Web-Based Traffic System
نویسندگان
چکیده
This paper provides a novel approach for car traffic control by applying a Web-based Traffic System (WTS). This approach was applied for navigation and traffic information services that are able to informs drivers about the most efficient routes to use in order to avoid traffic delays and roundabout directions. This paper provides a solution for the dynamic changes of the road density and high and low traffic by mean of web and mobile technology. It was applied to the problem of traffic control in the city of Amman-Jordan, and a system is built in cooperation with the Traffic Engineering Department of The Amman City Municipality. In particular, this system is suitable to by uploaded to the Internet and to work online to help drivers and traffic management personnel to make better informed, and more intelligent transport control decisions. This simplifies the control of city transport and makes it more efficient and economical. In this paper we illustrate the overall architecture of the system, and the algorithm used to solve the optimal path problem. WTS represents an online guide traffic status navigation, which may be an important part of any traffic control system and will be a very useful tool for the next generation cars.
منابع مشابه
Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...
متن کاملDesigning and implementing a Web-based real time routing service for crisis management (a case study for district 11 of Tehran)
Timing framework associated with catastrophes is one of the most important issues in crisis management. In such cases, being immediate has a considerable importance and web based real-time routing service as an important tool has a significant role in relief operations improvement. At this study, a web-based real time routing service based on open source technology has designed for 11th distric...
متن کاملRepresenting a method to identify and contrast with the fraud which is created by robots for developing websites’ traffic ranking
With the expansion of the Internet and the Web, communication and information gathering between individual has distracted from its traditional form and into web sites. The World Wide Web also offers a great opportunity for businesses to improve their relationship with the client and expand their marketplace in online world. Businesses use a criterion called traffic ranking to determine their si...
متن کاملApplication Research of Embedded Web Technology in Traffic Monitoring System
the paper mainly discusses design of hardware & software for embedded web server with Heterogeneous network seamless connectivity and implement of key technology. It contains transplantation of embedded Linux operating system, design of embedded web server, transplantation of database and implementing method of main functions. Remote monitoring is realized to traffic information collection, mon...
متن کاملDesign &Implement of Embedded Web Technology in Traffic Monitoring System
The paper mainly discusses design of hardware & software for embedded web server with Heterogeneous network seamless connectivity and implement of key technology. It contains transplantation of embedded Linux operating system, design of embedded web server, transplantation of database and implementing method of main functions. Remote monitoring is realized to traffic information collection, mon...
متن کاملDetecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Int. Arab J. Inf. Technol.
دوره 2 شماره
صفحات -
تاریخ انتشار 2005