SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3045
Metro Management System
Kuldeep Chauhan1, Md. Mokarram Mansoor2, Krishna Mohan3, Ali Akhtar Ansari4, Vibha Oberoy5
1CSE, Greater Noida Institute of Technology, Greater Noida, U.P, India,Chauhankuldeep341@gmail.com
2CSE, Greater Noida Institute of Technology, Greater Noida, U.P, India, mdmokarrammansoor98@gmail.com
3CSE, Greater Noida Institute of Technology, Greater Noida, U.P, India, krishna9472544025@gmail.com
4CSE, Greater Noida Institute of Technology, Greater Noida, U.P, India, aliakhtaransari550@gmail.com
5Assistant Professor, CSE, Greater Noida Institute of Technology, Greater Noida, U.P, IndiaVibha.oberoi@gmail.com
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Metro plays a crucial role in transportation. But
with the increase in number of users has made the
administration less effective as in case of long queues for
tickets, loss of assets (ticket, card, wallet, money), theft cases,
etc. This paper state the new form of administration system
that may effectively handle the users with high traffic of users.
The Proposed solution uses user identification system, fraud
detection system, and central administration to achieve the
goal.
Key Words: User Identification System, Central
Administration, Fraud Detection System.
1. INTRODUCTION
Metro trains are one of the most used public transportations
in India. These trains are for the utility of people, and people
utilize metro daily in the best way possible. By 2022, metro
services are operational in 11 cities of India namely, Kolkata,
Delhi, Bengaluru, Gurugram,Mumbai,Chennai,Jaipur,Kochi,
Hyderabad,Lucknow,andAhmedabad.Withsuchhuge reach
and popularity user traffic is also increasingand longqueues
can be seen for ticket buying and lots of cases of theft can be
seen at the metro stations. With increase in numberofusers,
cases of losing money, wallet, ticket, and card are common
today.
All these problems can be solved by using a Metro
management system, which uses a hybrid approach to
include automation. For designing such system, we use user
identification system, fraud detection system, and Central
administration, which have been discussed below:
 User identificationsystemusesseveral useridentification
technologies to uniquely identify the user. User
identification techniques used here are face detection,
fingerprint recognition, and QR Code Detection.
 Fraud Detection System uses user’s historytopredictthe
usual behaviour of a user. If a user shows a different
behaviour than the usual fraud detection system based
on some policies, determine the severity of the risk and
take appropriate measures to handle the risk.
 Central Administration is approach for handling the
administration. A central entity will governall theactive
stations in the metro system and can cease or
operationalize the functionalities of a Service in its
domain.
In a Metro Management System, user enters the station and
buys the ticket from vending machines or at the ticket
counters. Then they enter the metro station premises
through AFC Gates where users have to verify their
credibility using their ticket ortheMetrocard,whichisbeing
issued by the metro. After the user’s credibility is verified,
the AFC gate opens and the user board the metro and
deboard at the destination. At the destination station, users
again have to submit their credit using their coinsandMetro
cards.
In this entire process, chances of losing or forgetting the
credit are high enough. In fact, user can forget their assetsor
credits and thus being unable to travel using metro system.
Although, the mentioned situations are not common to
everyone but with increase in number of users these cases
have increased. Sometimes, the user may not have wallet or
money to travel despite being in emergency.
With increase in usage of metro, thefts and fraud are also
becoming common, which is becoming a challenge to the
Metro administration.
2. LITTERATURE REVIEW
S. Priyanka at el. [1], describe how metro has gained its
concern, with its elegant and smooth flow for transportation
in the era of growing population, with which metro
management has turninefficient forwhichhehasproposeda
Smart Ticket System for Metro Train.
Abhishek Nair M at el. [2], describes the problem with
traditional metro ticketing system and propose a Smart
Metro Rail Ticketing System, briefing fingerprint biometric
authentication to achieve the same.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3046
3. PROPOSED SYSTEM
The proposed Metro Management System uses recognition
technologies and centrally manage entire system to provide
safe, secured and hassle free journey.
At metro station, users have to go through the traditional
AFC gates where identification system will automatically
recognize their identity. After the entrance, Fraud Detection
System will ensure their activity and they will be considered
to be logged in at the station. At the exit Station, similar
procedurewill follow and user will be consideredloggedout,
and money will be deducted accordingly from his account.
During the entire process,user’scredibilitywillbetheutmost
concern. After the recognition of users, the same will verified
from the user’s side. Based on the previous history of users
and the input from user’s side, fraud detection system
validates their credibility. Thus,inthiswayweensureutmost
safety to the user against any fraud activity. If the user still
faces any problem, then he can talk to customerserviceatthe
station. In case of fraud, the fraud detection system will not
login the user to the system and the user will not be able to
logout at the exiting station and in order to exit from the
station user need to explain it to the security guard and if he
was fault of system then it will be rectified else he will be
liable to pay fine for his illegal activity.
In Metro management system, everything is managed by
the Administration and has complete control in its domain,
i.e. users, station, etc.
 Stations regulate activities within their domain. It has
complete control over gates, functionalities, etc.
 User has features to manage their given attributes status,
recognition features, etc.
 Administration can blockorfunctionalizetheentirestation,
a person, gate, any recognition feature when required.
Similarly, station can also block elements of it, like gates,
recognition features, etc.
4. PROPOSED SYSTEM
Metro Management system consist of different types of
functionalities. It consists of administration unit, which
interact in an emergency as if user’s face is not identified,
login is not confirmed, or arrival of any unregistered person.
This unit handles the breaks in the system so that rest of the
system can work efficiently. User can interact with the
administration unit with the help of customer service.
Following is the flow chart (Chart -1) of actions:
Chart -1: User Management
Following is the systematic explanation for the actions (as in
Chart -1):
• Entrance of User
At the entrance user has to pass through user recognition
System at AFC gates, where user’s identity is determined
and if the user hascredibility,i.e. is a registereduser,then
the gate opens and the user is allowed to enter the
premise.
If there is any problem during login,thenhecanbehelped
by the of Customer service.
• User Login
Fraud Detection System detect the user’s authenticity.
With some course of response from the user, user’s
authenticity is confirmed andloginisconfirmedelselogin
is denied.
• User Logout
At the exit station user again go throughtheidentification
system and if the user is logged in then the AFC gates
open and the logout is confirmed else if the login is not
found then user is considered to be fraud and proceed
accordingly.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3047
The system consists of the following units:
1) Administration System
2) User Management System
3) Authentication System
4.1 Administration System
Administration System is the part of Metro management
system that regulates and monitor the activity of Metro
stations. It has control over entiresystem.Itissuesguidelines
and news about the upcoming events.
Administration system plays important role of
communicating between the stations. It takes care of all
events happening in the metro station.
Functioning of Administration System:
1) It can stop, halt or terminate the metro stations.
2) It takes care of interstation happening and their tracing.
3) It can stop any possible functionality in the system.
4) It can cease the rights of station
5) It can take over the control of station in case of
emergency.
It exercises the function of administrating the rights of users
and stations.
4.2 User Management System
Usermanagementsystemconsistsofsecuritymodules,which
work in synchronization of authentication module, that
works whenever some user and enters the station. This
system generates a pop message to verifyanyactivityofuser.
In this system user manages his/her data and verify the
security related issues.
Components of User Management System:
1) User management:
User management component interact withtheuserdirectly.
It is main element in the metromanagementsystembyvirtue
of which user can retrieve and manage theirinformationlike,
profile, personal data, transaction history, settings, privacy
control, etc.
All the interaction in user management is handle using web
app.
2) Security interface
It is one of the main component from the aspect of security.
Thiscomponent interacts with user regardinguser’ssecurity
and authentication. It takes user’s fingerprint and video to
authenticate user (as shown in Fig-1).
Fig -1: Security Interface
4.3 Administration System
Authentication system is responsibleforuserauthentication.
This authentication involve advanced security features in a
cluster. These security features involve biometric
authentication, one-time verification, and Human assisted
verification also.
Authentication System consist of two parts:
i) User Identification:
User identification system identify the user via different
means like, finger print, facial recognition,active andpassive
OR code verification.
ii) Fraud detection system:
Fraud detection system initiates security system, after
receiving output from the security systemitevaluatesuserto
be authenticated or fraud.
5. SECURITY
Security system is implemented at everystepinthesystem.If
the system findsany abrupt change in the usagebehaviourof
the user, then it immediately sends security interrupts to the
user for their approval. System does not allow users to use
the services until their credentials are not verified by course
of him. In this way, we detect fraud users.
Administrationmayblocksomefeaturesthataresupposedto
be vulnerable at times.
Security system is aimed to serve user the most, as they are
most vulnerable part of the system.
For users we have defined following set of protocol to detect
the unusual activity:
• If a user does an activity which he never does, then it is
considered as activity of highest risk.
• If a user does an activity, which he rarely does, then it is of
high risk.
• If a user shift to another usage pattern then it is considered
to activity of intermediate risk.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3048
• If a user does an activity which he regularly does, then it is
considered to genuine and no risk.
Based on risk following actions are taken:
- Highest: User has to positively verify his activity with
biometric service like fingerprint or video.
- High: User has to positively verify his activity.
- Intermediate: User should not verify it negatively.
- No: No user verification is required.
In any case, if the above mention criteria fail then the
credibility of the person will be denied.
The domain of activity includes:
1) Travelling
2) Recognition Technique
3) Payment Methods
4) Login
For evaluating security of station, number of boarding,
deboarding, fraud activity and risk are analysed.
Based on the vulnerabilitylevelfollowingfeaturesofastation
can be blocked:
• Facial recognition – If facial recognition frauds has
increased
• Fingerprint Recognition – If finger print recognition fraud
has increased.
• QR code recognition- If QR code recognition fraud has
increased.
Administration based on the security threats increased can
even halt the station until evaluation.
6. OPERATIONAL HIERARCHY
In metro management,systemoperationsareorganisedfrom
top to bottom.
Hierarchy of organization as follows (bottom to top):
• User- Users of Metro Management
• Station- Metro Stations
• Administration- Central Administration of the Metro
system.
Eachlevel of hierarchy has following attributes,whichcanbe
set by the entities.
Attributes of entities:
1) User:
i) Status- active, halted, terminated
ii) Facial Recognition- active/ inactive
iii) Finger Print- active/ inactive
iv) Active QR- active/ inactive
v) Passive OR- active/inactive
2) Station:
i) Status: active, halted, terminated
ii) People- Entity Attributes
iii) Gate-
a. Status- active, halted, terminated
b. Facial Recognition- active/ inactive
c. Finger Print- active/ inactive
d. Active QR- active/ inactive
e. Passive OR- active/inactive
iv) Facial Recognition- active/ inactive
v) Finger Print- active/ inactive
vi) Active QR- active/ inactive
vii) Passive OR- active/inactive
viii) Customer Service- active/ inactive
3) Administration:
i) Status- active, halted, terminated
ii) Station- Entity Attribute
iii) People- Entity Attribute
vi) Facial Recognition- active/ inactive
vii) Finger Print- active/ inactive
viii) Active QR- active/ inactive
ix) Passive OR- active/inactive
Table 1: Attributes of Entities in Operational Hierarchy
Following point are valid for the entire hierarchy in Table 1:
1) Entity Attributes is directly inherited.
2) Entity can set the attributes for entities in its domain.
Fig -1: Security Interface
Operational Description:
-In Metro management, system everything is managed by
Administration and has complete control in its domain, i.e.
users, station, etc.
-Stations can regulate activities within its domain. It has
complete control over gates, functionalities, users, etc.
-User has features like to manage their given attributes like
status, recognition features, etc.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3049
-Administration can block or functionalize the entire station,
a person, gate, any recognition feature wen required.
-Similarly, station can also block elements of it, like gates,
recognition features, etc.
-People can set their functionality based on the attributes
providedtothem,liketermination,haltingaccount,activation
any of recognition service.
For understating detailed functionalities of an entity, refer
Table 1.
7. CONCLUSIONS
The Metro Management System we get is a hassle-free
system, which provide free flow of users with utmost ease.
8. FUTURE WORK
-Metre management system can be integrated with new
recognition technologies like biometric signalsthatariseout
of human brain for easy and more accurate recognition
System.
-Integration of management of Metro train and their route
and schedules
ACKNOWLEDGEMENT
I thank the almighty for giving us the courage and
perseverance in completing the research. This researchitself
is acknowledgements for all those people who have given us
their heartfelt co-operationinmakingthisresearchasuccess.
REFERENCES
[1] S. Priyanka1, R. Abhishek2, Ameen Pasha3, M.
Chandramouli Bhat4, Darpan D. Raj5, “Smart Ticket
System for Metro Train”, International Journal of
Research in Engineering, Science and Management
Volume-3, Issue-6, June-2020
[2] Abhishek Nair M, Smit Taunk, Panyam Gangadhar
Reddy, Parveen Sultana H, “Smart Metro Rail Ticketing
System”, INTERNATIONAL CONFERENCE ON RECENT
TRENDS IN ADVANCED COMPUTING 2019, ICRTAC
2019

More Related Content

Similar to Metro Management System

IRJET-A review of Face Recognition Based Car Ignition and Security System
IRJET-A review of Face Recognition Based Car Ignition and Security SystemIRJET-A review of Face Recognition Based Car Ignition and Security System
IRJET-A review of Face Recognition Based Car Ignition and Security SystemIRJET Journal
 
ATM fraud detection system using machine learning algorithms
ATM fraud detection system using machine learning algorithmsATM fraud detection system using machine learning algorithms
ATM fraud detection system using machine learning algorithmsIRJET Journal
 
Internet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’sInternet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’sIRJET Journal
 
IRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET Journal
 
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication MechanismIRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication MechanismIRJET Journal
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
IRJET- Customized CRM Mobile Application for Retail Industry
IRJET-  	  Customized CRM Mobile Application for Retail IndustryIRJET-  	  Customized CRM Mobile Application for Retail Industry
IRJET- Customized CRM Mobile Application for Retail IndustryIRJET Journal
 
ATM Robbery Prevention Using Advance Security
ATM Robbery Prevention Using Advance SecurityATM Robbery Prevention Using Advance Security
ATM Robbery Prevention Using Advance SecurityIRJET Journal
 
COLLEGE ONLINE ELECTION SYSTEM
COLLEGE ONLINE ELECTION SYSTEMCOLLEGE ONLINE ELECTION SYSTEM
COLLEGE ONLINE ELECTION SYSTEMIRJET Journal
 
IRJET- Aadhaar Based Voting System using Android Application
IRJET- Aadhaar Based Voting System using Android ApplicationIRJET- Aadhaar Based Voting System using Android Application
IRJET- Aadhaar Based Voting System using Android ApplicationIRJET Journal
 
IRJET- Mumbai Suburban Train Ticketing System
IRJET- Mumbai Suburban Train Ticketing SystemIRJET- Mumbai Suburban Train Ticketing System
IRJET- Mumbai Suburban Train Ticketing SystemIRJET Journal
 
Online car parking reservation system 9160262550 dinesh
Online car parking reservation system   9160262550 dineshOnline car parking reservation system   9160262550 dinesh
Online car parking reservation system 9160262550 dineshDinesh Nalluri
 
IRJET- Trafficop Android Application for Management of Traffic Violations
IRJET-  	  Trafficop Android Application for Management of Traffic ViolationsIRJET-  	  Trafficop Android Application for Management of Traffic Violations
IRJET- Trafficop Android Application for Management of Traffic ViolationsIRJET Journal
 
1.[1 5]automatic vehicle checking agent (vca)
1.[1 5]automatic vehicle checking agent (vca)1.[1 5]automatic vehicle checking agent (vca)
1.[1 5]automatic vehicle checking agent (vca)Alexander Decker
 
11.automatic vehicle checking agent (vca)
11.automatic vehicle checking agent (vca)11.automatic vehicle checking agent (vca)
11.automatic vehicle checking agent (vca)Alexander Decker
 
IRJET - Biometric Attendance System
IRJET - Biometric Attendance SystemIRJET - Biometric Attendance System
IRJET - Biometric Attendance SystemIRJET Journal
 
Unified National Electoral System (UNES)
Unified National Electoral System (UNES)Unified National Electoral System (UNES)
Unified National Electoral System (UNES)IRJET Journal
 
IRJET- Online Voting System using Fingerprint Scanner
IRJET-  	  Online Voting System using Fingerprint ScannerIRJET-  	  Online Voting System using Fingerprint Scanner
IRJET- Online Voting System using Fingerprint ScannerIRJET Journal
 
IRJET - Electronic Turnpike Automation System with Penalty Analyzer
IRJET - Electronic Turnpike Automation System with Penalty AnalyzerIRJET - Electronic Turnpike Automation System with Penalty Analyzer
IRJET - Electronic Turnpike Automation System with Penalty AnalyzerIRJET Journal
 

Similar to Metro Management System (20)

IRJET-A review of Face Recognition Based Car Ignition and Security System
IRJET-A review of Face Recognition Based Car Ignition and Security SystemIRJET-A review of Face Recognition Based Car Ignition and Security System
IRJET-A review of Face Recognition Based Car Ignition and Security System
 
ATM fraud detection system using machine learning algorithms
ATM fraud detection system using machine learning algorithmsATM fraud detection system using machine learning algorithms
ATM fraud detection system using machine learning algorithms
 
Internet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’sInternet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’s
 
IRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting System
 
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication MechanismIRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication Mechanism
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
IRJET- Customized CRM Mobile Application for Retail Industry
IRJET-  	  Customized CRM Mobile Application for Retail IndustryIRJET-  	  Customized CRM Mobile Application for Retail Industry
IRJET- Customized CRM Mobile Application for Retail Industry
 
ATM Robbery Prevention Using Advance Security
ATM Robbery Prevention Using Advance SecurityATM Robbery Prevention Using Advance Security
ATM Robbery Prevention Using Advance Security
 
COLLEGE ONLINE ELECTION SYSTEM
COLLEGE ONLINE ELECTION SYSTEMCOLLEGE ONLINE ELECTION SYSTEM
COLLEGE ONLINE ELECTION SYSTEM
 
IRJET- Aadhaar Based Voting System using Android Application
IRJET- Aadhaar Based Voting System using Android ApplicationIRJET- Aadhaar Based Voting System using Android Application
IRJET- Aadhaar Based Voting System using Android Application
 
IRJET- Mumbai Suburban Train Ticketing System
IRJET- Mumbai Suburban Train Ticketing SystemIRJET- Mumbai Suburban Train Ticketing System
IRJET- Mumbai Suburban Train Ticketing System
 
Online car parking reservation system 9160262550 dinesh
Online car parking reservation system   9160262550 dineshOnline car parking reservation system   9160262550 dinesh
Online car parking reservation system 9160262550 dinesh
 
IRJET- Trafficop Android Application for Management of Traffic Violations
IRJET-  	  Trafficop Android Application for Management of Traffic ViolationsIRJET-  	  Trafficop Android Application for Management of Traffic Violations
IRJET- Trafficop Android Application for Management of Traffic Violations
 
1.[1 5]automatic vehicle checking agent (vca)
1.[1 5]automatic vehicle checking agent (vca)1.[1 5]automatic vehicle checking agent (vca)
1.[1 5]automatic vehicle checking agent (vca)
 
11.automatic vehicle checking agent (vca)
11.automatic vehicle checking agent (vca)11.automatic vehicle checking agent (vca)
11.automatic vehicle checking agent (vca)
 
IRJET - Biometric Attendance System
IRJET - Biometric Attendance SystemIRJET - Biometric Attendance System
IRJET - Biometric Attendance System
 
Unified National Electoral System (UNES)
Unified National Electoral System (UNES)Unified National Electoral System (UNES)
Unified National Electoral System (UNES)
 
IRJET- Online Voting System using Fingerprint Scanner
IRJET-  	  Online Voting System using Fingerprint ScannerIRJET-  	  Online Voting System using Fingerprint Scanner
IRJET- Online Voting System using Fingerprint Scanner
 
IRJET - Electronic Turnpike Automation System with Penalty Analyzer
IRJET - Electronic Turnpike Automation System with Penalty AnalyzerIRJET - Electronic Turnpike Automation System with Penalty Analyzer
IRJET - Electronic Turnpike Automation System with Penalty Analyzer
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 

Metro Management System

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3045 Metro Management System Kuldeep Chauhan1, Md. Mokarram Mansoor2, Krishna Mohan3, Ali Akhtar Ansari4, Vibha Oberoy5 1CSE, Greater Noida Institute of Technology, Greater Noida, U.P, India,Chauhankuldeep341@gmail.com 2CSE, Greater Noida Institute of Technology, Greater Noida, U.P, India, mdmokarrammansoor98@gmail.com 3CSE, Greater Noida Institute of Technology, Greater Noida, U.P, India, krishna9472544025@gmail.com 4CSE, Greater Noida Institute of Technology, Greater Noida, U.P, India, aliakhtaransari550@gmail.com 5Assistant Professor, CSE, Greater Noida Institute of Technology, Greater Noida, U.P, IndiaVibha.oberoi@gmail.com ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Metro plays a crucial role in transportation. But with the increase in number of users has made the administration less effective as in case of long queues for tickets, loss of assets (ticket, card, wallet, money), theft cases, etc. This paper state the new form of administration system that may effectively handle the users with high traffic of users. The Proposed solution uses user identification system, fraud detection system, and central administration to achieve the goal. Key Words: User Identification System, Central Administration, Fraud Detection System. 1. INTRODUCTION Metro trains are one of the most used public transportations in India. These trains are for the utility of people, and people utilize metro daily in the best way possible. By 2022, metro services are operational in 11 cities of India namely, Kolkata, Delhi, Bengaluru, Gurugram,Mumbai,Chennai,Jaipur,Kochi, Hyderabad,Lucknow,andAhmedabad.Withsuchhuge reach and popularity user traffic is also increasingand longqueues can be seen for ticket buying and lots of cases of theft can be seen at the metro stations. With increase in numberofusers, cases of losing money, wallet, ticket, and card are common today. All these problems can be solved by using a Metro management system, which uses a hybrid approach to include automation. For designing such system, we use user identification system, fraud detection system, and Central administration, which have been discussed below:  User identificationsystemusesseveral useridentification technologies to uniquely identify the user. User identification techniques used here are face detection, fingerprint recognition, and QR Code Detection.  Fraud Detection System uses user’s historytopredictthe usual behaviour of a user. If a user shows a different behaviour than the usual fraud detection system based on some policies, determine the severity of the risk and take appropriate measures to handle the risk.  Central Administration is approach for handling the administration. A central entity will governall theactive stations in the metro system and can cease or operationalize the functionalities of a Service in its domain. In a Metro Management System, user enters the station and buys the ticket from vending machines or at the ticket counters. Then they enter the metro station premises through AFC Gates where users have to verify their credibility using their ticket ortheMetrocard,whichisbeing issued by the metro. After the user’s credibility is verified, the AFC gate opens and the user board the metro and deboard at the destination. At the destination station, users again have to submit their credit using their coinsandMetro cards. In this entire process, chances of losing or forgetting the credit are high enough. In fact, user can forget their assetsor credits and thus being unable to travel using metro system. Although, the mentioned situations are not common to everyone but with increase in number of users these cases have increased. Sometimes, the user may not have wallet or money to travel despite being in emergency. With increase in usage of metro, thefts and fraud are also becoming common, which is becoming a challenge to the Metro administration. 2. LITTERATURE REVIEW S. Priyanka at el. [1], describe how metro has gained its concern, with its elegant and smooth flow for transportation in the era of growing population, with which metro management has turninefficient forwhichhehasproposeda Smart Ticket System for Metro Train. Abhishek Nair M at el. [2], describes the problem with traditional metro ticketing system and propose a Smart Metro Rail Ticketing System, briefing fingerprint biometric authentication to achieve the same.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3046 3. PROPOSED SYSTEM The proposed Metro Management System uses recognition technologies and centrally manage entire system to provide safe, secured and hassle free journey. At metro station, users have to go through the traditional AFC gates where identification system will automatically recognize their identity. After the entrance, Fraud Detection System will ensure their activity and they will be considered to be logged in at the station. At the exit Station, similar procedurewill follow and user will be consideredloggedout, and money will be deducted accordingly from his account. During the entire process,user’scredibilitywillbetheutmost concern. After the recognition of users, the same will verified from the user’s side. Based on the previous history of users and the input from user’s side, fraud detection system validates their credibility. Thus,inthiswayweensureutmost safety to the user against any fraud activity. If the user still faces any problem, then he can talk to customerserviceatthe station. In case of fraud, the fraud detection system will not login the user to the system and the user will not be able to logout at the exiting station and in order to exit from the station user need to explain it to the security guard and if he was fault of system then it will be rectified else he will be liable to pay fine for his illegal activity. In Metro management system, everything is managed by the Administration and has complete control in its domain, i.e. users, station, etc.  Stations regulate activities within their domain. It has complete control over gates, functionalities, etc.  User has features to manage their given attributes status, recognition features, etc.  Administration can blockorfunctionalizetheentirestation, a person, gate, any recognition feature when required. Similarly, station can also block elements of it, like gates, recognition features, etc. 4. PROPOSED SYSTEM Metro Management system consist of different types of functionalities. It consists of administration unit, which interact in an emergency as if user’s face is not identified, login is not confirmed, or arrival of any unregistered person. This unit handles the breaks in the system so that rest of the system can work efficiently. User can interact with the administration unit with the help of customer service. Following is the flow chart (Chart -1) of actions: Chart -1: User Management Following is the systematic explanation for the actions (as in Chart -1): • Entrance of User At the entrance user has to pass through user recognition System at AFC gates, where user’s identity is determined and if the user hascredibility,i.e. is a registereduser,then the gate opens and the user is allowed to enter the premise. If there is any problem during login,thenhecanbehelped by the of Customer service. • User Login Fraud Detection System detect the user’s authenticity. With some course of response from the user, user’s authenticity is confirmed andloginisconfirmedelselogin is denied. • User Logout At the exit station user again go throughtheidentification system and if the user is logged in then the AFC gates open and the logout is confirmed else if the login is not found then user is considered to be fraud and proceed accordingly.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3047 The system consists of the following units: 1) Administration System 2) User Management System 3) Authentication System 4.1 Administration System Administration System is the part of Metro management system that regulates and monitor the activity of Metro stations. It has control over entiresystem.Itissuesguidelines and news about the upcoming events. Administration system plays important role of communicating between the stations. It takes care of all events happening in the metro station. Functioning of Administration System: 1) It can stop, halt or terminate the metro stations. 2) It takes care of interstation happening and their tracing. 3) It can stop any possible functionality in the system. 4) It can cease the rights of station 5) It can take over the control of station in case of emergency. It exercises the function of administrating the rights of users and stations. 4.2 User Management System Usermanagementsystemconsistsofsecuritymodules,which work in synchronization of authentication module, that works whenever some user and enters the station. This system generates a pop message to verifyanyactivityofuser. In this system user manages his/her data and verify the security related issues. Components of User Management System: 1) User management: User management component interact withtheuserdirectly. It is main element in the metromanagementsystembyvirtue of which user can retrieve and manage theirinformationlike, profile, personal data, transaction history, settings, privacy control, etc. All the interaction in user management is handle using web app. 2) Security interface It is one of the main component from the aspect of security. Thiscomponent interacts with user regardinguser’ssecurity and authentication. It takes user’s fingerprint and video to authenticate user (as shown in Fig-1). Fig -1: Security Interface 4.3 Administration System Authentication system is responsibleforuserauthentication. This authentication involve advanced security features in a cluster. These security features involve biometric authentication, one-time verification, and Human assisted verification also. Authentication System consist of two parts: i) User Identification: User identification system identify the user via different means like, finger print, facial recognition,active andpassive OR code verification. ii) Fraud detection system: Fraud detection system initiates security system, after receiving output from the security systemitevaluatesuserto be authenticated or fraud. 5. SECURITY Security system is implemented at everystepinthesystem.If the system findsany abrupt change in the usagebehaviourof the user, then it immediately sends security interrupts to the user for their approval. System does not allow users to use the services until their credentials are not verified by course of him. In this way, we detect fraud users. Administrationmayblocksomefeaturesthataresupposedto be vulnerable at times. Security system is aimed to serve user the most, as they are most vulnerable part of the system. For users we have defined following set of protocol to detect the unusual activity: • If a user does an activity which he never does, then it is considered as activity of highest risk. • If a user does an activity, which he rarely does, then it is of high risk. • If a user shift to another usage pattern then it is considered to activity of intermediate risk.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3048 • If a user does an activity which he regularly does, then it is considered to genuine and no risk. Based on risk following actions are taken: - Highest: User has to positively verify his activity with biometric service like fingerprint or video. - High: User has to positively verify his activity. - Intermediate: User should not verify it negatively. - No: No user verification is required. In any case, if the above mention criteria fail then the credibility of the person will be denied. The domain of activity includes: 1) Travelling 2) Recognition Technique 3) Payment Methods 4) Login For evaluating security of station, number of boarding, deboarding, fraud activity and risk are analysed. Based on the vulnerabilitylevelfollowingfeaturesofastation can be blocked: • Facial recognition – If facial recognition frauds has increased • Fingerprint Recognition – If finger print recognition fraud has increased. • QR code recognition- If QR code recognition fraud has increased. Administration based on the security threats increased can even halt the station until evaluation. 6. OPERATIONAL HIERARCHY In metro management,systemoperationsareorganisedfrom top to bottom. Hierarchy of organization as follows (bottom to top): • User- Users of Metro Management • Station- Metro Stations • Administration- Central Administration of the Metro system. Eachlevel of hierarchy has following attributes,whichcanbe set by the entities. Attributes of entities: 1) User: i) Status- active, halted, terminated ii) Facial Recognition- active/ inactive iii) Finger Print- active/ inactive iv) Active QR- active/ inactive v) Passive OR- active/inactive 2) Station: i) Status: active, halted, terminated ii) People- Entity Attributes iii) Gate- a. Status- active, halted, terminated b. Facial Recognition- active/ inactive c. Finger Print- active/ inactive d. Active QR- active/ inactive e. Passive OR- active/inactive iv) Facial Recognition- active/ inactive v) Finger Print- active/ inactive vi) Active QR- active/ inactive vii) Passive OR- active/inactive viii) Customer Service- active/ inactive 3) Administration: i) Status- active, halted, terminated ii) Station- Entity Attribute iii) People- Entity Attribute vi) Facial Recognition- active/ inactive vii) Finger Print- active/ inactive viii) Active QR- active/ inactive ix) Passive OR- active/inactive Table 1: Attributes of Entities in Operational Hierarchy Following point are valid for the entire hierarchy in Table 1: 1) Entity Attributes is directly inherited. 2) Entity can set the attributes for entities in its domain. Fig -1: Security Interface Operational Description: -In Metro management, system everything is managed by Administration and has complete control in its domain, i.e. users, station, etc. -Stations can regulate activities within its domain. It has complete control over gates, functionalities, users, etc. -User has features like to manage their given attributes like status, recognition features, etc.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3049 -Administration can block or functionalize the entire station, a person, gate, any recognition feature wen required. -Similarly, station can also block elements of it, like gates, recognition features, etc. -People can set their functionality based on the attributes providedtothem,liketermination,haltingaccount,activation any of recognition service. For understating detailed functionalities of an entity, refer Table 1. 7. CONCLUSIONS The Metro Management System we get is a hassle-free system, which provide free flow of users with utmost ease. 8. FUTURE WORK -Metre management system can be integrated with new recognition technologies like biometric signalsthatariseout of human brain for easy and more accurate recognition System. -Integration of management of Metro train and their route and schedules ACKNOWLEDGEMENT I thank the almighty for giving us the courage and perseverance in completing the research. This researchitself is acknowledgements for all those people who have given us their heartfelt co-operationinmakingthisresearchasuccess. REFERENCES [1] S. Priyanka1, R. Abhishek2, Ameen Pasha3, M. Chandramouli Bhat4, Darpan D. Raj5, “Smart Ticket System for Metro Train”, International Journal of Research in Engineering, Science and Management Volume-3, Issue-6, June-2020 [2] Abhishek Nair M, Smit Taunk, Panyam Gangadhar Reddy, Parveen Sultana H, “Smart Metro Rail Ticketing System”, INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING 2019, ICRTAC 2019