Series-1 (May - June 2020)May - June 2020 Issue Statistics
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Soldier Health Care Monitoring & Tracking System Using IOT |
| Country | : | India |
| Authors | : | G.Harinee || R.Ramya |
| : | 10.9790/4200-10030105 ![]() |
ABSTRACT: Embedded is a combination of software and hardware, when a technology is used to do a particular task it is called embedded system. Embedded system is widely used automobiles, industrial automation, home appliances, mobile and aeronautics. Embedded technology uses PC or a controller to do the specified task and the programming is done using assembly language programming or embedded C. Wireless Sensor Network technologies have become a latest research area in health care industries due to rapid maturity in improving the quality of life of a patient. Wireless Sensor Networks when work in medical field provide continuous monitoring of vital health parameters which over a long period of time provide doctors much needed help to make accurate diagnosis and giving better treatment using Internet of things
Keywords: Gps, Heat Sensor, Iot, Micro Controller, Relay
[1]. Matthew J. Zieniewicz, Douglas C. Johnson, Douglas C. Wong, and John D. Flat ―The Evolution of Army Wearable Computers‖ Research, Development and engineering centre, US Armu communication October–December 2002.
[2]. Wayne Soehren &Wes Hawkinson ―Prototype Personal Navigation system‖, IEEE A&E system magazine April-2008.
[3]. Simon L. Cotton and William G. Scanlon ―Millimeter - wave Soldier –to- soldier communications for covert battlefield operation‖ Defence science and Technology laboratory, IEEE communication Magazine October 2009.
[4]. Alexandrous Plantelopoulous and Nikolaos , G. Bourbakis‖A Survey on Wearable sensor based system for health monitoring and prognosis‖ IEEE Transaction on system, Man and Cybernetics ,Vol.40,No.1, January 2010.
[5]. A uderey Giremus, Jean-yves Tourneret, Senior member, IEEE &Arnaud Doucet―A fixed-Lag particle filter for the joint Detection/ Compensation of interference effects in GPS Navigation―December-2011
- Citation
- Abstract
- Reference
- Full PDF
ABSTRACT: A crisis occasion is an abrupt, pressing, generally unforeseen episode or event that requires a quick response or help for crisis circumstances, which assumes an undeniably critical job in the worldwide economy and in our day-by-day lives. As of late, the web is turning into an imperative occasion data supplier and storehouse because of its continuous, open, and dynamic highlights. In this paper, web assets based states recognizing calculation of an occasion is created to tell the general population of a crisis occasion unmistakably and help the social gathering or government process the crisis occasions adequately. The connection among web and crisis occasions is first presented, which is the establishment of utilizing web assets to identify the highly sensitive.....
Keywords: Events; emergency management; automatic states detection; web mining
[1]. J. Makkonen. Investigation on event evolution in TDT. In Proceedings of the 2003 Conference of the North American Chapter of the Association for Computational Linguistics on Human Language, PP.43-48, 2003.
[2]. C. Yang, X. Shi, and C. Wei. Discovering Event Evolution Graphs from News Corpora. IEEE Trans. on Systems, Man and Cybernetics—Part A: 39(4):850-863, 2009.
[3]. J. Abonyi, B. Feil, S. Nemeth, and P. Arva. Modified Gath– Geva clustering for fuzzing segmentation of multivariate time-series. Fuzzy Sets and Systems, Data Mining, Special Issue 149:39-56, 2005.
[4]. X. Wu, Y. Lu, Q. Peng, and C. Ngo. Mining Event Structures from Web Videos. IEEE Multimedia, 18(1):38-51, 2011.
[5]. Q. He, K. Chang, E. Lim and A. Banerjee. Keep It Simple with Time: A Reexamination of Probabilistic Topic Detection Models. IEEE Transactions on Pattern Analysis and Machine Intelligence, 32(10):1795-1808, 2010.
- Citation
- Abstract
- Reference
- Full PDF
ABSTRACT: Re-appropriating information to an untouchable authoritative control, as is done in cloud dealing with, offers move to security concerns. The information arrangement may occur in perspective on assaults by different clients and focus focuses inside the cloud. In this way, high safety efforts are required to ensure information inside the cloud. Notwithstanding, the utilized security framework should besides consider the improvement of the information recovery time. In this paper, we propose Division and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) those outright philosophies the security and execution issues. In the DROPS framework, we separate a file into pieces, and mirror the divided information over the cloud focus focuses. The majority of the inside point's stores just a solitary zone of a specific information record that guarantees that paying....
Keyword: Cloud, Security, Cryptographic, Replication
[1]. K. Bilal, S. U. Khan, L. Zhang, H. Li, K. Hayat, S. A. Madani, N. Min-Allah, L. Wang, D. Chen, M. Iqbal, C. Z. Xu, and A. Y. Zomaya, "Quantitative comparisons of the state of the art data center architectures," Concurrency and Computation: Practice and Experience, Vol. 25, No. 12, 2013, pp. 1771-1783.
[2]. K. Bilal, M. Manzano, S. U. Khan, E. Calle, K. Li, and A. Zomaya, "On the characterization of the structural robustness of data center networks," IEEE Transactions on Cloud Computing, Vol. 1, No. 1, 2013, pp. 64-77.
[3]. D. Boru, D. Kliazovich, F. Granelli, P. Bouvry, and A. Y. Zomaya, "Energy-efficient data replication in cloud computing datacen-ters," In IEEE Globecom Workshops, 2013, pp. 446-451. .
[4]. Y. Deswarte, L. Blain, and J-C. Fabre, "Intrusion tolerance in dis-tributed computing systems," In Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, Oakland CA, pp. 110-121, 1991.
[5]. B. Grobauer, T.Walloschek, and E. Stocker, "Understanding cloud computing vulnerabilities," IEEE Security and Privacy, Vol. 9, No. 2, 2011, pp. 50-57.
