Trash Bin Monitoring System using IOT
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 4
Abstract
In the present day scenario, we see that the Dumpster or Dust bin placed in the cities is overflowing due to increase in the waste. It causes unhygienic condition and leads in spreading deadly diseases & human illness, to avoid such a situation we are planning to design “Dumpster Monitoring System”. In this proposed system each dumpster contains an embedded device to track the level of the garbage in the dumpster and unique ID will be provided to easily detect which dumpster gets filled. The embedded device consists of IR Sensor, Arduino Uno and Arduino Wi-Fi Shield. Once the level gets filled it will transmit the level of the garbage with the unique ID through the mobile application. The notifications are accessed by the concern authorities through the internet and they can take immediate actions to clean the dumpster.
Authors and Affiliations
Ms. S. Nirmala, G. Vani Priya, M. Rathna Bala
Fuzzy Association Rule by Classification Technique
When we use the fuzzy association rule then it is difficult to find the minimum frequency because of distinct fuzzy values of data sets. To resolve such type of problem the classification technique is used in a data set...
Microcontroller Based Speed Control Scheme of Bldc Motor using Proteus
this paper is proposed to control speed of a dc motor using low cost pic16f877a microcontroller. To accomplish this, pwm technique is used, which is intrinsic under module of pic. A microcontroller based speed control s...
Adiponectin Gene Polymorphism SNP +45 T/G in Type 2 Diabetic Patients in Assam, India
Background: Adiponectin SNPs gene have been associated with BMI, insulin sensitivity and type 2 diabetes, reportedly. In this Case study we investigate Adiponectin SNP gene +45*T/G (rs2242766) in type 2 diabetes and Hea...
Combating Cybercrime: A Growing Trend Malvertising and Ransomware
Malware developers trick users to download their malware. By studying how Malvertising occurs, how sites are tricked and how to prevent it, one can better understand Malvertising. People across the globe are subjected t...
Data Compression Technique for Cloud Storage in Multi-User Environments
In many associations, the cloud storages contain a copy (duplicates) of information. For example, the same file would be spared in various locations by different users, too many documents that aren’t differentiable may...