Android Applications have become an integral fraction of entwined contemporary subsistence. The entire sphere is employing diverse assortment of applications for distinguished intention. Among all the flamboyant assortment of applications, some applications have engrossed apiece individual and are unanimously accepted. With apiece fleeting instant, numerous applications are emerging in the market and are contending amid the contemporary applications in use.The proposed work is a pioneering approach to develop an application for message transference in a cosseted manner. The eminence of the work lies in ensuring that the messages send are in a coded structure, more precisely in encrypted form, formulated from the proposed Cryptographic modus operandi. The focal intention of the proposed work is to augment the status of safekeeping in data transference. The work is a multidisciplinary work and includes Biological principles in devising the Cryptographic modus operandi. Hormonal system is one of the most decisive fractions of human well-being and fundamental structure. There are numerous hormones meant for diverse purposes in human anatomy, more precisely, they are exclusively distinct for male and female. Although, the numeral quotient of hormones is colossal, but in the work, preferred male and female hormones have been employed.The hormones employed, their operational cycle and their way of illustration in the proposed work opens a unique mode to encrypt data and augment the safekeeping echelon. The augmented safekeeping could unearth its employment in numerous modes and in countless places, not only for personal purposes but could also be employed for organizational purpose.The Android Application for the said Cryptographic modus operandi is an initiative for safekeeping of apiece individual employing the Application as well as a universal mold for societal impact on the whole.
{"title":"Design and Implementation of Hormonal Cycle Based Cryptographic Modus Operandi and Android Application Development for Cosseted Transmission","authors":"Rajdeep Chowdhury, Paromita Mitra, Sukhwant Kumar, Satyam Singh, Aditya Singh","doi":"10.1109/ICGCIOT.2018.8753013","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753013","url":null,"abstract":"Android Applications have become an integral fraction of entwined contemporary subsistence. The entire sphere is employing diverse assortment of applications for distinguished intention. Among all the flamboyant assortment of applications, some applications have engrossed apiece individual and are unanimously accepted. With apiece fleeting instant, numerous applications are emerging in the market and are contending amid the contemporary applications in use.The proposed work is a pioneering approach to develop an application for message transference in a cosseted manner. The eminence of the work lies in ensuring that the messages send are in a coded structure, more precisely in encrypted form, formulated from the proposed Cryptographic modus operandi. The focal intention of the proposed work is to augment the status of safekeeping in data transference. The work is a multidisciplinary work and includes Biological principles in devising the Cryptographic modus operandi. Hormonal system is one of the most decisive fractions of human well-being and fundamental structure. There are numerous hormones meant for diverse purposes in human anatomy, more precisely, they are exclusively distinct for male and female. Although, the numeral quotient of hormones is colossal, but in the work, preferred male and female hormones have been employed.The hormones employed, their operational cycle and their way of illustration in the proposed work opens a unique mode to encrypt data and augment the safekeeping echelon. The augmented safekeeping could unearth its employment in numerous modes and in countless places, not only for personal purposes but could also be employed for organizational purpose.The Android Application for the said Cryptographic modus operandi is an initiative for safekeeping of apiece individual employing the Application as well as a universal mold for societal impact on the whole.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126243277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8752970
Ankita Gupta, Abhishek Singhal, A. Sabitha, T. Choudhury
Over the years the utility-customer relationship has rapidly transformed with vast number of factors affecting consumption including environmental factors like geography, weather, population, migration etc. Over the years the utility-customer relationship has rapidly transformed with vast number of factors affecting consumption including environmental factors like geography, weather, population, migration etc. The research work focuses on implementing a data driven approach towards understanding the water utility management, finding loopholes in demand supply patterns and customer base analysis using data analytics methods and geospatial approach. The first half focuses research work aims at understanding the water utility consumption in metropolitan city of parts of City of Delhi, using data analytics that aims at understanding per household consumption of consumers and segmentation of customers based on customer profiling.
{"title":"Water utility management using Data Analytics and Geospatial Analytics for state of Delhi","authors":"Ankita Gupta, Abhishek Singhal, A. Sabitha, T. Choudhury","doi":"10.1109/ICGCIOT.2018.8752970","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8752970","url":null,"abstract":"Over the years the utility-customer relationship has rapidly transformed with vast number of factors affecting consumption including environmental factors like geography, weather, population, migration etc. Over the years the utility-customer relationship has rapidly transformed with vast number of factors affecting consumption including environmental factors like geography, weather, population, migration etc. The research work focuses on implementing a data driven approach towards understanding the water utility management, finding loopholes in demand supply patterns and customer base analysis using data analytics methods and geospatial approach. The first half focuses research work aims at understanding the water utility consumption in metropolitan city of parts of City of Delhi, using data analytics that aims at understanding per household consumption of consumers and segmentation of customers based on customer profiling.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125647555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753041
S. Nandyal, Soumya Mugali
Prisoners are very dangerous and it’s very difficult for the police department to monitor them because, there are chances that the prisoners can try to escape from the prison. To overcome this problem, the present work has been proposed. The work deals with design and development of an automated system to analyze the posture and behavior of the prisoners using the sensors namely, accelerometer sensors and smoke sensor. The sensors are placed on the body of the prisoner mainly, arm, leg and back part. The sensor values will be uploaded on to the cloud periodically. Whenever, the prisoner makes a movement to escape or any misbehavior activities are found, the updated sensor values alert the admin that the prisoner is trying to escape.
{"title":"An Automated System for Identification of Fire and Behaviour of Prisoners Through Posture Using IOT","authors":"S. Nandyal, Soumya Mugali","doi":"10.1109/ICGCIOT.2018.8753041","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753041","url":null,"abstract":"Prisoners are very dangerous and it’s very difficult for the police department to monitor them because, there are chances that the prisoners can try to escape from the prison. To overcome this problem, the present work has been proposed. The work deals with design and development of an automated system to analyze the posture and behavior of the prisoners using the sensors namely, accelerometer sensors and smoke sensor. The sensors are placed on the body of the prisoner mainly, arm, leg and back part. The sensor values will be uploaded on to the cloud periodically. Whenever, the prisoner makes a movement to escape or any misbehavior activities are found, the updated sensor values alert the admin that the prisoner is trying to escape.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133534658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753109
Pushpa Sk, Manjunath T.N, Gireesh Babu C N, Syed Furqan Azeez
Almost every application and web service you join, require you to come with a password which is robust and strong enough to evade attacks. Password strength is a measure of degree to which a password is effective to any random attack. The strength of a password is a combination of length, numbers, complexity and randomness.The need to analyse the strength of a password is to flag weak passwords in order to improve password security. Although, there is not any rule that states a good password but certain guidelines can be followed to differentiate bad passwords. This paper primarily focuses on various authentication threats, steps to mitigate the threats and analysis of password strengths.
{"title":"An Empirical Analysis of Passwords","authors":"Pushpa Sk, Manjunath T.N, Gireesh Babu C N, Syed Furqan Azeez","doi":"10.1109/ICGCIOT.2018.8753109","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753109","url":null,"abstract":"Almost every application and web service you join, require you to come with a password which is robust and strong enough to evade attacks. Password strength is a measure of degree to which a password is effective to any random attack. The strength of a password is a combination of length, numbers, complexity and randomness.The need to analyse the strength of a password is to flag weak passwords in order to improve password security. Although, there is not any rule that states a good password but certain guidelines can be followed to differentiate bad passwords. This paper primarily focuses on various authentication threats, steps to mitigate the threats and analysis of password strengths.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131454134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753096
P. S, Rohit Rayapeddi
Around the world, the telecommunications industry is rapidly expanding, as we are entering into a smartphone dominated era. Internet availability is now cited as a basic necessity and requirement for the generation today. With this, comes a competition amongst service providers to provide the best services to customers, along with the best prices to retain the already existing ones. Customers may choose to leave, for reasons known or unknown due to their experiences with a certain provider. Churn, simply put, is the process where a customer suspends or cancels his/her service with a provider. This paper presents a solution to this problem by recognizing those who may sway towards leaving, providing a vital solution to companies as retentive of existing customer is much easier than securing a new customer. Predictive, unsupervised models can organize and prevent such situations and can tell us what to expect in the near future. The research done here is an application of Logistic regression, Random Forests and K - Means clustering with the help of R - to predict churn. The data set consists of 3400 instances were considered in the dataset and 19 out of 22 attributes being decisive in the process of prediction.
{"title":"Predicting Customer Churn in the Telecom Industry Using Data Analytics","authors":"P. S, Rohit Rayapeddi","doi":"10.1109/ICGCIOT.2018.8753096","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753096","url":null,"abstract":"Around the world, the telecommunications industry is rapidly expanding, as we are entering into a smartphone dominated era. Internet availability is now cited as a basic necessity and requirement for the generation today. With this, comes a competition amongst service providers to provide the best services to customers, along with the best prices to retain the already existing ones. Customers may choose to leave, for reasons known or unknown due to their experiences with a certain provider. Churn, simply put, is the process where a customer suspends or cancels his/her service with a provider. This paper presents a solution to this problem by recognizing those who may sway towards leaving, providing a vital solution to companies as retentive of existing customer is much easier than securing a new customer. Predictive, unsupervised models can organize and prevent such situations and can tell us what to expect in the near future. The research done here is an application of Logistic regression, Random Forests and K - Means clustering with the help of R - to predict churn. The data set consists of 3400 instances were considered in the dataset and 19 out of 22 attributes being decisive in the process of prediction.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133178160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8752995
R. Kodali, Aditya Valdas
With rapidly developing technology and the Internet of Things taking the world by storm, easy-to-use and low-cost solutions are being provided to almost any and every application in the world. In a similar way, technological solutions are also now being applied to urban farming, a practice which has gained momentum especially in large cities, to help citizens grow vegetables and the like in their own homes or establishments. Urban farming is now more important than ever in the context of the rapid urbanization and development of smart cities all over the world. It is important that residents in urban areas grow their vegetables, and it is important that they do it the right way. Only then will it be possible, in the future, to sustain ourselves in large cities and places which are not quite accessible by villages where farming is done on a large scale. In this paper, we propose a process of growing and taking care of the plants, so that maximum efficiency is guaranteed in the growth process and also information is generated and shared by the whole community. This information will help us crunch the data and arrive at better decisions. The solution works on sensors monitoring the temperature, humidity, ambient light intensity and soil moisture levels pertaining to a certain plant. These sensors are connected to a device which makes understandable data out of these sensor outputs. This then communicates with a central device which collects information from all such sensors, and displays this on a locally hosted webpage. The content is also shown on a dashboard for comfortable visualization and understanding. It also stores a database which can be referred for future analytics. All the devices used are low-cost and consume low-power, which is ideally suited for IoT applications which focus more on communicating effectively at low costs.
{"title":"MQTT Based Monitoring System for Urban Farmers Using ESP32 and Raspberry Pi","authors":"R. Kodali, Aditya Valdas","doi":"10.1109/ICGCIOT.2018.8752995","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8752995","url":null,"abstract":"With rapidly developing technology and the Internet of Things taking the world by storm, easy-to-use and low-cost solutions are being provided to almost any and every application in the world. In a similar way, technological solutions are also now being applied to urban farming, a practice which has gained momentum especially in large cities, to help citizens grow vegetables and the like in their own homes or establishments. Urban farming is now more important than ever in the context of the rapid urbanization and development of smart cities all over the world. It is important that residents in urban areas grow their vegetables, and it is important that they do it the right way. Only then will it be possible, in the future, to sustain ourselves in large cities and places which are not quite accessible by villages where farming is done on a large scale. In this paper, we propose a process of growing and taking care of the plants, so that maximum efficiency is guaranteed in the growth process and also information is generated and shared by the whole community. This information will help us crunch the data and arrive at better decisions. The solution works on sensors monitoring the temperature, humidity, ambient light intensity and soil moisture levels pertaining to a certain plant. These sensors are connected to a device which makes understandable data out of these sensor outputs. This then communicates with a central device which collects information from all such sensors, and displays this on a locally hosted webpage. The content is also shown on a dashboard for comfortable visualization and understanding. It also stores a database which can be referred for future analytics. All the devices used are low-cost and consume low-power, which is ideally suited for IoT applications which focus more on communicating effectively at low costs.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122644592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIoT.2018.8753002
Shashikant Patil, V. Kulkarni, A. Bhise
Diagnosis of tooth caries or cavities are regarded as one of the promising research issues for the past two decades. Moreover, several techniques are established to diagnose the tooth demineralization, tooth decaying and re-mineralization. However, the complexity of tooth decaying diagnosis emerges when the surroundings are comparatively multifaceted. Hence, for solving such issues, this paper establishes caries diagnosing model. Here, the feature selection is dependent on Multilinear Principal Component Analysis (MPCA). In addition, the classification is performed by exploiting well-known classifier known as Neural Network (NN).
{"title":"Caries Detection with the Aid of Multilinear Principal Component Analysis and Neural Network","authors":"Shashikant Patil, V. Kulkarni, A. Bhise","doi":"10.1109/ICGCIoT.2018.8753002","DOIUrl":"https://doi.org/10.1109/ICGCIoT.2018.8753002","url":null,"abstract":"Diagnosis of tooth caries or cavities are regarded as one of the promising research issues for the past two decades. Moreover, several techniques are established to diagnose the tooth demineralization, tooth decaying and re-mineralization. However, the complexity of tooth decaying diagnosis emerges when the surroundings are comparatively multifaceted. Hence, for solving such issues, this paper establishes caries diagnosing model. Here, the feature selection is dependent on Multilinear Principal Component Analysis (MPCA). In addition, the classification is performed by exploiting well-known classifier known as Neural Network (NN).","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124019851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753033
Pramod Kumar Sagar, Kanika Garg, Chiranjit Dutta
Internet of Things (IoT) has its footsteps in almost each and every aspect of living, whether it being personal or professional. It aims to make living better by making physical devices smarter. With its immense applications in fields like agriculture, wearables, poultry, etc., it is also invading Fast Moving Consumer Goods (FMCG) sector. FMCG and IoT together can bring a revolution in the field of business marketing. IoT can help FMCG to increase productivity, improve product quality, generate revenues, maintain customer satisfaction and enhance visibility by measuring, analyzing and monitoring product quality with the help of sensors. IoT can be applied in each and every segment of FMCG sector like production, inventory management, sales and marketing, product management, customer relationship management (CRM), etc., this research paper aims to put forth the relationship between IoT and FMCG sector and also show how it can be used to gain business efficiency. The paper proposes a design on how IoT can be used in three primarily segments (production, distribution and marketing) of FMCG sector. Radio Frequency Identification (RFID) technology is the main methodology used for proposing the design of IoT based FMCG sector. The paper combines various innovation of IoT in different industries and concludes by proposing a theoretical and partially implemented model.
{"title":"Application of Internet of Things in Fast Moving Consumer Goods Sector to increase Business Efficiency","authors":"Pramod Kumar Sagar, Kanika Garg, Chiranjit Dutta","doi":"10.1109/ICGCIOT.2018.8753033","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753033","url":null,"abstract":"Internet of Things (IoT) has its footsteps in almost each and every aspect of living, whether it being personal or professional. It aims to make living better by making physical devices smarter. With its immense applications in fields like agriculture, wearables, poultry, etc., it is also invading Fast Moving Consumer Goods (FMCG) sector. FMCG and IoT together can bring a revolution in the field of business marketing. IoT can help FMCG to increase productivity, improve product quality, generate revenues, maintain customer satisfaction and enhance visibility by measuring, analyzing and monitoring product quality with the help of sensors. IoT can be applied in each and every segment of FMCG sector like production, inventory management, sales and marketing, product management, customer relationship management (CRM), etc., this research paper aims to put forth the relationship between IoT and FMCG sector and also show how it can be used to gain business efficiency. The paper proposes a design on how IoT can be used in three primarily segments (production, distribution and marketing) of FMCG sector. Radio Frequency Identification (RFID) technology is the main methodology used for proposing the design of IoT based FMCG sector. The paper combines various innovation of IoT in different industries and concludes by proposing a theoretical and partially implemented model.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114855950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753106
P. K, Pawan Hegde
Cloud computing is a swift moving field that gives several application based services and data storage. Cloud computing focuses on providing the services to the clients as what they need and pay accordingly. Since a large amount of data of the users is stored or available at the cloud servers and data centres, privacy and safety of the data is a major concern in a cloud environment. Cloud computing security or, simply known to be, cloud security refers to a wider category of technologies, policies and controls utilized to protect data, applications, and the infrastructure amalgamated with cloud computing. In this paper we discuss about a few smart ways to overcome with these challenges.
{"title":"A Novel Approach For Securing Cloud Using Fog Computing","authors":"P. K, Pawan Hegde","doi":"10.1109/ICGCIOT.2018.8753106","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753106","url":null,"abstract":"Cloud computing is a swift moving field that gives several application based services and data storage. Cloud computing focuses on providing the services to the clients as what they need and pay accordingly. Since a large amount of data of the users is stored or available at the cloud servers and data centres, privacy and safety of the data is a major concern in a cloud environment. Cloud computing security or, simply known to be, cloud security refers to a wider category of technologies, policies and controls utilized to protect data, applications, and the infrastructure amalgamated with cloud computing. In this paper we discuss about a few smart ways to overcome with these challenges.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127747771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753053
Divya Pandey, Seema Hanchate Author
The development of devices that can connect to the Internet and transmit data has been a source of inspiration for smart city designs. in a metropolitan cities where the smart cities project are working in progress there are various approaches for making the cities smarter, one of the key features is smart parking, at a peak hour rush it is v difficult for driver to find a parking spaces with an increase and order of traffic, causing traffic congestion and result in wastage of fuel, energy etc. there are various work done,. With liberalization of economy number of vehicle on the road have increased leading to illegal, unorganized parking behavior in at public place, private building, educational campus, corporate campus. Thus, Our main objective is to avoid this unorganized parking system and so for this we can provide the intelligences to parking system which can solved the real time problem of organized and unorganized parking. In this study we have developed a smart parking proposal using queuing theory approach which can be model the parking system as a queue and the evaluation parameter like wait time for user in a queue or in a system can be estimated. Also by using IOT concept, by using wireless sensor node and infrared sensor to provide the real time status of parking lot for user on IOT and suggest the parking lot to avoid wait time in peak hour. The parking space closest to the current location can be found using multiple server single queue system and optimizing the existing system for better user experiences.
{"title":"Navigation based - Intelligent Parking Management System using Queuing theory and IOT","authors":"Divya Pandey, Seema Hanchate Author","doi":"10.1109/ICGCIOT.2018.8753053","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753053","url":null,"abstract":"The development of devices that can connect to the Internet and transmit data has been a source of inspiration for smart city designs. in a metropolitan cities where the smart cities project are working in progress there are various approaches for making the cities smarter, one of the key features is smart parking, at a peak hour rush it is v difficult for driver to find a parking spaces with an increase and order of traffic, causing traffic congestion and result in wastage of fuel, energy etc. there are various work done,. With liberalization of economy number of vehicle on the road have increased leading to illegal, unorganized parking behavior in at public place, private building, educational campus, corporate campus. Thus, Our main objective is to avoid this unorganized parking system and so for this we can provide the intelligences to parking system which can solved the real time problem of organized and unorganized parking. In this study we have developed a smart parking proposal using queuing theory approach which can be model the parking system as a queue and the evaluation parameter like wait time for user in a queue or in a system can be estimated. Also by using IOT concept, by using wireless sensor node and infrared sensor to provide the real time status of parking lot for user on IOT and suggest the parking lot to avoid wait time in peak hour. The parking space closest to the current location can be found using multiple server single queue system and optimizing the existing system for better user experiences.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126851933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}