Trash Bin Monitoring System using IOT
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 4
Abstract
In the present day scenario, we see that the Dumpster or Dust bin placed in the cities is overflowing due to increase in the waste. It causes unhygienic condition and leads in spreading deadly diseases & human illness, to avoid such a situation we are planning to design “Dumpster Monitoring System”. In this proposed system each dumpster contains an embedded device to track the level of the garbage in the dumpster and unique ID will be provided to easily detect which dumpster gets filled. The embedded device consists of IR Sensor, Arduino Uno and Arduino Wi-Fi Shield. Once the level gets filled it will transmit the level of the garbage with the unique ID through the mobile application. The notifications are accessed by the concern authorities through the internet and they can take immediate actions to clean the dumpster.
Authors and Affiliations
Ms. S. Nirmala, G. Vani Priya, M. Rathna Bala
Secure third-party auditing for user data in cloud using HLA with random masking algorithm
Cloud services allow individuals and businesses to use software and hardware that are managed by third parties at remote locations. The cloud facilitates on-demand self service, integrated availability of resources and...
A Descriptive Study to Assess the Innovative Abilities Among Student Nurses at Applied Medical Science College, Alnamas, Kingdom of Saudi Arabia
Innovation is something radically new that creates added social and economic value for an organization. The ability to support and sustain the innovative process is a significant challenge in today’s high-pressure healt...
An Ensemble Model for Identification of Phishing Website
Identification of phishing websites is very challenging task for every internet and e-mail users. To protect the information from unauthorized person classification of phishing websites is very important. In this resear...
Dynamic Routing with Security using a Blow fish algorithm in the Network System
In this paper is about encryption and decryption of the text, image, audio, video using a secret key block cipher which is for the dynamic routing with security using a cryptographic algorithm in the network system. The...
Inspection of Consumer Products Using Industrial Camera
In today’s modern world, everything has become mechanized. Every task is done by machines, but in the present scenario manual inspection and sorting is more popular with respect to size, color etc. If done manually the...