Volume 13, Issue 3, June-July 2022

Enabling Smart City by Accident Detection and Management for Road Safety
Pages: 1-9 (9) | [Full Text] PDF (495K)
Muhammad Ali Farooq, Junaid Arshad, Gulraiz khan
Department of Computer Science, UET, Lahore-Pakistan

Abstract -
We are living in an era of intelligent gadgets. Our lifestyle strongly depends upon these smart gadgets. All these gadgets are connected through Internet of Things. This network let these gadgets to communicate and do their tasks separately as well as compositely. When we limit the domain of these smart gadgets to vehicles then this network termed as Internet of Vehicles (IoV). As increase in the population in cities tends to increase vehicles on road thus we need an organized traffic management system that can minimize the possibility of any casualty to secure human life. Proper intimation of accidents on road and timely measures can be helpful in saving someone’s life. In this paper, we proposed a heterogeneous system for detection, intimation and post measures of an accident. We have employed Faster R-CNN for detection purpose, reason for choosing Faster R-CNN is the less prediction time than other flavors of R-CNN that is 0.3s, which is very fast as compared to R-CNN and Fast R-CNN. For training the proposed system, ‘Accident Detection System Data’ (ADSD) is collected by our own CVML lab. The overall accuracy of accident detection system is 93%.
 Index Terms - Internet of Vehicles, Accident Detection, Faster R-CNN, Activity, Internet of Things and VANET
Smart Devices and Authorization
Pages: 10-15 (6) | [Full Text] PDF (569K)
Hafiza Zahra Arshad, Iqra Khaliq
Department of CS, UET, Lahore

Abstract -
Authorization nowadays become the hot topic in the IT industry as most of the smart devices using it to secure their data. Increase in smart devices increases the potential threat to secret information. Authentication is more reliable and effective as it authorizes massive amount of data and secret information.In this paper we have studied many authentication protocols from different research articles that are used in most of the authentication devices and also discussed their advantages and disadvantages accordingly. We mainly focused on the articles related to the authentication in smart devices.In this paper, we have discussed multiple authentication Protocols for the authorization of smart grid system, virtual reality and smart phones.We have also discussed the challenges and research agenda for future approaches for authentication.This paper provides a comprehensive overview of authentication protocols for smart devices.
 Index Terms - Authorization, Authentication Protocols, Virtual Reality (VR), Smart Grid System (SG), Security and Privacy
Factors Affecting the Successfulness of the Management of the Software Projects
Pages: 16-28 (13) | [Full Text] PDF (796K)
Sayed AbdelGaber, AbdelMawgoud Reham Mohamed Younis Hagag, Mahmoud Hamdi Keshta
Business Information System, Helwan University, Egypt
Information Systems, Faculty of Computers and Artificial Intelli-gence, Helwan University, Egypt
Department of Business Information System, Faculty of Commerce and Business Administration, Helwan University, Egypt

Abstract -
The purpose of this study is to figure out the main reasons that make software projects fail to sort out a new list of rea-sons that makes software projects fail and determine the most important factors that affect the failures. 270 factors that affect the software project failure have been studied and grouped into new categories, a list of questions has been asked for 4 types of actors “Developer, tester, project manager and End user” answers have used as raw data for the statistical analysis that conducted with SPSS. The results show that the most influencing factors from end user perspec-tive are Implementation actual time and Suitability of project documentation. From development team perspective is suitability of project documentation. From quality assurance engineers is top management support. From project man-agers perspective is actual time for the implementation.
 Index Terms - Reasons of Software Failures, Factors of Software Failures, Business Information System, BIS and IT
IoT Based Infrastructure for Building Safe Smart Cities Resistant to Disasters
Pages: 29-36 (8) | [Full Text] PDF (653K)
AbuBakar Ubaid, Muhammad Dawood Iqbal
University of Engineering & Technology

Abstract -
Globalization, or internally connected, intelligent physical networks, is a feature of advanced Internet of Things (IoT) technology. The Internet of Things (IoT) is a promising technology that is being used in a variety of applications, including catastrophe risk management. The Internet of Things (IoT) plays a critical and omnipresent role in disaster management, and it has the potential to save lives. The role of IoT in catastrophe risk management is discussed in this article. It compares IoT-based disaster risk management to other solutions on the market to expose IoT-based disaster risk management for various sorts of calamities. It depicts the implementation of several examples of IoT as an early warning system for fire and earthquakes, as well as alternate approaches to application, IoT design, and disaster research. This study could serve as a useful reference for anyone interested in using IoT technology to protect smart city infrastructure and manage disaster risk reduction.
 Index Terms - Internet of Things, Data Access, Centralized Control Data, IoT Based Smart Cities, Cloud Data Management and Sensor Based Solution
A Brief Study of IoT vs. Computing Domain: Features, Challenges and Limitation
Pages: 37-45 (9) | [Full Text] PDF (662K)
Mahrukh Ramzan, Iqra Naz
Technology University

Abstract -
There are a lot of machines linked to the internet these days and increasing day by day. These devices help a lot in the daily life of humans. IoT can connect multiple devices, with a wide range of features. Objects, which we may call nodes, can communicate through the internet, using data communication protocols and using Radio Frequency Identification (RFID). IoT integrates with multiple devices. Multiple devices are those that are not only material but also digital. Therefore, IoT integrates interaction with social features. IoT applications has potential to hear, communicate, collaborate, and interact with other objects. IoT applications require scalability and tolerance. This paper starts with the basic discussion of IoT and then their relationship with different technologies, such as Big Data, Block Chain, Machine Learning, Edge Computing, Fog Computing and how much it’s helpful in IoT-based applications. We did comparative analysis of their features in different domains listed above and list down protocols, challenges and limitations of these technologies. A lot of work done previously on these domains separately, but we are summarizing the whole work in our research paper to clearly define the relationship between IoT, and these domains listed above. This paper provides intuition into the IoT, IoT's relationship with other computing domain. We also list down the features, protocols, challenges, and limitations of these emerging technologies.
 Index Terms - Emerging Technologies, Computing Domain, Big Data, Block Chain