منابع مشابه
Tsunami warning system using of IoT
Abstract Today, the world has reached a new nature with advances in science. The Internet of Things is a technology that can connect all objects in different fields through the Internet. Any unforeseen event that destroys economic, social and physical capabilities and inflicts human and financial losses is known as a natural disaster, such as a tsunami. IoT-based tsunami forecasting system ...
متن کاملGarbage monitoring system using IoT
Nowadays certain actions are taken to improve the level of cleanliness in the country. People are getting more active in doing all the things possible to clean their surroundings. Various movements are also started by the government to increase cleanliness. We will try to build a system which will notify the corporations to empty the bin on time. In this system, we will put a sensor on top of t...
متن کاملAutomatic Ambulance Rescue With Intelligent Traffic Light System
The road accident in the present era is increased to greater extent. The loss of human life due to accident must be avoided. Traffic congestion and tidal flow are major facts that cause delay to ambulance. In order to save human life from accidents we introduce a scheme called ITLS (Intelligent Traffic Light system).The main concept behind this scheme is to provide a smooth flow for the emergen...
متن کاملCloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS)
Internet of Things (IoT) and cloud computing technologies have connected the infrastructure of the city to make the context-aware and more intelligent city for utility its major resources. These technologies have much potential to solve thechallenges of urban areas around the globe to facilitate the citizens. A framework model that enables the integration of sensor’s data and analysis of ...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering and Science Invention
سال: 2020
ISSN: 2319-6734
DOI: 10.35629/6734-0905010103