IOT Based Smart Automatic Shopping Cart with Overload Indicator

THANGAVEL M, VSB ENGINEERING COLLEGE, KARUR, TAMIL NADU; Karthick N ,VSB ENGINEERING COLLEGE, KARUR, TAMIL NADU; Karthikeyan D ,VSB ENGINEERING COLLEGE, KARUR, TAMIL NADU; Karunakaran P ,VSB ENGINEERING COLLEGE, KARUR, TAMIL NADU; Prasanth R ,VSB ENGINEERING COLLEGE, KARUR, TAMIL NADU

IOT, Smart Shopping, Smart Cart, Security

In such an IOT framework, an Inexpensive RFID tag can be connected to every item which, When set into a savy shopping basket, can be consequently Read by a truck outfitted with a RFID per user. Furthermore, Smart racking can be included into this framework, outfitted with RFID per users, and can screen stock, maybe additionally refreshing a focal server. Another advantage of this sort of framework is that Inventory administration turns out to be significantly less demanding, as all things can be naturally perused by a RFID per user and shows if the items lapse date isn't substantial. Everything about be refreshed in IOT site.
    [1] F. Xia, L. T. Yang, L. Wang, and A. Vinel, “Internet of things,” International Journal of Communication Systems, vol. 25, no. 9, p. 1101, 2012. [2] P. Castillejo, J.-F. Martinez, J. Rodriguez-Molina, and A. Cuerva, “Integration of wearable devices in a wireless sensor network for an e-health application,” IEEE Wireless Communications, vol. 20, no. 4, pp. 38–49, 2013. [3] N. Mitton, S. Papavassiliou, A. Puliafito, and K. S. Trivedi, “Combining cloud and sensors in a smart city environment,” EURASIP journal on Wireless Communications and Networking, vol. 2012, no. 1, p. 1, 2012. [4] T. Song, R. Li, X. Xing, J. Yu, and X. Cheng, “A privacy preserving communication protocol for iot applications in smart homes,” in to appear in International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI) 2016, 2016. [5] D. M. Dobkin, The rf in RFID: uhf RFID in practice. Newnes, 2012. [6] Raju Kumar, K. Gopalakrishna, K. Ramesha, “Intelligent Shopping Cart,” International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 4, July 2013. [7] http://en.wikipedia.org/wiki/zigbee. [8] https://en.wikipedia.org/wiki/Bayesian_network. [9] http://www.rfidjournal.com [10] EktaMaini and JyotiShettar” Wireless Intelligent Billing Trolley for Malls, International Journal of Scientific Engineering and Technology Volume No.3 Issue [11] A. Yewatkar, F. Inamdar, R. Singh, A. Bandal et al., “Smart cart with automatic billing, product information, product recommendation using rfid & zigbee with anti-theft,” Procedia Computer Science, vol. 79, pp. 793–800, 2016. [12] Z. Cai, Z. He, X. Guan, and Y. Li, “Collective data-sanitization for preventing sensitive information inference attacks in social networks,” IEEE Transactions on Dependable and Secure Computing, 2016. [12] Z. He, Z. Cai, Q. Han, W. Tong, L. Sun, and Y. Li, “An energy efficient privacy-preserving content sharing scheme in mobile social networks,” Personal and Ubiquitous Computing, vol. 20, no. 5, pp. 833–846, 2016. [13] L. Zhang, Z. Cai, and X. Wang, “Fakemask: A novel privacy preserving approach for smart phones,” IEEE Transactions on Network and Service Management, vol. 13, no. 2, pp. 335–348, 2016. [14] Y. Wang, Z. Cai, G. Yin, Y. Gao, X. Tong, and G. Wu, “An incentive mechanism with privacy protection in mobile crowd sourcing systems,” Computer Networks, vol. 102, pp. 157–171, 2016. [15] X. Jin, M. Zhang, N. Zhang, and G. Das, “Versatile publishing for privacy preservation,” in Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2010, pp. 353–362. [16] C. Hu, R. Li, W. Li, J. Yu, Z. Tian, and R. Bie, “Efficient privacypreserving schemes for dot-product computation in mobile computing,” in Proceedings of the 2st ACM Workshop on Privacy-Aware Mobile Computing. ACM, 2016, pp. 51–59.
Paper ID: GRDCF007019
Published in: Conference : National Conference on Emerging Trends in Electrical, Electronics and Computer Engineering (ETEEC - 2018)
Page(s): 100 - 105