A Survey on Technologies, Applications, Challenges in IOT
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 6
Abstract
IoT would add a new dimension to the world of information and communication. IoT technologies are summarized suchlike RFID systems,NFC,Wireless sensor networks,applications. The impacts of their potential applications are inspected. Believable, prudent, proficient and compelling security and protection for IoT are required to guarantee definite and precise privacy, uprightness, validation, and access control, among others.
Authors and Affiliations
M. Padma
Modern Steganographic technique: A survey
Steganography is one of the methods of secret communication that hides the existence of hidden message. It can be defined as the study of invisible communication that usually deals with the ways of hiding the existence o...
A GIS based Analysis for Rooftop Rain Water Harvesting
For properly Digitizing the Roof area of any building, some parameters need to be determined in order to get maximum benefit. Google Earth is used to determine the view or the area with proper resolution. The resolution...
Named Entity Recognition in Indian Languages Using Gazetteer Method and Hidden Markov Model: A Hybrid Approach
Named Entity Recognition (NER) is the task of processing text to identify and classify names, which is an important component in many Natural Language Processing (NLP) applications, enabling the extraction of useful info...
Civilizing the Network Lifetime Efficiently in MANETs Through DEL-CMAC Protocol
MANET (Mobile Ad-Hoc Network) has a dynamic topology. Due to the mobility of nodes in the network of cooperative communication is a technique for archived greater efficiency of transmission. In this paper the Network Lif...
Regression model approach to predict missing values in the Excel sheet databases
The most important stage of data mining is pre-processing, where we prepare the data for mining. Real-world data tends to be incomplete, noisy, and inconsistent and an important task when pre-processing the data is to fi...