Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972270
F. Basha, V. Lavanya, Sindhu J. Kumaar, C. Kumar
A novel approach is introduced in this paper to execute computing device with non-deterministic finite automata for hexose monophosphate shunt pathway process. It is designed to observe the hexose monophosphate shunt pathway metabolism along the case of acceptance and rejection. The state of rejection in non-deterministic finite automaton for red blood cells is glucose-6-phosphate dehydrogenase deficiency, which can lead to varying degrees of hemolysis. The manifestation of this study is the building of a machine that is used for the improvement of NADPH and ribose sugars. More over, it is necessary to know the mechanism that occurs during such operation. The computational complexity in such an attempt is applied to HMP shunt pathway. As this pathway is active in rapidly dividing cells and in tissues where there is more requirement of NADPH, it is shown that nondeterministic finite automata accept HMP shunt pathway.
{"title":"A computational model for monitoring the hexose monophosphate (HMP) shunt pathway","authors":"F. Basha, V. Lavanya, Sindhu J. Kumaar, C. Kumar","doi":"10.1109/ICCCT2.2017.7972270","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972270","url":null,"abstract":"A novel approach is introduced in this paper to execute computing device with non-deterministic finite automata for hexose monophosphate shunt pathway process. It is designed to observe the hexose monophosphate shunt pathway metabolism along the case of acceptance and rejection. The state of rejection in non-deterministic finite automaton for red blood cells is glucose-6-phosphate dehydrogenase deficiency, which can lead to varying degrees of hemolysis. The manifestation of this study is the building of a machine that is used for the improvement of NADPH and ribose sugars. More over, it is necessary to know the mechanism that occurs during such operation. The computational complexity in such an attempt is applied to HMP shunt pathway. As this pathway is active in rapidly dividing cells and in tissues where there is more requirement of NADPH, it is shown that nondeterministic finite automata accept HMP shunt pathway.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115425780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972273
V. Madhan, V. Kalaiselvi, Donald J.P
This paper describes a tool evidence be used to formalize the software requirements. This formalization is based on Z-language. The tool converts the informal to formal Z-language. For this the informal requirements are written in well-defined templates. The tool focuses the requirements and converts it to Z-specification automatically. Test cases are generated to express the correct and completeness of the requirements using the FASTEST tool for the derived z specifications.
{"title":"Tool development for formalizing the requirement for the safety critical software engineering process","authors":"V. Madhan, V. Kalaiselvi, Donald J.P","doi":"10.1109/ICCCT2.2017.7972273","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972273","url":null,"abstract":"This paper describes a tool evidence be used to formalize the software requirements. This formalization is based on Z-language. The tool converts the informal to formal Z-language. For this the informal requirements are written in well-defined templates. The tool focuses the requirements and converts it to Z-specification automatically. Test cases are generated to express the correct and completeness of the requirements using the FASTEST tool for the derived z specifications.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117167602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972242
Jai Utkarsh, A. K. Lall, D. K. Upadhyay, G. K. Mishra
A spiral resonator reconfigurable microstrip band pass filter is presented in this manuscript. The filter provides control variation in resonance frequency (ƒc). The variation in center frequency of the proposed design is noted from 3.40 – 3.77 GHz. The filter is designed to work at LTE-42 band to support IMT-A applications. The size of the proposed spiral structure is 14.6 × 5.5 mm2.
{"title":"Frequency reconfigurable bandpass filter for IMT-A applications","authors":"Jai Utkarsh, A. K. Lall, D. K. Upadhyay, G. K. Mishra","doi":"10.1109/ICCCT2.2017.7972242","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972242","url":null,"abstract":"A spiral resonator reconfigurable microstrip band pass filter is presented in this manuscript. The filter provides control variation in resonance frequency (ƒc). The variation in center frequency of the proposed design is noted from 3.40 – 3.77 GHz. The filter is designed to work at LTE-42 band to support IMT-A applications. The size of the proposed spiral structure is 14.6 × 5.5 mm2.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123770463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972310
S. Gomathi, V. R., S. R, S. Dheeksha
In the Web analytics the information delivery and the web usage is optimized and the analysis of data is done. The analytics is the measurement, collection and analysis of webpage data. Page statistics and user metrics are the important factor in most of the web analytics tool. This is the limitation of the existing tools. It does not provide design inputs for the optimization of information. This paper aims at providing an extension for the scope of web analytics to provide analysis and statistics of each segment of a webpage.
{"title":"Web page design optimisation based on segment analytics","authors":"S. Gomathi, V. R., S. R, S. Dheeksha","doi":"10.1109/ICCCT2.2017.7972310","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972310","url":null,"abstract":"In the Web analytics the information delivery and the web usage is optimized and the analysis of data is done. The analytics is the measurement, collection and analysis of webpage data. Page statistics and user metrics are the important factor in most of the web analytics tool. This is the limitation of the existing tools. It does not provide design inputs for the optimization of information. This paper aims at providing an extension for the scope of web analytics to provide analysis and statistics of each segment of a webpage.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123618179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972290
K. Joshitha, S. Jayashri
The work deals with the healing of the coverage hole identified in a location unaware network using fuzzy logic. The hole identification is done based on the Delaunay Triangulation method and the Empty circle concept. The main contribution here is that the healing of the coverage hole is done on a location unaware network based on the energy, angle and distance of the nodes involved in the healing process using the fuzzy rule set. Only the partial location information like the distance between the nodes is used. Redundant nodes are identified using the depth of angle formed between any two nodes. The boundary nodes of the hole along with their one hop neighbors take part in the healing process. This fastens the healing process with reduced energy consumption.
{"title":"Coverage enhancement using fuzzy logic in a distributed Wireless sensor network","authors":"K. Joshitha, S. Jayashri","doi":"10.1109/ICCCT2.2017.7972290","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972290","url":null,"abstract":"The work deals with the healing of the coverage hole identified in a location unaware network using fuzzy logic. The hole identification is done based on the Delaunay Triangulation method and the Empty circle concept. The main contribution here is that the healing of the coverage hole is done on a location unaware network based on the energy, angle and distance of the nodes involved in the healing process using the fuzzy rule set. Only the partial location information like the distance between the nodes is used. Redundant nodes are identified using the depth of angle formed between any two nodes. The boundary nodes of the hole along with their one hop neighbors take part in the healing process. This fastens the healing process with reduced energy consumption.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124466590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972283
K. Sundaran, V. Ganapathy, Priyanka Sudhakara
Energy consumption and lifetime of WSN are the most important research challenges to be resolved. For load balancing and efficient data collection in the network, clustering is used. Sensors in each cluster send the data to their corresponding cluster heads. The cluster head performs data aggregation and transmission of the aggregated data to the base station. Farther sensor nodes data are aggregated by cluster heads and send to the base station. This leads to a heavy traffic and faster depletion of energy to the nodes that are nearer to the sink. To enhance the energy conservation, for suppressing hot spot problem and for load balance achievement, we propose an algorithm namely as ECUCF (Energy Conserved Unequal Clusters with Fuzzy logic). Based on the distances of the nodes from the base station, the network is divided into three different sectors. For designing unequal clusters in each sector, a fuzzy logic approach is followed. The cluster heads that are nearer to the base station are designed to be of smaller sizes whereas the cluster heads that are situated farther away from the sink to have higher cluster sizes. The proposed algorithm ECUCF is simulated using MATLAB environment. The performances obtained are compared with the performances of other clustering schemes like LEACH (equal clustering algorithm) and FBUC (unequal clustering algorithm). From the simulated results, it is found that the performances of ECUCF are much improved as compared to LEACH and FBUC in maximizing the number of clusters, increasing the number of live nodes in the network and extending the lifetime of nodes on each round of operation.
{"title":"Fuzzy logic based Unequal Clustering in wireless sensor network for minimizing Energy consumption","authors":"K. Sundaran, V. Ganapathy, Priyanka Sudhakara","doi":"10.1109/ICCCT2.2017.7972283","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972283","url":null,"abstract":"Energy consumption and lifetime of WSN are the most important research challenges to be resolved. For load balancing and efficient data collection in the network, clustering is used. Sensors in each cluster send the data to their corresponding cluster heads. The cluster head performs data aggregation and transmission of the aggregated data to the base station. Farther sensor nodes data are aggregated by cluster heads and send to the base station. This leads to a heavy traffic and faster depletion of energy to the nodes that are nearer to the sink. To enhance the energy conservation, for suppressing hot spot problem and for load balance achievement, we propose an algorithm namely as ECUCF (Energy Conserved Unequal Clusters with Fuzzy logic). Based on the distances of the nodes from the base station, the network is divided into three different sectors. For designing unequal clusters in each sector, a fuzzy logic approach is followed. The cluster heads that are nearer to the base station are designed to be of smaller sizes whereas the cluster heads that are situated farther away from the sink to have higher cluster sizes. The proposed algorithm ECUCF is simulated using MATLAB environment. The performances obtained are compared with the performances of other clustering schemes like LEACH (equal clustering algorithm) and FBUC (unequal clustering algorithm). From the simulated results, it is found that the performances of ECUCF are much improved as compared to LEACH and FBUC in maximizing the number of clusters, increasing the number of live nodes in the network and extending the lifetime of nodes on each round of operation.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121995736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972268
C. Vijayakumaran, T. A. Macriga
Mobile Ad-hoc Networks are dynamic in nature and do not have fixed infrastructure to control nodes in the networks. The challenge lies ahead in coordinating among such dynamically moving nodes. Over a due course, nodes might become selfish and may refrain from packet forwarding because of the heavy dynamism. This selfish behavior might also result as an impact of malicious nodes in the neighborhood. Therefore, trust and reputation based mechanisms are required to keep the mobile neighbors intact. Assigning or altering the trust highly depends on the node behavior. Game theoretical approaches are more suitable in deciding upon the reward mechanisms for which the mobile nodes operate upon. Rewards or penalties have to be decided by ensuring a clean and healthy MANET environment. Not every time the same reward schemes are to be followed since this might result in malicious nodes attacking the rewarding scheme as well. Therefore, a non-routine yet surprise alterations are well required in place in deciding suitable and safe reward strategies. This work focuses on integrating a misbehavior node detection scheme and an incentive based reputation scheme with game theoretical approach called Supervisory Game to analyze the selfish behavior of nodes in the MANETs environment. The proposed work significantly reduces the cost of detecting misbehavior nodes in the network.
{"title":"An integrated game theoretical approach to detect misbehaving nodes in MANETs","authors":"C. Vijayakumaran, T. A. Macriga","doi":"10.1109/ICCCT2.2017.7972268","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972268","url":null,"abstract":"Mobile Ad-hoc Networks are dynamic in nature and do not have fixed infrastructure to control nodes in the networks. The challenge lies ahead in coordinating among such dynamically moving nodes. Over a due course, nodes might become selfish and may refrain from packet forwarding because of the heavy dynamism. This selfish behavior might also result as an impact of malicious nodes in the neighborhood. Therefore, trust and reputation based mechanisms are required to keep the mobile neighbors intact. Assigning or altering the trust highly depends on the node behavior. Game theoretical approaches are more suitable in deciding upon the reward mechanisms for which the mobile nodes operate upon. Rewards or penalties have to be decided by ensuring a clean and healthy MANET environment. Not every time the same reward schemes are to be followed since this might result in malicious nodes attacking the rewarding scheme as well. Therefore, a non-routine yet surprise alterations are well required in place in deciding suitable and safe reward strategies. This work focuses on integrating a misbehavior node detection scheme and an incentive based reputation scheme with game theoretical approach called Supervisory Game to analyze the selfish behavior of nodes in the MANETs environment. The proposed work significantly reduces the cost of detecting misbehavior nodes in the network.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129786963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972285
G. Indumathi, G.Praveen Koodalingam
In this paper the design of an antenna sensor for deterioration in mechanical contraption at high frequency to attain more sensitivity and high gain is proposed. The design & simulation of a wireless antenna sensor for deterioration assessment in mechanical contraption is presented. Here the length of a patch antenna governs the antenna's resonance frequency and a patch antenna bonded to a structural surface can be used to measure mechanical deterioration propagation by interrogating resonance frequency shift due to antenna length change. In comparison with existing approaches such as radio frequency identification, the frequency doubling scheme is proposed as a new signal modulation approach for the antenna sensor. A circular patch receiving and transmitting antenna sensor is designed using Advanced Design System (ADS) software. And both the patch antennas are coupled using a matching network to form a frequency doubling antenna sensor. A split ring resonator is designed and simulated using Advanced Design System (ADS). The theoretical analysis of resonant frequency with and without stress is also represented in detail, to know about the performance of the resonator.
{"title":"Antenna sensor for deterioration assesment in mechanical contraption","authors":"G. Indumathi, G.Praveen Koodalingam","doi":"10.1109/ICCCT2.2017.7972285","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972285","url":null,"abstract":"In this paper the design of an antenna sensor for deterioration in mechanical contraption at high frequency to attain more sensitivity and high gain is proposed. The design & simulation of a wireless antenna sensor for deterioration assessment in mechanical contraption is presented. Here the length of a patch antenna governs the antenna's resonance frequency and a patch antenna bonded to a structural surface can be used to measure mechanical deterioration propagation by interrogating resonance frequency shift due to antenna length change. In comparison with existing approaches such as radio frequency identification, the frequency doubling scheme is proposed as a new signal modulation approach for the antenna sensor. A circular patch receiving and transmitting antenna sensor is designed using Advanced Design System (ADS) software. And both the patch antennas are coupled using a matching network to form a frequency doubling antenna sensor. A split ring resonator is designed and simulated using Advanced Design System (ADS). The theoretical analysis of resonant frequency with and without stress is also represented in detail, to know about the performance of the resonator.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129204563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972278
S. Surya, G. A. Magrica
Wireless network has gained popularity as the users want connectivity irrespective of their geographic position to perform their tasks. Wireless networks have many benefits over the wired networks in terms of mobility, flexibility and cost. Though there are several advantages of wireless networks, they are prone to security issues which generally fall under the following three categories they are confidentiality, integrity and availability. A survey on wireless network attacks is put forward that discusses various security methods which helps in protecting against different types of attacks and also the research areas need to be concentrated for further development.
{"title":"A survey on wireless networks attacks","authors":"S. Surya, G. A. Magrica","doi":"10.1109/ICCCT2.2017.7972278","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972278","url":null,"abstract":"Wireless network has gained popularity as the users want connectivity irrespective of their geographic position to perform their tasks. Wireless networks have many benefits over the wired networks in terms of mobility, flexibility and cost. Though there are several advantages of wireless networks, they are prone to security issues which generally fall under the following three categories they are confidentiality, integrity and availability. A survey on wireless network attacks is put forward that discusses various security methods which helps in protecting against different types of attacks and also the research areas need to be concentrated for further development.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122978304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972276
G. Shyam, S. Manvi, P. Bharti
To make the cities greener, safer, and more efficient, Internet of Things (IoT) can play an important role. Improvement in safety and quality of life can be achieved by connecting devices, vehicles and infrastructure all around in a city. Best technological solutions can be achieved in smart cities by making different stakeholders to work together [5][6][7]. System integrators, network operators and technology providers have a role to play in working with governments to enable smart solutions. But, building such solutions on an open, standards-based communications platform that can be continuously used is a challenge. We present a waste collection management solution based on providing intelligence to wastebins, using an IoT prototype with sensors. It can read, collect, and transmit huge volume of data over the Internet. Such data, when put into a spatio-temporal context and processed by intelligent and optimized algorithms, can be used to dynamically manage waste collection mechanism. Simulations for several cases are carried out to investigate the benefits of such system over a traditional system. We try to replicate the scenario using Open Data from the city of Pune, India stressing on the opportunities created by this type of initiatives for several parties to innovate and contribute to the development of Smart waste management solutions.
{"title":"Smart waste management using Internet-of-Things (IoT)","authors":"G. Shyam, S. Manvi, P. Bharti","doi":"10.1109/ICCCT2.2017.7972276","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972276","url":null,"abstract":"To make the cities greener, safer, and more efficient, Internet of Things (IoT) can play an important role. Improvement in safety and quality of life can be achieved by connecting devices, vehicles and infrastructure all around in a city. Best technological solutions can be achieved in smart cities by making different stakeholders to work together [5][6][7]. System integrators, network operators and technology providers have a role to play in working with governments to enable smart solutions. But, building such solutions on an open, standards-based communications platform that can be continuously used is a challenge. We present a waste collection management solution based on providing intelligence to wastebins, using an IoT prototype with sensors. It can read, collect, and transmit huge volume of data over the Internet. Such data, when put into a spatio-temporal context and processed by intelligent and optimized algorithms, can be used to dynamically manage waste collection mechanism. Simulations for several cases are carried out to investigate the benefits of such system over a traditional system. We try to replicate the scenario using Open Data from the city of Pune, India stressing on the opportunities created by this type of initiatives for several parties to innovate and contribute to the development of Smart waste management solutions.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"168 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113953338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}