WOMEN SELF SECURITY SYSTEM USING AWS AND IOT
نویسندگان
چکیده
منابع مشابه
Tsunami warning system using of IoT
Abstract Today, the world has reached a new nature with advances in science. The Internet of Things is a technology that can connect all objects in different fields through the Internet. Any unforeseen event that destroys economic, social and physical capabilities and inflicts human and financial losses is known as a natural disaster, such as a tsunami. IoT-based tsunami forecasting system ...
متن کاملCloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS)
Internet of Things (IoT) and cloud computing technologies have connected the infrastructure of the city to make the context-aware and more intelligent city for utility its major resources. These technologies have much potential to solve thechallenges of urban areas around the globe to facilitate the citizens. A framework model that enables the integration of sensor’s data and analysis of ...
متن کاملGarbage monitoring system using IoT
Nowadays certain actions are taken to improve the level of cleanliness in the country. People are getting more active in doing all the things possible to clean their surroundings. Various movements are also started by the government to increase cleanliness. We will try to build a system which will notify the corporations to empty the bin on time. In this system, we will put a sensor on top of t...
متن کاملIoT Security: A Survey
The Internet of Things (IoT) is still at the top of the Gartner Hype Cycle as the most hyped technology, which means that it is the hottest topic that has gained the most attraction of the researchers currently. In recent years, there have been huge amount of research that have investigated different aspects and concerns of this field. Meanwhile, supplying privacy and security is an inseparable...
متن کاملRequirement of Security for IoT Application based on Gateway System
An integrated security mechanism is one of the key challenges in the open wireless network architecture because of the diversity of the wireless network in open wireless network and the unique security mechanism used in each one of these networks. The security consideration should satisfy a concise set of cryptographic and security mechanisms, single security policy framework, and configuration...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering Applied Sciences and Technology
سال: 2020
ISSN: 2455-2143
DOI: 10.33564/ijeast.2020.v04i11.063