SMART RAIL RESERVATION AND VERIFICATION SYSTEM WITH UNIQUE IDENTIFICATION IN IoT USING CLOUD DATABASE

Size: px
Start display at page:

Download "SMART RAIL RESERVATION AND VERIFICATION SYSTEM WITH UNIQUE IDENTIFICATION IN IoT USING CLOUD DATABASE"

Transcription

1 Volume 119 No , ISSN: (on-line version) url: ijpam.eu SMART RAIL RESERVATION AND VERIFICATION SYSTEM WITH UNIQUE IDENTIFICATION IN IoT USING CLOUD DATABASE 1 Adapa Sri Kumar Satya Ganapathi, 2 S.Praveen Kumar, 3 P.Madhusudhanan, 4 S.Ranjith Kumar, 5 M.Ganesan Department of CSE, Sri manakula Vinayagar Engineering College ABSTRACT The Internet of Things is inter-networking of physical devices, buildings, and other items which are embedded with electronics, software, sensors, actuator, and network connectivity that enable these objects to collect and exchange data. The devices which are connecting to internet are called IoT Devices. In technical we can say it as the device which has IP Address is called as an IoT Device. Analysts say that by 2020 there will be over 50 billion devices. That's a lot of connections. More over some estimate that it would be 100 billion devices. In general ticket reservation for the Indian railways is quite a complex process. This involves various steps which could be much complicated for illiterates. More over Indian railways is using more than 2 tonnes of paper for booking and verification process. To avoid these problems and more over to move the nation towards digitalization we are proposing this idea. Here in this proposal we are building web-based application for reservation and mobile application for ticket verification process. Keywords: IoT :Internet of Things I. INTRODUCTION The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actu ators, and connectivity which enables these objects to connect and exchange data. Each thing is uniquely identifiable through its embedded computing system but is able to inter-operate within the existing Internet infrastructure. The figure of online capable devices increased 31% from 2016 to 8.4 billion in 2017.Experts estimate that the IoT will consist of about 30 billion objects by It is also estimated that the global market value of IoT will reach $7.1 trillion by The IoT allows objects to be sensed or controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems, and resulting in improved efficiency, accuracy and economic benefit in addition to reduced human intervention. When IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyberphysical systems, which also encompasses technologies such as smart grids, virtual power plants, smart homes, intelligent transportation and smart cities. II. RELATED WORKS 279

2 S No Name of the Author Title Proposed Algorithm Advantage of Concept Drawback Mr. Godson Michael D silva, Mr. Anoop Kunjumon Scariah, Mr. Lukose Roy Pannapara, Ms. Jessica John Joseph Md. Foisal Mahedi Hasan,Golam Tangim, Md. Kafiul Islam, Md. Rezwanul Haque Khandokar, ArifUl Alam Smart Ticketing System for Railways in Smart Cities using Software as a Service Architecture RFID-based Ticketing for Public Transport System 3. Kirti Dhiman, Er. CK Raina IoT Based Ticket Checking System Vijaysanthi. R, Radha. N, Jaya Shree. M, Sindhujaa. V Dhvani. K. Shah, Dr. Vinayak A. Bharadi, V. J. Kaul, and Sameer Amrutia Fingerprint Authentication using Raspberry Pi based on IoT End-to-end Encryption based Biometric SaaS AWS cloud based service using AWS IoT and RFID Smart cards with RFID technology used for the public transport system QR code is generation for purchasing the ticket and authenticated with QR code for verification. Biometric authentication using GT-511C3 and Raspberry-Pi Fingerprint Sensor and Wi-Fi module is integrated with the Raspberry Pi uploading it to the Azure Cloud Service Effective and can be monitored easily using cloud service and also reduces the man powers The whole system is fully automated and installed with using RFID sensors The ticket verification is done using QR code generator Authentication is done with fingerprint which is compared with database sets that present in the cloud Saas based finger print authentication system with easy and fast access from cloud. It is only applicable to suburban regions alone. Installation of RFID sensor at each stop cost higher. Unauthorized persons can travel without verification The sensor converts them into image and compare with the other one. Bit costlier to manage azure and connectivity with other database is not up to mark. Mr. Godson Michael D silva, Mr.AnoopKunjumonScariah, Mr.Lukose Roy Pannapara and Ms. Jessica John Joseph proposed the ticketing system for railways for suburbs region in order to /authenticate and authorize using smart cards. These Smart Cards are maintained with a balance amount to travel from source to destination. It is implemented in AWS public cloud service.it captures the RFID Sensors data through Raspberry Pi device and then it publishes the event to the cloud. In addition to that, the crowd analysis and cost-effective features [6-9] are included. Md.FoisalMahediHasan et. Al., were proposed RFID based tickets in the bus transportation. The total system mainly acts to bring out the consistency among various bus agencies that will conclude in uniform access of passengers in daily rides through an automated server being updated every single time the passengers travel by carrying the RFID based tickets. KirtiDhiman, Er. And CK Raina proposed IOT module to check the tickets of the passenger in the train. When the ticket is issued to the passenger a QR code is generated to the passenger's mobile number and this is used for the verification of ticket. Vijaysanthi. R et. Al., were presented the Fingerprint Authentication using Raspberry Pi based on IoT, where the fingerprint is collected by the optical sensor, which relays to cloud via Raspberry Pi. The fingerprints to be authenticated are stowed in a file server and web server performs 1:N verification once it obtains the data through POST request. It sends out a retort based on match score along with fingerprint index ID. Dhvani. K et. Al., were proposed End-to-end Encryption based Biometric SaaS. These systems are used in various applications like ATMs, voting system, aadhar card, attendance management system etc. The fingerprint and face detection are done with the Raspberry Pi as an authentication node and upload it the Microsoft Azure cloud service. EXISTINGSYSTEM In the existing reservation system, booking itself includes two types of methodologies. One is PRS System and the other one is Online booking which is provided by IRCTC. In both the cases we need to enter details such as name, age, gender, preference and other things. After that availability will checked and booking will be completed as per the wish. This even includes the payment gateway also. DRAWBACKS In the current system there are many disadvantages which are to be rectified. The main thing which comes under is about allocation of lower berths. Even for senior citizens, medically ill and pregnant ladies. During Verification there are possibilities for fake identification also. So there could possibility of unauthenticated travel by stranger also. More over the main disadvantage is about payment for waiting list 280

3 passengers and un travelled passengers. Untravelled passengers are not given any refund and those untraveled seats were sold out for the officers profit. Even in verification there is a lot s of quantity of paper is used. PROPOSED SYSTEM For overcoming these problems were are proposing a new idea. For booking purpose we are going to use an web application which is developed in Java JSP technology. Through this web application we can book ticket using our biometrics as the primary key. Since our biometric is recorded in the UIDAI Aadhar- KYC system there won t be necessary to enter any further details. For booking tickets for multiple passengers, it is necessary to have their aadhar number for booking the ticket. While in case of the verification time, biometrics should be verified for all the passenger who boarded in the train. If the passenger has a confirmed ticket then it will verify. Otherwise it will check in the waiting list. For waiting list, if the data is not authenticated means it will go refund if not no refund will be provided. For verification we are going to use a specially designed mobile application. This application is accessed by using an external fingerprint sensor or with an inbuilt sensor. Each official will have individual login credentials. So, by this itself we can identify every thing. Un travelled seats are automatically allocated for boarded waiting list passengers. More over with is application, Lower seat preference will be adjusted by the medical track and senior citizenship claim also. Main thing which we are going to utilize is here is AEPS. This means Aadhar Enabled Payment System. By this system payment is done by using biometric id itself. Refund will be also given with consideration of this biometric. a).architecture for AEPS. b) Backend processing at the time of reservation b) Backend processing at the time of verification. REFERENCES: [1] Mr. Godson Michael D silva, Mr.AnoopKunjumonScariah, Mr.Lukose Roy Pannapara and Ms. Jessica John Joseph Smart Ticketing System for Railways in Smart Cities using Software as a Service Architecture International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I- SMAC 2017) [2] Md. FoisalMahediHasan, *GolamTangim, *Md. Kafiul Islam, *Md. RezwanulHaqueKhandokar, *** ArifUlAlam RFID-based Ticketing for Public Transport System /10/$ IEEE [3] Kirti Dhiman1, Er. CK Raina2 IoT Based Ticket Checking System Vol. 6, Issue 3, March 2017 [4] Vijaysanthi. R, Radha. N, Jaya Shree. M, Sindhujaa. V Fingerprint Authentication using Raspberry Pi basedoniot [5] Dhvani. K. Shah, Dr.Vinayak A. Bharadi, V. J. Kaul,SameerAmrutia End-to-end Encryption based Biometric SaaS 281

4 [6] Syamala, M., Nalini, N.J., Ragupathy, R., Magulur, L.P., "Random forest classifier approach for blurred images", (2017) International Journal of Pure and Applied Mathematics, 116 (6 ), pp [7] Utkam, S.G., Parasa, R., Kondapaneni, A., Tulabandula, P.R.K., Kuppala, D.R., "A secured symmetric key encryption technique using images as secret keys", (2017) International Journal of Pure and Applied Mathematics, 116 (6 ), pp [8] Veeraiah, T., Mahamkali, A., Kishore, B.N.P., Rao, A.N., Rao, S.K.M., "Image denoising by profunditymap methodusing diagram base change and group scanty", (2017) International Journal of Pure and Applied Mathematics, 115 (8 ), pp [9] Veeraiah, T., Rao, S.K.M., "Classification of fuzzy rule based order-statistic filters for color images", (2017) International Journal of Pure and Applied Mathematics, 115 (8 ), pp

5 283

6 284

ONLINE BIOMETRIC VERIFICATION USING APACHE STORM ON PUBLIC CLOUD

ONLINE BIOMETRIC VERIFICATION USING APACHE STORM ON PUBLIC CLOUD ONLINE BIOMETRIC VERIFICATION USING APACHE STORM ON PUBLIC CLOUD Prof. Shraddha More 1, Jigar Maniyar 2, Mrunmayee Vartak 3, Prasobh Nair 4, Chirag Raul 5 1,2,3,4,5 Department of Information Technology,

More information

Biometric Attendance Management System using Raspberry Pi

Biometric Attendance Management System using Raspberry Pi Biometric Attendance Management System using Raspberry Pi Varun Panditpautra 1, Adrija Goswami 2, Aishwarya Khavare 3, Prof. Sarita Ambadekar 4 Department of Computer Engineering, K.J. Somaiya Institute

More information

B.TECH/M.TECH MINOR/MAJOR PROJECT

B.TECH/M.TECH MINOR/MAJOR PROJECT 1 B.TECH/M.TECH MINOR/MAJOR PROJECT CSE/IT Project list of JAVA/ANDROID: New Patient Registry Management system MySQL Database Management Using Java Restaurant Billing Management System Library Management

More information

IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online):

IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 UTS 2.0: Online/Offline, Authenticate, Paperless Local Railway Unreserved Ticket Booking

More information

BIOMETRIC PRINTER SECURITY SYSTEM

BIOMETRIC PRINTER SECURITY SYSTEM BIOMETRIC PRINTER SECURITY SYSTEM A.S.Karthiga 1, k.saravanakumar 2, R.Aravind 3, M.Karthi 4, S.P.Dwarakesh M.E., 5, 1,2,3,4 UG Scholar, Dept. of EEE, 5 Assistant professor of EEE, Erode Sengunthar Engineering

More information

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES We are experts in, CODING SUPPORT FOR FINAL YEAR PROJECT JOURNAL PREPARATION

More information

Implementation of ATM security using IOT

Implementation of ATM security using IOT Implementation of ATM security using IOT Mahalakshmi.T.K 1, J.Kumudha 2, M.Ranjitha 3, Mr.J.Gurumurthy 4, Dr.D.Sivakumar 5 1,2,3 Department of electronics and communication engineering, Easwari engineering

More information

IEEE PROJECTS ON EMBEDDED SYSTEMS

IEEE PROJECTS ON EMBEDDED SYSTEMS S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of

More information

EMBEDDED MAJOR PROJECTS LIST

EMBEDDED MAJOR PROJECTS LIST CODE PROJECT TITLE APPLICATION TECHNOLOGY /CORE KTEMB 01 KTEMB 02 KTEMB 03 A Location Aided Flooding Mechanism In Community Based Iot Networks An Iot Based Fire Alarming And Authentication System For Workhouse

More information

Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at

Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 Design of Architecture for Efficient

More information

Challenges in Aadhaar Implementation : Opportunities for products and innovations Proposal Presentation

Challenges in Aadhaar Implementation : Opportunities for products and innovations Proposal Presentation Challenges in Aadhaar Implementation : Opportunities for products and innovations Proposal Presentation 27 May 2011 ?????? Conception is easy Delivery is difficult 2 Agenda About Aadhaar- What the world

More information

Cost Minimization by QR Code Compression

Cost Minimization by QR Code Compression Cost Minimization by QR Code Compression Sharu Goel #1, Ajay Kumar Singh *2 #1 M. Tech Student & CSE Deptt., Meerut Institute of Engineering and Technology, Baghpat Bypass Road, NH- 58, Meerut, UPTU, (India)

More information

BIOMETRIC BASED VOTING MACHINE

BIOMETRIC BASED VOTING MACHINE Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 4, April-2018 BIOMETRIC BASED VOTING MACHINE

More information

COMPARATIVE ANALYSIS OF IPV4 & IPV6 IN CLOUD ENVIRONMENT FOR FTP & DATABASE SERVICES

COMPARATIVE ANALYSIS OF IPV4 & IPV6 IN CLOUD ENVIRONMENT FOR FTP & DATABASE SERVICES COMPARATIVE ANALYSIS OF IPV4 & IPV6 IN CLOUD ENVIRONMENT FOR FTP & DATABASE SERVICES Mr. Ammar Rafique**, Mr. Muhammad Waqas Anwar, Mr. Haris Shabbir, Mr. Moazzam Ali Baig, Mr. Rohail Ayaz Computer Science

More information

A SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET KEYS

A SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET KEYS Volume 116 No. 6 2017, 149-153 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET

More information

Applying biometric authentication to physical access control systems

Applying biometric authentication to physical access control systems Applying biometric authentication to physical access control systems Published on 24 Jul 2018 Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market

More information

Comparison of Web and Mobile UTS E-Governance Application A Case on Mumbai Railways

Comparison of Web and Mobile UTS E-Governance Application A Case on Mumbai Railways IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727 PP 63-67 www.iosrjournals.org Comparison of Web and Mobile UTS E-Governance Application A Case on Mumbai Railways Dr.Jaya

More information

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN. Volume 115 No. 6 2017, 585-589 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS

More information

A System for Monitoring Hand Hygiene Compliance based-on Internet-of- Things

A System for Monitoring Hand Hygiene Compliance based-on Internet-of- Things - 2018 Embedded Systems IEEE FINAL YEAR Projects @ JP infotech S.NO Project Code IEEE SYSTEM Project Titles Domain Year 1 JPE1701 A System for Monitoring Hand Hygiene Compliance based-on Internet-of- Things

More information

VOICE BASED HOME AUTOMATION USING AMAZON DOT T.S.Karthick 1, K.Malini 2 1,2

VOICE BASED HOME AUTOMATION USING AMAZON DOT T.S.Karthick 1, K.Malini 2 1,2 VOICE BASED HOME AUTOMATION USING AMAZON DOT T.S.Karthick 1, K.Malini 2 1,2 Assistant Professor, IT, CAHCET, Vellore ABSTRACT In recent years, the field of Internet of Things (IoT) has seen significant

More information

Implementation of Aadhaar Based EVM

Implementation of Aadhaar Based EVM Implementation of Aadhaar Based EVM Kiran Chavan 1, Kashinath Raut 2, Ashish Bhingardive 3, Yogesh Kolape 4, D. M. Ujalambkar 5 1, 2, 3, 4, 5 Computer Department, Savitribai Phule Pune University Abstract:

More information

Internet of Things(IoT):A Future Vision OF MODERN SOCIETY

Internet of Things(IoT):A Future Vision OF MODERN SOCIETY RESEARCH ARTICLE OPEN ACCESS Internet of Things(IoT):A Future Vision OF MODERN SOCIETY Nidhi Shukla 1, Sandhya Mishra 2 1(Computer Science, Shambhunath Institute of Engineering & Technology, Allahabad

More information

Embedded Systems Projects

Embedded Systems Projects Embedded Systems Projects I. Embedded based ANDROID Mobile Systems 1. Health Assessment Monitoring using Embedded sensor data for Mobile Apps (IEEE 2. Precise pressure indication using simultaneous Electro

More information

Android Application on E-Ticketing Railway System Using Qr-Code

Android Application on E-Ticketing Railway System Using Qr-Code IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Volume 13, PP 33-38 www.iosrjen.org Android Application on E-Ticketing Railway System Using Qr-Code Vinay Maheshwar 1, Kalpesh

More information

NEAR FIELD COMMUNICATION - THE FUTURE TECHNOLOGY FOR AN INTERACTIVE WORLD

NEAR FIELD COMMUNICATION - THE FUTURE TECHNOLOGY FOR AN INTERACTIVE WORLD Int. J. Engg. Res. & Sci. & Tech. 2013 Jignesh Patel and Badal Kothari, 2013 Research Paper ISSN 2319-5991 www.ijerst.com Vol. 2, No. 2, May 2013 2013 IJERST. All Rights Reserved NEAR FIELD COMMUNICATION

More information

Need and Challenges of Driving License Authentication Using Biometrics

Need and Challenges of Driving License Authentication Using Biometrics Need and Challenges of Driving License Authentication Using Biometrics Divya Gangamwar Akash Bande Pallavi Gaykar Dr. Nilesh J Uke Professor, ABSTRACT License authentication is a very difficult task for

More information

IoT-based Collision Avoidance System for Railways using Fog Computing

IoT-based Collision Avoidance System for Railways using Fog Computing IoT-based Collision Avoidance System for Railways using Fog Computing Prof. A. Haja Abdul Khader 1 and Dr. N. Jayaveeran 2 1 Asst. Professor, Department of Computer Science, Khadir Mohideen College, Adirampattinam,

More information

To book Train Tickets live online UK/Europe/Eurostar

To book Train Tickets live online UK/Europe/Eurostar To book Train Tickets live online UK/Europe/Eurostar 1. Go to the Agent Portal at www.agent.internationalrail.com.au 2. Click on Rail Tickets & Passes 3. Login using your International Rail Username and

More information

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)

More information

Smart Home Control System by Internet of Things Based on WIFI Module

Smart Home Control System by Internet of Things Based on WIFI Module Smart Home Control System by Internet of Things Based on WIFI Module M.Sangeetha 1, C.Udhayanila 2, G.Gayathri 3, N.Rakshana 4 Assistant Professor, Dept. of ECE, Kathir College of Engineering, Coimbatore,

More information

Creating Web Server in Android Mobile and Easy Serving of Information to Clients

Creating Web Server in Android Mobile and Easy Serving of Information to Clients Indian Journal of Science and Technology, Vol 9(39), DOI: 10.17485/ijst/2016/v9i39/102073, October 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Creating Web Server in Android Mobile and Easy

More information

Communication Models in Internet of Things: A Survey

Communication Models in Internet of Things: A Survey IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 11 May 2017 ISSN (online): 2349-784X Communication Models in Internet of Things: A Survey Santosh Kulkarni Lecturer Department

More information

INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL.

INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL. INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL. From IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1, FEBRUARY 2014 Presented by: Abid Contents Objective Introduction Smart City Concept & Services

More information

Classroom Automation System

Classroom Automation System Classroom Automation System Mrs. Tanuja Sali, Mr. Chetan Pardeshi, Mr. Vikas Malshette, Mr. Akshay Jadhav, Mr. Vishal Thombare Abstract The application of Internet of Things in the modern world is the

More information

Attractive Urban Developments Achieved through Fusion of OT, IT, and Products Hitachi s Urban Solutions

Attractive Urban Developments Achieved through Fusion of OT, IT, and Products Hitachi s Urban Solutions Concept Attractive Urban Developments Achieved through Fusion of OT, IT, and Products Hitachi s Urban Solutions With Japan s population now beginning to decline, there is a pressing need for ways of generating

More information

AUTOMATED GARBAGE COLLECTION USING GPS AND GSM. Shobana G 1, Sureshkumar R 2

AUTOMATED GARBAGE COLLECTION USING GPS AND GSM. Shobana G 1, Sureshkumar R 2 Volume 118 No. 20 2018, 751-755 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AUTOMATED GARBAGE COLLECTION USING GPS AND GSM Shobana G 1, Sureshkumar

More information

Connecting a Laser Level Transmitter to the Cloud

Connecting a Laser Level Transmitter to the Cloud IOT-ASAP 2018 AT ICSA 2018, 2018-04-30 IoT Challenges for Smart Manufacturing Connecting a Laser Level Transmitter to the Cloud Heiko Koziolek, Senior Principal Scientist, ABB Corporate Research Germany

More information

MCA APPLICATION TITLES LIST

MCA APPLICATION TITLES LIST 1. Automated tele-network system JAVA 2. Car Rental System JAVA 3. City Information System JAVA 4. College Feedback System JAVA 5. Design and strategies for online voting system JAVA 6. E-Learning JAVA

More information

Deprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018

Deprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 Deprecating the Password: A Progress Report Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 The password problem Alpha-numeric passwords are hard for humans to remember and easy

More information

The Aadhaar Project NANDAN NILEKANI CHAIRMAN UNIQUE IDENTIFICTION AUTHORITY OF INDIA

The Aadhaar Project NANDAN NILEKANI CHAIRMAN UNIQUE IDENTIFICTION AUTHORITY OF INDIA The Aadhaar Project NANDAN NILEKANI CHAIRMAN UNIQUE IDENTIFICTION AUTHORITY OF INDIA OVERALL MANDATE OF THE AADHAAR PROJECT AADHAAR AND IT S POTENTIAL DIRECT BENEFIT TRANSFER AND AADHAAR WHY AADHAAR FOR

More information

Real Time Application of Cpm & Pert in the Field of Operation Research Using Sharegrin40 Software in Scsvmv University, Kanchipuram.

Real Time Application of Cpm & Pert in the Field of Operation Research Using Sharegrin40 Software in Scsvmv University, Kanchipuram. Volume 117 No. 13 2017, 403-410 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Real Time Application of Cpm & Pert in the Field of Operation Research

More information

V.V. COLLEGE OF ENGINEERING

V.V. COLLEGE OF ENGINEERING A.R. NIVETHITHAA BE 1 ST YEAR V.V. COLLEGE OF ENGINEERING TISAIYANVILAI DIGITAL FIANCIAL LITERACY India is a developing economy with focus on achieving sustainable development. To achieve sustainable development,

More information

Lecture 41 Blockchain in Government III (Digital Identity)

Lecture 41 Blockchain in Government III (Digital Identity) Blockchains Architecture, Design and Use Cases Prof. Sandip Chakraborty Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 41 Blockchain in Government III

More information

INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom

INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom CAUTIONARY STATEMENT This presentation may contain forward-looking statements

More information

Unique ID Management Mrs. Hemangi Kulkarni, Aniket Yadav, Darpan Shah, Pratik Bhandari, Samuya Mahapatra

Unique ID Management Mrs. Hemangi Kulkarni, Aniket Yadav, Darpan Shah, Pratik Bhandari, Samuya Mahapatra Unique ID Management Mrs. Hemangi Kulkarni, Aniket Yadav, Darpan Shah, Pratik Bhandari, Samuya Mahapatra Department of Computer Engineering, Pune University Address hemangikulkarni21@gmail.com ayadav4003@gmail.com

More information

IOT BASED MOBILE CHARGING WITH SOLAR ENERGY BY COIN INSERTION

IOT BASED MOBILE CHARGING WITH SOLAR ENERGY BY COIN INSERTION IOT BASED MOBILE CHARGING WITH SOLAR ENERGY BY COIN INSERTION 1 GURURAJ. P. MATHAD, 2 SHARATH REDDY, 3 PUNITH C M, 4 B.T. VENKATESH MURTHY 1,2,3 Department of Electronics & Communication Engineering, Siddaganga

More information

EMBEDDED MAJOR PROJECTS LIST

EMBEDDED MAJOR PROJECTS LIST EMBEDDED MAJOR PROJECTS LIST GSM AND GPS BASED REAL TIME APPLICATIONS 1. AGRICULTURE FIELD MOTOR CONTROL SYSTEM USING GSM. 2. FIRE DETECTION AND AUTOMATIC ALERT SYSTEM. 3. WEATHER MONITORING SYSTEM IN

More information

Three Level Authentication for Student Attendance Management System

Three Level Authentication for Student Attendance Management System Volume 119 No. 15 2018, 1997-2012 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ Three Level Authentication for Student Attendance Management System 1 G.Ravi

More information

Smart City IoT Solution Brings Data Insight to Transportation

Smart City IoT Solution Brings Data Insight to Transportation Smart City IoT Solution Brings Data Insight to Transportation The customer summary Customer name San Diego Metropolitan Transit System Industry Transportation Location San Diego Cisco, Davra Networks,

More information

Singapore s National Digital Identity (NDI):

Singapore s National Digital Identity (NDI): Singapore s National Digital Identity (NDI): Leaving no one behind Kwok Quek Sin Director, National Digital Identity Programme Government Technology Agency PART 1 INTRODUCTION TO NDI Better Living For

More information

Smart Security For Car Using OT

Smart Security For Car Using OT Smart Security For Car Using OT M.N Aishwarya 1, Dr. Priyatam Kumar 1 1 Department of Electronics and Communication Engineering, B.V.B College of Engineering Technology, Hubli, Karnataka, India Abstract-

More information

Internet of Things (IOT) What It Is and How It Will Impact State Pools

Internet of Things (IOT) What It Is and How It Will Impact State Pools NLC Mutual Insurance Company 660 Capitol Street NW Suite 450 Washington, DC 20001 Internet of Things (IOT) What It Is and How It Will Impact State Pools MAY 19, 2017 RYAN DRAUGHN, DIRECTOR OF INFORMATION

More information

INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES

INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES Scientific Journal Impact Factor (SJIF): 1.711 e-issn: 2349-9745 p-issn: 2393-8161 International Journal of Modern Trends in Engineering and Research www.ijmter.com INNOVATIVE AUTOMOBILE SECURITY SYSTEM

More information

Out of the Fog: Use Case Scenarios. Industry. Smart Cities. Visual Security & Surveillance. Application

Out of the Fog: Use Case Scenarios. Industry. Smart Cities. Visual Security & Surveillance. Application Out of the Fog: Use Case Scenarios Industry Application Smart Cities Visual Security & Surveillance 0 Executive Summary Surveillance and security cameras are being deployed worldwide in record numbers

More information

Automated Biometric Attendance Management System

Automated Biometric Attendance Management System Automated Biometric Attendance Management System Sushama Shetty 1, Shubham Raut 2, Kirti Patil 3, Vaibhavi Save 4 1,2,3,4 Electronics and telecommunication, St. John College of Engineering and Management,

More information

INTERNET OF THINGS BASED OFFICE AUTOMATION SYSTEM USING ANDROID

INTERNET OF THINGS BASED OFFICE AUTOMATION SYSTEM USING ANDROID INTERNET OF THINGS BASED OFFICE AUTOMATION SYSTEM USING ANDROID Aparna S. Kapare 1, Prof S.A.Shaikh 2 1 PG Student, Pravara Rural College of Engg, Loni 2 Associate Professor, Pravara Rural College of Engg,

More information

Internet of secure things: issues and perspectives. Pasquale Pace Dimes - UNICAL

Internet of secure things: issues and perspectives. Pasquale Pace Dimes - UNICAL Internet of secure things: issues and perspectives Pasquale Pace Dimes - UNICAL ppace@dimes.unical.it Table of Contents: Inter-IoT European Project» http://www.inter-iot-project.eu/ IoT Security IoT Authentication

More information

Remember to attach all receipts over $75.00 and check the Receipt Attached box for the expense or line item

Remember to attach all receipts over $75.00 and check the Receipt Attached box for the expense or line item 2 Remember to attach all receipts over $75.00 and check the Receipt Attached box for the expense or line item You can use your mouse pointer and Hover over items and labels to provide you with extra information

More information

ABSTRACT I. INTRODUCTION II. FINGERPRINT RECONIGATION. Department of Electronics & Instrumentation Engineering, GIET, Gunupur, Odisha, India

ABSTRACT I. INTRODUCTION II. FINGERPRINT RECONIGATION. Department of Electronics & Instrumentation Engineering, GIET, Gunupur, Odisha, India International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 Fingerprint Recognition through Extracting and

More information

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for

More information

Libelium Cloud Hive. Technical Guide

Libelium Cloud Hive. Technical Guide Libelium Cloud Hive Technical Guide Index Document version: v7.0-12/2018 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General and information... 4 1.1. Introduction...4 1.1.1. Overview...4 1.2. Data

More information

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY Volume 119 No. 15 2018, 1557-1564 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY S. EsaiPuvanesh

More information

ITU Arab Forum on Emerging Technologies Algiers Algeria, Feb. 2018

ITU Arab Forum on Emerging Technologies Algiers Algeria, Feb. 2018 ITU Arab Forum on Emerging Technologies Algiers Algeria, 14-15 Feb. 2018 IOT AS THE NEXT MILESTONE FOR INNOVATIONS IN THE 21 ST CENTURY by: Osama Ghanim Nour Smart Solution 14 th Feb 2018 3 Time Attendance

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Digital Interconnect Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively

More information

A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography

A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography Ashok Kumar J 1, and Gopinath Ganapathy 2 1,2 School of Computer Science, Engineering and Applications

More information

Smart Cities & The 4th Industrial Revolution

Smart Cities & The 4th Industrial Revolution Smart Cities & The 4th Industrial Revolution August 2nd, 2018 Tom Snyder ncriot.org @ncriot Capture IoT opportunities for our community locally, regionally, and nationally RIoT Ecosystem 6,000 Participants

More information

Multi Packed Security Addressing Challenges in Cloud Computing

Multi Packed Security Addressing Challenges in Cloud Computing Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Real Time Monitoring of Solar Panel Using IoT #1 Gajanan Manohar Chinke, #2 Nikhil Diliprao Payal, #3 Atul Bhagwan Patil,

Real Time Monitoring of Solar Panel Using IoT #1 Gajanan Manohar Chinke, #2 Nikhil Diliprao Payal, #3 Atul Bhagwan Patil, ISSN 2395-1621 Real Time Monitoring of Solar Panel Using IoT #1 Gajanan Manohar Chinke, #2 Nikhil Diliprao Payal, #3 Atul Bhagwan Patil, #4 Shubham Mahadev More, #5 Prof. Neha Avinash Zope 3 atul.patil074@gmail.com

More information

IOT Based Cloud Integrated Parking, Trolley Identification and Outdoor Mapping System at Airport

IOT Based Cloud Integrated Parking, Trolley Identification and Outdoor Mapping System at Airport IOT Based Cloud Integrated Parking, Trolley Identification and Outdoor Mapping System at Airport D. Narendar Singh, B. Pavitra, M. Anusha Abstract: In every airport, it is mandatory to maintain the security

More information

Project Note: Safe and Secure Amdavad (SASA)

Project Note: Safe and Secure Amdavad (SASA) Project Note: Safe and Secure Amdavad (SASA) Smart City Ahmedabad inaugurated its Integrated Command and Control Centre under the Safe and Secure Amdavad (SASA) Project at Paldi, on 23rd of February, at

More information

Smart Door Lock Opening In Cars Using Face Recognition

Smart Door Lock Opening In Cars Using Face Recognition Smart Door Lock Opening In Cars Using Face Recognition 1 Vinil Kumar.V, 1 Divya.N, 2 Mr. K.S.Vairavel 1 PG Scholar, M.E (Embedded System), Bannari Amman Institute of Technology, Sathyamangalam, India 1

More information

Bluetooth Based Home Appliance Control System with Feedback Voice Response Using Android Application

Bluetooth Based Home Appliance Control System with Feedback Voice Response Using Android Application Bluetooth Based Home Appliance Control System with Feedback Voice Response Using Android Application Md. Ismail Husain 1, Md. Emdadul Haque 2 and Md. Harun. or. Rashid 3 1, 2, 3 Department of Information

More information

IEEE-SA Internet of Things - Security & Standards

IEEE-SA Internet of Things - Security & Standards IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:

More information

IoT Based Traffic Signalling System

IoT Based Traffic Signalling System IoT Based Traffic Signalling System Ashok. P.V B.Tech Graduate, Department of Information Technology, SivaSankari.S Assistant Professor, Department of Information Technology, Vignesh Mani B.Tech Graduate,

More information

IRCTC windows 10 e-ticket booking screens

IRCTC windows 10 e-ticket booking screens IRCTC windows 0 e-ticket booking screens. Login screen Enter valid Username & password and click on Done To generate new password, click on Forgot Password 3 New user can create their profile on click

More information

A Two-Fold Authentication Mechanism for Network Security

A Two-Fold Authentication Mechanism for Network Security Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1

More information

The Internet of Things: Mobile Food Vendor Tracking

The Internet of Things: Mobile Food Vendor Tracking The Internet of Things: Mobile Food Vendor Tracking Bringing IoT technologies into the government sector. A case study on how a Large City Department of Health could track mobile food vendors and increase

More information

Minutiae Based Fingerprint Authentication System

Minutiae Based Fingerprint Authentication System Minutiae Based Fingerprint Authentication System Laya K Roy Student, Department of Computer Science and Engineering Jyothi Engineering College, Thrissur, India Abstract: Fingerprint is the most promising

More information

SMARTPHONE BASED SURVEILLANCE SYSTEM WITH INTRUSION DETECTION

SMARTPHONE BASED SURVEILLANCE SYSTEM WITH INTRUSION DETECTION International Journal of Computer Engineering and Applications, Volume XI, Special Issue, May 17, www.ijcea.com ISSN 2321-3469 SMARTPHONE BASED SURVEILLANCE SYSTEM WITH INTRUSION DETECTION Sneha Khandare

More information

BIOMETRIC SYSTEM TO SECURE THE INTERNET OF THINGS

BIOMETRIC SYSTEM TO SECURE THE INTERNET OF THINGS BIOMETRIC SYSTEM TO SECURE THE INTERNET OF THINGS Olja Latinović Faculty of Organizational Sciences, University of Belgrade, Belgrade, Republic of Serbia, oljalatinovic88@gmail.com Critical review DOI:

More information

BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES

BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES 1V. Sai Venkatalakshmi, 2 N. Deivanayaki, 3 A. Risvanul Jannah 1M.E student, 2 Associate Professor, 3 Assistant

More information

E-Voting System based on Mobile using NIC and SIM

E-Voting System based on Mobile using NIC and SIM E-Voting System based on Mobile using NIC and SIM Balaji Ghate Satish Talewar Sanket Taware J. V. Katti college of Engg. ABSTRACT Mobile is emerging technology and center of attraction for worldwide end-user.

More information

Security in NFC Readers

Security in NFC Readers Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic

More information

connecting citizens A resource of creative ideas, industry expertise & innovative product, to connect citizens in a new digital age..

connecting citizens A resource of creative ideas, industry expertise & innovative product, to connect citizens in a new digital age.. Partnered with connecting citizens & the LinkNYC program A resource of creative ideas, industry expertise & innovative product, to connect citizens in a new digital age.. BENEFITS ENABLERS step forward

More information

VOICE CONTROLLED WIRELESS HOME AUTOMATION SYSTEM

VOICE CONTROLLED WIRELESS HOME AUTOMATION SYSTEM VOICE CONTROLLED WIRELESS HOME AUTOMATION SYSTEM Authors: Ezhil Venthan S & Gokulapriyan A, Computer Science and Engineering, Kingston Engineering College, Vellore. Guide: Dr.U.V.Arivazhagu M.E.,M.B.A.,Ph.d.,

More information

Design of an Automatic Fare Collection System Using Near Field Communication with Focus on Indian Metrorail

Design of an Automatic Fare Collection System Using Near Field Communication with Focus on Indian Metrorail International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 4 (April 2014), PP.20-24 Design of an Automatic Fare Collection System

More information

SECURITY ENHANCEMENT OF E-VOTING SYSTEM

SECURITY ENHANCEMENT OF E-VOTING SYSTEM SECURITY ENHANCEMENT OF E-VOTING SYSTEM CHAPTER-4 Security is one of the most important issues for a reliable and trusted Electronic Voting system. The term E-Voting is used in different ways and it encompasses

More information

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services A Layered Approach to Fraud Mitigation Nick White Product Manager, FIS Payments Integrated Financial Services Session Agenda Growing Fraud Concerns Old Habits Die Hard Maneuvering through the Barriers

More information

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data Volume 117 No. 15 2017, 1087-1094 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Eradication of Vulnerable host from N2N communication Networks using

More information

Security for V2X Communications

Security for V2X Communications Security for V2X Communications ITS Canada Annual General Meeting May 1-4, 2016 Brian Romansky VP Strategic Technology Your Connected Car Your Connected Car Security Security Partner Partner TrustPoint

More information

IOT Deployed PPI. Montgomery County, MD Thingstitute A case study of three test environments

IOT Deployed PPI. Montgomery County, MD Thingstitute A case study of three test environments IOT Deployed PPI Montgomery County, MD Thingstitute A case study of three test environments What problems exist in IoT? Scalability How many devices can be communicating? Sustainability How long can a

More information

A Review:Internet of Things(IoT) Based Smart Home Automation

A Review:Internet of Things(IoT) Based Smart Home Automation A Review:Internet of Things(IoT) Based Smart Home Automation Vimal Nakrani 1, Mayank Panchal 2, Dipesh Thakkar 3,Sanket Pednekar 4, Prof. Yogita Mane 5 1,2,3,4 Information Technology, Universal College

More information

It s Time to take control

It s Time to take control It s Time to take control Thomas Persson Account Manager Ericsson Nordic Rail, Jönköping 11 Oct-2017 Ericsson - the driver for the Networked Society - PMI Chapter meeting 27 August 2015 Fragmented market

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India

More information

Corporate Profile. Applying minds to technology

Corporate Profile. Applying minds to technology Corporate Profile AEM is the leading provider of indigenously designed & built technology solutions in India. We have addressed the most challenging real-time communication & collaboration needs of defense

More information

Shaping Smart Sustainable Cities in Asia Pacific Mr. Sameer Sharma, Senior Advisor, ITU 30 March 2018

Shaping Smart Sustainable Cities in Asia Pacific Mr. Sameer Sharma, Senior Advisor, ITU 30 March 2018 TRANSFORMATION TOWARDS SUSTAINABLE AND RESILIENT SOCIETIES IN ASIA AND THE PACIFIC Shaping Smart Sustainable Cities in Asia Pacific Mr. Sameer Sharma, Senior Advisor, ITU 30 March 2018 ITU at a glance

More information

Social Value Creation via IoT

Social Value Creation via IoT Social Value Creation via IoT Smart City, Enterprise and Service Solutions Kurt Jacobs kurt.jacobs@necect.com NEC Enterprise Communication Technologies 3 June 2016 The Earth in 2050 (Source:OECD, FAO,

More information

GRANDSTREAM PRIVACY STATEMENT

GRANDSTREAM PRIVACY STATEMENT GRANDSTREAM PRIVACY STATEMENT This Privacy Statement governs how Grandstream Networks, Inc. and its affiliates ( Grandstream, us, our or we ) may collect, use, and disclose information that we obtain through

More information

Charting the Progress of Smart City Development in Shanghai

Charting the Progress of Smart City Development in Shanghai Charting the Progress of Smart City Development in Shanghai Xueguo Wen Executive Vice President of Shanghai Academy 2017 TM Forum 1 C ONTENTS Current situation Experience and outlook Strategic cooperation

More information