Machine Learning and Deep Learning; subfields of Artificial Intelligence have been implemented in applications that can detect and label objects and figures such as a chair, a person or even some kinds of animals. We have developed an application that makes use of Augmented Reality, a more modest goal of Plane Detection. The purpose of this app is to label detected objects with tags and relay the information to people who are visually impaired. A significant first step towards our goal is to concentrate on Plane Detection. This technology can benefit individuals in public places by helping them reach their destination safely. The app will guide individuals in need to prevent from colliding with walls and objects by recognizing and navigating plane surfaces and physical objects.
Cloud Computing is one of the most important advancements in technology since the invention of the Personal Computers. Cloud Computing refers to manipulating, configuring and accessing the applications via the Internet and provides various kinds of services to its users. One of the principal concerns of Cloud Computing is security "How secure is a cloud computing environment?"-Security is then one of the parameters that need to be tackled deeper before enterprises embrace this popular technology to a greater degree. With the cloud technology paradigm enterprise data are stored at a remote location and must be assured that is safe and be available at any time. Our effort is to report security feature results of our evaluation carried out on Public, Private, Community and Hybrid Cloud Computing; which includes differences between their services, architecture, deployment and development of services and the way to mitigate those security risks and issues.
In recent years, the so-called Internet of Things (IoT) has emerged as a transformative trend for both commercial and consumer-grade applications. The IoT includes a mesh of wirelessly networked devices with embedded sensors that monitor physical and environmental conditions, and which share the acquired data sets with other systems. Wireless Sensor Networks (WSN) have become ubiquitous components in modern IoT networks, employing protocols such as Wi-Fi and Bluetooth. Privacy is fundamental to the WSN, since it transmits sensitive personal information that can be misused in the wrong hands. In this paper, we explore WSN security mechanisms including cryptography and secure routing or data aggregation protocols. To demonstrate best practices, an experimental test bed is constructed, consisting of a 3D printed model building equipped with wireless sensors and controlled by an Arduino and a Raspberry Pi 3 model B. A wireless management application for smart phones, which interfaces with the WSN, is also developed. Security properties are investigated using Kali Linux tools.
Nowadays, it is very important to ensure the security of our homes. We have designed, developed, and implemented a home security system that consists of a webcam and a motion sensor detector connected to a Raspberry Pi. The Raspberry Pi is a lowcost small computer. We have used the Raspberry Pi 4 which has a built in Bluetooth and Wi-Fi connections onboard to connect with our home Wi-Fi router with the cloud server. When the motion sensor detects an object, the webcam will take the images and save it to the pre-install memory card temporarily, then those images will be moved into the Google cloud and notify via email to the registered user of this device.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.