Automated Grass Cutter Robot Based on IoT IJTSRD
Automation is rapidly growing in the present technology. So automation plays a vital role in the agricultural field which is helpful for the farmers. In the earlier days, the grass cutters used were manually handheld devices. Because of this, there was pollution and loss of energy as they used gas and petrol engines. So the […]
APIs and Restful APIs IJTSRD
This Research Paper is about Restful API and Rest APIs. This Paper Presents Description about how APIS Restful APIs work and how they are implemented and why they are used in the modern world. by Mithilesh Tarkar | Ameya Parker”APIs and Restful APIs” Published in International Journal of Trend in Scientific Research and Development (ijtsrd), […]
Review on Various Security Attacks in Ad-Hoc Networks IJTSRD
Importance of security in ad-hoc networks is increasing due to a tremendous boon in mobile equipment usage. Due to the characteristic of ad hoc network being decentralized, wireless and infrastructure-less makes it vulnerable to various attacks that cause disruption in the network. In order to provide possible security measures to handle the malicious activity in […]
Voice Recognition Wireless Home Automation System Based on IOT IJTSRD
In the modern centuries, the Home Computerization scheme that is automation became one of the important challenges using and controlling the things remotely. The burst increase the electronic technology which made an automation to be a part in the day-to-day life. The remote technology has seen the rise of numerous criterions, mainly in the manufacturing, […]
Security Enhancement Using NTRU Algorithm Based Cryptosystem for Communication of Classified Information Via Cloud IJTSRD
Distributed storage depends on exceptionally artificial foundation and encourages available boundary point, flexibility and versatility it can oversee profoundly dimensions and tedious information. Henceforth, subcontracting encoded text to a cloud is ended up being a standout amongst the best methodologies for big data stockpiling and admittance. In spite of the fact that gives bounteous security […]