Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972300
Bharadwaj B, M. Kumudha, G. N, C. G.
“Swachh Bharat Abhiyaan” is a national campaign initiated by the Government of India, which covers 4,041 cities and towns, to clean the streets, roads and infrastructure of the country. The main motto of the mission is to cover all the rural and urban areas of the country. With proliferation of Internet of Things (IoT) devices such as Smartphone & sensors, this paper describes the effective dry and wet dirt collection using Embedded System. The main motto of the application is collection of dry and wet waste separately which is placed in a conveyor belt on which the dry waste collected dust bins are placed left side and wet waste collected bins on right side. The system will get the input through the dust collecting person through switches and sends signal to the Micro controller unit using RF technology and that makes the H-bridge to rotate conveyor belt. When the belt starts rotating clockwise the dust bin's lid is automatically closed, simultaneously the waste is dumped into the underground garbage container placed at the ground floor. Here IoT module is used to control and monitor the waste and the information will be sent to the particular organization and the common man. The mobile app shows the collection of waste and the particular date and arrival time of the vehicle.
{"title":"Automation of Smart waste management using IoT to support “Swachh Bharat Abhiyan” - a practical approach","authors":"Bharadwaj B, M. Kumudha, G. N, C. G.","doi":"10.1109/ICCCT2.2017.7972300","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972300","url":null,"abstract":"“Swachh Bharat Abhiyaan” is a national campaign initiated by the Government of India, which covers 4,041 cities and towns, to clean the streets, roads and infrastructure of the country. The main motto of the mission is to cover all the rural and urban areas of the country. With proliferation of Internet of Things (IoT) devices such as Smartphone & sensors, this paper describes the effective dry and wet dirt collection using Embedded System. The main motto of the application is collection of dry and wet waste separately which is placed in a conveyor belt on which the dry waste collected dust bins are placed left side and wet waste collected bins on right side. The system will get the input through the dust collecting person through switches and sends signal to the Micro controller unit using RF technology and that makes the H-bridge to rotate conveyor belt. When the belt starts rotating clockwise the dust bin's lid is automatically closed, simultaneously the waste is dumped into the underground garbage container placed at the ground floor. Here IoT module is used to control and monitor the waste and the information will be sent to the particular organization and the common man. The mobile app shows the collection of waste and the particular date and arrival time of the vehicle.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116063162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The ultimate aim of this Wireless Sensor Brain (WSB) is to secure the person from emergency situations using SOS network and sensors. The last few years have witnessed a phenomenal growth in the wireless and sensor industry, both in terms of mobile technology and in Internet Of Things (IoT). Watch, rings etc., are such main things that is going to be used for the application of wireless sensor brain. WSB is an sensor application through which the corresponding authority can track and secure the person from emergency situations by SOS network. Security is very important in some activities. During night time, some accidents can be serious or fatal. During that emergency situation, this WSB is very valuable. In such situations the need to type the message or the mobile number to call for help will be very inconvenient and time consuming. Thus the objective of WSB is to develop simple smart sensor application, with the existing technologies of human detecting sensor with GPRS, GPS, SOS NETWORK and mini brain chip, which allows the person to be secured and send panic alerts by sensing the object nature.
这种无线传感器大脑(WSB)的最终目的是利用SOS网络和传感器保护人们免受紧急情况的影响。在过去的几年里,无论是在移动技术还是在物联网(IoT)方面,无线和传感器行业都出现了惊人的增长。手表、戒指等都是将用于无线传感器大脑应用的主要物品。WSB是一种传感器应用程序,相应当局可以通过SOS网络跟踪并保护人员免受紧急情况的影响。在某些活动中,安全是非常重要的。在夜间,一些事故可能是严重或致命的。在这种紧急情况下,这个WSB非常有价值。在这种情况下,需要输入信息或手机号码来寻求帮助将是非常不方便和耗时的。因此WSB的目标是开发简单的智能传感器应用,利用现有的具有GPRS, GPS, SOS NETWORK和迷你大脑芯片的人体检测传感器技术,使人能够通过感知物体的性质来获得安全并发出恐慌警报。
{"title":"Wireless Sensor Brain (WSB)","authors":"Padmavathy N., Kamaleshwari J., Sowndarya S., Kalaiselvi V.K.G.","doi":"10.1109/ICCCT2.2017.7972292","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972292","url":null,"abstract":"The ultimate aim of this Wireless Sensor Brain (WSB) is to secure the person from emergency situations using SOS network and sensors. The last few years have witnessed a phenomenal growth in the wireless and sensor industry, both in terms of mobile technology and in Internet Of Things (IoT). Watch, rings etc., are such main things that is going to be used for the application of wireless sensor brain. WSB is an sensor application through which the corresponding authority can track and secure the person from emergency situations by SOS network. Security is very important in some activities. During night time, some accidents can be serious or fatal. During that emergency situation, this WSB is very valuable. In such situations the need to type the message or the mobile number to call for help will be very inconvenient and time consuming. Thus the objective of WSB is to develop simple smart sensor application, with the existing technologies of human detecting sensor with GPRS, GPS, SOS NETWORK and mini brain chip, which allows the person to be secured and send panic alerts by sensing the object nature.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126751056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972306
S. S, K.M.Yatheendra Pravan, V. Sumathy, Thejeswari C.K
Indian railways being one of the largest railway networks operating over 1,015,000 km carrying more than 22 million passengers a day spends more than 94,000cr for efficient functioning. From recent proposal for smart cities, Railways are projected as ‘India's Growth engine’ and with the current trend moving towards digitalization, Smart railways are the need of the hour. Of the 94,000cr spent, an exorbitant pay-out of 23,500cr is spent on paper, which can be subsidized using efficient alternative techniques. Smartphone having a profound influence on the daily routine of people, it can be utilized for paperless ticket travel. Verification of Identification proofs for 22 million people during their travel per day demands great human resource and all these can be simplified digitally by linking application with the aadhar card database. Indian Railways harvests a revenue of ₹1.6345 trillion per annum. With local trains contributing a major share towards this revenue, considering the fact, that there are people who travel without tickets. This proposal will also be helpful in cracking down those who travel in such a bogus manner. With the execution of this novel approach, Indian railways will be able to implement Smart Railways and efficient verification techniques.
{"title":"Novel approach for Smart Indian Railways","authors":"S. S, K.M.Yatheendra Pravan, V. Sumathy, Thejeswari C.K","doi":"10.1109/ICCCT2.2017.7972306","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972306","url":null,"abstract":"Indian railways being one of the largest railway networks operating over 1,015,000 km carrying more than 22 million passengers a day spends more than 94,000cr for efficient functioning. From recent proposal for smart cities, Railways are projected as ‘India's Growth engine’ and with the current trend moving towards digitalization, Smart railways are the need of the hour. Of the 94,000cr spent, an exorbitant pay-out of 23,500cr is spent on paper, which can be subsidized using efficient alternative techniques. Smartphone having a profound influence on the daily routine of people, it can be utilized for paperless ticket travel. Verification of Identification proofs for 22 million people during their travel per day demands great human resource and all these can be simplified digitally by linking application with the aadhar card database. Indian Railways harvests a revenue of ₹1.6345 trillion per annum. With local trains contributing a major share towards this revenue, considering the fact, that there are people who travel without tickets. This proposal will also be helpful in cracking down those who travel in such a bogus manner. With the execution of this novel approach, Indian railways will be able to implement Smart Railways and efficient verification techniques.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"51 203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125950212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972299
R. Swathi, T. Subha
Cloud computing is a type of online based computing that gives shared computer dealing out resources & data to the computers. It is dreadfully challenging part to maintain the safety of all required data that are wanted in various applications for the user in cloud. The data stored in the cloud may not be wholly responsible. So, the cloud storage contributors are in charge for monitoring the data which is available and accessible on the cloud, and the physical environment protected and running. There are still some interesting challenges on maintaining the truthfulness of full data that is stored up in the computing environment. The stored data in cloud is so important that the users make ensure either the data is corrupted or lost. This work studies the problem of ensuring the security and integrity of data storage in Cloud Computing. This paper, proposes an approach named enhancing data storage security in cloud using Certificate less public auditing scheme which is used to generate key value. Key Generation Center (KGC) will generate only the partial key so that at any case it will not compromise user's private key. Private & public key is generated based on the partially generated private key by the KGC and to check the cloud data reliability of the user's uploads the data in server and then during the auditing of the reliability of data is checked. Once after checking it then sends the report to the users'. To confirm the data reliability during the auditing process & the server generates the proof and randomly selects the blocks. The TPA then authenticates the proof against cloud server & the auditing result issent to the user. A detailed execution analysis exhibited that the proposed approach gives preferred execution over the current works.
{"title":"Enhancing data storage security in Cloud using Certificateless public auditing","authors":"R. Swathi, T. Subha","doi":"10.1109/ICCCT2.2017.7972299","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972299","url":null,"abstract":"Cloud computing is a type of online based computing that gives shared computer dealing out resources & data to the computers. It is dreadfully challenging part to maintain the safety of all required data that are wanted in various applications for the user in cloud. The data stored in the cloud may not be wholly responsible. So, the cloud storage contributors are in charge for monitoring the data which is available and accessible on the cloud, and the physical environment protected and running. There are still some interesting challenges on maintaining the truthfulness of full data that is stored up in the computing environment. The stored data in cloud is so important that the users make ensure either the data is corrupted or lost. This work studies the problem of ensuring the security and integrity of data storage in Cloud Computing. This paper, proposes an approach named enhancing data storage security in cloud using Certificate less public auditing scheme which is used to generate key value. Key Generation Center (KGC) will generate only the partial key so that at any case it will not compromise user's private key. Private & public key is generated based on the partially generated private key by the KGC and to check the cloud data reliability of the user's uploads the data in server and then during the auditing of the reliability of data is checked. Once after checking it then sends the report to the users'. To confirm the data reliability during the auditing process & the server generates the proof and randomly selects the blocks. The TPA then authenticates the proof against cloud server & the auditing result issent to the user. A detailed execution analysis exhibited that the proposed approach gives preferred execution over the current works.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121980828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972311
Joshi Kumar A.V., A. Bharathi, Vinoth Kumar, Trillia Ku, B. N.S.
The need of machine learning in the defence planning and strategies is increasing day by day due to the increasing amount of breaches and decimations caused by terrorist forces. A myriad of military bases, temporary campaigns, base camps etc. are being targeted and attacked by several terrorist forces. The common problem in the warfare and tumultuous international borders is the frequent and violent intrusion and breaches upon the temporary / permanent military and army bases. Though they are successful in their individual task to identify the safest or the effective base, a combined location that embraces both effectiveness and vulnerability is invalid using a present analyzing and classification technology. This problem is due to the presence of collinearity between the parameters that determine both effectiveness and vulnerability. A military base location can be both effective and vulnerable at the same time, a location that does not provide sufficient effectiveness to perform military operation. To combat this problem, in this paper we propose an algorithm that identifies the two rival parameters (effectiveness and vulnerability) and cross correlates them one by one for checking collinearity between them. Additionally, after identifying the collinear combinations, the Rival Check Cross Correlation Algorithm eliminates those collinear combinations, thereby providing unambiguous combinations of effective variables.
{"title":"Rival Check Cross Correlator for locating strategic defense base using supervised learning","authors":"Joshi Kumar A.V., A. Bharathi, Vinoth Kumar, Trillia Ku, B. N.S.","doi":"10.1109/ICCCT2.2017.7972311","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972311","url":null,"abstract":"The need of machine learning in the defence planning and strategies is increasing day by day due to the increasing amount of breaches and decimations caused by terrorist forces. A myriad of military bases, temporary campaigns, base camps etc. are being targeted and attacked by several terrorist forces. The common problem in the warfare and tumultuous international borders is the frequent and violent intrusion and breaches upon the temporary / permanent military and army bases. Though they are successful in their individual task to identify the safest or the effective base, a combined location that embraces both effectiveness and vulnerability is invalid using a present analyzing and classification technology. This problem is due to the presence of collinearity between the parameters that determine both effectiveness and vulnerability. A military base location can be both effective and vulnerable at the same time, a location that does not provide sufficient effectiveness to perform military operation. To combat this problem, in this paper we propose an algorithm that identifies the two rival parameters (effectiveness and vulnerability) and cross correlates them one by one for checking collinearity between them. Additionally, after identifying the collinear combinations, the Rival Check Cross Correlation Algorithm eliminates those collinear combinations, thereby providing unambiguous combinations of effective variables.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"32 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115008005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972249
K. Renganathan
Fault Diagnosis and identification (FDI) in a process plant refers to the concept of detecting and locating faults occurring in a process plant. Faults mostly include sensor and actuator faults. Identification or location of a fault requires a special technique or algorithm and hence the concept of Hybrid Petri nets are proposed to achieve FDI since it has a strong mathematical background. In this paper the concept of estimation based FDI is proposed and for this purpose Hybrid Petri nets are used to model the process which is followed by detailed analysis in Petri net environment. Corresponding FDI algorithms are developed for a typical sequential Industrial batch process- a three tank hybrid system (bench mark system) which is equivalent to the sewage treatment process application considered in this paper for study. The algorithms are coded in MATLAB and implemented using a Graphical User interface and corresponding numerical results are obtained.
{"title":"Estimation based Fault Diagnosis and identification in sequential Industrial batch processes modeled as Hybrid Petri nets","authors":"K. Renganathan","doi":"10.1109/ICCCT2.2017.7972249","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972249","url":null,"abstract":"Fault Diagnosis and identification (FDI) in a process plant refers to the concept of detecting and locating faults occurring in a process plant. Faults mostly include sensor and actuator faults. Identification or location of a fault requires a special technique or algorithm and hence the concept of Hybrid Petri nets are proposed to achieve FDI since it has a strong mathematical background. In this paper the concept of estimation based FDI is proposed and for this purpose Hybrid Petri nets are used to model the process which is followed by detailed analysis in Petri net environment. Corresponding FDI algorithms are developed for a typical sequential Industrial batch process- a three tank hybrid system (bench mark system) which is equivalent to the sewage treatment process application considered in this paper for study. The algorithms are coded in MATLAB and implemented using a Graphical User interface and corresponding numerical results are obtained.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124168302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972247
Da-Young Lee, Kyung-Rim Kim, Han-Ho Kim, H. Tak, Hwan-Gue Cho
Many biologists check and analyze the result of alignment directly for various purpose. The more we get the genome data easily, the more alignment result that needed to be analyzed increase. The new proposed visualization model for alignment sequence is designed to reveal the base sequence of alignment result, which is 3d random walk plot model, developed as Web-GL based Web system. Using this model, we can represent the contents of alignment sequence directly that it couldn't be displayed by previous visualization model, and identify diametrically different alignment sequences although their alignment score are much similar to each other. As a result, we can intuitively express the information of alignment analysis in various angle that it cannot be covered by previous alignment visualization model.
{"title":"3D visualization method for whole genome alignment","authors":"Da-Young Lee, Kyung-Rim Kim, Han-Ho Kim, H. Tak, Hwan-Gue Cho","doi":"10.1109/ICCCT2.2017.7972247","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972247","url":null,"abstract":"Many biologists check and analyze the result of alignment directly for various purpose. The more we get the genome data easily, the more alignment result that needed to be analyzed increase. The new proposed visualization model for alignment sequence is designed to reveal the base sequence of alignment result, which is 3d random walk plot model, developed as Web-GL based Web system. Using this model, we can represent the contents of alignment sequence directly that it couldn't be displayed by previous visualization model, and identify diametrically different alignment sequences although their alignment score are much similar to each other. As a result, we can intuitively express the information of alignment analysis in various angle that it cannot be covered by previous alignment visualization model.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121415878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972269
M. SureshKumar, P. Rajesh
In this project we introduce an energy-aware processing model used for balancing the load of docker container and job scaling using docker(1). The approach used is to create an energy optimal regime within which the containers operate. An important strategy for energy reduction is concentrating the load on the containers. When the load increases, then by api call a new container can be spawned which can the allocated with jobs to process. The container can be created automatically based upon threshold conditions. This ensures that the rest of the container is not over-loaded with jobs. When the load decreases that container can be killed to save energy. The Energy-Aware scaling algorithm is used which ensures that the largest possible number of containers operate within their respective operational domain.
{"title":"Optimizing the docker container usage based on load scheduling","authors":"M. SureshKumar, P. Rajesh","doi":"10.1109/ICCCT2.2017.7972269","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972269","url":null,"abstract":"In this project we introduce an energy-aware processing model used for balancing the load of docker container and job scaling using docker(1). The approach used is to create an energy optimal regime within which the containers operate. An important strategy for energy reduction is concentrating the load on the containers. When the load increases, then by api call a new container can be spawned which can the allocated with jobs to process. The container can be created automatically based upon threshold conditions. This ensures that the rest of the container is not over-loaded with jobs. When the load decreases that container can be killed to save energy. The Energy-Aware scaling algorithm is used which ensures that the largest possible number of containers operate within their respective operational domain.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132664694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972272
S. Rajakumari, S. Azhagumeena, A. Devi, M. Ananthi
In day to day life, everything has been digitized. Digitization is something greater than invention because digitization leads to change. In this, every hardware is connected to the network and our smart mobile phones act as the remote to control and monitor the devices. This can be achieved by digitizing and automating the home appliances. In real-time certain home devices need to be digitized and those include water heaters, a system to monitor water overflow in water tanks, a mechanism to convey the user with the nearby available parking slots and to inform the user about the quality of air around him. Thus, In this paper the study of technical details and methodologies to digitize the above ideas are discussed. In case of storage, huge amount of data will be produced by continuously monitoring the devices. Internet of things(IoT) is used to enable hardware devices with internet and bigdata is used store and monitor the large amount of data produced.
{"title":"Upgraded living think-IoT and big data","authors":"S. Rajakumari, S. Azhagumeena, A. Devi, M. Ananthi","doi":"10.1109/ICCCT2.2017.7972272","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972272","url":null,"abstract":"In day to day life, everything has been digitized. Digitization is something greater than invention because digitization leads to change. In this, every hardware is connected to the network and our smart mobile phones act as the remote to control and monitor the devices. This can be achieved by digitizing and automating the home appliances. In real-time certain home devices need to be digitized and those include water heaters, a system to monitor water overflow in water tanks, a mechanism to convey the user with the nearby available parking slots and to inform the user about the quality of air around him. Thus, In this paper the study of technical details and methodologies to digitize the above ideas are discussed. In case of storage, huge amount of data will be produced by continuously monitoring the devices. Internet of things(IoT) is used to enable hardware devices with internet and bigdata is used store and monitor the large amount of data produced.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133208160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972245
R. Kaushalya, J. Jayabahu, W.P.G.M. Weerasinghe, A.M.C.P Herath, K. Kulawansa, M. Firdhous
Many applications have been available in the market for helping tourists for reaching their destinations efficiently. But these applications suffer from many shortcomings including limited functionality, accuracy and features. In order to overcome these limitations, GuideMe has been developed to provide the tourists with accurate and reliable information along with the ability to customize the application to suit their requirements. In addition to providing general information, GuideMe is capable of segmenting the industry into multiple groups based on specific requirements. Also, this application has been developed and hosted on multiple platforms, so that it can be accessed using any device available with the prospective client. Evaluation of the application shows that GuideMe provides more accurate information with better efficiency than the existing solutions.
{"title":"GuideMe: An innovative mobile application for guiding tourists","authors":"R. Kaushalya, J. Jayabahu, W.P.G.M. Weerasinghe, A.M.C.P Herath, K. Kulawansa, M. Firdhous","doi":"10.1109/ICCCT2.2017.7972245","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972245","url":null,"abstract":"Many applications have been available in the market for helping tourists for reaching their destinations efficiently. But these applications suffer from many shortcomings including limited functionality, accuracy and features. In order to overcome these limitations, GuideMe has been developed to provide the tourists with accurate and reliable information along with the ability to customize the application to suit their requirements. In addition to providing general information, GuideMe is capable of segmenting the industry into multiple groups based on specific requirements. Also, this application has been developed and hosted on multiple platforms, so that it can be accessed using any device available with the prospective client. Evaluation of the application shows that GuideMe provides more accurate information with better efficiency than the existing solutions.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131853058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}