This research proposed centralize controlling system that can help to track missing pilgrims during Hajj season by using the wide spread GPS, GPRS and Arduino UNO Microcontroller. The system under study is planned to provide the facility to pilgrims, Ministry of Hajj and the law and peace enforcement in tackling with this issue. Similar applications related to this issue were developed and can be divided into two types from the perception of the device used for location determination. Some applications are using handheld Global Positioning System (GPS) receiver and others are using mobile phones with embedded GPS receiver. This paper proposed system that is designed in such a way to deal with both solutions at the same time. This gives more agility to the system to suite diverse user categories in term of age i.e. children, young and old people with some limitations. In the proposed system the location of the pilgrim is sent instantly to the web server in the form of General Packet Radio Service (GPRS) packet through the Global System for Mobile (GSM) network on demand. The system will also provide the facility to keep a check on a missing pilgrim for regular location updates after identifying that particular pilgrim.
Abstract-Cloud computing is an arrangement of InformationTechnology administrations offered to clients over the web on a leased base. Such administrations empower the associations to scale-up or downsize their in-house establishments. By and large, cloud administrations are given by an outside supplier who has the game plan. Cloud computing has numerous focal points, for example, adaptability, productivity, versatility, combination, and capital lessening. In addition, it gives a progressed virtual space for associations to convey their applications or run their operations. With dismissal to the conceivable advantages of Cloud computing administrations, the associations are hesitant to put resources into Cloud computing chiefly because of security concerns. Security in Cloud computing is an essential and basic angling that upset the development of Cloud computing, and has various issues and issue identified with it. Cloud administration supplier and the cloud administration purchaser ought to ensure that the cloud is sufficiently sheltered from all the outer dangers so that the client does not confront any issue, for example, loss of information or information burglary. There is likewise a probability where a noxious client can infiltrate the cloud by mimicking a real client, along these lines tainting the whole cloud and influences numerous clients who are sharing the contaminated cloud. This paper firstly records the parameters that influence the security of the cloud then it investigates the cloud security issues and issues confronted by cloud administration supplier and cloud administration customer, for example, information, protection, and contaminated application and security issues. It likewise plates a few tips for handling these issues.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.