Corpus ID: 212485800

SMART GARBAGE MONITORING SYSTEM USING IOT BASED

@article{Thuse2018SMARTGM,
  title={SMART GARBAGE MONITORING SYSTEM USING IOT BASED},
  author={Sushama Tulshiram Thuse and R. S. Satpute and Vaishnavi Chandrakant Padile and Ujwala Ashokrao Meshram and A. S. Deshmukh and Shradha Rameshrao Savale and Monali Yogeshrao Jagdhane and Pratiksha Rajendrarao Dange},
  journal={International Journal of Advance Research and Innovative Ideas in Education},
  year={2018},
  volume={4},
  pages={494-503}
}
As the name suggests we are developing an Automatic garbage collection and information gathering system which is based on Image processing as well as on GSM module. The main concept is that a Camera will be placed at every garbage collection point along with load cell sensor at bottom of the garbage can. The camera will take continuous snapshots of the garbage can. The eshold level is set which compares the output of camera and load sensor .The comparison is done with help of microcontroller… Expand
1 Citations
Survey on IOT based Smart City Bin
TLDR
The concept of IOT based Smart Dustbin is brought to bring “Waste Management “ to an optimal solution because Waste Management is a major issue in today’s world. Expand

References

SHOWING 1-10 OF 15 REFERENCES
A method for obtaining digital signatures and public-key cryptosystems
TLDR
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys. Expand
A method for obtaining digital signatures and public-key cryptosystems
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two importantExpand
Efficient Security Mechanisms for Routing Protocols
As our economy and critical infrastructure increasingly rely on the Internet, securing routing protocols becomes of critical importance. In this paper, we present four new mechanisms as tools forExpand
Packet leashes: a defense against wormhole attacks in wireless networks
  • Y. Hu, A. Perrig, D. Johnson
  • Computer Science
  • IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428)
  • 2003
TLDR
A new, general mechanism, called packet leashes, is presented for detecting and thus defending against wormhole attacks, and a specific protocol is presented, called TIK, that implements leashes. Expand
Rushing attacks and defense in wireless ad hoc network routing protocols
TLDR
The rushing attack is presented, a new attack that results in denial-of-service when used against all previous on-demand ad~hoc network routing protocols, and Rushing Attack Prevention (RAP) is developed, a generic defense against the rushing attack for on- demand protocols. Expand
Caching strategies in on-demand routing protocols for wireless ad hoc networks
TLDR
A set of new mobility metrics are defined that allow accurate characterization of the relative difficulty that a given movement scenario presents to an ad hoc network routing protocol, and each mobility metric's ability to predict the actual difficulty in terms of routing overhead experienced by the routing protocol across the scenarios in this study is analyzed. Expand
Multipoint Relaying: An Efficient Technique for Flooding in Mobile Wireless Networks
TLDR
The principle and the functioning of multipoint relays are discussed, and a heuristic to select these MPRs in a mobile wireless environment is proposed, and it is proved that the computation of a multipoint relay set with minimal size is NP-complete. Expand
A performance comparison of multi-hop wireless ad hoc network routing protocols
TLDR
The results of a derailed packet-levelsimulationcomparing fourmulti-hopwirelessad hoc networkroutingprotocols, which cover a range of designchoices: DSDV,TORA, DSR and AODV are presented. Expand
Packet leashes: a defense against wormhole attacks in wireless ad Networks, in: Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies
  • 2003
Ariadne: A secure on -demand routing protocol for wireless ad hoc networks
  • in: Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom
  • 2002
...
1
2
...