Parking Lot Security System using RFID Technology ijtsrd
Radio Frequency Identification RFID technology is widely used in various applications such as attendance system, tracking system, monitoring system or parking system. In this paper, the Parking Lot Security System using RFID technology and embedded technology is presented. In conventional parking system, manual entrance system is applied that permission must be requested from the security […]
Document Management System IJTSRD
Document management has been an important component of organizations and institutes where mass work-forces are there. Storage, maintenance, updating and retrieval of documents becomes difficult as the amount of data gets larger with time. The data when stored in a digital format lacks authenticity and thereby compromising security at a large scale. Thus, as a […]
Secure Data Transmission in VANETs IJTSRD
A number of technical problems are arising with the widespread distribution of vehicular ad-hoc networks. Privacy and authentication mechanisms are of major concern. If security is not integrated with the system, it leads to anti-social and criminal behavior and endanger the benefits of the deployment of VANETs. A suitable authentication procedure is to implement the […]
Advanced Security System using PIC through Bluetooth IJTSRD
The objective of our project is to develop an Exploiting Bluetooth on Android mobile devices for home appliances control appliances control application. Mobile deviceshave been integrated into our everyday life consequently, home automation is becoming increasingly prominent features on mobile devices .We have developed a security system that interfaces with an android mobile devices.The mobile […]
Internet of Things (IoT) : Security Perspective IJTSRD
In the past decade, internet of things IoT has been a focus of research. It makes more intelligent to core element of modern world such as hospitals, cities, organizations, and buildings. Usually, IoT has four major components including sensing, information processing, applications and services, heterogeneous access and additional components e.g. Security and privacy. In this […]