Series-4 (March-April 2019)March-April 2019 Issue Statistics
Series-1 Series-2 Series-3 Series-4
- Citation
- Abstract
- Reference
- Full PDF
- Download Cover Page
Paper Type | : | Research Paper |
Title | : | Society Management System |
Country | : | India |
Authors | : | Hitesh Solanki || Deshna Yadav || Aarti Yadav || Prof. Chintan Shah |
: | 10.9790/0661-2102040104 |
Abstract: Being a human, there are three necessities of life: food, clothing, and shelter. Nowadays lots of applications are developed for clothing and foods where we can order online 24*7. People are struggling and working too hard to complete their needs and requirements so they think all things should be quick, easy and automatic and hence we propose a solution for easy and faster management of societies. Our society management system deals with many functions such as daily notices, monthly meetings, cultural events, miscellaneous contacts for their daily needs, domestic help, committee calendars, complaint section, automatic bill generation etc.[4]. It also maintains parking issues, cultural events and funds, emergency funds and add them automatically in the bill..
Keywords: Security, transparency, digitization
[1]. Muhammad Barbar, Fazlullah Khan, Waseem Iqbal, Abid Yahy "A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment", 10.1109/ACCESS.2018.2861421, IEEE Access, 2016 [2]. Rutuja Vatharkar, Pratiksha Patil, Swati Sonar, "IMPLEMENTATION OF SOCIETY MANAGEMENT SYSTEM: SOCIETALES ", International Journal of Science & Technology, ISSN (online): 2250-141X, Vol. 6 Issue 2, April 2016
[3]. Rahul Bhagwat, Aashay Bharadwaj, Vivek Harsode, Anurag Chawake, Mrs. Deepali Bhanage, "Society
Management Application on Android", International Research Journal of Engineering and Technology (IRJET), May-2018.
[4]. E. W. T. Ngaia YongHub, Y. H. Wonga, YijunChen XinSunb "The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature" Decision Support Systems Volume 50, Issue 3, February 2011, Pages 559-569
[5]. Shivganga Gavhane ,Rutuja Vatharkar ,Pratiksha Patil Swati Sonar "Study of Implementation of Society Management System " International Journal of Computer Applications (0975 – 8887) Volume 132 No.1, December 2015
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | E-Commerce service model based on cloud |
Country | : | India |
Authors | : | Deepak || Meenu |
: | 10.9790/0661-2102040511 |
Abstract: Cloud computing provides a powerful, scalable and flexible infrastructure into which one can integrate previously known techniques and methods of Data Mining. Cloud computing has changed the way of computing. It delivers the software services to the clients on demand. It also provides the capacity to users to connect to calculate resources and access IT managed services with a previously unknown level of ease. Due to this greater level of flexibility, the cloud has become the breeding ground of a new generation of products and services.. There are different types of software applications are running on the environment of cloud computing. E-Commerce is one of the major.........
Key Words: Electronic data interchange(EDI), cloud computing,B2B,B2C,C2B,C2C.
[1]. T. Dillon, C. Wu, and E. Chang, "Cloud Computing: Issues and Challenges," 2010, pp. 27–33
[2]. "Nevin Aydin," Cloud Computing for E-Commerce," IOSR Journal of Mobile Computing & Application, Volume 2, Issue 1. (Mar. - Apr. 2015), pp 27-31.
[3]. Y. Jadeja and K. Modi, "Cloud computing- concepts, architecture and challenges," in Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on, 2012, pp. 877–880.
[4]. Danping Wang," Influences of Cloud Computing on E-Commerce Businesses and Industry", Journal of Software Engineering and Applications, 2013, 6, pp 313-318.
[5]. R. L. Grossman, "The Case for Cloud Computing, IT Professional, Vol. 11, No. 2, 2009, pp. 23-27..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Digital Forensics Framework for Facebook Activity Logs |
Country | : | |
Authors | : | Youssef Bassil |
: | 10.9790/0661-2102041218 |
Abstract: Facebook is one of the most widely used social networks with over two billion active users. According to recent surveys, five new users are created every second on Facebook, of which 3.6% are fake. Fake users are generally created for hiding people's real identity, nonetheless, they are sometimes created to commit illegal activities and cybercrimes. Facebook has lately introduced to their platform a feature called "Activity Logs". It is a tool that lists all online activities performed by a particular user on his Facebook account including posts, comments, likes...........
[1]. Liu, H., Maes, P., Davenport, G., Unraveling the Taste Fabric of Social Networks. InternationalJournal on Semantic Web and Information Systems, vol.2, no.1, pp. 42-71, 2006.
[2]. "Key Facts", Facebook Newsroom, FacebookInc, Retrieved January, 2019.
[3]. "Facebook Reports Fourth Quarter and Full Year 2018 Results", Menlo Park, Calif, Retrieved January 30, 2019
[4]. Zephoria, The Top 20 Valuable Facebook Statistics, March 2019, Url: https://zephoria.com/top-15-valuable-facebook-statistics/
[5]. Roger McNamee, "Zucked: Waking up to the Facebook Catastrophe", HarperCollins. ISBN 9780008318994, 2019..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This study aims to produce a computer application that is able to classify banking leads by analyzing each leads based on business intelligence on sales force automation applications. The classification is potential leads, regular leads, and dormant leads. Data obtained from Bank OCBC NISP Branch Seminyak - Bali transaction records from customer's data and their transactions. Applications are tested using blackbox testing and usability testing. Blackbox testing shows that each part of the application provides results that are in line with the expected output. Usability Testing shows a value of 79,286 which means the application is acceptable and easy to use.
Keywords: Black Box, Business Intelligence, Data Mining, Sales Force Automation, Usability
[1]. De Angelis, L. and Dias, J. G. (2014) 'Mining categorical sequences from data using a hybrid clustering method', European Journal of Operational Research. Elsevier B.V., 234(3), pp. 720–730. doi: 10.1016/j.ejor.2013.11.002.
[2]. Background, A. (2015) 'Information System for Depicting Relations between Banking Customer with Risk : Study Case in Indonesia', pp. 125–128.
[3]. Hassan, M. (2012) 'Evaluating the Benefits of Using Sales force automation Technology in the Palestinian Commercial Firms'. Available at: http://scholar.najah.edu/sites/default/files/all-thesis/mohammed_omar_hasan.pdf.
[4]. Kumar, R., Sharma, Y., Agarwal, S. and Parashar, B. B. (2014) 'Extremely effective CRM Solution Using Salesforce', International Journal of Emerging Technologies and Innovative Research, 1(5), pp. 278–282.
[5]. Moro, S., Cortez, P. and Rita, P. (2015) 'Expert Systems with Applications Business intelligence in banking : A literature analysis from 2002 to 2013 using text mining and latent Dirichlet allocation', 42, pp. 1314–1324. doi: 10.1016/j.eswa.2014.09.024..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In the digital world, which is currently evolving and changing at such a rapid pace, the security of information has become increasingly more important. To preserve the secrecy of the information, cryptography has specific roles to protect files from unauthorized access. In this paper, a new robust and lightweight cryptography algorithm named as LWC is suggested to increase security at a cheaper cost in the Symmetric- key producing algorithm. This algorithm ensures data stability, integration and privacy for those data files which are in size around 1 K.B to 512 K.B. Considering the lower time and power consumption and the hardware capabilities of IoT devices, this solution provides a cheap and effective alternative for them.
[1]. J. J. W. Wanping and J. Cheng, "The research and design of atm pin pad based on triple des," in IEEE International Conference on Information and Automation (ICIA, pp. 443 – 447, 2011.
[2]. S. Kurita and K. Komoriya, "Privacy protection on transfer system of automated teller machine from brute force attack," in International Conference on Advanced Information Networking and Applications Workshops (WAINA), vol. Fukuoka, pp. 72 – 77, 2012.
[3]. T. K. A. Hiltgen and T. Weigold, "Secure internet banking authentica- tion, security privacy," IEEE, pp. 21 – 29, 2006.
[4]. V. Cunsolo and S. Distefano, "Achieving information security in net- work computing systems," in Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, (Chengdu), pp. 71 – 77, 2009.
[5]. P. D. L. O. Dandash and B. Srinivasan, "Security analysis for in- ternet banking models," in Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Paral- lel/Distributed Computing, (Qingdao), pp. 1141 – 1146, 2007.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The current decade of technology gives the concept of intelligent transportation systems. The intelligent transportation systems need the reliable communication. For the reliability of communication in VANET network used various security and communication model. In this paper proposed the cluster based threshold function for the reliable communication. The proposed algorithm used distributed clustering technique for the region selection of mobile vehicles. The speed and path divergence set the value of threshold for the selection of new path and avoid the malicious packet from the other nodes. The malicious packets increase the traffic load and decrease the performance of VANET network. The proposed algorithm simulated in MATLAB and used urban traffic scenario for the evaluation of parameters.
Keywords: VANET, Clustering, Thresholding, Reliable, MATLAB, Traffic..
[1]. Congyi Liu, ChunxiaoChigan and Chunming Gao "Compressive Sensing based Data Collection in VANETs", IEEE, 2013, Pp 1756-1761.
[2]. Narendra Mohan Mittal and Savita Choudhary "Comparative Study of Simulators for Vehicular Ad-hoc Networks (VANETs)", International Journal of Emerging Technology and Advanced Engineering, 2014, Pp 528-537.
[3]. Duc Ngoc Minh Dang, Choong Seon Hong, Sungwon Lee and Eui-Nam "An Efficient and Reliable MAC in VANETs", IEEE, 2014, Pp 616-619.
[4]. Mahmoud Hashem Eiza and Qiang Ni "An Evolving Graph-Based Reliable Routing Scheme for VANETs", IEEE, 2013, Pp 1493-1504.
[5]. Ming-Chin Chuang and Meng Chang Chen "DEEP: Density-Aware Emergency Message Extension Protocol for VANETs", IEEE, 2013, Pp 4983-4993..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: As part of the national FrenchSafeCity project to handle access and security in schools, identification methods were implemented on an embedded system. The contract specifications required self-contained, fast, and reliable face identification via on-site cameras. To answer these constraintsthe Vander Lugt Correlator architecturewas selected as it provides a compromise between implementation complexity, robustness and discrimination and is an efficient way to check for similarities.As is, VLC identification is limited for a number of cases including illumination variation, strong discrimination (robustness against impostors) and face rotation. To overcome.........
Keywords: experimental implementation, correlation, pre-processing, VLC, phase-only filters, gradients, histogram equalization.
[1]. A. Quaglia, C.M. Epifano, eds., Face recognition: methods, applications and technology, Nova Science, New York, 2012.
[2]. Q. Wang, A. Alfalou, C. Brosseau, New perspectives in face correlation research: a tutorial, Advances in Optics and Photonics. 9 (2017) 1. doi:10.1364/AOP.9.000001.
[3]. A. Alfalou, A. Kouas, M. Elbouz, Y. Ouerhani, C. Brosseau, A. Fakhfakh, F. Ghozzi, A new correlation criterion based on energy distribution: face recognition application, in: M.S. Alam (Ed.), Pattern Recognition and Tracking XXIX, SPIE, Orlando, United States, 2018: p. 42. doi:10.1117/12.2312500.
[4]. M. Jridi, T. Napoléon, A. Alfalou, One lens optical correlation: application to face recognition, Applied Optics. 57 (2018) 2087. doi:10.1364/AO.57.002087.
[5]. J. L. Tribillon, CorrélationOptique, Teknéa, Toulouse, 1999...
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Neuronal outgrowth assessment is useful to understand the development of peripheral or central neurons and their regeneration after wounding. It consists in the determination of the length of the cell extensions (neurite length) using photos of neuron cultures. As the manual determination of neurite length is time-consuming and operator-dependent, many semi- or fully-automated methods have been developed. Most of them have been designed to analyze fluorescence microscopy images which allow clear delineation of cell bodies and neurites from the background. In this paper, we propose a new easy-to-use fully automated computer vision methodbased on denoising, background........
Keywords: Light microscopy, image processing, living sensory neurons, neurite length, automatic processing, statistical analysis tool.
[1]. S.-T. Hsieh, W.-M. Lin, Modulation of Keratinocyte Proliferation by Skin Innervation, Journal of Investigative Dermatology. 113 (1999) 579–586. doi:10.1046/j.1523-1747.1999.00737.x.
[2]. V. Buhé, Pathophysiological study of sensitive skin, ActaDermatoVenereologica. 96 (2016) 314–318.
[3]. Laverdet B, Danigo A, Girard D, Magy L, Demiot C , Desmoulière A , Skin innervation: important roles during normal and pathological cutaneous repair, Histology and Histopathology. (2015) 875–892. doi:10.14670/HH-11-610.
[4]. N.M. Radio, W.R. Mundy, Developmental neurotoxicity testing in vitro: Models for assessing chemical effects on neurite outgrowth, NeuroToxicology. 29 (2008) 361–376. doi:10.1016/j.neuro.2008.02.011.
[5]. E.J. Calabrese, Enhancing and Regulating Neurite Outgrowth, Critical Reviews in Toxicology. 38 (2008) 391–418. doi:10.1080/10408440801981981.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The operation and management of dehydration systems for the determination of liquid and gas dew points is becoming increasingly complex. Several methods for prediction of the liquid and gas dew points have been developed by researchers. These methods differ in the available inputs, their classification and the horizon of the prediction. In this paper, a nonlinear auto-Regressive with eXogenous (NARX) input model has been proposed. The data driven modelling approach was adopted in the proposed model with System Identification toolbox in MATLAB software. Implementation and simulation of the model which was achieved by feeding the measured input data into the developed model shows that the model is able to reproduce the dew-point (measured output) of the dehydrator bed, and hence gives a good prediction of it.
Keywords: final prediction error, loss function evaluation, model estimation, Modelling Structure, system identification
[1]. E. J. Akpabio and V. J. Aimikhe, Dynamics of Solid Bed Dehydration in a Niger Delta Natural Gas Liquids Plant, International Journal of Engineering and Technology, 2(12), 2012, 2026-2032.
[2]. A. Elshorbagy, G. Corzo, S. Srinivasulu and D. P Solomatine, Experimental investigation of the predictive capabilities of data driven modelling techniques in hydrology - Part 2: Application, Hydrology and Earth System Sciences, 14(10), 2010, 1943-1961.
[3]. S. Guillaume and B. Charnomordic, Fuzzy inference systems: An integrated modelling environment for collaboration between expert knowledge and data using FisPro, Expert Systems with Applications, 39(10), 2015, 8744- 8755.
[4]. K. J. Åström and P. Eykhoff, System identification—A survey, Automatica, 7(2), 2009, 23-162.
[5]. S. Avila, A. Benito, C. Berro, S. Blanco, S. Otín, and I. Velasco, Dew-Point Curves of Natural Gas. Measurement and Modelling,Industrial & Engineering Chemistry Research, 45(14), 2002, 179-5184...
- Citation
- Abstract
- Reference
- Full PDF
Abstract: A failure in detecting 'estrus' is one of the factors that can cause reproductive problems and low pregnancy rates in cattle groups. Generally, detecting estrus can be done by looking at cattle behavior in vulva condition. Beside that, there are some cows that their sub estrus or silent heat do not really show their estrus symptoms physically, such as the vulva swells, flushes and the clear liquid comes out by hanging from the vulva or seen at the base of the tail. Based on these conditions, it can be clearly seen that not all breeders are able to detect animal estrus properly. From the aforementioned problem, it was proposed a system that can detect 'estrus' of cattle based on the cattle's movements. The system was built by using Arduino based accelerometer that hopely can detect estrus by sending the warning system to the breeder. The results of system performance testing using percentile approach compared to expert results obtained an accuracy of 77.77%.
Keywords: Arduino, Accelerometer, Estrus, Bali Cattle
[1] Mahmud Siswanto, N. W. (2013). Penampilan Reproduksi Sapi Bali pada Peternakan Intensif di Instalasi Pembibitan Pulukan. Jurnal Ilmu dan Kesehatan Hewan Vol.1 No.1, 11-15.
[2] Hariadi, M. S. (2011). Ilmu Kemajiran pada Ternak. . Surabaya: University Press.
[3] Prihatno, S. A. (2013). Profil Biokimia Darah pada Sapi Perah yang Mengalami Kawin Berulang. Jurnal Kedokteran Hewan.
[4] Anneke, A. (2010). Indeks Reproduksi Sebagai Faktor Penentu Efisiensi Reproduksi Sapi Perah : Fokus Kajian Pada Sapi Perah Bos Taurus. Semiloka Nasional Prospek Industri Sapi Perah Menuju Perdagangan Bebas, (pp. 61-73).
[5] Laming, S. (2004). Performans Reproduksi Sapi Perah dan Sahiwal Cross di Kabupaten Enrekang. Makasar: Skripsi, Fakultas Peternakan Universitas Hasanuddin
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In the past few years uses of electronic commerce technology and credit card has increased dramatically. As a credit card becomes the most popular way of paying there are cases of fraud associated with regular purchases. An HMM is initially trained with the usual behavior of a cardholder. If someone's Credit card transactions are not accepted by trained HMM With sufficiently high probability, it is considered Fraudulent. At the same time, we try to ensure that the real Transaction is not denied using (hybrid model).In this paper we presents the HMM improved Naïve Bayes method for Fraud Detection of Credit Card. Experimental results illustrate that both classifiers work differently for the same dataset. The purpose is to enhance the accuracy and enhance the flexibility of the algorithm.
Keywords: Credit card, Fraud, Hidden Markov Model(HMM), Naïve Bayes.
[1]. HetaNaik, Credit Card Fraud Detection for Online Banking Transactions, InternationalJournal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 6.887Volume 6 Issue IV.
[2]. AbhinavSrivastava, AmlanKundu, ShamikSural, Arun K. Majumdar, Credit Card Fraud Detection Using Hidden Markov Model, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5, NO. 1, JANUARY-MARCH 2008.
[3]. Shailesh S. Dhok, Credit Card Fraud Detection Using Hidden Markov Model, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012
[4]. V. Bhusari, S. Patil, Application of Hidden Markov Model in Credit Card Fraud Detection, International Journal of Distributed and Parallel Systems (IJDPS) Vol.2, No.6, November 2011
[5]. Divya Singh, Asst. Prof. RakeshPandit, Credit Card Fraud Detection Using Hidden Markov Model,International Journal of Scientific & Engineering Research, Volume 6, Issue 1, January- 2015 1488 ISSN 2229-5518.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Increasing Scope of Internet in India |
Country | : | India |
Authors | : | Dr. Halapagol Pruthviraj |
: | 10.9790/0661-2102047780 |
Abstract: India has one of the biggest and quickest developing populaces of Internet clients on the planet, which is assessed to be around 190 million as of June 2014 and developing quickly. India as of now has the third biggest Internet populace on the planet today, after China with 620 million and the US with 275 million. The development in the Internet base in India is currently exponential. It took 20 years from the acquaintance of the Internet with arrive at 100 million clients. The second 100 million will probably be reached inside three years, and the third in under a yearThe current article depicts the expanding pattern of internet administrations in India.
Keywords: Internet, Digital, Mobile
[1]. https://www.kpmg.com/IN/en/IssuesAndInsights/ArticlesPublications/Documents/BBGRetail.pdf
[2]. http://articles.economictimes.indiatimes.com/keyword/online-shopping
[3]. http://dazeinfo.com/tag/emarketer/
[4]. Butler, P. and Peppard, J., "Consumer purchasing on the Internet: Process and Prospects", European Management Journal, Vol. 16, No. 5: 600-610, 2014.
[5]. Donthu, N.; Garcia, A.,"The Internet shopper", Journal of Advertising Research, Vol. 39, No. 3, pp. 52-58, 2013..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Power Factor Enhancement Using Active Power Factor Correction Methods |
Country | : | India |
Authors | : | Kasa Chiranjevi || Jibanananda Mishra |
: | 10.9790/0661-2102048189 |
Abstract:Single-phase switch mode ac-dc converters are being used as front-end rectifiers for a variety of
applications due to the advantages of high efficiency and power density. The mains current in an ac/dc
converter contains periodic current pulses dueto the action of rectifier and output filter capacitor. The main
focus of this study is to review variousexisting wave shaping methods in terms of their efficiency and power
factor. Among the various wave shaping techniques, the improved active current wave shaping methods are
analyzed and are simulated in PSIM software. The active method using a boost converter topology where
MOSFET switch driven by therectangular pulses of continuously varying duty cycle over a period of supply
voltage is analyzed in this paper......
Key Word: MOSFET switch, Single-phase switch mode ac-dc converters
[1]. J D Van Wyk. .Power Quality, Power Electronics and Control.. in Proceedings EPE.93, 1993, pp 17-32.
[2]. Z Yang and P C Sen. .Recent Developments in High Power Factor Switch mode Converters.. in IEEE Proceedings CCECE.98,
1998, pp 477-480.
[3]. H Akagi. .New Trends in Active Filters for Power Conditioning.. IEEE Transactions Industry Applications, vol 32,
November/December 1996, pp 1312-1322.
[4]. H Endo, T Yamashita and T Sugiura. .A High Power-factor Buck Converter..in Proceedings IEEE PESC.92, 1992, pp 1071-1076
[5]. S K Mazumder, A H Nayfeh and D Borojevic. .A Novel Approach to the Stability Analysis of Boost Power -factor-correction
Circuits.. in Proceedings IEEE PESC.01, 2001, pp 1719-1.
- Citation
- Abstract
- Reference
- Full PDF
Abstract:Accessibility of drinking water on the earth is less. Sun powered stills are utilized to change over
saline water into new water. Various models and plans of sun based stills have been made to build the day by
day profitability of the still. In such manner a sun oriented still with discrete consolidating chamber is created
to upgrade the pace of buildup and subsequently the efficiency. Their exhibitions as far as vitality and exergy
efficiencies were contrasted and the traditional still. The trial was directed in the premises of SHUATS
Allahabad, U.P., INDIA. It was seen that the exergy effectiveness of still with isolated consolidating chamber is
60.8% more than the customary sun powered still.
Key words: Solar still, separate condensing chamber solar still, exergy efficiency.
[1]. Kumar S., Tiwari A. An experimental study of hybrid photovoltic thermal (PV/T) active solar still. Int. J Energy Res 2008; 32: 847-
858.
[2]. Kaushal Varun A Solar stills: a review. Renew sustain Energy Rev; 14; 446-453.
[3]. Bahadur B., Dubey Richa, Rai A.K. Performance study of a solar still with salt hydrate as energy storage medium. International
journal of Mechanical Engineering and Technology (IJMET) 2017, Volume 8, Issue 2, pp. 289–294.
[4]. Torchia-Nùǹez JC, Porta-Gàndara MA, Cervantes-de Gortari JG. Exergy analysis of s passive solar still. Renew Energy 2008; 33:
608-616.
[5]. Zoori H Aghaei, Tabrizi F Farshchi, Sarhaddi F, Hashmatnezhad F. Comparision between energy and exergy efficiencies in a weir
type cascade solar still. Desalination 2013; 325: 113-121.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Smart Garbage Collector System |
Country | : | India |
Authors | : | Archana Senapati || Bhupesh Daka |
: | 10.9790/0661-21020495103 |
Abstract:In many countries maintaining the cities neat and clean has become a great challenge with the
growing population. This issue is further leading to diseases. The foul smell that comes from any garbage bin
system or from any waste is very dangerous and may lead to dreadful diseases. By announcing that a city is
turning to be smart means that the city is maintained neat and clean along with some advanced technology
being implemented. Here the concept tells about on the solution being addressed towards the wastage
maintenance especially the Garbage Bin system. Internet of Things is emerging with smart applications being
proposed for addressing many problems in a smart way. Smart Garbage Bin System is implemented by using the
Internet of Things technology.
Keywords: Arduino, GPS, LCD, Sensor System, Integration, Smart Garbage Bin, Wi-Fi.
[1]. L. Atzori, A. Iera, and G. Morabito (2010) The internet of things: A survey, Comput. Netw., vol. 54, no. 15, pp. 2787–2805.
[2]. D. Cuff, M. Hansen, and J. Kang, Urban sensing (2008): Out of the woods," Commun.ACM, vol. 51, no. 3, pp. 24–33.
[3]. I.Vilajosana, J. Llosa, B. Martinez, M. Domingo-Prieto, A. Angles, and X. Vilajosana (2013), Bootstrapping smart cities through a
self sustainable model based on big data flows, IEEE Commun. Mag., vol. 51, no. 6, pp. 128–134
[4]. J.P. Lynch and J. L. Kenneth (2006), A summary review of wireless sensors and sensor networks for structural health monitoring,
Shock and Vibration Digest, vol. 38, no. 2, pp. 91–130.
[5]. A.R. Al-Ali, I. Zualkernan, and F. Aloul (2009), A mobile GPRS sensors array for air pollution monitoring, IEEE Sensors J., vol.
10, no. 10, pp. 1666–1671.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Spring Configured and Shock Absorber of an Atv |
Country | : | India |
Authors | : | Rahul Prajapati || Nabnit Panigrahi |
: | 10.9790/0661-210204104108 |
Abstract:Shock absorbers are a basic piece of a suspension framework, associating the vehicle to its wheels.
The requirement for structuring the dampers emerges in light of the roll and pitches related with vehicle
moving, and from the unpleasantness of streets. In the mid nineteenth century, street quality was commonly
extremely poor. shock absorbers are gadgets that smooth out a motivation experienced by a vehicle, and
properly disperse or assimilate the dynamic vitality. safeguards have become such a fundamental segment of a
car and, after its all said and done there has been no specific strategy to test it utilizing Finite Element Analysis
procedure and the majority of the testing is finished utilizing the physical tests. Subsequently this paper centers
around to grow new connected procedures that will permit specialists to plan parts of Shock Absorbers by
utilizing FEM based devices.
Key words: Muffler, Silencer, BSFC, BTE
[1]. Human Activity Analysis version 5 Release 14
[2]. G. Sailaja, N. Seetharamaiah and M. Janardhana, Design and Finite Element Analysis of MR Fluid Damper For Structural Vibration
Mitigation, International Journal of Mechanical Engineering and Technology (IJMET), 7(4), 2016, pp. 143–151.
[3]. Tune to win By Carroll Smith
[4]. A Study of Important Human Dimensions and Percentile values for the Indian Collegiate Rowers
[5]. auto.howstuffworks.com.