Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673457
Cliona J Costa, S. Tiwari, Krishna Bhagat, Akash Verlekar, K. Kumar, S. Aswale
3D reconstruction has piqued the interest of many disciplines, and many researchers have spent the last decade striving to improve on latest automated three-dimensional reconstruction systems. Three Dimensional models can be utilized to tackle a wide range of visualization problems as well as other activities. In this paper, we have implemented a method of Digital Surface Map (DSM) generation from Aerial images using Conditional Generative Adversarial Networks (c-GAN). We have used Seg-net architecture of Convolutional Neural Network (CNN) to segment the aerial images and then the U-net generator of c-GAN generates final DSM. The dataset we used is ISPRS Potsdam-Vaihingen dataset. We also review different stages if 3D reconstruction and how Deep learning is now being widely used to enhance the process of 3D data generation. We provide binary cross entropy loss function graph to demonstrate stability of GAN and CNN. The purpose of our approach is to solve problem of DSM generation using Deep learning techniques. We put forth our method against other latest methods of DSM generation such as Semi-global Matching (SGM) and infer the pros and cons of our approach. Finally, we suggest improvements in our methods that might be useful in increasing the accuracy.
{"title":"Three-Dimensional Reconstruction of Satellite images using Generative Adversarial Networks","authors":"Cliona J Costa, S. Tiwari, Krishna Bhagat, Akash Verlekar, K. Kumar, S. Aswale","doi":"10.1109/ICTAI53825.2021.9673457","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673457","url":null,"abstract":"3D reconstruction has piqued the interest of many disciplines, and many researchers have spent the last decade striving to improve on latest automated three-dimensional reconstruction systems. Three Dimensional models can be utilized to tackle a wide range of visualization problems as well as other activities. In this paper, we have implemented a method of Digital Surface Map (DSM) generation from Aerial images using Conditional Generative Adversarial Networks (c-GAN). We have used Seg-net architecture of Convolutional Neural Network (CNN) to segment the aerial images and then the U-net generator of c-GAN generates final DSM. The dataset we used is ISPRS Potsdam-Vaihingen dataset. We also review different stages if 3D reconstruction and how Deep learning is now being widely used to enhance the process of 3D data generation. We provide binary cross entropy loss function graph to demonstrate stability of GAN and CNN. The purpose of our approach is to solve problem of DSM generation using Deep learning techniques. We put forth our method against other latest methods of DSM generation such as Semi-global Matching (SGM) and infer the pros and cons of our approach. Finally, we suggest improvements in our methods that might be useful in increasing the accuracy.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116887143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673407
S. Jasmindebora, M. Mahendrakumar, A. Nanoty, V. Shanmugasundaram, Anurag Srivastava, Baba Vajrala
This research discusses how to detect coronavirus patients using various target optimization and deep learning methods. This research utilizes the J48 decision tree methodology to describe the extended attributes of X-ray coronagraphs to identify polluted ill persons rapidly and efficiently. The investigation has found eleven distinct releases of the converting neural network to categorize infected individuals utilizing coronavirus pneumonia employing X-ray imaging (CNN). An emperor penguin and its objectives also indicate the characteristics of the CNN model. In the classified x-ray photos, a comprehensive model analysis displays the proper percentages of the features such as accuracy, precision, recollections, specificities, and F1. Extensive testing has shown that the new strategy outperforms competitors using wellknown performance criteria. The proposed model is therefore suitable for the Covid-19 disease radiation thoroughbred image in real-time. The developed/projected design is unique and will aid in the COVID-19 screening process optimization.
{"title":"An Introductory Assessment on Computational Algorithm in Initial Finding of COVID-19 Cases","authors":"S. Jasmindebora, M. Mahendrakumar, A. Nanoty, V. Shanmugasundaram, Anurag Srivastava, Baba Vajrala","doi":"10.1109/ICTAI53825.2021.9673407","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673407","url":null,"abstract":"This research discusses how to detect coronavirus patients using various target optimization and deep learning methods. This research utilizes the J48 decision tree methodology to describe the extended attributes of X-ray coronagraphs to identify polluted ill persons rapidly and efficiently. The investigation has found eleven distinct releases of the converting neural network to categorize infected individuals utilizing coronavirus pneumonia employing X-ray imaging (CNN). An emperor penguin and its objectives also indicate the characteristics of the CNN model. In the classified x-ray photos, a comprehensive model analysis displays the proper percentages of the features such as accuracy, precision, recollections, specificities, and F1. Extensive testing has shown that the new strategy outperforms competitors using wellknown performance criteria. The proposed model is therefore suitable for the Covid-19 disease radiation thoroughbred image in real-time. The developed/projected design is unique and will aid in the COVID-19 screening process optimization.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124921042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673456
C. P. Mallikarjuna Gowda, A. Srivastava, Shubham Chakraborty, Anurag Ghosh, Harsh Raj
In today’s world virtual office have become the talk of the town. In a very less span of time, the number of people using it have grown exponentially. Virtual Office management is a science that requires the use of a scientific tool that can be used for the management of the virtual office. Many tools and applications can be used for the management of the virtual office. The most important of them is a virtual office management application that uses unity and agora.io. The main purpose of a virtual office management application is to increase work effectiveness and to complete standard operating procedures in it. The virtual office management application should be based on a standard operating procedure. The application should have a user interface that is simple and easy to use. Though the problems of missing customer letters, conflicting schedules are there but it can be rectified as we move on. So, to overcome the problem faced by today’s world, we have designed a prototype of virtual office which can be downloaded from Heroku and after creating a server would be ready to use.
{"title":"Virtual Office Prototype: A Unity-2D work Simulation","authors":"C. P. Mallikarjuna Gowda, A. Srivastava, Shubham Chakraborty, Anurag Ghosh, Harsh Raj","doi":"10.1109/ICTAI53825.2021.9673456","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673456","url":null,"abstract":"In today’s world virtual office have become the talk of the town. In a very less span of time, the number of people using it have grown exponentially. Virtual Office management is a science that requires the use of a scientific tool that can be used for the management of the virtual office. Many tools and applications can be used for the management of the virtual office. The most important of them is a virtual office management application that uses unity and agora.io. The main purpose of a virtual office management application is to increase work effectiveness and to complete standard operating procedures in it. The virtual office management application should be based on a standard operating procedure. The application should have a user interface that is simple and easy to use. Though the problems of missing customer letters, conflicting schedules are there but it can be rectified as we move on. So, to overcome the problem faced by today’s world, we have designed a prototype of virtual office which can be downloaded from Heroku and after creating a server would be ready to use.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"369 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122718559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673298
G. Aggarwal, Atharv Sinha, Pranav Srivastava, Prerna Agarwal
The $3^{mathrm{r}mathrm{d}}$ wave of Coronavirus is hitting the world. The doctors and scientists are also in their last phase of developing a vaccine. But it is challenging to get the vaccine for everyone due to several factors such as production, supply chain, cold chain and price. Till then, the only way to prevent infection is to wear a mark and follow social distancing. This paper describes how to identify mask and no-mask faces in public areas using image processing algorithms. One of the significant steps taken by people around the world to stay safe is wearing masks. This research-based project gets a camera-based solution to detect faces and recognize them if they exist in the database. If the live stream has unmasked faces, which aren’t present in the existing database, give out an alarm to alert the administrator or user. It is a significant project for times like these because now, with the lockdown ending in the world because of financial meltdowns, most public places like malls, temples, shops, grocery stores, and medical stores are opening. A concern for the safety and well-being of everyone around us because the virus can spread at a logarithmic rate and cause mass damage in the form of large bills and some cases, death. To avoid this, we always have to wear masks when in public places, and this is what the project does. The crucial technologies used in our manuscript are Face Detection, Face Recognition & Identification, and Feature Detection in the face.
{"title":"Identification of Unmasked Faces: Protection in Public Places from COVID-19 and Other Infections","authors":"G. Aggarwal, Atharv Sinha, Pranav Srivastava, Prerna Agarwal","doi":"10.1109/ICTAI53825.2021.9673298","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673298","url":null,"abstract":"The $3^{mathrm{r}mathrm{d}}$ wave of Coronavirus is hitting the world. The doctors and scientists are also in their last phase of developing a vaccine. But it is challenging to get the vaccine for everyone due to several factors such as production, supply chain, cold chain and price. Till then, the only way to prevent infection is to wear a mark and follow social distancing. This paper describes how to identify mask and no-mask faces in public areas using image processing algorithms. One of the significant steps taken by people around the world to stay safe is wearing masks. This research-based project gets a camera-based solution to detect faces and recognize them if they exist in the database. If the live stream has unmasked faces, which aren’t present in the existing database, give out an alarm to alert the administrator or user. It is a significant project for times like these because now, with the lockdown ending in the world because of financial meltdowns, most public places like malls, temples, shops, grocery stores, and medical stores are opening. A concern for the safety and well-being of everyone around us because the virus can spread at a logarithmic rate and cause mass damage in the form of large bills and some cases, death. To avoid this, we always have to wear masks when in public places, and this is what the project does. The crucial technologies used in our manuscript are Face Detection, Face Recognition & Identification, and Feature Detection in the face.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128533362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673238
Richa Singh, Gaurav Srivastav
There are various deep learning-based IDS techniques are implemented in large scale. Intrusion detection systems are critical components for protecting ICT infrastructure (IDSs). Keeping this in mind, solid solution is required for different types of new attacks and complexity control. Deep learning and machine learning is widely used to handle high dimensional, complex type data. The IDS detects and attracts various attack types such as known, unknown, and zero-day attacks using unsupervised machine learning techniques. To detect threats without prior knowledge, a framework has been designed that uses the concept of One Class SVM (OCSVM) and active learning. The CIC-IDS2017 dataset was used to test the performance of the framework and compare the result with UNSW-NB15 and KDD cup 99 dataset. The final output shows that this framework gives better performance than other.
有各种基于深度学习的入侵检测技术被大规模实现。入侵检测系统是保护信息通信技术基础设施的重要组成部分。记住这一点,对于不同类型的新攻击和复杂性控制,需要可靠的解决方案。深度学习和机器学习被广泛用于处理高维、复杂类型的数据。IDS使用无监督机器学习技术检测和吸引各种攻击类型,如已知、未知和零日攻击。为了在没有先验知识的情况下检测威胁,设计了一个使用一类支持向量机(OCSVM)和主动学习概念的框架。使用CIC-IDS2017数据集测试框架的性能,并将结果与UNSW-NB15和KDD cup 99数据集进行比较。最终输出结果表明,该框架的性能优于其他框架。
{"title":"Novel Framework for Anomaly Detection Using Machine Learning Technique on CIC-IDS2017 Dataset","authors":"Richa Singh, Gaurav Srivastav","doi":"10.1109/ICTAI53825.2021.9673238","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673238","url":null,"abstract":"There are various deep learning-based IDS techniques are implemented in large scale. Intrusion detection systems are critical components for protecting ICT infrastructure (IDSs). Keeping this in mind, solid solution is required for different types of new attacks and complexity control. Deep learning and machine learning is widely used to handle high dimensional, complex type data. The IDS detects and attracts various attack types such as known, unknown, and zero-day attacks using unsupervised machine learning techniques. To detect threats without prior knowledge, a framework has been designed that uses the concept of One Class SVM (OCSVM) and active learning. The CIC-IDS2017 dataset was used to test the performance of the framework and compare the result with UNSW-NB15 and KDD cup 99 dataset. The final output shows that this framework gives better performance than other.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129083021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673159
Aruna Mittal, Hridesh Gupta
"However, a deep learning network requires a large amount of data, and because certain plant lesion data is difficult to acquire and has a similar structure, deep learning has lately showed potential in the identification of plant lesions.", The data set has to be increased by generating full plant lesion leaf pictures. To address this issue, this article offers a survey on technique for generating full and rare picture of plant lesion leaf that may be enhance the accuracy of classification network. Some of the benefits of our research in this article are a systematic survey on GAN based plant disease identification where many authors gave the theory and practical implementation on that. My approach has been shown to successfully extend plant lesion research and improve the classification network’s identification accuracy in the future.
{"title":"A Systematic Literature Survey on Generative Adversarial Network Based Crop Disease Identification","authors":"Aruna Mittal, Hridesh Gupta","doi":"10.1109/ICTAI53825.2021.9673159","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673159","url":null,"abstract":"\"However, a deep learning network requires a large amount of data, and because certain plant lesion data is difficult to acquire and has a similar structure, deep learning has lately showed potential in the identification of plant lesions.\", The data set has to be increased by generating full plant lesion leaf pictures. To address this issue, this article offers a survey on technique for generating full and rare picture of plant lesion leaf that may be enhance the accuracy of classification network. Some of the benefits of our research in this article are a systematic survey on GAN based plant disease identification where many authors gave the theory and practical implementation on that. My approach has been shown to successfully extend plant lesion research and improve the classification network’s identification accuracy in the future.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114226923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673257
Pooja, Vishal Bhatnagar
In today’s Society 5.0, the recommender system analyzes the user preferences to provide the required potential targets. Graph-Based Collaborative filtering has become the new state-of-the-art to take the edge of selection parameters for the user-item matrix. The author analyzed the following machine learning algorithms: Linear Regression, Logistic Regression Naive Bayes classifier, Support vector machine, and J48. The model Prediction depends upon the characteristics of genres associated with game play. Shortcomings of data take into account for model development, testing, and benchmarking.
{"title":"Performance Analysis of Machine Learning Algorithms for Intelligent Recommender System","authors":"Pooja, Vishal Bhatnagar","doi":"10.1109/ICTAI53825.2021.9673257","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673257","url":null,"abstract":"In today’s Society 5.0, the recommender system analyzes the user preferences to provide the required potential targets. Graph-Based Collaborative filtering has become the new state-of-the-art to take the edge of selection parameters for the user-item matrix. The author analyzed the following machine learning algorithms: Linear Regression, Logistic Regression Naive Bayes classifier, Support vector machine, and J48. The model Prediction depends upon the characteristics of genres associated with game play. Shortcomings of data take into account for model development, testing, and benchmarking.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116226303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673413
Prabhakara Rao Kapula, I. A. Pasha, B. A. Kumar, V. Sowmya
This article examines several designs of lower limb exoskeletons (LLE) used to assist paraplegia. Paraplegia is a kind of paralysis that affects the lower half of the body, making it difficult to move. The condition occurs when a disease or an event causes damage to the part of the nervous system that controls the bottom half of your body. Assistive technology is evolving at a rapid pace in today’s society. The majority of individuals suffer from knee and back discomfort, which makes them impossible to walk correctly. In this scenario, an assistance technology such as an exoskeleton will aid older individuals in walking. It includes assistance for SCI sufferers, the elderly, and military personnel who are weary of climbing high heights. Furthermore, it may be utilized for physiotherapy, which lowers the therapist’s workload as well as the cost and time constraints for patients. Mechanical design elements such as weight, actuators, cost, control, and gait analysis will be addressed. Finally, the applications of various LLEs are examined.
{"title":"Wearable Lower Limb Exoskeletons for paraplegia: A Review","authors":"Prabhakara Rao Kapula, I. A. Pasha, B. A. Kumar, V. Sowmya","doi":"10.1109/ICTAI53825.2021.9673413","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673413","url":null,"abstract":"This article examines several designs of lower limb exoskeletons (LLE) used to assist paraplegia. Paraplegia is a kind of paralysis that affects the lower half of the body, making it difficult to move. The condition occurs when a disease or an event causes damage to the part of the nervous system that controls the bottom half of your body. Assistive technology is evolving at a rapid pace in today’s society. The majority of individuals suffer from knee and back discomfort, which makes them impossible to walk correctly. In this scenario, an assistance technology such as an exoskeleton will aid older individuals in walking. It includes assistance for SCI sufferers, the elderly, and military personnel who are weary of climbing high heights. Furthermore, it may be utilized for physiotherapy, which lowers the therapist’s workload as well as the cost and time constraints for patients. Mechanical design elements such as weight, actuators, cost, control, and gait analysis will be addressed. Finally, the applications of various LLEs are examined.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121562140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673402
Vimal Bibhu, Shailaja Salagrama, B. P. Lohani, Pradeep Kushwaha
Social media is so popular internet enabled digital platform to share the ideas, views and connect with the people around the globe. These days, everyone using social media platform the share, meet, virtually through this digital platform. User identity and privacy are directly related to the users on social media. In this paper, we have surveyed and collect the different data from social media to derive the user privacy and exposure of user identity on the social media. The results which are derived are in the form of graphs and tabular metrics. The analytical result of findings by the derived survey and data of responder at last section of this research article.
{"title":"An Analytical Survey of User Privacy on Social Media Platform","authors":"Vimal Bibhu, Shailaja Salagrama, B. P. Lohani, Pradeep Kushwaha","doi":"10.1109/ICTAI53825.2021.9673402","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673402","url":null,"abstract":"Social media is so popular internet enabled digital platform to share the ideas, views and connect with the people around the globe. These days, everyone using social media platform the share, meet, virtually through this digital platform. User identity and privacy are directly related to the users on social media. In this paper, we have surveyed and collect the different data from social media to derive the user privacy and exposure of user identity on the social media. The results which are derived are in the form of graphs and tabular metrics. The analytical result of findings by the derived survey and data of responder at last section of this research article.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130262268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673244
Aman Kaushik, Nitin Jain
There is a rigorous malfunction of public transport system along with different security issues in urban as well as rural areas of our country. Right off the bat, there is a great deal of confusion among the passengers regarding fares which lead to corruption. Issues of authorizing the passenger with a current ticket and lose money requirement for small travel fare from both customer as well as person doing public transport ticket generation. Thirdly this paper discusses RFID based ticketing and passenger identification in the public transport. That deals with identification, bus ticket generation and bus ticket checking using IOT. Proposed ticketing system is used to authorize the passenger travelling and solve the security as well as general issues related to carrying cash with users as using this proposed system passengers do not have to carry money with them. All the record of transaction will be updated automatically. Moreover, the doors of bus will be opened only when passengers had generated their ticket.
{"title":"RFID Based Bus Ticket Generation System","authors":"Aman Kaushik, Nitin Jain","doi":"10.1109/ICTAI53825.2021.9673244","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673244","url":null,"abstract":"There is a rigorous malfunction of public transport system along with different security issues in urban as well as rural areas of our country. Right off the bat, there is a great deal of confusion among the passengers regarding fares which lead to corruption. Issues of authorizing the passenger with a current ticket and lose money requirement for small travel fare from both customer as well as person doing public transport ticket generation. Thirdly this paper discusses RFID based ticketing and passenger identification in the public transport. That deals with identification, bus ticket generation and bus ticket checking using IOT. Proposed ticketing system is used to authorize the passenger travelling and solve the security as well as general issues related to carrying cash with users as using this proposed system passengers do not have to carry money with them. All the record of transaction will be updated automatically. Moreover, the doors of bus will be opened only when passengers had generated their ticket.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134405886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}