Identifying the unauthorized user in e-government compliant system using valid proofs

  • Authors

    • Mekala T
    • Devakar B
    • Govindhasamy P
    • Nishkal Kanna B
    2018-05-07
    https://doi.org/10.14419/ijet.v7i2.26.12531
  • Street Damage, Street Cleaning, Garbage Bin Overflowing, Light Post Damage, Water Outage and Traffic, Web Application, Message Alert, Web Portal.
  • Citizens of our country face municipal complications like Street damage, Street cleaning, Garbage bin overflowing, light post damage, wa-ter outage etc. They started to register their complaints with advanced technologies. The complaint registration has many ways to file their complaints, it makes easier to register the complaint and saves our time. To solve these types of complications, we are going to implement a web application that helps the people to intimate about their issues directly to the government officer. So when the people iden-tify any complications in the city`s environment then, the government officer will solve the complications through his web portal. This will minimize time as well as money to go to an office for complaint registration. If the problem solved by those subjective then user will get the problem solved message. Otherwise, the problem will be again send to higher authorities to take action about it. The message alert will hap-pens repeatedly until the problem gets solve. Only the authorized persons have the rights to create the account by using aadhar card etc.

     

  • References

    1. [1] DhavalGherwada, Vipul Shah, Deep Shah, Prof. Harsh N. Bhor “Mobile Application Interface to Register Citizen Complaint†KJSIEIT, Sion, Mumbai, Maharashtra, India- 2015.

      [2] TejaswitaBadhe, Madhuri Birajdar, SuchetaMapari Prof. P. P. Jorvekar “Grievance Registration on Mobile Application under Smart City Project†Department of Computer Engineering, NBN Sinhgad School Of Engineering (NBNBSSOE), Pune,imperial journal of interdisciplinary research vol-3 issue-1,2017.

      [3] Gaurav Gawde , SharvilSarfare, ShreyashNaik, Vishal Mistry, HarshalPatil “Mobile Application for Resolving Citizens Complaints Department of Information Technology†Theem College of Engineering, Boisar University of Mumbai Maharashtra – India- International Journal of Advanced Research in Computer Engineering&Technology,volume 5 Issue 3 2016.

      [4] DevikaRadhakrishnan, NisargGandhewar, RuchitaNarnaware, 4Prayas Pagade, Arpan Tiwari and 6Pooja Vijaywargi, “Smart Complaint Management Systemâ€, Department of Computer Science and Engineering, S. B. Jain Institute of Technology, Management and Research, Nagpur, Maharastra, India, International Journal of Trend inResearch and Development volume 3(6)-2015.

      [5] TruptiBomble, RitikaRaut, RuchiKanekar, Prof.ShekhAhmadHusen “Android Based Complaint Management System for Municipal Corporation†Department of Information Technology, Mumbai UniversityTruptiBomble et al. Int. Journal of Engineering Research and Applications vol. 5 Issue 4 (part -3)-2015.

      [6] Satish Kumar Prasad, RiteshPatil, SagarBeldare, Prof. Anita Shinde “Civic Complaint Application under Smart City Project†Department of Computer Engineering, Mitra Mandal`s College of Engineering (MMCOE), Pune International of Computer Science Intformation Technologies vol.7 2016.

      [7] Vishesh K. Kandhari, Keertika D. Mohinani “GPS based Complaint Redressal SystemComputer Science†and Engineering Nirma University Ahmedabad, India- volume 4 Issue 3(2)-2014.

      [8] Aditi Mhapsekar, Uma Nagarseka, Priyanka Kulkarni and DhananjayR.Kalbande. “Voice enabled Android application for vehicular complaint system using GPS and GSM-SMS technology,†in World Congress on Information and Communication Technologies, 2012, pp. 520-524.

      [9] Kim Nee Goh, Yin Ping Ng, KamaruzamanJusoff, Yoke Yie Chen andYoonYeh Tan. “Architecture of a GPS-Based Road Management System,†World Applied Sciences Journal 12 (Special Issue on Computer Applications and Knowledge Management), pp. 26-31, 2011.

      [10] Umar Farooq, TanveerulHaq, Muhammad Amar, Muhammad Usman Asad and Asim Iqbal. "GPS-GSM Integration for Enhancing Public-volume 5 Issue 3-2015.

      [11] R Gomathi, N Mahendran, “An efficient data packet scheduling schemes in wireless sensor networksâ€, in Proceeding 2015 IEEE international Conference on Electronics and Communication Systems (ICECS’15), ISBN: 978-1-4799-7225-8, PP:542-547, 2015.DOI: 10.1109/ECS.2015.7124966.

      [12] S Vanithamani, N Mahendran, “Performance analysis of queue based scheduling schemes in wireless sensor networksâ€, in proceeding 2014 IEEE international Conference on Electronics and Communication Systems (ICECS’14), ISBN: 978-1-4799-2320-5, PP: 1-6, 2014. DOI: 10.1109/ECS.2014.6892593.

      [13] N.Mahendran, Dr.S.Shankar and T.Deepika,â€A Survey on Swarm Intelligence Based Optimization Algorithms in Wireless Sensor Networks†International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.20 (2015).

      [14] P Kalaiselvi, N Mahendran, “An efficient resource sharing and multicast scheduling for video over wireless networks “,in proceeding 2013 IEEE international Conference on Emerging Trends in Computing, Communication and Nanotechnology (ICECCN’13), ISBN: 978-1-4673-5036-5, PP:378-383, 2013.DoI: 10.1109/ICE-CCN.2013.6528527.

      [15] R Nithya, N Mahendran, “A SURVEY: Duty cycle based routing and scheduling in wireless sensor networksâ€, in proceeding 2015 IEEE international Conference on Electronics and Communication Systems (ICECS’15), ISBN: 978-1-4799-7225-8 PP-813-817, DOI: 10.1109/ECS.2015.7125025

      [16] T Mekala, N Madhu Suganya, “Secure transaction using dynamic session key†International Journal of Science and Modern Engineering, volume 1, issue four, pp- 2319-6386.

      [17] N Mahendran, T Mekala,†A Survey: Sentiment Analysis Using Machine Learning Techniques for Social Media Analyticsâ€, International Journal of Pure and Applied Mathematics, Volume 118 No. 8 2018, PP: 419-423.

      [18] T Mekala, N Mahendran, “Improved Security in Adaptive Steganography Using Game Theory, International Journal of Pure and Applied Mathematics, Volume 118 No. 8 2018, PP: 111-116.

      [19] Mekala, T., Natarajan, M."Secured crypto-biometric system based on session key navigation" Proceedings of ICCCS 2014 - IEEE International Conference on Computer Communication and Systems 2014.

      [20] S.Thilagamani, N. Shanthi,†Object Recognition Based on Image Segmentation and Clusteringâ€, Journal of Computer Science,Vol. 7,No.11,pp. 1741-1748, 2011.

      [21] S.Thilagamani , N. Shanthi,†Gaussian and gabor filter approach for object segmentationâ€, Journal of Computing and Information Science in Engineering,Vol.14,Issue 2, pp. 021006,2014

      [22] Dr.P.Santhi, S.Kiruthika,†Lung Based Disease prediction Using Lobe Segmentation Based on Neural Networksâ€, International Journal of Pure and Applied Mathematicsâ€, Vol.118, No.8, PP. 499-504, 2018.

      [23] P.Santhi, R.Vikram,†Implementation Of Classification System Using Density Clustering Based Gray Level Co Occurrence Matrix (DGLCM) For Green Bio Technologyâ€, International Journal of Pure and Applied Mathematicsâ€,Vol.118, No.8,PP. 191-195,2018.

      [24] S.Thilagamani, V.Manochitra,â€An Intelligent Region-Based Method for Detecting Objects from Natural Imagesâ€, International Journal of Pure and Applied Mathematicsâ€, Vol.118, No.8, PP.473-478, 2018.

      [25] S. Thilagamani, N.Shanthi, “A Novel Recursive Clustering Algorithm for Image Oversegmentationâ€, European Journal of Scientific Research, Vol.52, No.3, pp.430-436, 2011.

      [26] S.Thilagamani and S. Uma Mageshwari,†Risk appraisal for cardiovascular disease among selected young adult women in Coimbatore, Indiaâ€, Indian Journal of Science and Technology, Vol. 3, No. 6 ,PP.672-675,2010

      [27] T. Mekala, P. Nandhini,†Modified Agglomerative Clustering for Web Users Navigation Behaviorâ€, International Journal of Advanced Networking and Applications, Vol. 05, Issue: 01, PP.1842-1846, 2013.

      [28] S Saravanan, V Venkatachalam,“Advance Map Reduce Task Scheduling algorithm using mobile cloud multimedia services architecture†IEEE Digital Explore,pp.21-25,2014.

      [29] S.Thilagamani,N. Shanthi, “Literature survey on enhancing cluster qualityâ€, International Journal on Computer Science and Engineering Vol. 02, No. 06, pp1999-2002, 2010.

      [30] K.Deepa , Y.Naveen Raj, “Enhancing the Performance in WSN using Distributed Tracking Algorithmâ€, International Journal of Pure and Applied Mathematics Vol. 118, No. 9 2018, 717-722.

      [31] Hema.C.R, Paulraj.M.P & Ramkumar.S, “Classification of Eye Movements Using Electrooculography and Neural Networksâ€, International Journal of Human Computer Interaction, Vol.5 (4), pp.51-63, 2014.

      [32] Hema, C. R., Ramkumar, S., & Paulraj, M. P. , “Idendifying Eye Movements using Neural Networks for Human Computer Interactionâ€, International Journal of Computer Applications, 105(8), pp 18-26, 2014.

      [33] S.Ramkumar, K.SatheshKumar, G.Emayavaramban,â€EOG Signal Classification Using Neural Network for Human Computer Interactionâ€, International Journal of Computer Theory and Applications, Vol.9 (24), pp.223-231, 2016.

      [34] Ramkumar, Dr.K.Satheshkumar and G.Emayavaramban†Nine States HCI using Electrooculogram and Neural Networksâ€, IJET, Vol. 8(6), pp. 3056-3064, Jan 2017.

      [35] S.Ramkumar, K.Sathesh Kumar G.Emayavaramban,†A Feasibility Study on Eye Movements Using Electrooculogram Based HCI†IEEE- International Conference on Intelligent Sustainable Systems, pp.384-388, Dec-2017.

      [36] G.Emayavaramban, S.Ramkumar, A.Amudha and K.Sathesh Kumar “Classification Of Hand Gestures Using FFNN And TDNN Networksâ€, International Journal of Pure And Applied Mathematics, Vol.118 (8) Pp. 27-32, Jan 2018.

      [37] S.Ramkumar, K.Sathesh Kumar, T.Dhiliphan Rajkumar, M.Ilayaraja, K.Shankar, “A review-classification of electrooculogram based human computer interfacesâ€, Biomedical Research, 29(6), Pp. 1078-1084, April 2018.

      [38] G.Ranjith, M.Vinoth, “A Unified Approach for Effective Use of Cloud Metering Serviceâ€, International Journal of Pure and Applied Mathematics Vol. 118, No. 9 2018, 801-806.

      [39] Dr.P.Santhi, K.Deepa, Classification System for Identifying the chemical Structure Using the Support Vector Machine. Vol.03, No.1, June (2017). 2349-7866.

  • Downloads

  • How to Cite

    T, M., B, D., P, G., & Kanna B, N. (2018). Identifying the unauthorized user in e-government compliant system using valid proofs. International Journal of Engineering & Technology, 7(2.26), 40-43. https://doi.org/10.14419/ijet.v7i2.26.12531