IJET
  • Home
  • Topics
  • Call For Paper
  • Publication Charges
  • Archives
    • Current Issue
    • Past Issues
    • Upcoming Conference
    • Conference Issues
  • Indexing
  • IJET Policy
    • Plagiarism Policy
    • Malpractice Policy
    • Correction Policy
    • Publication Rights
    • Terms Conditions
    • Cancellation Refund
  • Contact Us

Submit your paper : editorIJETjournal@gmail.com


International Journal of Engineering and Techniques(IJET) Paper Title : SURVEY ABOUT CONNECTING DEVICES USING IOE

ISSN : 2395-1303
Year of Publication : 2020
10.29126/23951303/IJET-V6I2P5
Authors: DR.S.Hemalatha,ABINESH.A,SOORYA PRASAD.T. R,VIGNESH.M

         



MLA Style: DR.S.Hemalatha,ABINESH.A,SOORYA PRASAD.T. R,VIGNESH.M SURVEY ABOUT CONNECTING DEVICES USING IOE " Volume 6 - Issue 2(1-5) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org

APA Style: DR.S.Hemalatha,ABINESH.A,SOORYA PRASAD.T. R,VIGNESH.M SURVEY ABOUT CONNECTING DEVICES USING IOE " Volume 6 - Issue 2(1-5) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org

Abstract
The internet of everything (IoE) is a broad term that refers to devices and consumer products connected to the internet and outfitted with expanded digital features. It is a philosophy in which technology's future is comprised of many different types of appliances, devices and items connected to the global internet. IoE is based on the idea that in the future, internet connections will not be restricted to laptop or desktop computers and a handful of tablets, as in previous decades. Instead, machines will generally become smarter by having more access to data and expanded networking opportunities. The applications of the internet of everything is used as Fog computing, Cyber security. This Paper explains about the devices that are connected to a mobile phone application in which the application can be tracked with each other and the facial recognition principle is used wherein when the person visits the house then by using the camera the face can be recognized and it can be brought to the application. By the use of the Global Positioning System (GPS) which is inserted in the vehicle, can be trackedusing this application.

Reference
1. J. Goldman, K. Shilton, J. Burke, D. Estrin, M. Hansen, N. Ramanathan, S. Reddy, V. Samanta, M. Srivastava, and R. West, “Participatory sensing: a citizen-powered approach to illuminating the patterns that shape our world,” Foresight & Governance Project, White Paper, pp. 1–15, 2009. 2. Z. Yu, F. Yi, Q. Lv, and B. Guo, “Identifying on-site users for social events: Mobility, content, and social relationship,” IEEE Transactions on Mobile Computing, vol. 17, no. 9, pp. 2055–2068, 2018. 3. Y. Wang, D. Wang, and W. Fang, “Automatic node selection and target tracking in wireless camera sensor networks,” Computers & Electrical Engineering, vol. 40, no. 2, pp. 484–493, 2014. 4. J. Fuentes-Pacheco, J. Ruiz-Ascencio, and J. M. Rendon-Mancha, “Visual simultaneous localization and mapping: a survey,” Artificial Intelligence Review, vol. 43, no. 1, pp. 55–81, 2015. 5. Y. Jing, B. Guo, Z. Wang, V. O. Li, J. C. Lam, and Z. Yu, “Crowdtracker: Optimized urban moving object tracking using mobile crowd sensing,” IEEE Internet of Things Journal, vol. 5, no. 5, pp. 3452–3463, 2018. 6. H. Chen, B. Guo, Z. Yu, L. Chen, and X. Ma, “A generic framework for constraintdriven data selection in mobile crowd photographing,” IEEE Internet of Things Journal, vol. 4, no. 1, pp. 284–296, 2017. 7. H. Chen, B. Guo, Z. Yu, L. Chen, and X. Ma, “A generic framework forconstraint-driven data selection in mobile crowd photographing,” IEEEInternet of Things Journal, vol. 4, no. 1, pp. 284–296, 2017. 8. J. Wang, F. Wang, Y. Wang, D. Zhang, L. Wang, and Z. Qiu, “Social-network-assisted worker recruitment in mobile crowd sensing,” IEEETransactions on Mobile Computing, 2019. 9. L. Wang, Z. Yu, D. Zhang, B. Guo, and C. H. Liu, “Heterogeneous multi-task assignment in mobile crowdsensing using spatiotemporal correlation,” IEEE Transactions on Mobile Computing, vol. 18, no. 1, pp. 84–97, 2019. 10. E. Jenelius, T. Petersen, and L.-G. Mattsson, “Importance and exposure in road network vulnerability analysis,” Transportation Research Part A: Policy and Practice, vol. 40, no. 7, pp. 537–560, 2006.

Keywords
Scientific Workflow, Scheduling, Budget, Deadline, Cloud.

IJET Management

  • Archives
  • Aim & Scope
  • Current Issues
  • special issue
  • Conferences Gallery
  • Review process
  • Impact factor
  • Board members
  • Publication ethics
  • Copyright infringement
  • Join as a Reviewer
  • Faq
  • Journal Update

    Downloads

  • CopyrightForm
  • Paper Template
  • Registration Form
Copyright © 2015 IJET- International Journal of Engineering and Techniques Published By International Research Group , All rights reserved

Plagiarisma        PCX
This work is licensed under a Creative Commons Attribution 4.0 (International) Licence. (CC BY-NC 4.0)