SMART RAIL RESERVATION AND VERIFICATION SYSTEM WITH UNIQUE IDENTIFICATION IN IoT USING CLOUD DATABASE
|
|
- Cornelia Hodge
- 5 years ago
- Views:
Transcription
1 Volume 119 No , ISSN: (on-line version) url: ijpam.eu SMART RAIL RESERVATION AND VERIFICATION SYSTEM WITH UNIQUE IDENTIFICATION IN IoT USING CLOUD DATABASE 1 Adapa Sri Kumar Satya Ganapathi, 2 S.Praveen Kumar, 3 P.Madhusudhanan, 4 S.Ranjith Kumar, 5 M.Ganesan Department of CSE, Sri manakula Vinayagar Engineering College ABSTRACT The Internet of Things is inter-networking of physical devices, buildings, and other items which are embedded with electronics, software, sensors, actuator, and network connectivity that enable these objects to collect and exchange data. The devices which are connecting to internet are called IoT Devices. In technical we can say it as the device which has IP Address is called as an IoT Device. Analysts say that by 2020 there will be over 50 billion devices. That's a lot of connections. More over some estimate that it would be 100 billion devices. In general ticket reservation for the Indian railways is quite a complex process. This involves various steps which could be much complicated for illiterates. More over Indian railways is using more than 2 tonnes of paper for booking and verification process. To avoid these problems and more over to move the nation towards digitalization we are proposing this idea. Here in this proposal we are building web-based application for reservation and mobile application for ticket verification process. Keywords: IoT :Internet of Things I. INTRODUCTION The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actu ators, and connectivity which enables these objects to connect and exchange data. Each thing is uniquely identifiable through its embedded computing system but is able to inter-operate within the existing Internet infrastructure. The figure of online capable devices increased 31% from 2016 to 8.4 billion in 2017.Experts estimate that the IoT will consist of about 30 billion objects by It is also estimated that the global market value of IoT will reach $7.1 trillion by The IoT allows objects to be sensed or controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems, and resulting in improved efficiency, accuracy and economic benefit in addition to reduced human intervention. When IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyberphysical systems, which also encompasses technologies such as smart grids, virtual power plants, smart homes, intelligent transportation and smart cities. II. RELATED WORKS 279
2 S No Name of the Author Title Proposed Algorithm Advantage of Concept Drawback Mr. Godson Michael D silva, Mr. Anoop Kunjumon Scariah, Mr. Lukose Roy Pannapara, Ms. Jessica John Joseph Md. Foisal Mahedi Hasan,Golam Tangim, Md. Kafiul Islam, Md. Rezwanul Haque Khandokar, ArifUl Alam Smart Ticketing System for Railways in Smart Cities using Software as a Service Architecture RFID-based Ticketing for Public Transport System 3. Kirti Dhiman, Er. CK Raina IoT Based Ticket Checking System Vijaysanthi. R, Radha. N, Jaya Shree. M, Sindhujaa. V Dhvani. K. Shah, Dr. Vinayak A. Bharadi, V. J. Kaul, and Sameer Amrutia Fingerprint Authentication using Raspberry Pi based on IoT End-to-end Encryption based Biometric SaaS AWS cloud based service using AWS IoT and RFID Smart cards with RFID technology used for the public transport system QR code is generation for purchasing the ticket and authenticated with QR code for verification. Biometric authentication using GT-511C3 and Raspberry-Pi Fingerprint Sensor and Wi-Fi module is integrated with the Raspberry Pi uploading it to the Azure Cloud Service Effective and can be monitored easily using cloud service and also reduces the man powers The whole system is fully automated and installed with using RFID sensors The ticket verification is done using QR code generator Authentication is done with fingerprint which is compared with database sets that present in the cloud Saas based finger print authentication system with easy and fast access from cloud. It is only applicable to suburban regions alone. Installation of RFID sensor at each stop cost higher. Unauthorized persons can travel without verification The sensor converts them into image and compare with the other one. Bit costlier to manage azure and connectivity with other database is not up to mark. Mr. Godson Michael D silva, Mr.AnoopKunjumonScariah, Mr.Lukose Roy Pannapara and Ms. Jessica John Joseph proposed the ticketing system for railways for suburbs region in order to /authenticate and authorize using smart cards. These Smart Cards are maintained with a balance amount to travel from source to destination. It is implemented in AWS public cloud service.it captures the RFID Sensors data through Raspberry Pi device and then it publishes the event to the cloud. In addition to that, the crowd analysis and cost-effective features [6-9] are included. Md.FoisalMahediHasan et. Al., were proposed RFID based tickets in the bus transportation. The total system mainly acts to bring out the consistency among various bus agencies that will conclude in uniform access of passengers in daily rides through an automated server being updated every single time the passengers travel by carrying the RFID based tickets. KirtiDhiman, Er. And CK Raina proposed IOT module to check the tickets of the passenger in the train. When the ticket is issued to the passenger a QR code is generated to the passenger's mobile number and this is used for the verification of ticket. Vijaysanthi. R et. Al., were presented the Fingerprint Authentication using Raspberry Pi based on IoT, where the fingerprint is collected by the optical sensor, which relays to cloud via Raspberry Pi. The fingerprints to be authenticated are stowed in a file server and web server performs 1:N verification once it obtains the data through POST request. It sends out a retort based on match score along with fingerprint index ID. Dhvani. K et. Al., were proposed End-to-end Encryption based Biometric SaaS. These systems are used in various applications like ATMs, voting system, aadhar card, attendance management system etc. The fingerprint and face detection are done with the Raspberry Pi as an authentication node and upload it the Microsoft Azure cloud service. EXISTINGSYSTEM In the existing reservation system, booking itself includes two types of methodologies. One is PRS System and the other one is Online booking which is provided by IRCTC. In both the cases we need to enter details such as name, age, gender, preference and other things. After that availability will checked and booking will be completed as per the wish. This even includes the payment gateway also. DRAWBACKS In the current system there are many disadvantages which are to be rectified. The main thing which comes under is about allocation of lower berths. Even for senior citizens, medically ill and pregnant ladies. During Verification there are possibilities for fake identification also. So there could possibility of unauthenticated travel by stranger also. More over the main disadvantage is about payment for waiting list 280
3 passengers and un travelled passengers. Untravelled passengers are not given any refund and those untraveled seats were sold out for the officers profit. Even in verification there is a lot s of quantity of paper is used. PROPOSED SYSTEM For overcoming these problems were are proposing a new idea. For booking purpose we are going to use an web application which is developed in Java JSP technology. Through this web application we can book ticket using our biometrics as the primary key. Since our biometric is recorded in the UIDAI Aadhar- KYC system there won t be necessary to enter any further details. For booking tickets for multiple passengers, it is necessary to have their aadhar number for booking the ticket. While in case of the verification time, biometrics should be verified for all the passenger who boarded in the train. If the passenger has a confirmed ticket then it will verify. Otherwise it will check in the waiting list. For waiting list, if the data is not authenticated means it will go refund if not no refund will be provided. For verification we are going to use a specially designed mobile application. This application is accessed by using an external fingerprint sensor or with an inbuilt sensor. Each official will have individual login credentials. So, by this itself we can identify every thing. Un travelled seats are automatically allocated for boarded waiting list passengers. More over with is application, Lower seat preference will be adjusted by the medical track and senior citizenship claim also. Main thing which we are going to utilize is here is AEPS. This means Aadhar Enabled Payment System. By this system payment is done by using biometric id itself. Refund will be also given with consideration of this biometric. a).architecture for AEPS. b) Backend processing at the time of reservation b) Backend processing at the time of verification. REFERENCES: [1] Mr. Godson Michael D silva, Mr.AnoopKunjumonScariah, Mr.Lukose Roy Pannapara and Ms. Jessica John Joseph Smart Ticketing System for Railways in Smart Cities using Software as a Service Architecture International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I- SMAC 2017) [2] Md. FoisalMahediHasan, *GolamTangim, *Md. Kafiul Islam, *Md. RezwanulHaqueKhandokar, *** ArifUlAlam RFID-based Ticketing for Public Transport System /10/$ IEEE [3] Kirti Dhiman1, Er. CK Raina2 IoT Based Ticket Checking System Vol. 6, Issue 3, March 2017 [4] Vijaysanthi. R, Radha. N, Jaya Shree. M, Sindhujaa. V Fingerprint Authentication using Raspberry Pi basedoniot [5] Dhvani. K. Shah, Dr.Vinayak A. Bharadi, V. J. Kaul,SameerAmrutia End-to-end Encryption based Biometric SaaS 281
4 [6] Syamala, M., Nalini, N.J., Ragupathy, R., Magulur, L.P., "Random forest classifier approach for blurred images", (2017) International Journal of Pure and Applied Mathematics, 116 (6 ), pp [7] Utkam, S.G., Parasa, R., Kondapaneni, A., Tulabandula, P.R.K., Kuppala, D.R., "A secured symmetric key encryption technique using images as secret keys", (2017) International Journal of Pure and Applied Mathematics, 116 (6 ), pp [8] Veeraiah, T., Mahamkali, A., Kishore, B.N.P., Rao, A.N., Rao, S.K.M., "Image denoising by profunditymap methodusing diagram base change and group scanty", (2017) International Journal of Pure and Applied Mathematics, 115 (8 ), pp [9] Veeraiah, T., Rao, S.K.M., "Classification of fuzzy rule based order-statistic filters for color images", (2017) International Journal of Pure and Applied Mathematics, 115 (8 ), pp
5 283
6 284
ONLINE BIOMETRIC VERIFICATION USING APACHE STORM ON PUBLIC CLOUD
ONLINE BIOMETRIC VERIFICATION USING APACHE STORM ON PUBLIC CLOUD Prof. Shraddha More 1, Jigar Maniyar 2, Mrunmayee Vartak 3, Prasobh Nair 4, Chirag Raul 5 1,2,3,4,5 Department of Information Technology,
More informationBiometric Attendance Management System using Raspberry Pi
Biometric Attendance Management System using Raspberry Pi Varun Panditpautra 1, Adrija Goswami 2, Aishwarya Khavare 3, Prof. Sarita Ambadekar 4 Department of Computer Engineering, K.J. Somaiya Institute
More informationB.TECH/M.TECH MINOR/MAJOR PROJECT
1 B.TECH/M.TECH MINOR/MAJOR PROJECT CSE/IT Project list of JAVA/ANDROID: New Patient Registry Management system MySQL Database Management Using Java Restaurant Billing Management System Library Management
More informationIJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online):
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 UTS 2.0: Online/Offline, Authenticate, Paperless Local Railway Unreserved Ticket Booking
More informationBIOMETRIC PRINTER SECURITY SYSTEM
BIOMETRIC PRINTER SECURITY SYSTEM A.S.Karthiga 1, k.saravanakumar 2, R.Aravind 3, M.Karthi 4, S.P.Dwarakesh M.E., 5, 1,2,3,4 UG Scholar, Dept. of EEE, 5 Assistant professor of EEE, Erode Sengunthar Engineering
More informationA QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES
A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES We are experts in, CODING SUPPORT FOR FINAL YEAR PROJECT JOURNAL PREPARATION
More informationImplementation of ATM security using IOT
Implementation of ATM security using IOT Mahalakshmi.T.K 1, J.Kumudha 2, M.Ranjitha 3, Mr.J.Gurumurthy 4, Dr.D.Sivakumar 5 1,2,3 Department of electronics and communication engineering, Easwari engineering
More informationIEEE PROJECTS ON EMBEDDED SYSTEMS
S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of
More informationEMBEDDED MAJOR PROJECTS LIST
CODE PROJECT TITLE APPLICATION TECHNOLOGY /CORE KTEMB 01 KTEMB 02 KTEMB 03 A Location Aided Flooding Mechanism In Community Based Iot Networks An Iot Based Fire Alarming And Authentication System For Workhouse
More informationVolume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at
Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 Design of Architecture for Efficient
More informationChallenges in Aadhaar Implementation : Opportunities for products and innovations Proposal Presentation
Challenges in Aadhaar Implementation : Opportunities for products and innovations Proposal Presentation 27 May 2011 ?????? Conception is easy Delivery is difficult 2 Agenda About Aadhaar- What the world
More informationCost Minimization by QR Code Compression
Cost Minimization by QR Code Compression Sharu Goel #1, Ajay Kumar Singh *2 #1 M. Tech Student & CSE Deptt., Meerut Institute of Engineering and Technology, Baghpat Bypass Road, NH- 58, Meerut, UPTU, (India)
More informationBIOMETRIC BASED VOTING MACHINE
Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 4, April-2018 BIOMETRIC BASED VOTING MACHINE
More informationCOMPARATIVE ANALYSIS OF IPV4 & IPV6 IN CLOUD ENVIRONMENT FOR FTP & DATABASE SERVICES
COMPARATIVE ANALYSIS OF IPV4 & IPV6 IN CLOUD ENVIRONMENT FOR FTP & DATABASE SERVICES Mr. Ammar Rafique**, Mr. Muhammad Waqas Anwar, Mr. Haris Shabbir, Mr. Moazzam Ali Baig, Mr. Rohail Ayaz Computer Science
More informationA SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET KEYS
Volume 116 No. 6 2017, 149-153 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET
More informationApplying biometric authentication to physical access control systems
Applying biometric authentication to physical access control systems Published on 24 Jul 2018 Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market
More informationComparison of Web and Mobile UTS E-Governance Application A Case on Mumbai Railways
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727 PP 63-67 www.iosrjournals.org Comparison of Web and Mobile UTS E-Governance Application A Case on Mumbai Railways Dr.Jaya
More informationPRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.
Volume 115 No. 6 2017, 585-589 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS
More informationA System for Monitoring Hand Hygiene Compliance based-on Internet-of- Things
- 2018 Embedded Systems IEEE FINAL YEAR Projects @ JP infotech S.NO Project Code IEEE SYSTEM Project Titles Domain Year 1 JPE1701 A System for Monitoring Hand Hygiene Compliance based-on Internet-of- Things
More informationVOICE BASED HOME AUTOMATION USING AMAZON DOT T.S.Karthick 1, K.Malini 2 1,2
VOICE BASED HOME AUTOMATION USING AMAZON DOT T.S.Karthick 1, K.Malini 2 1,2 Assistant Professor, IT, CAHCET, Vellore ABSTRACT In recent years, the field of Internet of Things (IoT) has seen significant
More informationImplementation of Aadhaar Based EVM
Implementation of Aadhaar Based EVM Kiran Chavan 1, Kashinath Raut 2, Ashish Bhingardive 3, Yogesh Kolape 4, D. M. Ujalambkar 5 1, 2, 3, 4, 5 Computer Department, Savitribai Phule Pune University Abstract:
More informationInternet of Things(IoT):A Future Vision OF MODERN SOCIETY
RESEARCH ARTICLE OPEN ACCESS Internet of Things(IoT):A Future Vision OF MODERN SOCIETY Nidhi Shukla 1, Sandhya Mishra 2 1(Computer Science, Shambhunath Institute of Engineering & Technology, Allahabad
More informationEmbedded Systems Projects
Embedded Systems Projects I. Embedded based ANDROID Mobile Systems 1. Health Assessment Monitoring using Embedded sensor data for Mobile Apps (IEEE 2. Precise pressure indication using simultaneous Electro
More informationAndroid Application on E-Ticketing Railway System Using Qr-Code
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Volume 13, PP 33-38 www.iosrjen.org Android Application on E-Ticketing Railway System Using Qr-Code Vinay Maheshwar 1, Kalpesh
More informationNEAR FIELD COMMUNICATION - THE FUTURE TECHNOLOGY FOR AN INTERACTIVE WORLD
Int. J. Engg. Res. & Sci. & Tech. 2013 Jignesh Patel and Badal Kothari, 2013 Research Paper ISSN 2319-5991 www.ijerst.com Vol. 2, No. 2, May 2013 2013 IJERST. All Rights Reserved NEAR FIELD COMMUNICATION
More informationNeed and Challenges of Driving License Authentication Using Biometrics
Need and Challenges of Driving License Authentication Using Biometrics Divya Gangamwar Akash Bande Pallavi Gaykar Dr. Nilesh J Uke Professor, ABSTRACT License authentication is a very difficult task for
More informationIoT-based Collision Avoidance System for Railways using Fog Computing
IoT-based Collision Avoidance System for Railways using Fog Computing Prof. A. Haja Abdul Khader 1 and Dr. N. Jayaveeran 2 1 Asst. Professor, Department of Computer Science, Khadir Mohideen College, Adirampattinam,
More informationTo book Train Tickets live online UK/Europe/Eurostar
To book Train Tickets live online UK/Europe/Eurostar 1. Go to the Agent Portal at www.agent.internationalrail.com.au 2. Click on Rail Tickets & Passes 3. Login using your International Rail Username and
More informationMultimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint
Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)
More informationSmart Home Control System by Internet of Things Based on WIFI Module
Smart Home Control System by Internet of Things Based on WIFI Module M.Sangeetha 1, C.Udhayanila 2, G.Gayathri 3, N.Rakshana 4 Assistant Professor, Dept. of ECE, Kathir College of Engineering, Coimbatore,
More informationCreating Web Server in Android Mobile and Easy Serving of Information to Clients
Indian Journal of Science and Technology, Vol 9(39), DOI: 10.17485/ijst/2016/v9i39/102073, October 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Creating Web Server in Android Mobile and Easy
More informationCommunication Models in Internet of Things: A Survey
IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 11 May 2017 ISSN (online): 2349-784X Communication Models in Internet of Things: A Survey Santosh Kulkarni Lecturer Department
More informationINTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL.
INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL. From IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1, FEBRUARY 2014 Presented by: Abid Contents Objective Introduction Smart City Concept & Services
More informationClassroom Automation System
Classroom Automation System Mrs. Tanuja Sali, Mr. Chetan Pardeshi, Mr. Vikas Malshette, Mr. Akshay Jadhav, Mr. Vishal Thombare Abstract The application of Internet of Things in the modern world is the
More informationAttractive Urban Developments Achieved through Fusion of OT, IT, and Products Hitachi s Urban Solutions
Concept Attractive Urban Developments Achieved through Fusion of OT, IT, and Products Hitachi s Urban Solutions With Japan s population now beginning to decline, there is a pressing need for ways of generating
More informationAUTOMATED GARBAGE COLLECTION USING GPS AND GSM. Shobana G 1, Sureshkumar R 2
Volume 118 No. 20 2018, 751-755 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AUTOMATED GARBAGE COLLECTION USING GPS AND GSM Shobana G 1, Sureshkumar
More informationConnecting a Laser Level Transmitter to the Cloud
IOT-ASAP 2018 AT ICSA 2018, 2018-04-30 IoT Challenges for Smart Manufacturing Connecting a Laser Level Transmitter to the Cloud Heiko Koziolek, Senior Principal Scientist, ABB Corporate Research Germany
More informationMCA APPLICATION TITLES LIST
1. Automated tele-network system JAVA 2. Car Rental System JAVA 3. City Information System JAVA 4. College Feedback System JAVA 5. Design and strategies for online voting system JAVA 6. E-Learning JAVA
More informationDeprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018
Deprecating the Password: A Progress Report Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 The password problem Alpha-numeric passwords are hard for humans to remember and easy
More informationThe Aadhaar Project NANDAN NILEKANI CHAIRMAN UNIQUE IDENTIFICTION AUTHORITY OF INDIA
The Aadhaar Project NANDAN NILEKANI CHAIRMAN UNIQUE IDENTIFICTION AUTHORITY OF INDIA OVERALL MANDATE OF THE AADHAAR PROJECT AADHAAR AND IT S POTENTIAL DIRECT BENEFIT TRANSFER AND AADHAAR WHY AADHAAR FOR
More informationReal Time Application of Cpm & Pert in the Field of Operation Research Using Sharegrin40 Software in Scsvmv University, Kanchipuram.
Volume 117 No. 13 2017, 403-410 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Real Time Application of Cpm & Pert in the Field of Operation Research
More informationV.V. COLLEGE OF ENGINEERING
A.R. NIVETHITHAA BE 1 ST YEAR V.V. COLLEGE OF ENGINEERING TISAIYANVILAI DIGITAL FIANCIAL LITERACY India is a developing economy with focus on achieving sustainable development. To achieve sustainable development,
More informationLecture 41 Blockchain in Government III (Digital Identity)
Blockchains Architecture, Design and Use Cases Prof. Sandip Chakraborty Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 41 Blockchain in Government III
More informationINSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom
INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom CAUTIONARY STATEMENT This presentation may contain forward-looking statements
More informationUnique ID Management Mrs. Hemangi Kulkarni, Aniket Yadav, Darpan Shah, Pratik Bhandari, Samuya Mahapatra
Unique ID Management Mrs. Hemangi Kulkarni, Aniket Yadav, Darpan Shah, Pratik Bhandari, Samuya Mahapatra Department of Computer Engineering, Pune University Address hemangikulkarni21@gmail.com ayadav4003@gmail.com
More informationIOT BASED MOBILE CHARGING WITH SOLAR ENERGY BY COIN INSERTION
IOT BASED MOBILE CHARGING WITH SOLAR ENERGY BY COIN INSERTION 1 GURURAJ. P. MATHAD, 2 SHARATH REDDY, 3 PUNITH C M, 4 B.T. VENKATESH MURTHY 1,2,3 Department of Electronics & Communication Engineering, Siddaganga
More informationEMBEDDED MAJOR PROJECTS LIST
EMBEDDED MAJOR PROJECTS LIST GSM AND GPS BASED REAL TIME APPLICATIONS 1. AGRICULTURE FIELD MOTOR CONTROL SYSTEM USING GSM. 2. FIRE DETECTION AND AUTOMATIC ALERT SYSTEM. 3. WEATHER MONITORING SYSTEM IN
More informationThree Level Authentication for Student Attendance Management System
Volume 119 No. 15 2018, 1997-2012 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ Three Level Authentication for Student Attendance Management System 1 G.Ravi
More informationSmart City IoT Solution Brings Data Insight to Transportation
Smart City IoT Solution Brings Data Insight to Transportation The customer summary Customer name San Diego Metropolitan Transit System Industry Transportation Location San Diego Cisco, Davra Networks,
More informationSingapore s National Digital Identity (NDI):
Singapore s National Digital Identity (NDI): Leaving no one behind Kwok Quek Sin Director, National Digital Identity Programme Government Technology Agency PART 1 INTRODUCTION TO NDI Better Living For
More informationSmart Security For Car Using OT
Smart Security For Car Using OT M.N Aishwarya 1, Dr. Priyatam Kumar 1 1 Department of Electronics and Communication Engineering, B.V.B College of Engineering Technology, Hubli, Karnataka, India Abstract-
More informationInternet of Things (IOT) What It Is and How It Will Impact State Pools
NLC Mutual Insurance Company 660 Capitol Street NW Suite 450 Washington, DC 20001 Internet of Things (IOT) What It Is and How It Will Impact State Pools MAY 19, 2017 RYAN DRAUGHN, DIRECTOR OF INFORMATION
More informationINNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES
Scientific Journal Impact Factor (SJIF): 1.711 e-issn: 2349-9745 p-issn: 2393-8161 International Journal of Modern Trends in Engineering and Research www.ijmter.com INNOVATIVE AUTOMOBILE SECURITY SYSTEM
More informationOut of the Fog: Use Case Scenarios. Industry. Smart Cities. Visual Security & Surveillance. Application
Out of the Fog: Use Case Scenarios Industry Application Smart Cities Visual Security & Surveillance 0 Executive Summary Surveillance and security cameras are being deployed worldwide in record numbers
More informationAutomated Biometric Attendance Management System
Automated Biometric Attendance Management System Sushama Shetty 1, Shubham Raut 2, Kirti Patil 3, Vaibhavi Save 4 1,2,3,4 Electronics and telecommunication, St. John College of Engineering and Management,
More informationINTERNET OF THINGS BASED OFFICE AUTOMATION SYSTEM USING ANDROID
INTERNET OF THINGS BASED OFFICE AUTOMATION SYSTEM USING ANDROID Aparna S. Kapare 1, Prof S.A.Shaikh 2 1 PG Student, Pravara Rural College of Engg, Loni 2 Associate Professor, Pravara Rural College of Engg,
More informationInternet of secure things: issues and perspectives. Pasquale Pace Dimes - UNICAL
Internet of secure things: issues and perspectives Pasquale Pace Dimes - UNICAL ppace@dimes.unical.it Table of Contents: Inter-IoT European Project» http://www.inter-iot-project.eu/ IoT Security IoT Authentication
More informationRemember to attach all receipts over $75.00 and check the Receipt Attached box for the expense or line item
2 Remember to attach all receipts over $75.00 and check the Receipt Attached box for the expense or line item You can use your mouse pointer and Hover over items and labels to provide you with extra information
More informationABSTRACT I. INTRODUCTION II. FINGERPRINT RECONIGATION. Department of Electronics & Instrumentation Engineering, GIET, Gunupur, Odisha, India
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 Fingerprint Recognition through Extracting and
More informationAn Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)
An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for
More informationLibelium Cloud Hive. Technical Guide
Libelium Cloud Hive Technical Guide Index Document version: v7.0-12/2018 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General and information... 4 1.1. Introduction...4 1.1.1. Overview...4 1.2. Data
More informationSECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY
Volume 119 No. 15 2018, 1557-1564 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY S. EsaiPuvanesh
More informationITU Arab Forum on Emerging Technologies Algiers Algeria, Feb. 2018
ITU Arab Forum on Emerging Technologies Algiers Algeria, 14-15 Feb. 2018 IOT AS THE NEXT MILESTONE FOR INNOVATIONS IN THE 21 ST CENTURY by: Osama Ghanim Nour Smart Solution 14 th Feb 2018 3 Time Attendance
More informationTwo-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Digital Interconnect Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively
More informationA Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography
A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography Ashok Kumar J 1, and Gopinath Ganapathy 2 1,2 School of Computer Science, Engineering and Applications
More informationSmart Cities & The 4th Industrial Revolution
Smart Cities & The 4th Industrial Revolution August 2nd, 2018 Tom Snyder ncriot.org @ncriot Capture IoT opportunities for our community locally, regionally, and nationally RIoT Ecosystem 6,000 Participants
More informationMulti Packed Security Addressing Challenges in Cloud Computing
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationReal Time Monitoring of Solar Panel Using IoT #1 Gajanan Manohar Chinke, #2 Nikhil Diliprao Payal, #3 Atul Bhagwan Patil,
ISSN 2395-1621 Real Time Monitoring of Solar Panel Using IoT #1 Gajanan Manohar Chinke, #2 Nikhil Diliprao Payal, #3 Atul Bhagwan Patil, #4 Shubham Mahadev More, #5 Prof. Neha Avinash Zope 3 atul.patil074@gmail.com
More informationIOT Based Cloud Integrated Parking, Trolley Identification and Outdoor Mapping System at Airport
IOT Based Cloud Integrated Parking, Trolley Identification and Outdoor Mapping System at Airport D. Narendar Singh, B. Pavitra, M. Anusha Abstract: In every airport, it is mandatory to maintain the security
More informationProject Note: Safe and Secure Amdavad (SASA)
Project Note: Safe and Secure Amdavad (SASA) Smart City Ahmedabad inaugurated its Integrated Command and Control Centre under the Safe and Secure Amdavad (SASA) Project at Paldi, on 23rd of February, at
More informationSmart Door Lock Opening In Cars Using Face Recognition
Smart Door Lock Opening In Cars Using Face Recognition 1 Vinil Kumar.V, 1 Divya.N, 2 Mr. K.S.Vairavel 1 PG Scholar, M.E (Embedded System), Bannari Amman Institute of Technology, Sathyamangalam, India 1
More informationBluetooth Based Home Appliance Control System with Feedback Voice Response Using Android Application
Bluetooth Based Home Appliance Control System with Feedback Voice Response Using Android Application Md. Ismail Husain 1, Md. Emdadul Haque 2 and Md. Harun. or. Rashid 3 1, 2, 3 Department of Information
More informationIEEE-SA Internet of Things - Security & Standards
IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:
More informationIoT Based Traffic Signalling System
IoT Based Traffic Signalling System Ashok. P.V B.Tech Graduate, Department of Information Technology, SivaSankari.S Assistant Professor, Department of Information Technology, Vignesh Mani B.Tech Graduate,
More informationIRCTC windows 10 e-ticket booking screens
IRCTC windows 0 e-ticket booking screens. Login screen Enter valid Username & password and click on Done To generate new password, click on Forgot Password 3 New user can create their profile on click
More informationA Two-Fold Authentication Mechanism for Network Security
Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1
More informationThe Internet of Things: Mobile Food Vendor Tracking
The Internet of Things: Mobile Food Vendor Tracking Bringing IoT technologies into the government sector. A case study on how a Large City Department of Health could track mobile food vendors and increase
More informationMinutiae Based Fingerprint Authentication System
Minutiae Based Fingerprint Authentication System Laya K Roy Student, Department of Computer Science and Engineering Jyothi Engineering College, Thrissur, India Abstract: Fingerprint is the most promising
More informationSMARTPHONE BASED SURVEILLANCE SYSTEM WITH INTRUSION DETECTION
International Journal of Computer Engineering and Applications, Volume XI, Special Issue, May 17, www.ijcea.com ISSN 2321-3469 SMARTPHONE BASED SURVEILLANCE SYSTEM WITH INTRUSION DETECTION Sneha Khandare
More informationBIOMETRIC SYSTEM TO SECURE THE INTERNET OF THINGS
BIOMETRIC SYSTEM TO SECURE THE INTERNET OF THINGS Olja Latinović Faculty of Organizational Sciences, University of Belgrade, Belgrade, Republic of Serbia, oljalatinovic88@gmail.com Critical review DOI:
More informationBIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES
BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES 1V. Sai Venkatalakshmi, 2 N. Deivanayaki, 3 A. Risvanul Jannah 1M.E student, 2 Associate Professor, 3 Assistant
More informationE-Voting System based on Mobile using NIC and SIM
E-Voting System based on Mobile using NIC and SIM Balaji Ghate Satish Talewar Sanket Taware J. V. Katti college of Engg. ABSTRACT Mobile is emerging technology and center of attraction for worldwide end-user.
More informationSecurity in NFC Readers
Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic
More informationconnecting citizens A resource of creative ideas, industry expertise & innovative product, to connect citizens in a new digital age..
Partnered with connecting citizens & the LinkNYC program A resource of creative ideas, industry expertise & innovative product, to connect citizens in a new digital age.. BENEFITS ENABLERS step forward
More informationVOICE CONTROLLED WIRELESS HOME AUTOMATION SYSTEM
VOICE CONTROLLED WIRELESS HOME AUTOMATION SYSTEM Authors: Ezhil Venthan S & Gokulapriyan A, Computer Science and Engineering, Kingston Engineering College, Vellore. Guide: Dr.U.V.Arivazhagu M.E.,M.B.A.,Ph.d.,
More informationDesign of an Automatic Fare Collection System Using Near Field Communication with Focus on Indian Metrorail
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 4 (April 2014), PP.20-24 Design of an Automatic Fare Collection System
More informationSECURITY ENHANCEMENT OF E-VOTING SYSTEM
SECURITY ENHANCEMENT OF E-VOTING SYSTEM CHAPTER-4 Security is one of the most important issues for a reliable and trusted Electronic Voting system. The term E-Voting is used in different ways and it encompasses
More informationA Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services
A Layered Approach to Fraud Mitigation Nick White Product Manager, FIS Payments Integrated Financial Services Session Agenda Growing Fraud Concerns Old Habits Die Hard Maneuvering through the Barriers
More informationEradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data
Volume 117 No. 15 2017, 1087-1094 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Eradication of Vulnerable host from N2N communication Networks using
More informationSecurity for V2X Communications
Security for V2X Communications ITS Canada Annual General Meeting May 1-4, 2016 Brian Romansky VP Strategic Technology Your Connected Car Your Connected Car Security Security Partner Partner TrustPoint
More informationIOT Deployed PPI. Montgomery County, MD Thingstitute A case study of three test environments
IOT Deployed PPI Montgomery County, MD Thingstitute A case study of three test environments What problems exist in IoT? Scalability How many devices can be communicating? Sustainability How long can a
More informationA Review:Internet of Things(IoT) Based Smart Home Automation
A Review:Internet of Things(IoT) Based Smart Home Automation Vimal Nakrani 1, Mayank Panchal 2, Dipesh Thakkar 3,Sanket Pednekar 4, Prof. Yogita Mane 5 1,2,3,4 Information Technology, Universal College
More informationIt s Time to take control
It s Time to take control Thomas Persson Account Manager Ericsson Nordic Rail, Jönköping 11 Oct-2017 Ericsson - the driver for the Networked Society - PMI Chapter meeting 27 August 2015 Fragmented market
More informationGurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3
Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India
More informationCorporate Profile. Applying minds to technology
Corporate Profile AEM is the leading provider of indigenously designed & built technology solutions in India. We have addressed the most challenging real-time communication & collaboration needs of defense
More informationShaping Smart Sustainable Cities in Asia Pacific Mr. Sameer Sharma, Senior Advisor, ITU 30 March 2018
TRANSFORMATION TOWARDS SUSTAINABLE AND RESILIENT SOCIETIES IN ASIA AND THE PACIFIC Shaping Smart Sustainable Cities in Asia Pacific Mr. Sameer Sharma, Senior Advisor, ITU 30 March 2018 ITU at a glance
More informationSocial Value Creation via IoT
Social Value Creation via IoT Smart City, Enterprise and Service Solutions Kurt Jacobs kurt.jacobs@necect.com NEC Enterprise Communication Technologies 3 June 2016 The Earth in 2050 (Source:OECD, FAO,
More informationGRANDSTREAM PRIVACY STATEMENT
GRANDSTREAM PRIVACY STATEMENT This Privacy Statement governs how Grandstream Networks, Inc. and its affiliates ( Grandstream, us, our or we ) may collect, use, and disclose information that we obtain through
More informationCharting the Progress of Smart City Development in Shanghai
Charting the Progress of Smart City Development in Shanghai Xueguo Wen Executive Vice President of Shanghai Academy 2017 TM Forum 1 C ONTENTS Current situation Experience and outlook Strategic cooperation
More information