Design and Development of Open Source Based Interactive e-Waste Management System
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 4
Abstract
e-Waste has become an issue of serious concern to environmentalists. e-Waste is a complex mixture of hazardous and non-hazardous waste, which consists of items of economic value. Therefore, it requires specialized segregation, collection, transportation, treatment, disposal and recycling. ‘e-Waste’ is a popular, informal name for electronic products nearing the end of their useful life. e-Wastes are considered dangerous, as certain components of some electronic products contain materials that are hazardous, depending on their condition and density. The hazardous content of these materials pose a threat to human health and environment. Discarded computers, cell phones, televisions, batteries and other electronic materials if improperly disposed can leak out lead and other substances into soil and groundwater. Many of these products can be reused, refurbished, or recycled in an environmental friendly manner so that they are less harmful to the ecosystem. It is a "reverse production" system that designs infrastructure to recover and reuse every material contained within e-Wastes metals such as lead, copper, aluminum, iron, silica , etc and non-metals such as rubber, sulfur, etc. This research work highlights the hazards of e-Wastes, the need for its appropriate management and options that can be implemented and it also assist in understanding, planning, designing and implementing e-Waste take-back schemes for use by cities or other localized areas or for use at a nation-wide level.
Authors and Affiliations
Prof. Pragati N. Rode, Prof. Sneha S. Kadam
A Review of the Literature on Immersive Virtual Reality in Education: Current State and Future Prospects
That's because the term "Virtual Reality" (VR) was being coined in mid-1950s, it really has evolved in numerous aspects, getting increasingly similar to the natural environment. Virtual reality is classified into two kin...
A Comparative Approach for Host Based Intrusion Detection Using Naiyve Bayes and KNN Algorithm
Despite the existence of various types of network intrusion detection system, growth of attacks at host level has increased in the present time. Therefore, there is a huge potential of research in this field and which mo...
Applications of Large Language Models in Cloud Computing: An Empirical Study Using Real-world Data
This study investigates the integration of Large Language Models (LLMs) in cloud computing, focusing on their impact on resource allocation and management. The research employs Bayesian inference and Markov Decision Proc...
Intuitive Language Learning Application Using IoT and ASL
This Project is an android application enabled with IOT and ASL. Which aids the people with visual and hearing impairments to learn a new language? Initially the application will prompt the user to select how he is diffe...
The Simple Model of Newton's II Law and Its Applications
The research aims to determine The Simple model for Newton’s II Law and its application. The sample of this study is 20 sample variation. Data analysis technique used is by regression analysis. From the results of the an...