SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
p-ISSN: 2395-0072
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net
© 2023, IRJET | Impact Factor value: 8.226 | ISO
LIFI based vehicle to vehicle communication to prevent accidents
Omar Zidan K1, Mohomed Shuraih2, Vishnuraj A3, Prakhyath J4, Swaroop Gannamani5 Irwin
Felix Dsouza6
1234
UG student, Dept. of Mechanical Engineering, Mangalore Institute of Technology & Engineering, Moodabidri, Karnataka,
India
5
Assistant Professor, Dept. of Mechanical Engineering, Mangalore Institute of Technology & Engineering, Moodabidri,
Karnataka, India
6
Graduate Engineer Trainee, Process Engineering department, Autoliv
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The The rapid development of technology has
revolutionized the way we live, especially with the
interconnectivity of devices and the advent of smart systems.
LiFi, also known as Light Fidelity, is a cutting-edge technology
that utilizes light as a communication mediumandisaform of
Visible Light Communication (VLC) that simplifies the
complexities of cable communication. The benefits of LiFi are
numerous, including being secure, efficient, and capable of
transmitting data at high rates. This paper proposes a novel
approach to vehicle-to-vehicle (V2V) communication using
LiFi, complementing the existing Internet of Things (IoT)
connected vehicles solution. V2V communication has
enormous potential to exchange information about the speed
and position of surrounding vehicles, reducing crashes, easing
traffic congestion, and improving the environment. However,
to realize the full potential of V2V communication, all vehicles
must be able to communicate witheach other.Thissystemcan
ensure real-time data transfers between vehiclesastheyenter
range, promoting safer and better driving conditions for all.
LiFi communication has been developed for this purpose,
offering a new paradigm for V2V communication.
Key Words: Lifi; VLC; vehicles; IoT
1.INTRODUCTION
Vehicle-to-vehicle communication (V2V communication)
refers to the wireless exchange of data between motor
vehicles. The primary objective of V2V communication is to
preventaccidentsbyfacilitatingthetransmissionofposition
and speed data among vehicles through an ad hoc mesh
network.Theimplementationofthistechnologymayinvolve
eitherwarning the driver of animpending collisionortaking
pre-emptive actions, such as applying brakes to decelerate
the vehicle. V2V communication is expected to outperform
existingautomotiveoriginal equipmentmanufacturer(OEM)
embedded systems, including lane departure warnings,
adaptive cruise control, blind spot detection, rear parking
sonar, and backup camera, due to its ability to provide a
comprehensive 360-degree awareness of surrounding risks.
The intelligent transport system (ITS), a concept supported
by the National Highway Traffic Safety Administration
(NHTSA) and the United States Department of
Transportation (DOT), includes vehicle-to-vehicle (V2V)
communication as a key component.
The implementation of an intelligent transport system will
rely on the data obtained from V2V communication to
enhance traffic management by enabling vehicles to
communicate with roadside infrastructure, such as traffic
lights and signs. The adoption of this technology may
become mandatory in the near future, facilitating the
introduction of driverless cars on American highways.
Nonetheless, the successful implementation of V2V
communication and an intelligent transportsystem requires
the resolution of three major challenges: the agreement
upon standards among automotive manufacturers, data
privacy concerns, and funding.Atpresent,itremainsunclear
whether the creation and maintenance of the supporting
network will be publicly or privately funded. Major
automotive manufacturers actively working on ITS and V2V
include Audi, BMW, Daimler, GM, and Volvo.
This paper explores the use of Li-Fi for vehicle-to-vehicle
communication. Li-Fi, short for Light Fidelity, is a visible
light communication technology developed by a research
team at the University of Edinburgh, led by ProfessorHarald
Haas. It enables the remote transmission of data using LED
light, relying on the ability of solid-state lighting systems to
create binary code with imperceptible LEDillumination.
The aim of this study is to use Li-Fi technology to prevent
accidents on the road and provide drivers with real-time
information and alerts. By utilizing sensors, information
about the driving conditions of the vehicle behind can be
collected, allowing drivers to maintain a safe distance
without the need for distracting phone calls. This new
mechanism for conveying information between vehicleshas
the potential to greatly improve road safety.
9001:2008 Certified Journal | Page 423
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
p-ISSN: 2395-0072
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net
© 2023, IRJET | Impact Factor value: 8.226 | ISO
Fig 1: V2V Communication
2. WORKING OF LIFI SYSTEM
2.1 Transmitting and receiving serial data
Digital data isconvertedinto individual bitsandtransmitted
in a sequential manner using a UART (universal
asynchronous receiver/transmitter), which serves this
purpose. A shift register, a key element of the UART, is used
to performthis conversionbetweenserial andparallel types
of data. Due to the fact that serial data transmission uses
fewer cables than parallel data transmission, it is typically
more economical.
Although the UART is a crucial component of a serial
communicationsystem, it is unabletosendorreceiveoutside
signals on its own. The UART's logic level signals must be
convertedintoexternal signallinglevels withtheaid ofother
interfacedevices.Dependingonthecommunicationprotocol
utilised, a different type of external signalling level may be
used. Examples are RS232, RS-422, and RS-485 are some of
the voltages signaling standards from the Electronic
Industries Alliance (EIA).
Othersignalling technologies,suchasoptical,infrared(IrDA),
and wireless Bluetooth in its Serial Port Profile (SPP), can
also be used for data transmission in addition to electrical
cables. Thechoice ofcommunication mediumis made easier
by the availability of many signalling methods. Some
signalling protocols usecarriersignalmodulation,eitherwith
or without wires.Examples includetheDC-LINforpowerline
communication, RF modulation with data radios, and
modulation of audio signals with phone line modems.
The UARTrequires bytes ofdata to operate,sending each bit
one at a time. At the receiving end, a second UART
reassemblesthebitsintowholebytes.Eachbitistransferred
and received in the proper order thanks to the shift register
usedby the UART,whichpermitsaccurateandeffectivedata
transport. The UART's functionality is further improved by
the use of double buffering and FIFO buffer memory, which
allowittoholdthe mostrecentcharacterwhilereceivingthe
next one and prevent data loss duringtransmission.
Although the UART isa crucial partof serial communication,
it onlyhas a little amount ofpowertosend orreceive outside
signals. The UART's logic level signals must therefore be
convertedtoandfromtheexternalsignallinglevels required
bythespecificcommunicationprotocolusingextrainterface
devices. This conversion is necessary to guarantee accurate
anddependabledata transmissionbetweenvariousdevices.
Between devices, information can be transferred through a
numberofdifferentcommunicationchannels. Simplexisone
mode where data is only delivered in one direction. Full
duplex is a different mode in which data can be sent and
received concurrently by both devices. Half-duplex is the
third mode, in which data is transmitted and received by
devices alternately. in an idle state, where no data is being
transmitted,a high voltage or power isindicated.
In a UART transmission, a start bit with a logic low value is
sentpriortoeachcharacter. An optional paritybitandoneor
more stop bits with a logic high value are delivered after the
character. Normally, there are 8 data bits between the start
and stop bits, but if fewer than 9 bits are needed, a parity bit
maybeinserted.Althoughthesequence inwhichthe bitsare
communicated can vary, it is often the least important data
bit that is delivered first.
The start bit alerts the receiver that a new character is
coming when it is received. The following 5 to 9 bits reflect
the character that is beingconveyed,dependingonthecoding
set.Whenused, a parity bitis broadcast followingallthedata
bits. The character is complete when one or two stop bits
with a logic high value are communicated to the recipient. A
logic low (0) value is always sent for the start bit and a logic
high value for the stop bit.
To ensure reliable communication between devices, the
UART ensures that there are at least two signal changes
betweencharacters.Additionally, ifthe lineremainsinalow-
voltage state for a duration longer than the time taken to
transmit a character, the UART can detect a break condition.
The UART ensures that there are at least two signal changes
betweencharacters.Moreover,iftheline remains inthelow-
voltage state for a duration longer than the time taken to
transmita character, the UARTcandetecta break condition.
2.2 Transmitter and Reciever
Transmitter:
The UART transmits data by inserting a character into the
shift registerand producing a startbit. Theoptionalparitybit
(if utilised)andstop bits are then pushed out to the line after
the necessary amount of data bits. The process is made
simpler because the timing of gearbox is not based on the
stateofthelineorpredeterminedintervals. Thehostsystem
cannot transmit a new character for transmission until the
preceding one has finished sending, which allows the UART
to function more effectively. Another option is to use an
interrupt signal to let the user know when the UART is
prepared to receive a new character.
Forfull-duplex operation, wherecharactersmustbesentand
receivedsimultaneously,separateshiftregistersareusedfor
transmitted and received characters.Irjet template sample
paragraph, Irjet template sample paragraph .Irjet template
sample paragraph. Irjet template sampleparagraph
9001:2008 Certified Journal | Page 424
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
p-ISSN: 2395-0072
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net
© 2023, IRJET | Impact Factor value: 8.226 | ISO
Fig 2: Transmitter unit block diagram
Reciever:
In serial communication between devices, the Universal
Asynchronous Receiver/Transmitter (UART) hardware is
essential.Aclock signal thatoperates ata frequencymultiple
of the data rate iscrucial forits properoperation.TheUART's
transmitter and receiver both use this clock signal as a point
of reference.
The receiver component of the UART is responsible for
detecting the incoming signal and processing it accordingly.
Indoingso,itchecks thestatus oftheincomingsignal ateach
clock pulse to determine the start bit of the next character.
This process involves checking the duration of the start bit
andverifyingthatitlasts foratleasthalfofthe bitduration.If
the start bit meets this criterion, it is identified as a valid
signal andmarks the startofa newcharacter.Anysignal that
does not meet this requirement is considered a spurious
pulse and is ignored.
Following a bit durationwait, the status ofthelineissampled
once again after determining the start bit, and the output is
then placed in a shift register. Once the character length,
which typically lasts between 5 and 8 bits, has passed, the
shift register's parallel output is made accessible to the
receiving system. The UART then sets a flag to indicate the
presence of fresh data and may also produce an interrupt to
notify the host CPU that data has beenreceived.
The communicationsignal istypicallytheonlytimingscheme
that two UARTs exchange when communicating. To
resynchronize theirinternal clocks,theythereforerelyonthe
detectionofdata linechanges thataren't false pulses.Even if
thetransmittersendsatalittledifferent pace thanusual,this
resynchronizationensuresdependabledatareceipt.Simpler
UARTscanonly readthe centerof eachexpecteddata bitand
resynchronize on the falling edge of the start bit. If the
broadcastdata rate isaccurateenoughtoenablethestopbits
to be sampled reliably, then this method will function.
Inordertoincrease theirfunctionality, many UARTs employ
a process known as "double buffering," which enables them
to hold the most recent character while receiving the
following one. This gives the receiving computer the entire
character transmission time to retrieve the received
character.Inordertoavoidlosingreceiveddata,especiallyat
high speeds, many UARTs also employ a tiny FIFO buffer
memory between the receiver shift register and the host
system interface. This buffermemoryguaranteesthatnodata
islostduringtransmissionandgivesthe hostCPU more time
to respond to a UART interrupt.
Fig 3: Reciever unit block diagram
Sample paragraph Define abbreviations and acronyms the
first time they are used in the text, even after they have been
defined in the abstract. Abbreviations such as IEEE, SI, MKS,
CGS, sc, dc, and rms do not have to be defined. Do not use
abbreviations in the title or heads unless they are
unavoidable.
After the text edit has been completed, the paper is ready for
thetemplate. DuplicatethetemplatefilebyusingtheSaveAs
command, and usethe namingconventionprescribedbyyour
conference for the name of your paper. In this newly created
file, highlight all of the contents and import your prepared
text file. You are now ready to style yourpaper.
3. EXISTING AND PROPOSED SYSTEM
3.1 Existing System
Easy SMS is a securemessaging system that guarantees end-
to-end SMS message encryption between two end users. In
order to cypher the message using a symmetric key
technique, the protocol first establishes a symmetric shared
key between the two mobile stations (MS). The SMSSec and
PK-SIM protocols, which rely on the client-server paradigm,
are used as two separate situations to show how the
protocol functions.
The SMSSec protocol is a security protocol used to secure
SMS communication transmitted via Java's Wireless
Messaging API. The protocol uses AES/MAES cryptographic
encryption algorithm to ensure end-to-end confidentiality of
the messages sent over the network. The encryption
guarantees that the message content can only be accessed
and understood by the intended recipient, thereby
safeguarding it from unauthorized access.
The PK-SIM protocol, which suggestsanormalSIMcard with
additional Public Key Infrastructure (PKI) features, is
another technology that aims to improve SMS security. The
AES/MAES encryption technique is also used by this
protocol to safeguard SMS messages sent over the network.
9001:2008 Certified Journal | Page 425
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
p-ISSN: 2395-0072
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net
© 2023, IRJET | Impact Factor value: 8.226 | ISO
By allowing the SIM card to create a public and private key
pair that is used to authenticate and encrypt messages
transferred between devices, PKI technology adds an extra
degree of security.
The integration of the AES/MAES encryption algorithm in
both the SMSSec and PK-SIM protocols ensures that SMS
communication is secure and private. TheencryptionofSMS
messages provides a level of security that prevents
unauthorized access to sensitive information, protectingthe
privacy of the user. Overall, these security protocols have
becomecritical tools for protecting SMScommunicationand
enhancing the overall security of modern communication
systems.
3.2 Proposed system
• The proposed system is carried out using LIFI technology.
The LIFI system has been connected to each vehicle. That lifi
system is used to transmit and receive information form a
vehicle.
• Here, in this proposed system we have used varioussensor
like eye blink sensor, ultrasonic sensor, mems sensor and
alcohol sensor. This sensor has been connected with a
microcontroller to each vehicle.
• If the rider consumes alcohol, then the alcohol sensor
senses it and give that information to the nearest vehicle
going in front of it through LIFI. Because while drunk and
driving the rider may ride with over speed and it may hitthe
other vehicles which results accidents.
• The rider should follow a particular distance with another
vehicle. When the vehicle really closes to next vehicle then
the ultrasonic sensor detects it and transmit that
information through LIFI. This will help to reduce the
accidents.
• Mems sensor senses axis of the car, when there is a tilt in
axis, it will send message. This mems sensor will help to
detect in case of rash driving. And that information will be
shared with the help of lifi technology.
• Here, we used one more sensor called eye blink sensorthat
detects the drowsiness ofa riderwhichcouldalertthedriver
before mishap happens. We haveconnectedanalarmsystem
for that. Here we have used a liquid crystal display to
monitor all these parameters
Fig 4: Block diagram for back vehicle
Fig 5: Block diagram for front vehicle
4. RESULT
Below are the results of our project that incorporates a
drowsiness sensor, alcohol sensor, rash driving sensor, and
proximity sensor (which displays the distance to nearby
vehicles).
Fig 6: Monitor showing result 1
9001:2008 Certified Journal | Page 426
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
p-ISSN: 2395-0072
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net
© 2023, IRJET | Impact Factor value: 8.226 | ISO
Fig 7: Monitor showing result 2
Fig 8: Monitor showing result 3
Fig 9: Monitor showing result 4
Fig 10: Monitor showing result 5
Fig 6 illustrates the proximity distance between our vehicle
and the one behind us. Fig 7 indicates that the rear vehicle
has come into close proximity to our vehicle. In Fig 8, it is
evident that the driver in front of us is under the influenceof
alcohol. Fig 9 demonstrates that the driver ahead of us is
drowsy. Lastly, Fig 10 displays the driver in front of us
engaging in reckless driving behavior.
5. CONCLUSION AND FUTURE SCOPE
5.1 Conclusion
An innovative system has been developed that utilizes Li-Fi
technology along with a range of sensors such as MQ3,
vibration sensor, ultrasonic sensor, and PC camera, in
addition to an Arduino board, LED light, and a solar panel, to
facilitate communication between vehicles.
This system aims to reduce the occurrence of road
accidents, and in the future, it has the potential to enhance
safety for drivers and passengers by implementing the
technology more widely. Li-Fi technology, which enables
high-speed data transmissionthrough its uniquemodulation
techniques and comprehensive architecture, is employed as
the communication system, with its benefits and limitations
explained in detail. The system's transmission of data from
one vehicle to another is made simple and efficient by
utilizing LED light to transmit data through Li-Fi technology,
which ultimately aids in preventing road accidents.
5.2 Future scope
Integrating this system in all vehiclescanpotentiallyprovide
safety not only to drivers but also to co-passengers.
Furthermore, the implementation of a vehicle-to-vehicle
(V2V) communication system can enable collaboration
between vehicles on the roadbyformingplatoonswithother
vehicles heading in the same direction.
The emergence of LiFi technology has opened up new
opportunities for vehicle-to-vehicle (V2V) communication,
presenting several advantages over traditional
communication technologies, such as Dedicated Short-Range
Communications (DSRC) and Cellular-V2X (C-V2X). LiFi
technology utilizes light waves to transmit data, offering
higher data rates than DSRC and C-V2X, which enables the
development of more data-intensive applications. This
technologyalso providesreliableandsecurecommunication,
especially in areas where traditional RF-based
communication technologies may not work effectively, such
as tunnels, underground parking lots, and other locations
with limited or no RF coverage.
The possibilities that LiFi-based V2V communication
technology presents for the future are promising. With the
ever-increasing demand for connected and autonomous
vehicles, there is a growing needfor high-speed,reliable,and
secure communication between vehicles, making LiFi
technology an essential component of next-generation V2V
communication systems. The technology can facilitate real-
time traffic updates, high-definition video streaming,
augmentedrealityapplications,andotheradvancedfeatures
that were not possible with traditional communication
technologies.
9001:2008 Certified Journal | Page 427
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
p-ISSN: 2395-0072
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net
© 2023, IRJET | Impact Factor value: 8.226 | ISO
As research and development efforts continue, the future of
LiFi-based V2V communicationtechnology looks bright,with
a host of technical challenges already being addressed by
scientists and engineers working in the field. The
technology's potential to enhance road safety, increase
vehicle efficiency, and reduce accidents has led to a growing
interest in the technology among automotive industry
stakeholders, policymakers, and researchers alike.
Inconclusion, the future of LiFi-basedV2Vcommunicationis
poised for growth, with the technology evolving to meet the
demands of the automotive industry. As the technology
becomes more mature and is deployed on a large scale, we
can expect to see a broader range of applications of LiFi-
based V2V communication technology, contributing to the
development of safer, more efficient, and more connected
transportation systems in the years ahead.
6. REFERENCES
[1] Portable Alcohol Detection System for Driver
Monitoring by Hironori Wakana, Masuyoshi Yamada,
Center for Exploratory Research, Research &
Development Group, Hitachi, Ltd.,
[2] Automatic Road Accident Detection using Ultrasonic
Sensor by Usman Khalil, S.M Khan T. Javid, S.A Raza, A.
Sidhiqui
[3] Reconfigurable Intelligent Surface Aided Multi-User
Communications: State-of-the-ArtTechniquesandOpen
Issues by Munyaradzi Munochiveyi , ArjunChakravarthi
Pogaku , Dinh-Thuan Do ,Anh-Tu Le ,Miroslav Voznak
and Nhan Duc Nguyen
[4] Non-SignalizedIntersectionNetworkManagementWith
Connected and Automated Vehicles by Xialong chen,
biao xu, xiaohui qin, yougang bian, manjiang hu, and
ning sun
[5] Channel Characterization for Vehicle-to- Infrastructure
Communications in Millimeter-Wave Band by Dong yan ,
ke guan, danping he, bo ai , zan li , junhyeong kim, heesang
chung , and zhangdui zhong
[6] A Comprehensive Survey on Cooperative Intersection
Management for Heterogeneous Connected Vehicles
Ashikan Gholamhossenian and Jochen Seitz.
9001:2008 Certified Journal | Page 428

More Related Content

Similar to LIFI based vehicle to vehicle communication to prevent accidents

Implementation and Validation of SAE J1850 (VPW) Protocol Solution for Diagno...
Implementation and Validation of SAE J1850 (VPW) Protocol Solution for Diagno...Implementation and Validation of SAE J1850 (VPW) Protocol Solution for Diagno...
Implementation and Validation of SAE J1850 (VPW) Protocol Solution for Diagno...IRJET Journal
 
Response time analysis of mixed messages in CAN
Response time analysis of mixed messages in CANResponse time analysis of mixed messages in CAN
Response time analysis of mixed messages in CANIJERA Editor
 
Train control system using can protocol
Train control system using can protocolTrain control system using can protocol
Train control system using can protocolIRJET Journal
 
IRJET- Intelligent Transport System using IoT
IRJET- Intelligent Transport System using IoTIRJET- Intelligent Transport System using IoT
IRJET- Intelligent Transport System using IoTIRJET Journal
 
CDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkCDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkIRJET Journal
 
POWER LINE COMMUNICATION FOR VEHICLE
POWER LINE COMMUNICATION FOR VEHICLEPOWER LINE COMMUNICATION FOR VEHICLE
POWER LINE COMMUNICATION FOR VEHICLEIRJET Journal
 
Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...IJECEIAES
 
ANALYSIS OF POWER WIRE COMMUNICATION SYSTEM
ANALYSIS OF POWER WIRE COMMUNICATION SYSTEMANALYSIS OF POWER WIRE COMMUNICATION SYSTEM
ANALYSIS OF POWER WIRE COMMUNICATION SYSTEMIRJET Journal
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
IRJET- IoT based Street Light Monitoring & Control with Lora/Lorawan Network
IRJET-  	  IoT based Street Light Monitoring & Control with Lora/Lorawan NetworkIRJET-  	  IoT based Street Light Monitoring & Control with Lora/Lorawan Network
IRJET- IoT based Street Light Monitoring & Control with Lora/Lorawan NetworkIRJET Journal
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET Journal
 
IRJET- Automatic Detection of Crack Fault in Railway Track
IRJET- Automatic Detection of Crack Fault in Railway TrackIRJET- Automatic Detection of Crack Fault in Railway Track
IRJET- Automatic Detection of Crack Fault in Railway TrackIRJET Journal
 
IRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WANIRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WANIRJET Journal
 
VEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEM
VEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEMVEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEM
VEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEMIRJET Journal
 
V2V- Vehicle to Vehicle Communication
V2V- Vehicle to Vehicle CommunicationV2V- Vehicle to Vehicle Communication
V2V- Vehicle to Vehicle CommunicationSrijanKumar18
 
Intelligent Car System for Accident Prevention
Intelligent Car System for Accident PreventionIntelligent Car System for Accident Prevention
Intelligent Car System for Accident PreventionIRJET Journal
 

Similar to LIFI based vehicle to vehicle communication to prevent accidents (20)

Implementation and Validation of SAE J1850 (VPW) Protocol Solution for Diagno...
Implementation and Validation of SAE J1850 (VPW) Protocol Solution for Diagno...Implementation and Validation of SAE J1850 (VPW) Protocol Solution for Diagno...
Implementation and Validation of SAE J1850 (VPW) Protocol Solution for Diagno...
 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568
 
Response time analysis of mixed messages in CAN
Response time analysis of mixed messages in CANResponse time analysis of mixed messages in CAN
Response time analysis of mixed messages in CAN
 
Train control system using can protocol
Train control system using can protocolTrain control system using can protocol
Train control system using can protocol
 
IRJET- Intelligent Transport System using IoT
IRJET- Intelligent Transport System using IoTIRJET- Intelligent Transport System using IoT
IRJET- Intelligent Transport System using IoT
 
CDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkCDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite Link
 
POWER LINE COMMUNICATION FOR VEHICLE
POWER LINE COMMUNICATION FOR VEHICLEPOWER LINE COMMUNICATION FOR VEHICLE
POWER LINE COMMUNICATION FOR VEHICLE
 
Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...
 
ANALYSIS OF POWER WIRE COMMUNICATION SYSTEM
ANALYSIS OF POWER WIRE COMMUNICATION SYSTEMANALYSIS OF POWER WIRE COMMUNICATION SYSTEM
ANALYSIS OF POWER WIRE COMMUNICATION SYSTEM
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
IRJET- IoT based Street Light Monitoring & Control with Lora/Lorawan Network
IRJET-  	  IoT based Street Light Monitoring & Control with Lora/Lorawan NetworkIRJET-  	  IoT based Street Light Monitoring & Control with Lora/Lorawan Network
IRJET- IoT based Street Light Monitoring & Control with Lora/Lorawan Network
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
 
IRJET- Automatic Detection of Crack Fault in Railway Track
IRJET- Automatic Detection of Crack Fault in Railway TrackIRJET- Automatic Detection of Crack Fault in Railway Track
IRJET- Automatic Detection of Crack Fault in Railway Track
 
IRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WANIRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WAN
 
VEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEM
VEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEMVEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEM
VEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEM
 
CAN BASE VOLVO AUTOMATION
CAN BASE VOLVO AUTOMATIONCAN BASE VOLVO AUTOMATION
CAN BASE VOLVO AUTOMATION
 
V2V- Vehicle to Vehicle Communication
V2V- Vehicle to Vehicle CommunicationV2V- Vehicle to Vehicle Communication
V2V- Vehicle to Vehicle Communication
 
Intelligent Car System for Accident Prevention
Intelligent Car System for Accident PreventionIntelligent Car System for Accident Prevention
Intelligent Car System for Accident Prevention
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 

LIFI based vehicle to vehicle communication to prevent accidents

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 p-ISSN: 2395-0072 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net © 2023, IRJET | Impact Factor value: 8.226 | ISO LIFI based vehicle to vehicle communication to prevent accidents Omar Zidan K1, Mohomed Shuraih2, Vishnuraj A3, Prakhyath J4, Swaroop Gannamani5 Irwin Felix Dsouza6 1234 UG student, Dept. of Mechanical Engineering, Mangalore Institute of Technology & Engineering, Moodabidri, Karnataka, India 5 Assistant Professor, Dept. of Mechanical Engineering, Mangalore Institute of Technology & Engineering, Moodabidri, Karnataka, India 6 Graduate Engineer Trainee, Process Engineering department, Autoliv ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The The rapid development of technology has revolutionized the way we live, especially with the interconnectivity of devices and the advent of smart systems. LiFi, also known as Light Fidelity, is a cutting-edge technology that utilizes light as a communication mediumandisaform of Visible Light Communication (VLC) that simplifies the complexities of cable communication. The benefits of LiFi are numerous, including being secure, efficient, and capable of transmitting data at high rates. This paper proposes a novel approach to vehicle-to-vehicle (V2V) communication using LiFi, complementing the existing Internet of Things (IoT) connected vehicles solution. V2V communication has enormous potential to exchange information about the speed and position of surrounding vehicles, reducing crashes, easing traffic congestion, and improving the environment. However, to realize the full potential of V2V communication, all vehicles must be able to communicate witheach other.Thissystemcan ensure real-time data transfers between vehiclesastheyenter range, promoting safer and better driving conditions for all. LiFi communication has been developed for this purpose, offering a new paradigm for V2V communication. Key Words: Lifi; VLC; vehicles; IoT 1.INTRODUCTION Vehicle-to-vehicle communication (V2V communication) refers to the wireless exchange of data between motor vehicles. The primary objective of V2V communication is to preventaccidentsbyfacilitatingthetransmissionofposition and speed data among vehicles through an ad hoc mesh network.Theimplementationofthistechnologymayinvolve eitherwarning the driver of animpending collisionortaking pre-emptive actions, such as applying brakes to decelerate the vehicle. V2V communication is expected to outperform existingautomotiveoriginal equipmentmanufacturer(OEM) embedded systems, including lane departure warnings, adaptive cruise control, blind spot detection, rear parking sonar, and backup camera, due to its ability to provide a comprehensive 360-degree awareness of surrounding risks. The intelligent transport system (ITS), a concept supported by the National Highway Traffic Safety Administration (NHTSA) and the United States Department of Transportation (DOT), includes vehicle-to-vehicle (V2V) communication as a key component. The implementation of an intelligent transport system will rely on the data obtained from V2V communication to enhance traffic management by enabling vehicles to communicate with roadside infrastructure, such as traffic lights and signs. The adoption of this technology may become mandatory in the near future, facilitating the introduction of driverless cars on American highways. Nonetheless, the successful implementation of V2V communication and an intelligent transportsystem requires the resolution of three major challenges: the agreement upon standards among automotive manufacturers, data privacy concerns, and funding.Atpresent,itremainsunclear whether the creation and maintenance of the supporting network will be publicly or privately funded. Major automotive manufacturers actively working on ITS and V2V include Audi, BMW, Daimler, GM, and Volvo. This paper explores the use of Li-Fi for vehicle-to-vehicle communication. Li-Fi, short for Light Fidelity, is a visible light communication technology developed by a research team at the University of Edinburgh, led by ProfessorHarald Haas. It enables the remote transmission of data using LED light, relying on the ability of solid-state lighting systems to create binary code with imperceptible LEDillumination. The aim of this study is to use Li-Fi technology to prevent accidents on the road and provide drivers with real-time information and alerts. By utilizing sensors, information about the driving conditions of the vehicle behind can be collected, allowing drivers to maintain a safe distance without the need for distracting phone calls. This new mechanism for conveying information between vehicleshas the potential to greatly improve road safety. 9001:2008 Certified Journal | Page 423
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 p-ISSN: 2395-0072 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net © 2023, IRJET | Impact Factor value: 8.226 | ISO Fig 1: V2V Communication 2. WORKING OF LIFI SYSTEM 2.1 Transmitting and receiving serial data Digital data isconvertedinto individual bitsandtransmitted in a sequential manner using a UART (universal asynchronous receiver/transmitter), which serves this purpose. A shift register, a key element of the UART, is used to performthis conversionbetweenserial andparallel types of data. Due to the fact that serial data transmission uses fewer cables than parallel data transmission, it is typically more economical. Although the UART is a crucial component of a serial communicationsystem, it is unabletosendorreceiveoutside signals on its own. The UART's logic level signals must be convertedintoexternal signallinglevels withtheaid ofother interfacedevices.Dependingonthecommunicationprotocol utilised, a different type of external signalling level may be used. Examples are RS232, RS-422, and RS-485 are some of the voltages signaling standards from the Electronic Industries Alliance (EIA). Othersignalling technologies,suchasoptical,infrared(IrDA), and wireless Bluetooth in its Serial Port Profile (SPP), can also be used for data transmission in addition to electrical cables. Thechoice ofcommunication mediumis made easier by the availability of many signalling methods. Some signalling protocols usecarriersignalmodulation,eitherwith or without wires.Examples includetheDC-LINforpowerline communication, RF modulation with data radios, and modulation of audio signals with phone line modems. The UARTrequires bytes ofdata to operate,sending each bit one at a time. At the receiving end, a second UART reassemblesthebitsintowholebytes.Eachbitistransferred and received in the proper order thanks to the shift register usedby the UART,whichpermitsaccurateandeffectivedata transport. The UART's functionality is further improved by the use of double buffering and FIFO buffer memory, which allowittoholdthe mostrecentcharacterwhilereceivingthe next one and prevent data loss duringtransmission. Although the UART isa crucial partof serial communication, it onlyhas a little amount ofpowertosend orreceive outside signals. The UART's logic level signals must therefore be convertedtoandfromtheexternalsignallinglevels required bythespecificcommunicationprotocolusingextrainterface devices. This conversion is necessary to guarantee accurate anddependabledata transmissionbetweenvariousdevices. Between devices, information can be transferred through a numberofdifferentcommunicationchannels. Simplexisone mode where data is only delivered in one direction. Full duplex is a different mode in which data can be sent and received concurrently by both devices. Half-duplex is the third mode, in which data is transmitted and received by devices alternately. in an idle state, where no data is being transmitted,a high voltage or power isindicated. In a UART transmission, a start bit with a logic low value is sentpriortoeachcharacter. An optional paritybitandoneor more stop bits with a logic high value are delivered after the character. Normally, there are 8 data bits between the start and stop bits, but if fewer than 9 bits are needed, a parity bit maybeinserted.Althoughthesequence inwhichthe bitsare communicated can vary, it is often the least important data bit that is delivered first. The start bit alerts the receiver that a new character is coming when it is received. The following 5 to 9 bits reflect the character that is beingconveyed,dependingonthecoding set.Whenused, a parity bitis broadcast followingallthedata bits. The character is complete when one or two stop bits with a logic high value are communicated to the recipient. A logic low (0) value is always sent for the start bit and a logic high value for the stop bit. To ensure reliable communication between devices, the UART ensures that there are at least two signal changes betweencharacters.Additionally, ifthe lineremainsinalow- voltage state for a duration longer than the time taken to transmit a character, the UART can detect a break condition. The UART ensures that there are at least two signal changes betweencharacters.Moreover,iftheline remains inthelow- voltage state for a duration longer than the time taken to transmita character, the UARTcandetecta break condition. 2.2 Transmitter and Reciever Transmitter: The UART transmits data by inserting a character into the shift registerand producing a startbit. Theoptionalparitybit (if utilised)andstop bits are then pushed out to the line after the necessary amount of data bits. The process is made simpler because the timing of gearbox is not based on the stateofthelineorpredeterminedintervals. Thehostsystem cannot transmit a new character for transmission until the preceding one has finished sending, which allows the UART to function more effectively. Another option is to use an interrupt signal to let the user know when the UART is prepared to receive a new character. Forfull-duplex operation, wherecharactersmustbesentand receivedsimultaneously,separateshiftregistersareusedfor transmitted and received characters.Irjet template sample paragraph, Irjet template sample paragraph .Irjet template sample paragraph. Irjet template sampleparagraph 9001:2008 Certified Journal | Page 424
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 p-ISSN: 2395-0072 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net © 2023, IRJET | Impact Factor value: 8.226 | ISO Fig 2: Transmitter unit block diagram Reciever: In serial communication between devices, the Universal Asynchronous Receiver/Transmitter (UART) hardware is essential.Aclock signal thatoperates ata frequencymultiple of the data rate iscrucial forits properoperation.TheUART's transmitter and receiver both use this clock signal as a point of reference. The receiver component of the UART is responsible for detecting the incoming signal and processing it accordingly. Indoingso,itchecks thestatus oftheincomingsignal ateach clock pulse to determine the start bit of the next character. This process involves checking the duration of the start bit andverifyingthatitlasts foratleasthalfofthe bitduration.If the start bit meets this criterion, it is identified as a valid signal andmarks the startofa newcharacter.Anysignal that does not meet this requirement is considered a spurious pulse and is ignored. Following a bit durationwait, the status ofthelineissampled once again after determining the start bit, and the output is then placed in a shift register. Once the character length, which typically lasts between 5 and 8 bits, has passed, the shift register's parallel output is made accessible to the receiving system. The UART then sets a flag to indicate the presence of fresh data and may also produce an interrupt to notify the host CPU that data has beenreceived. The communicationsignal istypicallytheonlytimingscheme that two UARTs exchange when communicating. To resynchronize theirinternal clocks,theythereforerelyonthe detectionofdata linechanges thataren't false pulses.Even if thetransmittersendsatalittledifferent pace thanusual,this resynchronizationensuresdependabledatareceipt.Simpler UARTscanonly readthe centerof eachexpecteddata bitand resynchronize on the falling edge of the start bit. If the broadcastdata rate isaccurateenoughtoenablethestopbits to be sampled reliably, then this method will function. Inordertoincrease theirfunctionality, many UARTs employ a process known as "double buffering," which enables them to hold the most recent character while receiving the following one. This gives the receiving computer the entire character transmission time to retrieve the received character.Inordertoavoidlosingreceiveddata,especiallyat high speeds, many UARTs also employ a tiny FIFO buffer memory between the receiver shift register and the host system interface. This buffermemoryguaranteesthatnodata islostduringtransmissionandgivesthe hostCPU more time to respond to a UART interrupt. Fig 3: Reciever unit block diagram Sample paragraph Define abbreviations and acronyms the first time they are used in the text, even after they have been defined in the abstract. Abbreviations such as IEEE, SI, MKS, CGS, sc, dc, and rms do not have to be defined. Do not use abbreviations in the title or heads unless they are unavoidable. After the text edit has been completed, the paper is ready for thetemplate. DuplicatethetemplatefilebyusingtheSaveAs command, and usethe namingconventionprescribedbyyour conference for the name of your paper. In this newly created file, highlight all of the contents and import your prepared text file. You are now ready to style yourpaper. 3. EXISTING AND PROPOSED SYSTEM 3.1 Existing System Easy SMS is a securemessaging system that guarantees end- to-end SMS message encryption between two end users. In order to cypher the message using a symmetric key technique, the protocol first establishes a symmetric shared key between the two mobile stations (MS). The SMSSec and PK-SIM protocols, which rely on the client-server paradigm, are used as two separate situations to show how the protocol functions. The SMSSec protocol is a security protocol used to secure SMS communication transmitted via Java's Wireless Messaging API. The protocol uses AES/MAES cryptographic encryption algorithm to ensure end-to-end confidentiality of the messages sent over the network. The encryption guarantees that the message content can only be accessed and understood by the intended recipient, thereby safeguarding it from unauthorized access. The PK-SIM protocol, which suggestsanormalSIMcard with additional Public Key Infrastructure (PKI) features, is another technology that aims to improve SMS security. The AES/MAES encryption technique is also used by this protocol to safeguard SMS messages sent over the network. 9001:2008 Certified Journal | Page 425
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 p-ISSN: 2395-0072 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net © 2023, IRJET | Impact Factor value: 8.226 | ISO By allowing the SIM card to create a public and private key pair that is used to authenticate and encrypt messages transferred between devices, PKI technology adds an extra degree of security. The integration of the AES/MAES encryption algorithm in both the SMSSec and PK-SIM protocols ensures that SMS communication is secure and private. TheencryptionofSMS messages provides a level of security that prevents unauthorized access to sensitive information, protectingthe privacy of the user. Overall, these security protocols have becomecritical tools for protecting SMScommunicationand enhancing the overall security of modern communication systems. 3.2 Proposed system • The proposed system is carried out using LIFI technology. The LIFI system has been connected to each vehicle. That lifi system is used to transmit and receive information form a vehicle. • Here, in this proposed system we have used varioussensor like eye blink sensor, ultrasonic sensor, mems sensor and alcohol sensor. This sensor has been connected with a microcontroller to each vehicle. • If the rider consumes alcohol, then the alcohol sensor senses it and give that information to the nearest vehicle going in front of it through LIFI. Because while drunk and driving the rider may ride with over speed and it may hitthe other vehicles which results accidents. • The rider should follow a particular distance with another vehicle. When the vehicle really closes to next vehicle then the ultrasonic sensor detects it and transmit that information through LIFI. This will help to reduce the accidents. • Mems sensor senses axis of the car, when there is a tilt in axis, it will send message. This mems sensor will help to detect in case of rash driving. And that information will be shared with the help of lifi technology. • Here, we used one more sensor called eye blink sensorthat detects the drowsiness ofa riderwhichcouldalertthedriver before mishap happens. We haveconnectedanalarmsystem for that. Here we have used a liquid crystal display to monitor all these parameters Fig 4: Block diagram for back vehicle Fig 5: Block diagram for front vehicle 4. RESULT Below are the results of our project that incorporates a drowsiness sensor, alcohol sensor, rash driving sensor, and proximity sensor (which displays the distance to nearby vehicles). Fig 6: Monitor showing result 1 9001:2008 Certified Journal | Page 426
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 p-ISSN: 2395-0072 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net © 2023, IRJET | Impact Factor value: 8.226 | ISO Fig 7: Monitor showing result 2 Fig 8: Monitor showing result 3 Fig 9: Monitor showing result 4 Fig 10: Monitor showing result 5 Fig 6 illustrates the proximity distance between our vehicle and the one behind us. Fig 7 indicates that the rear vehicle has come into close proximity to our vehicle. In Fig 8, it is evident that the driver in front of us is under the influenceof alcohol. Fig 9 demonstrates that the driver ahead of us is drowsy. Lastly, Fig 10 displays the driver in front of us engaging in reckless driving behavior. 5. CONCLUSION AND FUTURE SCOPE 5.1 Conclusion An innovative system has been developed that utilizes Li-Fi technology along with a range of sensors such as MQ3, vibration sensor, ultrasonic sensor, and PC camera, in addition to an Arduino board, LED light, and a solar panel, to facilitate communication between vehicles. This system aims to reduce the occurrence of road accidents, and in the future, it has the potential to enhance safety for drivers and passengers by implementing the technology more widely. Li-Fi technology, which enables high-speed data transmissionthrough its uniquemodulation techniques and comprehensive architecture, is employed as the communication system, with its benefits and limitations explained in detail. The system's transmission of data from one vehicle to another is made simple and efficient by utilizing LED light to transmit data through Li-Fi technology, which ultimately aids in preventing road accidents. 5.2 Future scope Integrating this system in all vehiclescanpotentiallyprovide safety not only to drivers but also to co-passengers. Furthermore, the implementation of a vehicle-to-vehicle (V2V) communication system can enable collaboration between vehicles on the roadbyformingplatoonswithother vehicles heading in the same direction. The emergence of LiFi technology has opened up new opportunities for vehicle-to-vehicle (V2V) communication, presenting several advantages over traditional communication technologies, such as Dedicated Short-Range Communications (DSRC) and Cellular-V2X (C-V2X). LiFi technology utilizes light waves to transmit data, offering higher data rates than DSRC and C-V2X, which enables the development of more data-intensive applications. This technologyalso providesreliableandsecurecommunication, especially in areas where traditional RF-based communication technologies may not work effectively, such as tunnels, underground parking lots, and other locations with limited or no RF coverage. The possibilities that LiFi-based V2V communication technology presents for the future are promising. With the ever-increasing demand for connected and autonomous vehicles, there is a growing needfor high-speed,reliable,and secure communication between vehicles, making LiFi technology an essential component of next-generation V2V communication systems. The technology can facilitate real- time traffic updates, high-definition video streaming, augmentedrealityapplications,andotheradvancedfeatures that were not possible with traditional communication technologies. 9001:2008 Certified Journal | Page 427
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 p-ISSN: 2395-0072 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net © 2023, IRJET | Impact Factor value: 8.226 | ISO As research and development efforts continue, the future of LiFi-based V2V communicationtechnology looks bright,with a host of technical challenges already being addressed by scientists and engineers working in the field. The technology's potential to enhance road safety, increase vehicle efficiency, and reduce accidents has led to a growing interest in the technology among automotive industry stakeholders, policymakers, and researchers alike. Inconclusion, the future of LiFi-basedV2Vcommunicationis poised for growth, with the technology evolving to meet the demands of the automotive industry. As the technology becomes more mature and is deployed on a large scale, we can expect to see a broader range of applications of LiFi- based V2V communication technology, contributing to the development of safer, more efficient, and more connected transportation systems in the years ahead. 6. REFERENCES [1] Portable Alcohol Detection System for Driver Monitoring by Hironori Wakana, Masuyoshi Yamada, Center for Exploratory Research, Research & Development Group, Hitachi, Ltd., [2] Automatic Road Accident Detection using Ultrasonic Sensor by Usman Khalil, S.M Khan T. Javid, S.A Raza, A. Sidhiqui [3] Reconfigurable Intelligent Surface Aided Multi-User Communications: State-of-the-ArtTechniquesandOpen Issues by Munyaradzi Munochiveyi , ArjunChakravarthi Pogaku , Dinh-Thuan Do ,Anh-Tu Le ,Miroslav Voznak and Nhan Duc Nguyen [4] Non-SignalizedIntersectionNetworkManagementWith Connected and Automated Vehicles by Xialong chen, biao xu, xiaohui qin, yougang bian, manjiang hu, and ning sun [5] Channel Characterization for Vehicle-to- Infrastructure Communications in Millimeter-Wave Band by Dong yan , ke guan, danping he, bo ai , zan li , junhyeong kim, heesang chung , and zhangdui zhong [6] A Comprehensive Survey on Cooperative Intersection Management for Heterogeneous Connected Vehicles Ashikan Gholamhossenian and Jochen Seitz. 9001:2008 Certified Journal | Page 428