Search

Advanced Search

Mobile based Waste Bin Clearance Monitoring System

R.Gayatri, Tamil Nadu r[dot]gayatri[at]nic[dot]in
  |   Nov 29, 2013
Honorable Mayor of Chennai Corporation handing over mobile phone to a Conservancy Inspector
Honorable Mayor of Chennai Corporation handing over mobile phone to a Conservancy Inspector

Chennai Map showing locations of dustbins
Chennai Map showing locations of dustbins

A Mobile based Waste Bin Clearance Monitoring System was launched by Honorable Mayor of Chennai Corporation on 05/11/2013. Android based Mobiles loaded with the Application were distributed to  200 Conservancy Inspectors during the launch.

The Application has been developed for Corporation of Chennai by NIC, Tamil Nadu State Centre to Monitor the timely clearance of Waste Bins in Chennai Corporation Area. There are 15 Zones, 200 wards and 29864 streets in the Corporation. Every street has been provided with Waste Bins (Group or Single) and each Bin is given a unique Number. The Geo Location(Latitude and Longitude) along with photo of all the Bins are captured using Android based phones and stored in the Central Server of Chennai Corporation through web services.  

The Conservancy Inspectors are provided with user id and password. They are linked to a Ward of a Zone in backend Application developed by Chennai Corporation. When they successfully logon to server from Mobile, all the localities and streets along with bin numbers are downloaded to their Mobile based on their User-id.   

This mobile application has the facility to take the photograph of the Waste Bin along with the Geo-coordinates of the  location from where the photo is taken and the time-stamp. The Inspector can upload this photograph immediately to the central server maintained by the Chennai Corporation.    

A GIS based interface developed by NIC, Tamil Nadu State Centre facilitates the senior officials of Chennai Corporation in viewing the Bins on the Open Street MAP with different color coding to know the status of the bins on a particular day. Green color on the location of the Bin indicates the Garbage cleared status, Orange color indicates uncleared status and Red color indicates non-visiting of Conservancy Inspectors to the Bin location on that day.   

A Separate mobile application would shortly be released to citizens which can be downloaded by them to their Mobile. The Mobile Application can be used by citizens to capture the photograph of any uncleared bin and upload it to the server through web services in Corporation of Chennai Servers.  

These complaints are monitored by designated officials for  followup action.  

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...