Internet of Things (IOT): An overview and its applications
PV Dudhe, NV Kadam… - … , data analytics and …, 2017 - ieeexplore.ieee.org
We are entering in a beginning of a new of computing technology ie Internet of Things (IOT).
IOT is a sort of “universal global neural network” in the cloud which connects various …
IOT is a sort of “universal global neural network” in the cloud which connects various …
Revolutionary strategies analysis and proposed system for future infrastructure in internet of things
The Internet of Things (IoT) has changed the worldwide network of people, smart devices,
intelligent things, data, and information as an emergent technology. IoT development is still …
intelligent things, data, and information as an emergent technology. IoT development is still …
[PDF][PDF] Exploring The Security Landscape: A Comprehensive Analysis Of Vulnerabilities, Challenges, And Findings In Internet Of Things (Iot) Application Layer …
Network security is significantly impacted by the difficult task of securing Internet of Things
(IoT) ecosystems. Strong security protocols must be developed in order to protect the …
(IoT) ecosystems. Strong security protocols must be developed in order to protect the …
[PDF][PDF] The internet of things: vision, architecture and applications
P Deshpande, A Damkonde, V Chavan - International Journal of …, 2017 - academia.edu
The domain of the Internet has extended from computers to different types of heterogeneous
and homogeneous sensors leading to connectivity of almost everything and making it smart …
and homogeneous sensors leading to connectivity of almost everything and making it smart …
Automated hybrid surveillance robot
SM Ashish, M Manjunath, L Ravindra - International Journal of …, 2018 - neliti.com
This paper proposes a Raspberry Pi based automated robot which fulfils the purpose of
surveillance. The robot provides autonomous movement around the facility where it is …
surveillance. The robot provides autonomous movement around the facility where it is …
A forensic study of Tor usage on the Raspberry Pi platform using open source tools
NS Vaidya, PH Rughani - Computer Fraud & Security, 2020 - magonlinelibrary.com
Since the invention of the first computer, scientists have striven to minimise the size–and we
can see the fruits of their efforts in the form of the Raspberry Pi. This is a series of small …
can see the fruits of their efforts in the form of the Raspberry Pi. This is a series of small …
Hydrogen-based PEM fuel cells for low-cost sustainable powering of IoT systems
In this paper, we propose the usage of fuel cells in lieu of the conventional power source,
namely batteries, to power Internet of Things (IoT) systems. This approach aims to improve …
namely batteries, to power Internet of Things (IoT) systems. This approach aims to improve …
Novel Secure Multipurpose Information Service and Management System with the help of Internet of Things
TJ Swamy, GP Kumar, TN Murthy - … International Conference on …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is one of the emerging technologies for real time applications such
as, home automation, health care management, industrial control etc. It can also be applied …
as, home automation, health care management, industrial control etc. It can also be applied …
[PDF][PDF] Revolutionary Strategies Analysis and Proposed System for Future Infrastructure in Internet of Things. Sustainability 2022, 14, 71
The Internet of Things (IoT) has changed the worldwide network of people, smart devices,
intelligent things, data, and information as an emergent technology. IoT development is still …
intelligent things, data, and information as an emergent technology. IoT development is still …
HEIST DETECTOR: A Secured IOT-Based Real-Time System
R Abinaya, S Tharani, AS Arunachalam… - … Technologies for Big …, 2022 - Springer
In the past, securing valuables in our home/office has been a big chore. There is a high
probability of any theft during our absence. When such incidents take place, it is often the …
probability of any theft during our absence. When such incidents take place, it is often the …