In this paper, we deal with comparative analysis of cryptocurrency wallets and traditional wallets. In addition to security analysis, we will observe the most important elements that should ensure a high level of social acceptability. In that regard, we will make a brief overview of the existing mechanisms for disposing a funds expressed in traditional currencies as well as for crypto currencies. Under the traditional safe keeping mechanisms and the disposal of cash, we will consider systems based on payment cards, payment by cash and payments over the internet. The use of digital wallets is reflected in various characteristics. The convenience of using the ability to execute a mobile phone transaction in matter of seconds. Efficiency is reflected in the speed of transaction execution. This paper describes the current state of digital wallets on the market, the choices of a better solution for purchasing and using digital wallets, security of digital wallets and future trends in their development.
Sve gradove koji teže ka razvoju i ulažu uimplementiranje modernih i novih tehnologija možemo nazvatipametnim gradovima. Pametni gradovi koriste digitalnetehnologije i imaju za cilj da poboljšaju kvalitet ljudskog života ida omoguće zaštitu životne sredine. Takođe jedan od ključnihciljeva pametnih gradova jeste da privuku veliki broj novihstanovnika i posetioca koji će investirati u grad što dalje vodi katome da se poboljšava kvalitet života i razvija dobro ekonomskookruženje. Kao moderne tehnologije pametni gradovi nastoje daomoguće pametnu mobilnost u kojoj postoji jaka ICT(Information and Communication Technologies) infrastruktura idobra usluga prevoza, takođe nastoje da internetom povežu sveobjekte IoT (Internet of Things), pružaju usluge koje su baziranena oblaku (engl. cloud based services), praktikuju korištenjepametnih telefona i drugih načina koji mogu da pomognu urešavanju problema. Kompletan koncept pametnog gradazasniva se na tome da se izgradi jedan primer savremenog gradačija će struktura kasnije moći da se prenese i na ostale gradove.Korištenje savremenih tehnologija kao što su bežične mreže imnoge aplikacije koje su bazirane na internetu promenile sunačin života urbane sredine na koju su ljudi već navikli, upravotakve tehnologije čine da pametni gradovi postanu realnost.
Precision agriculture is an innovative farming method that aims to maximize crop yields while minimizing waste. One of the key technologies used in precision agriculture is computer vision, which involves using cameras and sensors to collect data on crop growth and health. This data is then analyzed using machine learning algorithms to provide insights on how to optimize farming practices and improve yields. In this article, we provide an in-depth analysis of the role of computer vision in precision agriculture, with a focus on its applications in crop monitoring, the various types of cameras and sensors utilized in computer vision systems, and the diverse machine-learning algorithms employed to analyze the data collected. Through this analysis, we aim to offer a comprehensive overview of the potential of computer vision to revolutionize the way we grow and harvest crops, and the impact it could have on the future of agriculture.
Svakodnevnica savremenog čovjeka bez upotrebe savremene tehnologije je nezamisliva pa samim tim i porast sajber kriminala je neminovan. Različite okolnosti i dostupni resursi forenzičko ispitivanje mogu dovesti do izazova. Ovaj rad je nastao na realnim praktičnim primjerima kroz aktivne i pasivne metode forenzike počev od sakupljanja enkriptovanog saobraćaja u realnom vremenu, njegovu dekripciju i analizu dobijenih podataka. Aktivnom forenzikom kroz različite načine dobili smo dosta konkretnije informacije važne za forenziku. Koristio sam i tehnike koje koriste sajber kriminalci za upade u zaštićene mreže, računare i mrežne uređaje kada je to bilo neizbježno kako bi direktno spriječio napade i štetu ali i sačuvao što više podataka o toku napada na mrežu, računara i mrežne uređaje. Uz odgovarajuću mrežnu opremu koja je pravilno podešena dokazano je da je moguće spriječiti vršenje najtežih sajber napada, kao i presresti i dekriptovati i ransomware napade koji prave štetu u milijardama dolara na globalnom nivou. Svi softveri korišteni za ovaj rad počev od operativnog sistema i aplikacija su opensource i dostupni su svima.
The Internet of Things (IoT) is integrated and applied in various domains such as Smart Home, Healthcare, Industrial IoT (IIoT), and others. IoT allows physical objects to be able to create, receive and exchange huge amounts of data at any time. The goal of such applications is to automate physical objects that will be able to function without human intervention or with minimal intervention depending on the purpose of the application. Because all domains involved involve the use of sensitive data and that data is usually transmitted over insecure channels, security and privacy issues arise due to potential cyber-attacks. This paper presents various IoT security techniques as well as the main security goals and characteristics. Three types of authentication schemes, one-factor, two-factor, and threefactor are then explained. Since authentication is one of the most important security goals, a special focus is on two-factor authentication schemes.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.