IoT Based Theft Detection Using Raspberry Pi
暂无分享,去创建一个
[1] R. S. Jadon,et al. COMPARISON BETWEEN FACE RECOGNITION ALGORITHM-EIGENFACES, FISHERFACES AND ELASTIC BUNCH GRAPH MATCHING , 2011 .
[2] Venkat Margapuri. Smart Motion Detection System using Raspberry Pi , 2020, ArXiv.
[3] Priya B. Patel,et al. Smart Motion Detection System using Raspberry Pi , 2016 .
[4] Chinmaya Kaundanya,et al. Smart Surveillance System using Raspberry Pi and Face Recognition , 2017 .
[5] Abdelmadjid Bouabdallah,et al. M2M Security: Challenges and Solutions , 2016, IEEE Communications Surveys & Tutorials.
[6] Ajay Vikram Singh,et al. Mitigation of DoS attacks by using multiple encryptions in MANETs , 2015, 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions).
[7] Ajay Rana,et al. An Effective Approach to Build Optimal T-way Interaction Test Suites over Cloud Using Particle Swarm Optimization , 2012 .
[8] Ajay Rana,et al. Exploring routing with multiple Quality of Service parameters in High-Speed Networks , 2012, CCSEIT '12.
[9] Umera Anjum,et al. IOT Based Theft Detection using Raspberry Pi , 2017 .
[10] Virginia Menezes,et al. Surveillance and monitoring system using Raspberry Pi and SimpleCV , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).
[11] S. P. Singh,et al. Challenges of global stakeholder's in software release , 2014, 2014 International Conference on Computing for Sustainable Global Development (INDIACom).
[12] D. Gupta,et al. Fibonacci driven novel test generation strategy for constrained testing , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[13] M. Tech,et al. Smart Surveillance System using Thing Speak and Raspberry Pi , 2015 .
[14] Ajay Rana,et al. Leveraging technology to build collaborative learning environment in academic institutes , 2013, 2013 IEEE International Conference in MOOC, Innovation and Technology in Education (MITE).
[15] Ajay Vikram Singh,et al. Software defined network as solution to overcome security challenges in IoT , 2016, INFOCOM 2016.
[16] Shivani Deshpande,et al. Review on Theft Prevention System using Raspberry Pi and PIR Sensor , 2016 .
[17] N. R. Raajan,et al. Facial Recognition System Using Local Binary Patterns(LBP) , 2018 .
[18] Ajay Rana,et al. Online Mining of data to generate association rule mining in large databases , 2011, 2011 International Conference on Recent Trends in Information Systems.
[19] Sunil Kumar Khatri,et al. Security Implications in IoT using Authentication and Access Control , 2018, 2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO).
[20] Adrian McEwen,et al. Designing the Internet of Things , 2013 .
[21] A. Rana,et al. AN IMPROVISED APPROACH TO GENERATE SIGNIFICANT ASSOCIATION RULES FROM CUSTOMER TRANSACTION DATABASE- EMPIRICAL ANALYSIS , 2014 .
[22] Arti Rana,et al. Effect of Residual Defect Density on Software Release Management , 2011 .
[23] Ajay Vikram Singh,et al. Internet of things: Architecture, security challenges and solutions , 2017, INFOCOM 2017.