, compatible with Bluetooth specification, which is shown by experimental results to be an efficient design in providing a scatternet formation approach, while at the same time maintaining a low data error rate to support data and voice.

Originality/value

This paper presents Bluetooth handoff and scatternet formation techniques to extend geographical coverage and increase system capacity with adaptation to varying topologies and traffic changes. The techniques presented are compatible with Bluetooth specifications 1.0, 1.1 and 1.2.

Details

The Electronic Library, vol. 23 no. 5
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 1 May 2005

Leping Huang, Hongyuan Chen, T.V.L.N. Sivakumar, Tsuyoshi Kashima and Kaoru Sezaki

To utilize Bluetooth as a layer 2 multi‐hop subnet for global IP network, there are two missing protocols in current Bluetooth stack: network formation and routing. In this paper…

Abstract

To utilize Bluetooth as a layer 2 multi‐hop subnet for global IP network, there are two missing protocols in current Bluetooth stack: network formation and routing. In this paper, we propose our network formation and routing protocols optimized for such Bluetooth subnset usage scenarios to fill this gap. In this paper, we first present some observations on performance degradations of Bluetooth PAN due to network topologies and topology change when radio independant protocols are implemented. And then we analyze the reason of performance degradation. Based on our analysis, we first propose a flexible scatternet formation algorithm under conference scenario for multi‐hop communication. By using proposed method, scatternet can be formed flexibly with star, mesh, or linked line based on several parameters like number of maximum piconets that a gateway Bluetooth device can participate, and whether loops are needed in the resulting scatternet to achieve better network performance. To utilize topology information in multi‐hop communication, we propose a Cross‐layer Optimized Routing for Bluetooth (CORB) CORB is a QoS‐extended AODV routing protocol with mainly two optimizations between networking layer and underlying Bluetooth MAC layer. The first optimization is to use a new load metric. (LM) in QoS routing protocol instead of number of hops in conventional best effort routing. LM is derived from estimation of nodes’ link bandwidth, which reflects the different roles of nodes in Bluetooth scatternet. This proposal helps routing protocol to bypass heavily loaded nodes, and find route with larger bandwidth. The second optimization is to adjust LM and some MAC layer parameters in response to the unstable network topology caused by movement and change of indoor radio condition. Finally, We present some simulation and experiment results based on implementation, which prove the effectiveness of our protocols.

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of over 1000