Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972243
K. Gurumoorthy, P. Suresh, K. Murugan
Internet is one of the major research areas which provides a new medium of communication that enables to gain access towards the enormous amount of information on a broad variety of topics. Internet Services are available in many of the educational institutions for their working staff members and students. One of the most essential aspect is to find the user behaviors, and the usage of social media on the internet. In this paper, we inspect various attitudes of social media, internet usage of male students in engineering colleges by means of analyzing log files. In WUM, analyzing log files is the purpose of behavior of web mining of male students is related to concerning their Internet usage samples.
{"title":"Behavior educational mining of male students by analyzing log files","authors":"K. Gurumoorthy, P. Suresh, K. Murugan","doi":"10.1109/ICCCT2.2017.7972243","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972243","url":null,"abstract":"Internet is one of the major research areas which provides a new medium of communication that enables to gain access towards the enormous amount of information on a broad variety of topics. Internet Services are available in many of the educational institutions for their working staff members and students. One of the most essential aspect is to find the user behaviors, and the usage of social media on the internet. In this paper, we inspect various attitudes of social media, internet usage of male students in engineering colleges by means of analyzing log files. In WUM, analyzing log files is the purpose of behavior of web mining of male students is related to concerning their Internet usage samples.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131566571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972275
M. Gurulakshmi, S. A. Abbas
Machine to Machine forms the basis for the Internet of Things. Communication between machines using any communications protocol, including wired and wireless was referred as Machine to machine communication. In real-time applications the wireless communication offers a better solution for data traffic. In real-time application, all the wireless technologies are used within their proximate range. In real time applications, based on the proximity range the machines will communicate with each other. When the proximity is missed, the machines not able to communicate with other machine through the communication protocol. To overcome the problem, in the proposed work, data is transferred between two machines via different topologies such as Bluetooth, Zigbee, Wi-Fi and GSM. Based on the proximity range the data can be switched from one topology to other. While transferring the data Bluetooth is used as a data transferring mode. If the proximity range of the Bluetooth exceeds the data is switched to the Zigbee. Zigbee has the better proximity range than Bluetooth. If the proximity range of Zigbee exceeds the data is transferred via Wi-Fi. Wi-Fi has a better coverage than Zigbee. If the Wi-Fi proximity exceeds the data is transferred via GSM. GSM has high proximity range than all other topologies. The proposed system is implemented in the FPGA.
{"title":"FPGA architectures for evolution of communication using proximity for emergency","authors":"M. Gurulakshmi, S. A. Abbas","doi":"10.1109/ICCCT2.2017.7972275","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972275","url":null,"abstract":"Machine to Machine forms the basis for the Internet of Things. Communication between machines using any communications protocol, including wired and wireless was referred as Machine to machine communication. In real-time applications the wireless communication offers a better solution for data traffic. In real-time application, all the wireless technologies are used within their proximate range. In real time applications, based on the proximity range the machines will communicate with each other. When the proximity is missed, the machines not able to communicate with other machine through the communication protocol. To overcome the problem, in the proposed work, data is transferred between two machines via different topologies such as Bluetooth, Zigbee, Wi-Fi and GSM. Based on the proximity range the data can be switched from one topology to other. While transferring the data Bluetooth is used as a data transferring mode. If the proximity range of the Bluetooth exceeds the data is switched to the Zigbee. Zigbee has the better proximity range than Bluetooth. If the proximity range of Zigbee exceeds the data is transferred via Wi-Fi. Wi-Fi has a better coverage than Zigbee. If the Wi-Fi proximity exceeds the data is transferred via GSM. GSM has high proximity range than all other topologies. The proposed system is implemented in the FPGA.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126510421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972253
R. Valarmathi, T. Sheela
Cloud Computing is a new emerging paradigm that provisions various computing resources to meet the developing computational needs. Scheduling the task poses many difficulties, because the cloud computing resources are complex, dynamic, heterogeneous, distributed in nature. Task Scheduling aims at minimising the makespan and maximising the resource utilisation. This paper gives an elaborate idea about Particle Swarm optimisation (PSO) algorithm and its several variants for task scheduling in cloud environment. PSO produces better results for task Scheduling Problems. This paper gives an insight to the researchers about various aspects of PSO and Task Scheduling.
{"title":"A comprehensive survey on Task Scheduling for parallel workloads based on Particle Swarm optimisation under Cloud environment","authors":"R. Valarmathi, T. Sheela","doi":"10.1109/ICCCT2.2017.7972253","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972253","url":null,"abstract":"Cloud Computing is a new emerging paradigm that provisions various computing resources to meet the developing computational needs. Scheduling the task poses many difficulties, because the cloud computing resources are complex, dynamic, heterogeneous, distributed in nature. Task Scheduling aims at minimising the makespan and maximising the resource utilisation. This paper gives an elaborate idea about Particle Swarm optimisation (PSO) algorithm and its several variants for task scheduling in cloud environment. PSO produces better results for task Scheduling Problems. This paper gives an insight to the researchers about various aspects of PSO and Task Scheduling.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121706414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972302
Jayashree S, S. S, S. L, S. Prathibha
Flood is a phenomenon by which the living and non-living entities that belong to the environment suffers various losses. Human beings cannot totally avoid floods but the only thing humans can do is, they can develop suitable systems to predict & subsequent measures to alert the people about its occurrence. There are many technologies available to predict and prevent. There are many natural disasters that lead to floods. Some of them are heavy rains and tropical cyclones. These floods cause materialistic and human damage. The main reason behind development of flood alert system is the intimation of flood well in advance so that human losses can be controlled by evacuation of people to safe places and also protects valuable properties. Despite certain damage occurs due to the drawbacks of the system. This paper explores flood warning systems and issues associated with each of them. Later proposes an effective flood alert system that overcomes the disadvantages of all the studied systems.
{"title":"A novel approach for early flood warning using android and IoT","authors":"Jayashree S, S. S, S. L, S. Prathibha","doi":"10.1109/ICCCT2.2017.7972302","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972302","url":null,"abstract":"Flood is a phenomenon by which the living and non-living entities that belong to the environment suffers various losses. Human beings cannot totally avoid floods but the only thing humans can do is, they can develop suitable systems to predict & subsequent measures to alert the people about its occurrence. There are many technologies available to predict and prevent. There are many natural disasters that lead to floods. Some of them are heavy rains and tropical cyclones. These floods cause materialistic and human damage. The main reason behind development of flood alert system is the intimation of flood well in advance so that human losses can be controlled by evacuation of people to safe places and also protects valuable properties. Despite certain damage occurs due to the drawbacks of the system. This paper explores flood warning systems and issues associated with each of them. Later proposes an effective flood alert system that overcomes the disadvantages of all the studied systems.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122128348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972289
Spoorthi S., B. Shadaksharappa, Suraj S., V. Manasa
The purpose of FREYR drone is to develop a quad-copter which carries pesticides to spray all over the farm which reduces the work of farmers as well as it finishes his work soon. The application of pesticides and fertilizers in agricultural areas is of prime importance for crop yields. This is to develop a user friendly interface for the farmers. The FREYR Drone is a pesticide spraying quad copter for agricultural purpose which helps the farmer to spray the pesticides all over his land so that it reduces his work which can evenly spray all over his farm. Here the farmer can control the drone using an android app and he can connect to the app using Wi-Fi module (ESP 8266) which is interfaced in the drone. It will precisely route the land area of that particular farmer's land using GPS no matter shape of the field and type of the crop the pesticide spraying drone will get the job done. Here we have used the Arduino board which is the open source electronics prototype platform which is interfaced with the Wi-Fi module and GPS. To balance the directions and orientations we have used the ACCELEROMETER (ADXL 335), GYRO (MPU-6050), MAGNETOMETER (HMC5883L). We have a wireless camera that can transmit and receive pictures with high resolution.
{"title":"Freyr drone: Pesticide/fertilizers spraying drone - an agricultural approach","authors":"Spoorthi S., B. Shadaksharappa, Suraj S., V. Manasa","doi":"10.1109/ICCCT2.2017.7972289","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972289","url":null,"abstract":"The purpose of FREYR drone is to develop a quad-copter which carries pesticides to spray all over the farm which reduces the work of farmers as well as it finishes his work soon. The application of pesticides and fertilizers in agricultural areas is of prime importance for crop yields. This is to develop a user friendly interface for the farmers. The FREYR Drone is a pesticide spraying quad copter for agricultural purpose which helps the farmer to spray the pesticides all over his land so that it reduces his work which can evenly spray all over his farm. Here the farmer can control the drone using an android app and he can connect to the app using Wi-Fi module (ESP 8266) which is interfaced in the drone. It will precisely route the land area of that particular farmer's land using GPS no matter shape of the field and type of the crop the pesticide spraying drone will get the job done. Here we have used the Arduino board which is the open source electronics prototype platform which is interfaced with the Wi-Fi module and GPS. To balance the directions and orientations we have used the ACCELEROMETER (ADXL 335), GYRO (MPU-6050), MAGNETOMETER (HMC5883L). We have a wireless camera that can transmit and receive pictures with high resolution.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123506808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972244
M. Kanthimathi, R. Amutha
Block by block differential encoding is proposed for two-way relay network using amplify and forward protocol at the relays. In order to achieve bandwidth efficiency the bits are mapped into 16-ary differential amplitude phase shift keying (DAPSK) symbols. Phase estimation and reference carrier estimation at the receiver is avoided by using this non-coherent detection technique. The symbols are mapped using 16-level Differential amplitude phase shift keying technique. The proposed method improves the symbol error rate performance of the non-coherent differential modulation scheme.
{"title":"Performance analysis of generalized differential modulation using DAPSK for bi-directional relay networks","authors":"M. Kanthimathi, R. Amutha","doi":"10.1109/ICCCT2.2017.7972244","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972244","url":null,"abstract":"Block by block differential encoding is proposed for two-way relay network using amplify and forward protocol at the relays. In order to achieve bandwidth efficiency the bits are mapped into 16-ary differential amplitude phase shift keying (DAPSK) symbols. Phase estimation and reference carrier estimation at the receiver is avoided by using this non-coherent detection technique. The symbols are mapped using 16-level Differential amplitude phase shift keying technique. The proposed method improves the symbol error rate performance of the non-coherent differential modulation scheme.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124738838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972237
J. A.P, U. Sakthivel
It is widely known that the process and performance of data aggregation in wireless sensor network is dependent on the effectiveness of clustering mechanism. However, existing research work towards clustering mechanism has been found to focus on selection on cluster-head majorly on the basis on energy. This is the prime reason for which the energy effectiveness has not completely been achieved in wireless sensor network. The present paper introduces a novel analytical modeling of CFCLP that leverages data aggregation by a novel combinatorial approach using linear programming for evolving up with a new clustering mechanism. A sophisticated mathematical modeling is used for designing and its algorithm being implemented on MEMSIC nodes to find that CFCLP is capable of maintaining good balance between energy saving performance and data delivery among the sensor nodes for longer iterations.
{"title":"CFCLP-a novel Clustering Framework based on Combinatorial approach and Linear Programming in Wireless Sensor Network","authors":"J. A.P, U. Sakthivel","doi":"10.1109/ICCCT2.2017.7972237","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972237","url":null,"abstract":"It is widely known that the process and performance of data aggregation in wireless sensor network is dependent on the effectiveness of clustering mechanism. However, existing research work towards clustering mechanism has been found to focus on selection on cluster-head majorly on the basis on energy. This is the prime reason for which the energy effectiveness has not completely been achieved in wireless sensor network. The present paper introduces a novel analytical modeling of CFCLP that leverages data aggregation by a novel combinatorial approach using linear programming for evolving up with a new clustering mechanism. A sophisticated mathematical modeling is used for designing and its algorithm being implemented on MEMSIC nodes to find that CFCLP is capable of maintaining good balance between energy saving performance and data delivery among the sensor nodes for longer iterations.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128950728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972248
T. Mahalingam, P. Jeyanthi
Generally the surveillance system wireless camera is used to monitor the object in heavy traffic in secured way and it also support satellite communication to broadcast the tracked object information to others. It is used to reduce computational delay in real time detection and tracking videos. In object detection and tracking system detection and background separation is very important role, here powerful ruling camera is used to increase the algorithm time complexity compared to normal tracking system. In this paper we propose competent CAMSHIFT algorithm which is both Normalized cross correlation and mean shift algorithm's combination. By the usage of this competent CAMSHIFT object tracking techniques is used to track the object that we need to focus depending on the internal features of the object in non ideal environment. Here we propose cloud environment which incorporate a distinct dynamic effective broadcasting algorithm which renders efficient way to share the information extraordinarily without loss of information during their transmission to destination. It also supports high secured data transmission between end users, so as to achieve the real time detection and tracking of an object that is moving which is processed by OPENCV/MATLAB.
{"title":"Enhancement of distinct dynamic broadcasting technique in architecture of object detection and tracking with cloud","authors":"T. Mahalingam, P. Jeyanthi","doi":"10.1109/ICCCT2.2017.7972248","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972248","url":null,"abstract":"Generally the surveillance system wireless camera is used to monitor the object in heavy traffic in secured way and it also support satellite communication to broadcast the tracked object information to others. It is used to reduce computational delay in real time detection and tracking videos. In object detection and tracking system detection and background separation is very important role, here powerful ruling camera is used to increase the algorithm time complexity compared to normal tracking system. In this paper we propose competent CAMSHIFT algorithm which is both Normalized cross correlation and mean shift algorithm's combination. By the usage of this competent CAMSHIFT object tracking techniques is used to track the object that we need to focus depending on the internal features of the object in non ideal environment. Here we propose cloud environment which incorporate a distinct dynamic effective broadcasting algorithm which renders efficient way to share the information extraordinarily without loss of information during their transmission to destination. It also supports high secured data transmission between end users, so as to achieve the real time detection and tracking of an object that is moving which is processed by OPENCV/MATLAB.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129903464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972282
R. Ramesh
The aim of the project is to develop a Machine Learning model to perform predictive analytics on the banking dataset. The banking data set consists of details about customers like and whether the customer will buy a product provided by the bank or not. The data set is obtained from University of California Irvine Machine Learning Repository. This data set is used to create a binary classification model using Amazon Web Service(AWS) Machine Learning platform. 70 % of the data is used to train the binary classification model and 30 % of the dataset is used to test the model. Depending upon the test result we evaluate the essential parameters like precision, recall, accuracy and false positive rates. These parameters evaluate the efficiency of our model. Once we design our model we test our model using two features in AWS Machine learning. One, using real time prediction where we give real time input data and test our model. Two, we do batch prediction, where we have a set of customer data and we upload our data to evaluate our prediction.
{"title":"Predictive analytics for banking user data using AWS Machine Learning cloud service","authors":"R. Ramesh","doi":"10.1109/ICCCT2.2017.7972282","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972282","url":null,"abstract":"The aim of the project is to develop a Machine Learning model to perform predictive analytics on the banking dataset. The banking data set consists of details about customers like and whether the customer will buy a product provided by the bank or not. The data set is obtained from University of California Irvine Machine Learning Repository. This data set is used to create a binary classification model using Amazon Web Service(AWS) Machine Learning platform. 70 % of the data is used to train the binary classification model and 30 % of the dataset is used to test the model. Depending upon the test result we evaluate the essential parameters like precision, recall, accuracy and false positive rates. These parameters evaluate the efficiency of our model. Once we design our model we test our model using two features in AWS Machine learning. One, using real time prediction where we give real time input data and test our model. Two, we do batch prediction, where we have a set of customer data and we upload our data to evaluate our prediction.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121228330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972241
David Hong, Lai-Wan Wong
Transportation in Malaysia started since the British colonial period and as of 2016, it can be said that the country's transport network is highly diversified having undergone years of development. At present, Malaysia's road network covers an extensive estimate of 230,000 km in 2015 with a national road development growth index of 2.29 from a mere 1.42 in 2010. Since the 10th Malaysia plan, Malaysia's network growth remained at an annual 10.9% growth bringing this to an astounding 68% overall growth as of 2015 and this focus is set to continue in the 11th Malaysia Plan from 2016–2020 leveraging new investments in road, rail and air services. According to statistics obtained from JPJ, the number of new vehicles registrations spiked from 25418 in 2012 to 40753 in the following year and as of 2016, there is an observable average of 8000 to 11000 new registrations per month. By the first quarter of 2016, the number of new registered motor vehicles in Wilayah Persekutuan, Kuala Lumpur obtained from Road Transport Department is reported at 31476 and the total number of vehicles in the state is 6,149,414. Due to the rapid surge in urban transport and the wide availability of mobile vehicles, it becomes necessary to develop a real time monitoring system that could effectively measure the traffic movement of vehicles. This is because vehicles tend to emit unnecessary greenhouse gases which may pollute the environment and affect the population health. In this project, we aim to conduct a first class survey which aims at studying traffic flow in KL areas and also identify the cause of traffic congestion through state of the art data analytic methods.
{"title":"A study on smart mobility in Kuala Lumpur","authors":"David Hong, Lai-Wan Wong","doi":"10.1109/ICCCT2.2017.7972241","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972241","url":null,"abstract":"Transportation in Malaysia started since the British colonial period and as of 2016, it can be said that the country's transport network is highly diversified having undergone years of development. At present, Malaysia's road network covers an extensive estimate of 230,000 km in 2015 with a national road development growth index of 2.29 from a mere 1.42 in 2010. Since the 10th Malaysia plan, Malaysia's network growth remained at an annual 10.9% growth bringing this to an astounding 68% overall growth as of 2015 and this focus is set to continue in the 11th Malaysia Plan from 2016–2020 leveraging new investments in road, rail and air services. According to statistics obtained from JPJ, the number of new vehicles registrations spiked from 25418 in 2012 to 40753 in the following year and as of 2016, there is an observable average of 8000 to 11000 new registrations per month. By the first quarter of 2016, the number of new registered motor vehicles in Wilayah Persekutuan, Kuala Lumpur obtained from Road Transport Department is reported at 31476 and the total number of vehicles in the state is 6,149,414. Due to the rapid surge in urban transport and the wide availability of mobile vehicles, it becomes necessary to develop a real time monitoring system that could effectively measure the traffic movement of vehicles. This is because vehicles tend to emit unnecessary greenhouse gases which may pollute the environment and affect the population health. In this project, we aim to conduct a first class survey which aims at studying traffic flow in KL areas and also identify the cause of traffic congestion through state of the art data analytic methods.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116237541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}