This paper presents the current state of AR technology applications in the field of construction through some examples already applied in simulation of the organization of utilities networks, simulation of site organization in various stages, simulation of the new urban plan, modeling of building details, interior organization and navigation site and proposes to design of an IT application that integrates these benefits into a unitary application, easy to use by all parties involved in project: project owner, architects, builders, local community and public authorities. The application will be specific to the Android platform and will provide a virtual view of the stages in the construction. It will also run on mobile devices such as smartphones, tablets, or other devices that have a camera, internet connection, and location sensors.
Mobile devices threats are all over and come in many ways. Nowadays the number of mobile devices is extremely high, and we use them to cover many personal needs like ordering food, buying plane tickets, controlling our home from distance (using IoT devices) and so on. But all of this comes with a cost and that cost is that we have to give personal data to some devices which lead to threats. This paper is an overview of what we know so far about threats which affects the mobile devices at system and physical level, how they work and their scope. A classification of them is made so we can define them better in order to find ways for preventing and why not extinguish so we can be safer. As method of research was used a qualitative one by documenting from articles related to this theme, reports realized by companies which operates in this field and other resources.
Mobile devices (smartphones or IoT devices) threats are all over and come in many ways. Nowadays the number of mobile devices is extremely high and we use them to cover many personal needs like ordering food, buying plane tickets, controlling our home from distance (using IoT devices) and so on. But all of this comes with a cost and that cost is that we have to give personal data to some devices which lead to threats. This paper contains a classification for the threats and vulnerabilities for smartphones and tablets and a short one for IoT devices. Here are described some attack scenarios for IoT and a few representative attacks. As method of research was used a qualitative one by documenting from articles related to this theme, reports realized by companies which operates in this field and other resources.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.