2022 Second International Conference on Artificial Intelligence and Smart Energy (ICAIS) 2022
DOI: 10.1109/icais53314.2022.9742970
|View full text |Cite
|
Sign up to set email alerts
|

Protection of User’s Data in IOT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 22 publications
0
0
0
Order By: Relevance
“…The information about each parking garage, such as the car Geo-location, the distance across car parks, and the number of spots available in each lot, will be transmitted to the data centre via our technology, which transforms each parking lot into an IOT infrastructure. Parking application costs are computed by the data centre acting as a cloud server; these rates are updated often and are always available to the network's cars [11][12][13]. Parking lots may be controlled and watched over automatically because the SPS is based on various cutting-edge technologies.…”
Section: Introductionmentioning
confidence: 99%
“…The information about each parking garage, such as the car Geo-location, the distance across car parks, and the number of spots available in each lot, will be transmitted to the data centre via our technology, which transforms each parking lot into an IOT infrastructure. Parking application costs are computed by the data centre acting as a cloud server; these rates are updated often and are always available to the network's cars [11][12][13]. Parking lots may be controlled and watched over automatically because the SPS is based on various cutting-edge technologies.…”
Section: Introductionmentioning
confidence: 99%