The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today, the world is influenced by new emerging technologies. As a result we are surrounded by a number of smart devices. These smart devices make our life easy and convenient. On the contrary, we are exposed to a number of threats and cyber attacks. There is always a threat to our privacy. In this paper, we discuss the different applications of IOT and the security threats involved.
In today's generation sensors are playing a vital role in our daily based activities from playing motion based games on our mobile phones to parking our personal vehicles, controlling home appliances, tracking and monitoring of things, as well as in health and wellness sector and much more. The object of the invention is to propose a model which overcome the disadvantages of an earlier system that...
The development of Unmanned Aerial Vehicles (UAV) and wireless sensor network (WSN) applications depends on the availability of resources in UAVs and sensor nodes. In traditional applications, UAVs obtain the required data from specific sensors. However, this tightly coupled architecture restricts the usage of the infrastructure for specific applications. This paper proposes a softwarization architecture...
The Internet-of-Things (IoT) envisions a world where billions of everyday objects and mobile devices communicate using a large number of interconnected wired and wireless networks. Maximizing the utilization of this paradigm requires fine-grained QoS support for differentiated application requirements, context-aware semantic information retrieval, and quick and easy deployment of resources, among...
Human civilisation continues to be plagued by problems of crime and is often left defenceless and ill-equipped each time a natural disaster occurs. A Wireless Sensor Network (WSN) can be used to keep track of the ground situation in a crime scene or when a natural calamity occurs. Cloud computing can be utilised to enhance the capabilities of the sensors. We propose a system called Rescue and Crime...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.