2020 Fourth International Conference on I-Smac (IoT in Social, Mobile, Analytics and Cloud) (I-Smac) 2020
DOI: 10.1109/i-smac49090.2020.9243517
|View full text |Cite
|
Sign up to set email alerts
|

START: Smart Stick based on TLC Algorithm in IoT Network for Visually Challenged Persons

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…The formation of smart blind stick can easily implement the calculation of accurate distance and it could provide greater flexibility in navigation [33]. The devices and peripherals that will be used in this system could have the capability of judging the obstacles nearby and take necessary steps.…”
Section: Proposed System and Components Descriptionmentioning
confidence: 99%
“…The formation of smart blind stick can easily implement the calculation of accurate distance and it could provide greater flexibility in navigation [33]. The devices and peripherals that will be used in this system could have the capability of judging the obstacles nearby and take necessary steps.…”
Section: Proposed System and Components Descriptionmentioning
confidence: 99%
“…Rahul Johari et al [22] presented a smart stick that is based on a TLC (traffic light cross-ing) algorithm for visually impaired people can use for navigation and guidance while nav-igating through streets and crossing traffic signals. This smart stick contains an ultrasonic sensor for detecting obstacles, a colour sensor for detecting traffic light colour, a buzzer and GSM-based SMS alert system.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The multidiscipline industries that adopt IoT as a technology have their own variation of attacks on their IoT applications and infrastructures. The concept of sensors connecting to each other and transmitting big data in a two-way traffic in an IoT ecosystem typically creates vulnerabilities [13], [15]- [17] in the IoT network system. In the Smart City ecosystem in Ukraine that utilizes Smart energy grid system to serve the city, 30 of such Smart energy were attacked [8], [16], and (https://www.thenational.ae/uae/smart-cities-open-door-to-cyberattacks-say-security-experts-1.672214), and 80,000 residents were without power supply for several hours due to the adversarial malicious attack on the Smart Grid system.…”
Section: Iot Attacksmentioning
confidence: 99%