DESIGN AND IMPLEMENTATION OF INTELLIGENT SMART TRAFFIC CONTROL SYSTEM FOR EMERGENCY AMBULANCE CLEARANCE AND STOLEN VEHICLE DETECTION B.Bhavani
نویسنده
چکیده
This paper describes Nowadays the road accidents in modern urban areas are increased to uncertain level. The loss of human life due to accident is to be avoided. Traffic congestion and tidal flow are major facts that cause delay to ambulance. To bar loss of human life due to accidents we introduce a scheme Intelligent Traffic Control for Congestion, Ambulance clearance, and Stolen Vehicle Detection. The main theme behind this scheme is to provide a smooth flow for the emergency vehicles like ambulance to reach the hospitals in time and thus minimizing the delay caused by traffic congestion. The idea behind this scheme is to implement ITLS which would control mechanically the traffic lights in the path of the ambulance. When an ambulance approaching the junction, it will communicate the traffic controller in the junction to turn on the green light. And also we are going to implement a sensor network work which is used to detect the traffic density and also use RFID reader and tags. We use ARM7 system-on-chip to read the RFID tags attached to the vehicles. If the RFID tag read belongs to the stolen vehicles. GSM SIM900 used for message sends to the police control room. This scheme is fully automated, thus it finds the accident spot, controls the traffic lights, helping to reach the hospital in time.
منابع مشابه
Interoperability of E-government Services
The aim of this paper is to present a high-level operational model for a solution that can improve significantly public services in Albania. The solution will increase the efficiency of public administration, quality of their offered service and saves a lot of time to people that today have to wait in queues. The paper brings an evaluation of problems that may be solved, critically analyze the ...
متن کاملMicro-payments via Eecient Coin-flipping Extended Abstract
We present an authenticated coinipping protocol and its proof of security. We demonstrate the applicability of our scheme for online randomized micro-payment protocols. We also review some essential aspects of other micro-payment proposals (including SET, PayWord and MicroMint, PayTree, NetCheque, NetCash, Agora, NetCard, CAFE, Pederson's proposal, micro-iKP, Milicent, proposal of Jarecki-Odlyz...
متن کاملPrivacy and accountability in identity systems: the best of both worlds
Privacy and accountability are widely believed to be opposing goals in identity systems. On one hand, service providers require users to be identifiable to reduce fraud; on the other, users want to limit tracking while minimizing the amount of information disclosed about them. As a result, debates on identity become a rope pulling effort with privacy proponents on one end and security ones on t...
متن کاملGains from diversification on convex combinations: A majorization and stochastic dominance approach
By incorporating both majorization theory and stochastic dominance theory, this paper presents a general theory and a unifying framework for determining the diversification preferences of risk-averse investors and conditions under which they would unanimously judge a particular asset to be superior. In particular, we develop a theory for comparing the preferences of different convex combination...
متن کاملImproved immunogenicity of tetanus toxoid by Brucella abortus S19 LPS adjuvant.
BACKGROUND Adjuvants are used to increase the immunogenicity of new generation vaccines, especially those based on recombinant proteins. Despite immunostimulatory properties, the use of bacterial lipopolysaccharide (LPS) as an adjuvant has been hampered due to its toxicity and pyrogenicity. Brucella abortus LPS is less toxic and has no pyrogenic properties compared to LPS from other gram negati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016