The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Timeliness is one the most important factors in emergency management. Emergency notification mechanism has to be hassle free and quick, in order to have efficient response for any disaster, health-fix, act of terrorism, etc. In this paper, we present service architecture for emergency alert, using Fog computing. Fog computing brings cloud resources close to the underlying devices and IoTs, which makes...
Emergency situations are unfortunately part of our lives. Today's smart computing allow us handle such situations and fulfill our requirements more efficiently and effectively. This paper presents architecture to handle various kinds of emergency situations more efficiently and effectively, by allowing the user (victim or witness) easy and quick way to alert the concerned department (s) with just...
Internet of Things (IoT) is a new technology that allows many smart devices to interact with each other after they are connected to the Internet. Smart devices can communicate with each other as well as with other applications to gather useful information/tracking items/provide location which can be used to improve that service or obtain feedback. In addition, IoT provide new tools to develop more...
M2M (machine to machine) applications involving intelligence to ubiquitous environment have been in existence for the past many years. However, its provisioning using mobile technologies raises a new security challenge. Security services such as authentication and key establishment are critical in M2M, especially for healthcare systems. We proposed a simple architecture M2M service to apply any hospital...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.