Today, the world has experienced a new trend with regard to data system management, traditional database management tools have become outdated and they will no longer be able to process the mass of data generated by different systems, that's why big data is there to process this mass of data to bring out crucial information hidden in this data, and without big data technologies the treatment is very difficult to manage; among the domains that uses big data technologies is vehicular ad-hoc network to manage their voluminous data. In this article, we establish in the first step a method that allow to detect anomalies or accidents within the road and compute the time spent in each road section in real time, which permit us to obtain a database having the estimated time spent in all sections in real time, this will serve us to send to the vehicles the right estimated time of arrival all along their journey and the optimal route to attain their destination. This database is useful to utilize it like inputs for machine learning to predict the places and times where the probability of accidents is higher. The experimental results prove that our method permits us to avoid congestions and apportion the load of vehicles in all roads effectively, also it contributes to road safety.
The Design of a Simulation for the Modeling and Analysis of Public Transporta...CSCJournals
Vehicular ad-hoc networks, when combined with wireless sensor networks, are used in a variety of solutions for commercial, urban, and metropolitan areas, including emergency response, traffic, and environmental monitoring. In this work, we model buses in the Washington, DC Metropolitan Area Transit Authority (WMATA) as a network of vehicular nodes equipped with wireless sensors. A simulation tool was developed, using the actual WMATA schedule, to determine performance metrics such as end-to-end packet delivery delay. In addition, a web-based front-end was developed, using the Google Maps API, to provide a user-friendly display and control of the network map, input parameters, and simulated results. This application will provide users with a simplified method for modifying network parameters to account for a number of parameters and conditions, including inclement weather, traffic congestion, and more.
CREATING DATA OUTPUTS FROM MULTI AGENT TRAFFIC MICRO SIMULATION TO ASSIMILATI...csandit
The intensive development of traffic engineering and technologies that are integrated into
vehicles, roads and their surroundings, bring opportunities of real time transport mobility
modeling. Based on such model it is then possible to establish a predictive layer that is capable
of predicting short and long term traffic flow behavior. It is possible to create the real time
model of traffic mobility based on generated data. However, data may have different
geographical, temporal or other constraints, or failures. It is therefore appropriate to develop
tools that artificially create missing data, which can then be assimilated with real data. This
paper presents a mechanism describing strategies of generating artificial data using
microsimulations. It describes traffic microsimulation based on our solution of multiagent
framework over which a system for generating traffic data is built. The system generates data of
a structure corresponding to the data acquired in the real world.
Vehicular Ad Hoc Networks (VANETs) are classified as a special application of mobile ad hoc networks (MANETs)
which promise the new possibilities to improve traffic efficiency, road safety driving convenience. By providing the safety and
non-safety applications and sharing the useful information through vehicle to vehicle (V2V) or vehicle to roadside (V2R)
communications to avoid accidents and provide reliable information to travellers, such hot issues seeks much attention of
researchers in this field. VANET and MANET having several common characteristics but VANET differ with applications,
architecture, challenges and data dissemination. The survey of routing protocols in VANETs is important and necessary issue for
smart ITS. The objective of this paper is to design an algorithm for the detection and correction of routing attacks made by
obstructive nodes in VANETS and also drawn the comparison between various metrics like Cost, Average Packet loss,
Throughput and Energy Consumed.
Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception ...ijtsrd
The Vehicular Ad-hoc Networks VANET ascents as an surface technology for smart transport as observed in the latter date decennary.The routing is the important element for keeping effectual communication between smart vehicles, which need to be entreated snappily. A traffic-aware routing protocol TARCO that considers integrated real-time traffic conditions for integrating delivery paths over a vehicular environs is presented. Routing in VANETs plays 0 crucial role in production of networks.VANET protocols are classified as topology based and position based concordat. Device-to-device D2D communication is admired as a propitious technique as granting the reliable integration between vehicles. The D2D-based vehicle-to-vehicle communication links coincide by recycling the similar sequence property, solution in a more intricate Combat scenario. Thus the access mode switch and resource allocation between cellular and VANETs become a challenging issue. Each road segment was then assigned a weight according to the overall view of the traffic conditions and updated systematically to reflect traffic variations. Finally, the road segments providing operative and dependable data paths were used to frame a routing path with latched connectivity and a short distribution lag to the destination. Simulation results showed that the use of TARCO leads to high network performance in terms of the packet delivery ratio, end-to-end delay and communication upward. Mr. P. Senthil | Mrs. A. Jayanthi | R. Shobana "Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception for VANET" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Active Galaxy , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd14569.pdf
http://www.ijtsrd.com/engineering/computer-engineering/14569/vehicles-awake-routing-protocol-with-analysis-determine-knowledge-perception-for-vanet/mr-p-senthil
The Design of a Simulation for the Modeling and Analysis of Public Transporta...CSCJournals
Vehicular ad-hoc networks, when combined with wireless sensor networks, are used in a variety of solutions for commercial, urban, and metropolitan areas, including emergency response, traffic, and environmental monitoring. In this work, we model buses in the Washington, DC Metropolitan Area Transit Authority (WMATA) as a network of vehicular nodes equipped with wireless sensors. A simulation tool was developed, using the actual WMATA schedule, to determine performance metrics such as end-to-end packet delivery delay. In addition, a web-based front-end was developed, using the Google Maps API, to provide a user-friendly display and control of the network map, input parameters, and simulated results. This application will provide users with a simplified method for modifying network parameters to account for a number of parameters and conditions, including inclement weather, traffic congestion, and more.
CREATING DATA OUTPUTS FROM MULTI AGENT TRAFFIC MICRO SIMULATION TO ASSIMILATI...csandit
The intensive development of traffic engineering and technologies that are integrated into
vehicles, roads and their surroundings, bring opportunities of real time transport mobility
modeling. Based on such model it is then possible to establish a predictive layer that is capable
of predicting short and long term traffic flow behavior. It is possible to create the real time
model of traffic mobility based on generated data. However, data may have different
geographical, temporal or other constraints, or failures. It is therefore appropriate to develop
tools that artificially create missing data, which can then be assimilated with real data. This
paper presents a mechanism describing strategies of generating artificial data using
microsimulations. It describes traffic microsimulation based on our solution of multiagent
framework over which a system for generating traffic data is built. The system generates data of
a structure corresponding to the data acquired in the real world.
Vehicular Ad Hoc Networks (VANETs) are classified as a special application of mobile ad hoc networks (MANETs)
which promise the new possibilities to improve traffic efficiency, road safety driving convenience. By providing the safety and
non-safety applications and sharing the useful information through vehicle to vehicle (V2V) or vehicle to roadside (V2R)
communications to avoid accidents and provide reliable information to travellers, such hot issues seeks much attention of
researchers in this field. VANET and MANET having several common characteristics but VANET differ with applications,
architecture, challenges and data dissemination. The survey of routing protocols in VANETs is important and necessary issue for
smart ITS. The objective of this paper is to design an algorithm for the detection and correction of routing attacks made by
obstructive nodes in VANETS and also drawn the comparison between various metrics like Cost, Average Packet loss,
Throughput and Energy Consumed.
Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception ...ijtsrd
The Vehicular Ad-hoc Networks VANET ascents as an surface technology for smart transport as observed in the latter date decennary.The routing is the important element for keeping effectual communication between smart vehicles, which need to be entreated snappily. A traffic-aware routing protocol TARCO that considers integrated real-time traffic conditions for integrating delivery paths over a vehicular environs is presented. Routing in VANETs plays 0 crucial role in production of networks.VANET protocols are classified as topology based and position based concordat. Device-to-device D2D communication is admired as a propitious technique as granting the reliable integration between vehicles. The D2D-based vehicle-to-vehicle communication links coincide by recycling the similar sequence property, solution in a more intricate Combat scenario. Thus the access mode switch and resource allocation between cellular and VANETs become a challenging issue. Each road segment was then assigned a weight according to the overall view of the traffic conditions and updated systematically to reflect traffic variations. Finally, the road segments providing operative and dependable data paths were used to frame a routing path with latched connectivity and a short distribution lag to the destination. Simulation results showed that the use of TARCO leads to high network performance in terms of the packet delivery ratio, end-to-end delay and communication upward. Mr. P. Senthil | Mrs. A. Jayanthi | R. Shobana "Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception for VANET" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Active Galaxy , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd14569.pdf
http://www.ijtsrd.com/engineering/computer-engineering/14569/vehicles-awake-routing-protocol-with-analysis-determine-knowledge-perception-for-vanet/mr-p-senthil
Integrated Intelligent Transportation Systems (ITS)Babagana Sheriff
An Implementation of Integrated ITS Solution supporting Mobility as a Service within West Midlands Region, UK in Collaboration of Integrated Transport Authority.
SCALABLE AND ENERGY EFFICIENT TASK OFFLOADING SCHEMES FOR VEHICULAR CLOUD COM...IJCNCJournal
Smart vehicles of today on road are equipped with advanced computational units, multiple communication technologies, intelligent sensing platforms, and human-computer interaction devices which utilize Vehicular Edge Networks to support services offered by the remote cloud. This being named as
Opportunistic Vehicular Edge Computing recently, has the possibility to supplement the services provided by the Edge gadgets. Many Vehicular Edge Computing architectures have been proposed as of late which support task offloading. One among the premier difficulties in these networks is efficiently utilizing the resources available at the vehicular nodes. The present work uses APEATOVC, a conveyed and versatile
protocol for economical, efficient and effective task offloading in these networks which address the adaptability of vehicular clouds. The results obtained by extensive simulations are presented to assess and contrast its performance with existing protocols.
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
Intelligent Transportation Systems (ITS) have been one of the promising technology that has a great interest attention from many researchers over the world. Vehicular Ad-hoc Network (VANET) communications environment as a part of ITS opens the way for a wide range of applications such as safety applications, mobility and connectivity for both driver and passengers to exploit the transport systems in a smoothly, efficiently and safer way. Several challenging tasks facing adopting VANET functionality for ITS such as modelling of wireless transmission and routing issues. These research issues have become more critical due to the high mobility of vehicles nodes (transmitters and receivers) and unexpected network topology due to the high speed of nodes. In fact, modelling radio propagation channel in VANET environment which considers as one of a stringent communications environment is a challenging task. The selection of a suitable transmission model plays a key role in the routing decisions for VANET. Different propagation models allow calculating the Received Signal Strength (RSS) based on key environmental properties such as the distance between transmitter vehicle and a receiver vehicle, the gain and antenna height of transmitter and a receiver vehicles. Hence, it is useful to calculate RSS and SNR values for a specific propagation model and then these values can be used later for routing decision in order to find the best path with high SNR. This paper evaluates the performance of different transmission models (freespace, two-ray and log-normal) in terms of Receive Signal Strength (RSS). In addition, the performance of such wireless transmission models for vehicular communication in terms of PDR, throughput and delay is evaluated by applying the proposed cross layer routing approach based on IEEE 802.11p. By using MATLAB, the obtained results confirm the best packet delivery ratio for our proposed approach, where it indicates poor quality of DSSS PHY with high number vehicles. The minimum delay achieved when traffic density is decreased.
Towards a new approach of data dissemination in vanets networkscsandit
In the 2000s, ad hoc networks was developed and highly used in dynamic environment,
particularly for inter- vehicular communication (VANETs : Vehicular Ad hoc Networks).
Since that time, many researches and developments process was dedicated to VANET networks.
This was motivated by the current vehicular industry trend that is leading to a new transport
system generation based on the use of new communication technologies in order to provide
many services to passengers, the fact that improves the driving and travel’s experience.
These systems require traffic information sharing and dissemination the example as the case
alert message emitting allowing the driver to minimize driving risks. Sharing such information
between vehicles helps to anticipate potentially dangerous situations, as well as planning better
routes during congestion situations.
In this context, we are trying in this paper to model and simulate VANET Networks in order to
analyze and evaluate security information dissemination approaches and mechanisms used in
this type of networks in several exchanges conditions.This in order to identify their limitations
and suggest a new improved approach. This study was conducted as part of our research
project entitled “Simulation & VANETs”, where we justify and validate our approach using
modeling and simulation techniques and tools used in this domain.
VEHICULAR 2020 Presentation by Kohei HosonoKohei Hosono
Title:
Implementation and Evaluation of Priority Processing by Controlling Transmission Interval Considering Traffic Environment in a Dynamic Map
Author:
Kohei Hosono, Akihiko Maki, Yoichi Watanabe, Hiroaki Takada, Kenya Sato
Affiliation:
Computer and Information Science, Graduate School of Science and Engineering, Doshisha University
Fujitsu Limited
Institutes of Innovation for Future Society, Nagoya University
Mobility Research Center, Doshisha University
Conference:
The Ninth International Conference on Advances in Vehicular Systems, Technologies and Applications VEHICULAR 2020
Abstract:
Much attention has been attracted to the research of cooperative automatic driving that focuses on safety and efficiency by sharing the data obtained from sensor information of a vehicle. In addition, dynamic maps, a common information and communication platform for the integrated management of shared sensor information, are under consideration. A vehicle always sends data to a server that manages the dynamic map, and the server runs applications for driving support and control on the basis of the data, so fast information processing is required. However, congestion is a concern when data is continuously sent from vehicles to the server at high transmission intervals and when many vehicles are managed by dynamic maps on the server. In addition, the data transmission interval from the vehicle required by the road characteristics differs in actual traffic environments. Therefore, congestion can be alleviated by adjusting the transmission interval of data from the vehicle in consideration of road characteristics. In this paper, a platform for a dynamic map consisting of a server and a vehicle is constructed. We have also implemented a priority processing function that sets the priority for each section of a lane, and adjusts the transmission interval on the basis of the characteristics of the road around the vehicle.
: This paper is aimed at designing a density based dynamic traffic signal system where the timing
of signal will change automatically on sensing the traffic density at any junction using the IoT technology. Traffic
congestion is a severe problem in most cities across the world and therefore it is time to shift more manual mode
or fixed timer mode to an automated system with decision making capabilities. To optimize this problem, we have
made a framework for an intelligent traffic control system. Sometimes higher traffic density at one side of the
junction demands longer green time as compared to standard allotted time. We therefore propose here a
mechanism in which the time period of green light and red light is assigned on the basis of the density of the
traffic present at the time. This is achieved by using LIDAR sensors.
A Framework for Improving the Performance of MANET by Controlling Data Traffi...rahulmonikasharma
A mobile ad-hoc network is a category of wireless network which does not depend on a predefined network structure or topology. Ad hoc networks require no centralized administration or fixed network infrastructure such as base stations or access points, and can be quickly and inexpensively set up as needed. Two mobile nodes can exchange data directly if they are in the defined range of each other. If not, nodes can communicate via a multi-hop route with the help of other mobile nodes. This paper proposed an approach to improve data transmission by reducing the data traffic and it also increase data availability in the mobile ad-hoc network. In the proposed approach, MANET is server client based network, means a mobile host acts as a server and fulfill the others node’s request. Each mobile node has a buffer for temporarily storing data fragment for a specific time, If a mobile node requests for a particular data fragment and the request is multi hoped, then first request is sent to its neighbor node, neighbor node first match requested data fragment with stored data, if it is matched the request will be responded by this neighbor otherwise request will be routed to mobile server. In this way the overhead of the server and server traffic will be reduced. The proposed method reduces time consumed by data fetching directly from server routing through multiple nodes and thus, it also enhances data availability.
VANET Clustering for Protected and Steady Network
Mukesh Bathre1, Alok Sahelay2
Abstract— Vehicular on demand ad-hoc network (VANET) is understood as a necessary issue of good Transportation systems. The key advantage of VANET communication is looked in dynamic protection systems, that objective to improve security of travelers by exchanging caution messages between vehicles. Alternative applications and private services also are allowed so as to lower management expenses and to market VANET exploitation. To effectively established VANET, security is one amongst key challenges that has got to be tackled. Another vital concern is measurability could be a serious issue for a network designer a way to maintain stable communication and services in VANET. Extraordinarily dynamic atmosphere of VANETs looks it troublesome. This paper introduced an automatic reliability management method for VANETs that uses machine learning to categories nodes as malicious. Cluster creation is one effective method for the measurability drawback. Here conjointly given associate entropy-based WCA (EWCA) cluster maintained method which may handle the steady of the automobile network.
Campus realities: forecasting user bandwidth utilization using Monte Carlo si...IJECEIAES
Adequate network design, planning, and improvement are pertinent in a campus network as the use of smart devices is escalating. Underinvesting and overinvesting in campus network devices lead to low network performance and low resource utilization respectively. Due to this fact, it becomes very necessary to ascertain if the current network capacity satisfies the available bandwidth requirement. The bandwidth demand varies from different times and periods as the number of connected devices is on the increase. Thus, emphasizing the need for adequate bandwidth forecast. This paper presents a Monte Carlo simulation model that forecast user bandwidth utilization in a campus network. This helps in planning campus network design and upgrade to deliver available content in a period of high and normal traffic load.
A hierarchical RCNN for vehicle and vehicle license plate detection and recog...IJECEIAES
Vehicle and vehicle license detection obtained incredible achievements during recent years that are also popularly used in real traffic scenarios, such as intelligent traffic monitoring systems, auto parking systems, and vehicle services. Computer vision attracted much attention in vehicle and vehicle license detection, benefit from image processing and machine learning technologies. However, the existing methods still have some issues with vehicle and vehicle license plate recognition, especially in a complex environment. In this paper, we propose a multivehicle detection and license plate recognition system based on a hierarchical region convolutional neural network (RCNN). Firstly, a higher level of RCNN is employed to extract vehicles from the original images or video frames. Secondly, the regions of the detected vehicles are input to a lower level (smaller) RCNN to detect the license plate. Thirdly, the detected license plate is split into single numbers. Finally, the individual numbers are recognized by an even smaller RCNN. The experiments on the real traffic database validated the proposed method. Compared with the commonly used all-in-one deep learning structure, the proposed hierarchical method deals with the license plate recognition task in multiple levels for sub-tasks, which enables the modification of network size and structure according to the complexity of sub-tasks. Therefore, the computation load is reduced.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
Comparative study of proactive and reactive routing protocols in vehicular ad...IJECEIAES
In recent years, the vehicular ad-hoc network (VANET), which is an ad-hoc network used by connected autonomous vehicles (CAV) for information processing, has attracted the interest of researchers in order to meet the needs created by the accelerating development of autonomous vehicle technology. The enormous amount of information and the high speed of the vehicles require us to have a very reliable communication protocol. The objective of this paper is to determine a topology-based routing protocol that improves network performance and guarantees information traffic over VANET. This comparative study was carried out using the simulation of urban mobility (SUMO) and network simulator (NS-3). Through the results obtained, we will show that the choice of the type of protocol to use depends on the size of the network and also on the metrics to be optimized.
Integrated Intelligent Transportation Systems (ITS)Babagana Sheriff
An Implementation of Integrated ITS Solution supporting Mobility as a Service within West Midlands Region, UK in Collaboration of Integrated Transport Authority.
SCALABLE AND ENERGY EFFICIENT TASK OFFLOADING SCHEMES FOR VEHICULAR CLOUD COM...IJCNCJournal
Smart vehicles of today on road are equipped with advanced computational units, multiple communication technologies, intelligent sensing platforms, and human-computer interaction devices which utilize Vehicular Edge Networks to support services offered by the remote cloud. This being named as
Opportunistic Vehicular Edge Computing recently, has the possibility to supplement the services provided by the Edge gadgets. Many Vehicular Edge Computing architectures have been proposed as of late which support task offloading. One among the premier difficulties in these networks is efficiently utilizing the resources available at the vehicular nodes. The present work uses APEATOVC, a conveyed and versatile
protocol for economical, efficient and effective task offloading in these networks which address the adaptability of vehicular clouds. The results obtained by extensive simulations are presented to assess and contrast its performance with existing protocols.
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
Intelligent Transportation Systems (ITS) have been one of the promising technology that has a great interest attention from many researchers over the world. Vehicular Ad-hoc Network (VANET) communications environment as a part of ITS opens the way for a wide range of applications such as safety applications, mobility and connectivity for both driver and passengers to exploit the transport systems in a smoothly, efficiently and safer way. Several challenging tasks facing adopting VANET functionality for ITS such as modelling of wireless transmission and routing issues. These research issues have become more critical due to the high mobility of vehicles nodes (transmitters and receivers) and unexpected network topology due to the high speed of nodes. In fact, modelling radio propagation channel in VANET environment which considers as one of a stringent communications environment is a challenging task. The selection of a suitable transmission model plays a key role in the routing decisions for VANET. Different propagation models allow calculating the Received Signal Strength (RSS) based on key environmental properties such as the distance between transmitter vehicle and a receiver vehicle, the gain and antenna height of transmitter and a receiver vehicles. Hence, it is useful to calculate RSS and SNR values for a specific propagation model and then these values can be used later for routing decision in order to find the best path with high SNR. This paper evaluates the performance of different transmission models (freespace, two-ray and log-normal) in terms of Receive Signal Strength (RSS). In addition, the performance of such wireless transmission models for vehicular communication in terms of PDR, throughput and delay is evaluated by applying the proposed cross layer routing approach based on IEEE 802.11p. By using MATLAB, the obtained results confirm the best packet delivery ratio for our proposed approach, where it indicates poor quality of DSSS PHY with high number vehicles. The minimum delay achieved when traffic density is decreased.
Towards a new approach of data dissemination in vanets networkscsandit
In the 2000s, ad hoc networks was developed and highly used in dynamic environment,
particularly for inter- vehicular communication (VANETs : Vehicular Ad hoc Networks).
Since that time, many researches and developments process was dedicated to VANET networks.
This was motivated by the current vehicular industry trend that is leading to a new transport
system generation based on the use of new communication technologies in order to provide
many services to passengers, the fact that improves the driving and travel’s experience.
These systems require traffic information sharing and dissemination the example as the case
alert message emitting allowing the driver to minimize driving risks. Sharing such information
between vehicles helps to anticipate potentially dangerous situations, as well as planning better
routes during congestion situations.
In this context, we are trying in this paper to model and simulate VANET Networks in order to
analyze and evaluate security information dissemination approaches and mechanisms used in
this type of networks in several exchanges conditions.This in order to identify their limitations
and suggest a new improved approach. This study was conducted as part of our research
project entitled “Simulation & VANETs”, where we justify and validate our approach using
modeling and simulation techniques and tools used in this domain.
VEHICULAR 2020 Presentation by Kohei HosonoKohei Hosono
Title:
Implementation and Evaluation of Priority Processing by Controlling Transmission Interval Considering Traffic Environment in a Dynamic Map
Author:
Kohei Hosono, Akihiko Maki, Yoichi Watanabe, Hiroaki Takada, Kenya Sato
Affiliation:
Computer and Information Science, Graduate School of Science and Engineering, Doshisha University
Fujitsu Limited
Institutes of Innovation for Future Society, Nagoya University
Mobility Research Center, Doshisha University
Conference:
The Ninth International Conference on Advances in Vehicular Systems, Technologies and Applications VEHICULAR 2020
Abstract:
Much attention has been attracted to the research of cooperative automatic driving that focuses on safety and efficiency by sharing the data obtained from sensor information of a vehicle. In addition, dynamic maps, a common information and communication platform for the integrated management of shared sensor information, are under consideration. A vehicle always sends data to a server that manages the dynamic map, and the server runs applications for driving support and control on the basis of the data, so fast information processing is required. However, congestion is a concern when data is continuously sent from vehicles to the server at high transmission intervals and when many vehicles are managed by dynamic maps on the server. In addition, the data transmission interval from the vehicle required by the road characteristics differs in actual traffic environments. Therefore, congestion can be alleviated by adjusting the transmission interval of data from the vehicle in consideration of road characteristics. In this paper, a platform for a dynamic map consisting of a server and a vehicle is constructed. We have also implemented a priority processing function that sets the priority for each section of a lane, and adjusts the transmission interval on the basis of the characteristics of the road around the vehicle.
: This paper is aimed at designing a density based dynamic traffic signal system where the timing
of signal will change automatically on sensing the traffic density at any junction using the IoT technology. Traffic
congestion is a severe problem in most cities across the world and therefore it is time to shift more manual mode
or fixed timer mode to an automated system with decision making capabilities. To optimize this problem, we have
made a framework for an intelligent traffic control system. Sometimes higher traffic density at one side of the
junction demands longer green time as compared to standard allotted time. We therefore propose here a
mechanism in which the time period of green light and red light is assigned on the basis of the density of the
traffic present at the time. This is achieved by using LIDAR sensors.
A Framework for Improving the Performance of MANET by Controlling Data Traffi...rahulmonikasharma
A mobile ad-hoc network is a category of wireless network which does not depend on a predefined network structure or topology. Ad hoc networks require no centralized administration or fixed network infrastructure such as base stations or access points, and can be quickly and inexpensively set up as needed. Two mobile nodes can exchange data directly if they are in the defined range of each other. If not, nodes can communicate via a multi-hop route with the help of other mobile nodes. This paper proposed an approach to improve data transmission by reducing the data traffic and it also increase data availability in the mobile ad-hoc network. In the proposed approach, MANET is server client based network, means a mobile host acts as a server and fulfill the others node’s request. Each mobile node has a buffer for temporarily storing data fragment for a specific time, If a mobile node requests for a particular data fragment and the request is multi hoped, then first request is sent to its neighbor node, neighbor node first match requested data fragment with stored data, if it is matched the request will be responded by this neighbor otherwise request will be routed to mobile server. In this way the overhead of the server and server traffic will be reduced. The proposed method reduces time consumed by data fetching directly from server routing through multiple nodes and thus, it also enhances data availability.
VANET Clustering for Protected and Steady Network
Mukesh Bathre1, Alok Sahelay2
Abstract— Vehicular on demand ad-hoc network (VANET) is understood as a necessary issue of good Transportation systems. The key advantage of VANET communication is looked in dynamic protection systems, that objective to improve security of travelers by exchanging caution messages between vehicles. Alternative applications and private services also are allowed so as to lower management expenses and to market VANET exploitation. To effectively established VANET, security is one amongst key challenges that has got to be tackled. Another vital concern is measurability could be a serious issue for a network designer a way to maintain stable communication and services in VANET. Extraordinarily dynamic atmosphere of VANETs looks it troublesome. This paper introduced an automatic reliability management method for VANETs that uses machine learning to categories nodes as malicious. Cluster creation is one effective method for the measurability drawback. Here conjointly given associate entropy-based WCA (EWCA) cluster maintained method which may handle the steady of the automobile network.
Campus realities: forecasting user bandwidth utilization using Monte Carlo si...IJECEIAES
Adequate network design, planning, and improvement are pertinent in a campus network as the use of smart devices is escalating. Underinvesting and overinvesting in campus network devices lead to low network performance and low resource utilization respectively. Due to this fact, it becomes very necessary to ascertain if the current network capacity satisfies the available bandwidth requirement. The bandwidth demand varies from different times and periods as the number of connected devices is on the increase. Thus, emphasizing the need for adequate bandwidth forecast. This paper presents a Monte Carlo simulation model that forecast user bandwidth utilization in a campus network. This helps in planning campus network design and upgrade to deliver available content in a period of high and normal traffic load.
A hierarchical RCNN for vehicle and vehicle license plate detection and recog...IJECEIAES
Vehicle and vehicle license detection obtained incredible achievements during recent years that are also popularly used in real traffic scenarios, such as intelligent traffic monitoring systems, auto parking systems, and vehicle services. Computer vision attracted much attention in vehicle and vehicle license detection, benefit from image processing and machine learning technologies. However, the existing methods still have some issues with vehicle and vehicle license plate recognition, especially in a complex environment. In this paper, we propose a multivehicle detection and license plate recognition system based on a hierarchical region convolutional neural network (RCNN). Firstly, a higher level of RCNN is employed to extract vehicles from the original images or video frames. Secondly, the regions of the detected vehicles are input to a lower level (smaller) RCNN to detect the license plate. Thirdly, the detected license plate is split into single numbers. Finally, the individual numbers are recognized by an even smaller RCNN. The experiments on the real traffic database validated the proposed method. Compared with the commonly used all-in-one deep learning structure, the proposed hierarchical method deals with the license plate recognition task in multiple levels for sub-tasks, which enables the modification of network size and structure according to the complexity of sub-tasks. Therefore, the computation load is reduced.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
Comparative study of proactive and reactive routing protocols in vehicular ad...IJECEIAES
In recent years, the vehicular ad-hoc network (VANET), which is an ad-hoc network used by connected autonomous vehicles (CAV) for information processing, has attracted the interest of researchers in order to meet the needs created by the accelerating development of autonomous vehicle technology. The enormous amount of information and the high speed of the vehicles require us to have a very reliable communication protocol. The objective of this paper is to determine a topology-based routing protocol that improves network performance and guarantees information traffic over VANET. This comparative study was carried out using the simulation of urban mobility (SUMO) and network simulator (NS-3). Through the results obtained, we will show that the choice of the type of protocol to use depends on the size of the network and also on the metrics to be optimized.
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSijasuc
Vehicular Ad hoc Networks (VANETs) are a compelling application of ad hoc networks, because of the
potential to access specific context information (e.g. traffic conditions, service updates, route planning)
and deliver multimedia services (VOIP, in-car entertainment, instant messaging, etc.). In this paper, we
propose an agent based intelligent information dissemination model for VANETs. Safety information like
cooperative driving, accident, road condition warnings, etc. play a major role for applications of VANET.
Safety information dissemination poses a major challenge of delay-sensitive nature. This paper proposes
an agent based model for intelligent information dissemination in VANETs. Proposed model uses
cognitive agent concept for realizing intelligent information dissemination. To test the efficiency of the
model, proposed scheme is simulated using NS-2 simulator. Some of the performance parameters
analyzed are bandwidth utilized, push latency and push/pull decision latency.
GEOCAST ROUTING PROTOCOLS FOR VEHICULAR AD-HOC NETWORKS: A SURVEYijwmn
Geocast routing is considered to be advantageous in VANETs, as most of the safety applications are location-based and are relevant to a particular geographical area rather than individual vehicles. Hence, the geocast routing approach where data packets are delivered to a specific geographic area or zone of relevance has become an important research area among researchers and academicians. This article surveys the existing geocast routing protocols for the vehicular environment and compares them qualitatively based on various parameters. The pros and cons of each routing protocol are discussed. Certain directions for future research related to geocast routing protocols are also presented.
GEOCAST ROUTING PROTOCOLS FOR VEHICULAR AD-HOC NETWORKS: A SURVEYijwmn
Geocast routing is considered to be advantageous in VANETs, as most of the safety applications are
location-based and are relevant to a particular geographical area rather than individual vehicles. Hence,
the geocast routing approach where data packets are delivered to a specific geographic area or zone of
relevance has become an important research area among researchers and academicians. This article
surveys the existing geocast routing protocols for the vehicular environment and compares them
qualitatively based on various parameters. The pros and cons of each routing protocol are discussed.
Certain directions for future research related to geocast routing protocols are also presented.
Analysing Transportation Data with Open Source Big Data Analytic Toolsijeei-iaes
Big data analytics allows a vast amount of structured and unstructured data to be effectively processed so that correlations, hidden patterns, and other useful information can be mined from the data. Several open source big data analytic tools that can perform tasks such as dimensionality reduction, feature extraction, transformation, optimization, are now available. One interesting area where such tools can provide effective solutions is transportation. Big data analytics can be used to efficiently manage transport infrastructure assets such as roads, airports, bus stations or ports. In this paper an overview of two open source big data analytic tools is first provided followed by a simple demonstration of application of these tools on transport dataset.
VANET is next generation vehicular network and
its applications will be play key to safe human life while journey
on highway. Security is one of the key prominent factors for
implement VANET in real environment.In this survey paper, discuss in detail the various computing methods and illustrate the relationship with vehicular network. Using these computing
methods to secure the vehicular network from attackers and
attacks.
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
Vehicles download the data when passing through a drive through the road (RSU) and then share the data after travelling outside the coverage of RSU.A key issue of downloading
cooperative data is how effectively data is shared among them self. Developing an application layer data exchange protocol for the coordination of vehicles to exchange data according to
their geographic locations. Coordinated sharing can avoid medium access control (MAC) layer
collisions and the hidden terminal effect can be avoided in the multi-hop transmission. A salient
feature of the application layer data exchange protocol, in the voluntary services, Vehicles purchase the requested data from service provider via RSUs. In this project, we propose a
cooperative data sharing with secure framework for voluntary services in special vehicles networks (VANETs). We also concentrate on security in the process of downloading data and
sharing. Applicants to ensure exclusive access to data applied and security of the vehicles
involved in the implementation.
TOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKScscpconf
In the 2000s, ad hoc networks was developed and highly used in dynamic environment, particularly for inter- vehicular communication (VANETs : Vehicular Ad hoc Networks). Since that time, many researches and developments process was dedicated to VANET networks. This was motivated by the current vehicular industry trend that is leading to a new transport system generation based on the use of new communication technologies in order to provide many services to passengers, the fact that improves the driving and travel’s experience. These systems require traffic information sharing and dissemination the example as the case alert message emitting allowing the driver to minimize driving risks. Sharing such information between vehicles helps to anticipate potentially dangerous situations, as well as planning better routes during congestion situations. In this context, we are trying in this paper to model and simulate VANET Networks in order to analyze and evaluate security information dissemination approaches and mechanisms used in this type of networks in several exchanges conditions.This in order to identify their limitations and suggest a new improved approach. This study was conducted as part of our research project entitled “Simulation & VANETs”, where we justify and validate our approach using modeling and simulation techniques and tools used in this domain.
Abstract—This paper provides a brief overview of the Intelligent Traffic Management System based on Artificial
Neural Networks (ANN). It is being utilized to enhance the present traffic management system and human resource
reliance. The most basic problem with the current traffic lights is their dependency on humans for their working.
The technologies used in the making of this automated traffic lights are Internet of Things, Machine Learning and
Artificial Intelligence. The basic steps used in Internet of Things are reported along with different ANN trainings.
This ANN model can be used for the minimization of traffic on roads and less waiting time at traffic lights. As a
result, we can make traffic lights more automated which in turn eventually deceases our dependency on human
resources
Towards Improving Road Safety Using Advanced Vehicular NetworksTELKOMNIKA JOURNAL
Vehicular Ad-hoc Networks (VANETs) are advanced network technologies applied to improve safety on roads and to offer suitable solutions for Intelligent Transportation Systems (ITS). The goal of VANETs is to assistdrivers and to act as a smart co-pilot that can alret about accidents and help avoiding them while prodivding high-end infotainment systems for both the driver and passengers. Consequently, VANETs can save millions of lives around the world, especially in Saudi Arabia, which has a very high rate of road accidents annualy. In this paper, we introduce and discuss VANETs, related routing protocols, challenging problems, and the existing solutions. This work is a part of a bigger project that aims to enhance VANETs technologies and to updapteITS to significantly promote road safety in general and Saudi Arabia’s roads in particular.
Our journal has been unwavering commitment to showcasing cutting-edge research. The journal provides a platform for researchers to disseminate their work on next-generation technologies. In an era where innovation is the driving force behind progress, JST plays a crucial role in shaping the discourse on emerging technologies, thus contributing to their rapid development and implementation.
Medium access in cloud-based for the internet of things based on mobile vehic...TELKOMNIKA JOURNAL
Smart cities are made up of a large number of smart, intelligent gadgets that can sense, compute, act, and communicate. Focusing on how data is transferred between sensory devices and applications in the internet of things (IoT), and cyber-physical systems have led to 5G/IoT integration. This paper proposes a revolutionary architecture for mobile vehicular cloud infrastructure that takes variable weather, road, and traffic circumstances into consideration. It proposes a dynamic speed management system for smart cities. To optimize system flexibility and reduce costs, the system makes advantage of the most recent advancements in wireless communication and utilizes current telecommunication infrastructures utilized in data streaming, sound, and video. The study presents an internet protocol (IP) real-time subsystem-network-based framework for requesting bandwidth from free wireless channel resources using the channell quality indicator channel.
Traffic Control System by Incorporating Message Forwarding ApproachCSCJournals
During the last few years, continuous progresses in wireless communications have opened new research fields in computer networking, aimed at extending data networks connectivity to environments where wired solutions are impracticable. Among these, vehicular traffic is attracting a growing attention from both academia and industry, due to the amount and importance of related distributive applications to mobile entertainment. VANETs are self-organized networks built up from moving vehicles, and are part of the broader class of MANETs. Because of these peculiar characteristics, VANETs require new networking techniques, whose feasibility and performance are usually tested by means of simulation. In order to meet performance goals, it is widely agreed that VANETs must rely heavily on node-to-node communication. In VANET, each vehicle acts as a node and communicates with other vehicles within the range or communicates with base stations. The main idea is to deploy a wireless communication network that has a capability of sending and receiving messages between transmitter and mobile devices in the particular network. Results can be shown using an effective VEINS Simulator. This Simulator can produce detailed vehicular movement traces and can simulate different traffic conditions through fully customizable scenarios. The Framework is expected to be employed using such simulator that makes use of traffic modulator, network simulator and coupling module that integrates the traffic and network.
Predictive Data Dissemination in VanetDhruvMarothi
The vehicle itself is an information source that produces a large amount of various information including actual vehicle and environment sensors. The implementation of an efficient and scalable model for information dissemination in VANETs possesses major issues. In this dynamic environment, an ever-growing number of context dissemination messages are leveling up the usage of the channel which affects the network performance. This presentation tries to analyze and assess the key ideas of how to overcome the context data dissemination and how to reduce the amounts of transferred and stored data in a vehicular cooperation environment. This is one of the most prominent topics of pervasive computing.
Intelligent transportation system (ITS) is an application which provides intelligence to the transportation
and traffic management systems. Although the word ITS applies to all systems in the transportation but as
per the European union directive it is the application of Information and communication technology in the
field of transportation is defined as ITS. The communication technology has evolved greatly today from
2G/3G to long term evolution (LTE). In this paper we focus on the LTE and its application in the ITS. Since
LTE offers excellent QoS, wide area coverage and high availability it is a preferred choice for vehicle to
infrastructure (V2I) service. At the same time the LTE customer base is increasing day by day which results
in congestion and accessing the network to send or request resources becomes difficult. In this paper we
have proposed a group based node selection algorithm to reduce the preamble ID collision otherwise this
uncoordinated preamble ID transmission by vehicle node (VN) will eventually clog the network and there
will be a massive congestion and re-transmissions attempts by VNs to obtain the random access channel
(RACH).
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODELpijans
Ad hoc networks was developed in the 2000s, they was highly used in dynamic environment, particularly
for inter- vehicular communication (VANETs : Vehicular Ad hoc Networks).
Since that time, many researches and developments process was dedicated to VANET networks. These were
motivated by the current vehicular industry trend that is leading to a new transport system generation
based on the use of new communication technologies in order to provide many services to passengers, the
fact that improves the driving and travel’s experience.
These systems require traffic information sharing and dissemination, such as the alert message emitting,
that be exchanged for drivers protection on the road. Sharing such information between vehicles helps to
anticipate potentially dangerous situations, as well as planning better routes during congestion situations.
The current paper attempts to model and simulate VANET Networks, aiming to analyze and evaluate
security information dissemination approaches and mechanisms used in this type of networks in several
exchanges conditions. The second objective is to identify their limitations and suggest a new improved
approach. This study was conducted as part of our research project entitled “Simulation & VANETs”,
where we justify and validate our approach using modeling and simulation techniques and tools used in
this domain.
Similar to Big data traffic management in vehicular ad-hoc network (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Big data traffic management in vehicular ad-hoc network
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 11, No. 4, August 2021, pp. 3483~3491
ISSN: 2088-8708, DOI: 10.11591/ijece.v11i4.pp3483-3491 3483
Journal homepage: http://ijece.iaescore.com
Big data traffic management in vehicular ad-hoc network
Tantaoui Mouad1
, Laanaoui My Driss2
, Kabil Mustapha3
1,3
Hassan II University, Mohammedia, Morocco
2
Cadi Ayyad University, Marrakech, Morocco
Article Info ABSTRACT
Article history:
Received Aug 5, 2020
Revised Dec 19, 2020
Accepted Jan 19, 2021
Today, the world has experienced a new trend with regard to data system
management, traditional database management tools have become outdated
and they will no longer be able to process the mass of data generated by
different systems, that's why big data is there to process this mass of data to
bring out crucial information hidden in this data, and without big data
technologies the treatment is very difficult to manage; among the domains
that uses big data technologies is vehicular ad-hoc network to manage their
voluminous data. In this article, we establish in the first step a method that
allow to detect anomalies or accidents within the road and compute the time
spent in each road section in real time, which permit us to obtain a database
having the estimated time spent in all sections in real time, this will serve us
to send to the vehicles the right estimated time of arrival all along their
journey and the optimal route to attain their destination. This database is
useful to utilize it like inputs for machine learning to predict the places and
times where the probability of accidents is higher. The experimental results
prove that our method permits us to avoid congestions and apportion the load
of vehicles in all roads effectively, also it contributes to road safety.
Keywords:
Big data
Intelligent transportation
systems
Machine learning
Traffic congestions prediction
Traffic management
Vehicular ad hoc network
This is an open access article under the CC BY-SA license.
Corresponding Author:
Tantaoui Mouad
Department of mathematics and applications
Hassan II University, FST, Mohammedia, Morocco
Faculté des Sciences et Techniques de Mohammedia BP 146 Mohammedia 28806 Morocco
Email: mouad.tantaoui-etu@etu.univh2c.ma
1. INTRODUCTION
Today cities are developing more and more until it becomes what we call smart cities, our goal is to
ameliorate traffic management in intelligent transport system (ITS), this is a research area that catch the
attention of research community mainly in the field of computer science because of social and economic
challenges. The diversity of data sources produces voluminous data described by its different type and
velocity, those data have become difficult to handle, in this context, big data technologies is the solution to
handle this massive data in real time, one of the research areas that rely on big data technologies is vehicular
ad-hoc network for managing their voluminous data. Our cities have experienced a growing trend of non-stop
vehicles. The bulky increase in vehicles number has engendered lot of social and environmental problems in
everyday life within cities like many traffic jams, road accidents and breathtaking air pollution, in this
direction, ITS is research domain of interest to the research community principally in computer science
domain due to challenges raised. Our goal is to find out a way for predicting traffic density on all roads and
various cities which would permit us afterward to predict places where the probability of accidents is high.
To attain this goal, we have to establish a road density prediction method utilizing voluminous data gathered
during vehicle-vehicle and vehicle-infrastructure communication [1]. Vehicular ad hoc network (VANETs)
has made since their birth, an increasingly advancement. Many standards, applications and methods of data
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3483 - 3491
3484
processing have been established to remedy the characteristics of this new gender of networks. The main
challenges increase especially from the high mobility of vehicles and the spatio-temporal diversity of traffic
density. Among the main components of the architecture of VANET are on-board unit (OBU) which are on
mobile node for facilitating communication with other mobile nodes such as vehicles and fixed stations like
roadside units via dedicated short-range communications (DSRC) and the ability to communicate utilizing
cellular radio networks like GSM, 4G, Wi-Fi and WiMAX. Also, there are road-side units (RSUs) which are
the base stations that handle VANET applications and manage actions to share and process information and
also disseminate data, provides traffic directories, behave as location servers, and connect to the Internet and
external centralized or distributed servers. And centralized cloud which is a gender of computer architecture
where all or most of the treatment or computation is processed on such a central server. Centralized
computing enables the deployment of all IT resources, administration and management of the central server.
2. RELATED WORKS
Actually, VANET environment is becoming as a big data problem. Therefore, various big data tools
can be used to manage data from VANETs for improving traffic management. One of the important works
that interest us was about implementing VANET Dijkstra algorithm [2], they implemented the algorithm in
Hadoop MapReduce environment and the compared it to a dijikstra implemented in a simple NetBeans.
Another work which is very important is detecting within the VANET network the vehicles that can proceed
as information hubs whose role is to gather information from the network and share it. Ranking algorithm is
developed in this context like for example InfoRank [3]. Speed prediction algorithms are essential for
managing traffic in the field of intelligent transport system; Big data based deep learning speed prediction
(BDDL-SP) [4] is a speed prediction algorithm that can predict the speed of a vehicle in highways and urban
areas road networks. There are new systems to manage voluminous Data generated in real-time by different
agent such as vehicles and roadside units (RSUs) ensuring a rapid treatment of data in the purpose to make
road management decisions. Those new systems can be utilized for example to compute the estimated arrival
time of vehicles or predict accidents and congestions with the help of naive bayes and distributed random
forest (DRF) [5]. One of these systems is the Lambda architecture (LA) [6] which is data treatment
architecture that allows handling massive data in batch and in real time. In article [7], an experiment on ITS
environment was implemented to assess the traffic density estimation about different cities on different roads
and carry out a comparative evaluation relying on that parameter. In article [8], the authors suggest a system
to send with dynamic manner reports against selfish and malicious vehicles. The proposed system utilizes an
encryption mechanism to exchange messages. In article [9], in the first hand, authors proposed architecture
for large on-vehicle datasets which administer centralized access to massive data. The proposed system
integrates centralized data storage and processing mechanism, and a distributed data storage mechanism for
real-time processing and analysis. In article [10], a routing protocol was proposed which is based on road
vehicle density in real time. The computation of road density is based on each vehicle to which it belongs by
utilizing tag messages and the road information table.
In article [11], the synthetic minority oversampling technique is used for reconstructing the
experimental dataset, the minority samples in the study dataset were oversampled and new samples were
synthesized for completing the missing data. In article [12], in the first hand, they reviewed VANET
technologies for efficient and reliable data transmission. And then, they presented the methods used by Big
Data for studying the characteristics of VANETs and improving their performance. In article [13], a new
routing protocol is proposed which uses (link guarantee) and (forwarding movement distance) a node to
select the next hop node. They used the weighted function by normalizing all quality-of-service metrics. In
article [14], the H2O and WEKA extraction tools are used for evaluating five classifiers on two large sets of
workshop data. The classifiers utilized are: AdaboostM1, C4.5, random forest (RF), naive bayes, (with the
C4.5 basic classifier) and Bagging. The selection of attributes is applied and also the problem of class
imbalance is tackled. Their experiences showed that naive bayes (NB) gave the optimal results, with the
shortest calculation time and a practical area under the curve (AUC) and accuracy (ACC). In paper [15],
named data networking (NDN) is new Internet architecture has been established to settle the VANET
networks weaknesses and to manage countless applications such as object tracking, tracking a mobile vehicle
and handling an effective communication channel in the VANET. In article [16], this research project
proposes an efficient and secure data collection technique that ensures the security and confidentiality of data
exchanged between vehicles and RSUs. It is based on asymmetric encryption that ensures secure
communication between vehicles and RSUs. In this technique, secure authentication is established between
the vehicle and the RSU before the RSU begins to collect the vehicle data. In article [17], by significantly
expanding the scale of the network and performing real-time and long-term information processing, vehicular
VANETs are moving towards the Internet of vehicles (IoV), which promises effective and intelligent
3. Int J Elec & Comp Eng ISSN: 2088-8708
Big data traffic management in vehicular ad-hoc network (Tantaoui Mouad)
3485
prospects for a future transport system. On the other hand, vehicles are not just consumers; they also generate
huge amounts and types of data, called big data. In this article, they first examined the relationship between
IoV and big data in the vehicular environment, mainly on how IoV supports transmission, storage, computing
using big data and how IoV pulls benefit of big data for characterization, performance evaluation and big
data support for a communication protocol design. In article [18], autonomous vehicle (AV) technology leads
to many economic and social benefits and impacts. The trajectory planning is one of the essential and critical
tasks of driving the autonomous vehicle. In this article, they tackled the problem of trajectory planning for
fully autonomous vehicles. The constructed methods are intended for autonomous vehicles in a cloud based
smart vehicle environment.
This article presents an optimal and safe trajectory selection method in autonomous vehicles. The
selection of the safety trajectory in this work is mainly based on the exploitation of Big Data and the analysis
of real-life accident data and real-time connected vehicle data. In the paper [19], authors analyze channel
estimation techniques for Massive multiple-input multiple-output systems. They did a comparison among the
different channel estimation techniques. For the paper [20], they talked about the history of the evolution of
data handling systems, and they discuss the existing state of big data handling systems in the context of data
storage, model, and query engines of big data handling systems. In the article [21], Shaofu Lin et al. used
Guizhou as an example to produce a spatio-temporal big data handling system leaned on GIS bussing
technique. In the article [22], authors produced and created a new distributed big data management system
(DBDMS) and it offers big data real-time gathering, search and perpetual storage. Hadoop eco system seem
to be very important, in the article [23], authors analyze the Hadoop architecture and Hadoop eco system. In
article [24], Brunswicker et al. developed on research issue which is related to open digital collaboration and
established the data analytical challenges which need to be revealed to answer these important research
issues. In the paper [25], Bukhari et al. proposed a method based on big data demography managing system
using apache Hadoop platform to settle troubles of demography high rising data managing. In the paper [26]
Malik et al. have analyzed the various mechanisms of resource allocation, mode selection for underlying
communications in the sense of device to device and cooperative communication techniques and they
establish a new technique LTE-Advanced Pro. In the paper [27], authors settle the issue of overtaking larger
vehicle by constructing ad-hoc connection based on 5G technology with the vehicle to be overtaken.
3. RESEARCH METHOD
3.1. Anomaly detection
In this paper, it’s about traffic management in real-time, we propose a system construct that firstly
build a base that contain the estimated spending time of each section of all roads in the city at the present.
Secondly, the method will be able to detect anomalies in the road so that, with the help of the base, we can
compute the time required to reach any destination from any source in real time. More precisely, for the
construction of the base, each vehicle logs the time of entry at the beginning and the end of a section, after
that it transmits this information and its identifier (ID) to the RSU in order to compute the spending time of
the road section. So, we have the traces of time spent to cross each section of all vehicles which will allow us
to have a base containing the estimated spending time of all the road sections in real time. This approach is
presented in Figure 1. After that, when a vehicle asks for a route to its destination, our system will be able to
transmit the route to reach its destination to the vehicle and the estimated arrival time along its way. This
approach is presented in Figure 2. Another utility of this base, we can locate an accident or an anomaly in a
section when we receive a recent spending time of vehicles very bigger compared to what there is in the base.
This approach is presented in Figure 3.
In other word, the system will receive spending time of all vehicles all along their ways, then we
will compare these values which we have just received with the corresponding values which are in the base,
if the difference crosses a threshold, then we will deduce that there is an anomaly or an event since the
majority of vehicles spend too much time in a section x. After noticing that there is a change in terms of time
spent on a particular section, our system updates immediately the base spending time of the section affected
by the change. And the opposite is true, if the time spent in a section is reduced, so we deduce that there is no
more traffic jam for example in that section, so we update the base as well. Therefore, our database is always
up to date in real time traffic status and changes of different sections. From the start of a vehicle, it
establishes the desired destination; the system will choose the best path to reach its destination relying on the
base of the spending time by choosing the path with the minimum expenditure time by summing the
spending time of different sections of the path drawn. We can summarize all our use cases in Figure 4.
This mechanism will help vehicles to avoid sections of road where there is an anomaly or
congestion; not only that, but it reduces automatically the gravity of having an accident. After having
established the optimal route at the beginning of the vehicle trip, at each entry in a section, the vehicle sends
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3483 - 3491
3486
a notification of its entry and its route to the system to check if there is an anomaly or a modification in terms
of estimated time for crossing following sections of the route established, if yes, the system will look for
another more optimal route and it will send him the new path, otherwise the vehicle continues in his route
established beforehand. These checks of the state of the next section are carried out all along its path and at
each entry of a section; this is due to the frequent change of the state of the traffic within the VANET
network. This characteristic of these frequent checks gives our method more precision regarding the
estimated time of arrival of the vehicles.
Figure 1. Sequence diagram of building a base
containing the estimated spent time of all the sections
Figure 2. Sequence diagram of sending to the
vehicle the estimated time of arrival all along its way
Figure 3. Sequence diagram of detecting an accident or an anomaly in a section
5. Int J Elec & Comp Eng ISSN: 2088-8708
Big data traffic management in vehicular ad-hoc network (Tantaoui Mouad)
3487
Figure 4. Summary of all parts of the methodology
3.2. Prediction of anomalies
Our goal in this part is to predict the areas and the corresponding timestamp where the risk of
congestions or accidents is high, we utilized the database constructed above comprising the estimated
spending time of different road sections, and we add to this database the average speed of each road section,
density traffic of it, and the timestamp, and the results of anomalies detection part done above, we utilized
these attributes like our dataset inputs for machine learning. Two different classifiers are utilized and
compared: naive bayes (NB) and discriminant random forest (DRF) to discern areas where there will happen
an anomaly. The naive Bayesian classification is a type of simple probabilistic Bayesian classification based
on Bayes' theorem with a strong (called naive) independence of the assumptions. It implements a naive
Bayesian classifier, or naive Bayes classifier, belonging to the family of linear classifiers. While for DRF, it
is part of machine learning techniques. This algorithm [28] combines the concepts of random subspaces and
bagging. Discriminant random forest algorithm trains on multiple decision trees trained on slightly different
data subsets. The basis of the calculation is based on decision tree learning. Breiman's [29] proposal aims to
correct several known drawbacks of the initial method, such as the sensitivity of single trees to the order of
predictors, by calculating a set of X partially independent trees. The class feature of our classification is the
congestion degree. First, both the NB and DRF methods can achieve superb accuracy values. The
classification result has three different values: minor, intermediate and major. For the naïve bayes method, in
Table 1, accuracy (ACC) attains about 83.5%, (in classification methods, Accuracy is the number of correct
predictions made by the model over all different predictions done, and area under the curve (AUC) is a kind
of performance for classification method that express how much model is able to distinguish between
classes.), and for DRF, the values attain about 88.3%. DRF classifier had the biggest time of computation
(nearly 15 s). Table 1 and Figure 5 show the summarized results of classification for the two classifiers. For
DRF, despite of the classification results is better that the naïve bayes results, it took more time (15 s). For
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3483 - 3491
3488
real-time mode, with fewer features, using naïve bayes would be good in providing most likely the right
decision quickly, and then the alert will be sent to the participating vehicle and the driver to have better
decision.
Table 1. DRF and NB classification results
Classifier Time of computation ACC AUC
Naïve Bayes 0.04 83.5 63
Random Forest 15 88.3 61
Figure 5. DRF and NB accurary results
4. RESULTS AND DISCUSSION
The proposed method consists at establishing the optimal path to the destination by choosing the
sections of road that have the minimum spending time relying on utilizing big data technologies to assure a
fast treatment in real time. In the simulation below, we took the map of Casablanca city, Morocco; and then
we cut the roads into sections as is shown in Figure 6. The simulation was done by simulator sumo that
generates traffic, and we used a navigation map module that utilizes our database containing time spent on
each road section and find the best route with minimal time. To show the usefulness of immediate database
changes and always keeping the database up to date, we mentioned in the table only four vehicles which have
the same destination and source.
Figure 6. VANET components and cutting roads into sections
7. Int J Elec & Comp Eng ISSN: 2088-8708
Big data traffic management in vehicular ad-hoc network (Tantaoui Mouad)
3489
The Table 2 shows the itinerary of the vehicles assigned by our proposed method according to the
destination established beforehand by the vehicle, the system is based on the database of the spending time of
each section of road to assign the vehicles an optimal route. In the example shown below, at twelve o’clock
noon, the vehicle number one start its trip from road number one with section number one and wishes to
reach road number nine with section number three as its desired destination, our system affected to the
vehicle a route indicated in the ‘route’ field of the Table 2, it is a sequence of couples (x, y) that the vehicle
will follow throughout its trip, x being the identifier of the road and y being the section of the road x. For the
vehicle number two, it arrived just after vehicle number one at 12:02 and wants to go to the same destination
as vehicle number one, as we can see, the system has affected to it the same route because the base is the
same and so the optimal route stays the same as the first one. For the vehicle number three that arrived at
12:17 and has the same destination as vehicle number one and two, we noticed that the system has assigned a
different route than those of the two previous vehicles, this is because the spending time of section 5 of route
2 has become bigger because of a particular anomaly that can be either an accident, congestion, and an event
(Anomaly detected in (2, 5), its spending time is becoming bigger and is updated in the base) and this will
push the system to look for a new route which is more optimal than the old one.
As we can see in Table 2, the new route is third route in Table 2 that has duration of fifty minutes;
this third route is more optimal than the old route affected to vehicle number one and two because after the
anomaly detected, its duration has become equal to sixty minutes. Because of the frequent changes in the
traffic state in the VANET network, there are many real-time updates on the database; the Table 3 illustrates
an extract of this database. The proposed method gave us a way to avoid congestions and to reduce the
gravity to have an accident, It is another way to give to user a safe itinerary to reach their destination more
accurately, the other methods in the related method mentioned in the literature predict if there is an accident
or congestion in what will happen, the advantage of our method is that it knows in real time what is
happening in the different road sections, it is not a prediction, but it illustrate what is actually happening in
the roads based on the time spent by the vehicles live, also when we see that vehicles spend too much time on
some sections so we will know that it is congested (high density) or there is an anomaly in that section so our
system will redirect next vehicles to another route. It also helps to have as a kind of balance of loads in terms
that our method makes fill roads by the vehicles, and as soon as that starts to be busy, it reroutes the
following vehicles to a road that is less loaded than the others, our method develops this effect of balance of
load in an automatic manner.
Table 2. Vehicle itinerary assigned by our method
Time Vehicle ID Source Route Duration
12:00 1 (1,1) (1,1)->(1,2)->(2,4)->(2,5)->(4,6)->(4,7)->(6,2)->(9,3) 45 min
12:02 2 (1,1) (1,1)->(1,2)->(2,4)->(2,5)->(4,6)->(4,7)->(6,2)->(9,3) 47 min
12:17 3 (1,1) (1,1)->(1,2)->(3,1)->(5,5)->(4,8)->(4,9)->(6,2)->(9,3) 51 min
12:19 4 (1,1) (1,1)->(1,2)->(3,1)->(5,5)->(4,8)->(4,9)->(6,2)->(9,3) 53 min
Table 3. An extract of the database containing all road sections duration time
(road, section) Estimated duration time at
12:00
Estimated duration time at
12:10
Estimated duration time at
12:20
(1,1) 6 min 30 sec 7 min 20 sec 8 min 52 sec
(1,2) 7 min 13 sec 7 min 13 sec 7 min 13 sec
(1,3) 8 min19 sec 8 min 43 sec 8 min 32 sec
(2,1) 6 min 41 sec 6 min 23 sec 6 min 55 sec
(2,3) 5 min 22 sec 5 min 29 sec 5 min 28 sec
(3,4) 7 min 50 sec 7 min 45 sec 7 min 30 sec
(4,1) 8 min 21 sec 8 min 32 sec 8 min 40 sec
(2,5) 7 min 54 sec 13 min 41 sec 12min 36 sec
(7,3) 9 min22 sec 9 min 45 sec 9 min 10 sec
This approach is illustrated in Table 4, road section (1, 1) is affected to many routes sent too many
vehicles, so after a while (20 min), it becomes a little congested (medium density), and unlike (1, 3), the
system doesn’t used it in the routes, so after a while it becomes low congested. For (2, 5), its estimated
duration time moved from 7min to 13min because of an anomaly so we stop to use this section in routes until
it become normal. Those many updates at the level of the database let our method more accurate concerning
the estimated time of arrival of vehicles and to route vehicles in different paths. Our architecture is composed
of centralized batch data storage and processing mechanism and a distributed data storage mechanism for
real-time treatment and analysis to manage and process the flow from the vehicle in a particular area. For the
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3483 - 3491
3490
technologies used on the simulation, we benefited from LA advantages, we used apache storm for the real-
time analysis to process distributed and faster flow treatment. While for processing the data mass, we utilized
Hadoop MapReduce that constructs the database that will be utilized by speed layer which is a fast-
processing layer in real time. Thus, the experimental result and analysis proved that the proposed architecture
model is an optimal solution that utilizes big data technologies, destined to transfer data in a near real-time
treatment destined for intelligent transportation system in a vehicular ad-hoc environment.
Table 4. Status of different road section at T and T+ 20min
Time Road section Density at T Density at T+20min
12:00 (1,1) low Medium
12:00 (2,5) Medium Very high
12:10 (1,3) Medium Low
13:00 (x,y) low Low
5. CONCLUSION
VANET engender voluminous data which is complicated to handle; therefore, big data technologies
are important to mine meaningful data from these big data. Road accidents are threating the lives of human
beings, and in the purpose of finding out an alternative for the issue of predicting the high probability of
vehicle accidents, this paper utilizes the benefits of big data to enhance traffic management, we established
real-time anomalies detection system in real time employing parallel data treatment, this gave to our method
fast execution time. Our method aims to know exactly the time spent to cross each section on each road,
which will give us a control to well manage the traffic and send to vehicles an accurate estimated time of
arrivals and the best safe route to reach their destination. And also, anomalies prediction system was
developed with the help of machine learning techniques. That will help us to avoid traffic congestion and
reduce the risk of accidents. The results of our experiment show that our method decreases congestion
significantly and so decrease accidents and our results have low latency and high accuracy. Our future
research is to more exploit the base of spending time per section established on this method and merging it
with machine learning techniques to have a high control on managing traffic and having better results.
REFERENCES
[1] Da Cunha, F. D., Boukerche, A., Villas, L., Viana, A. C., and Loureiro, A. A., “Data communication in VANETs: a
survey, challenges and applications,” Diss. INRIA Saclay; INRIA, 2014.
[2] B. Punam, and V. Jindal, “Use of big data technology in vehicular ad-hoc networks,” 2014 International
Conference on Advances in Computing, Communications and Informatics (ICACCI), 2014, pp. 1677-1683.
[3] Khan, Junaid, Yacine Ghamri-Doudane, and Ali El Masri, “Vers une approche centrée information (ICN) pour
identifier les véhicules importants dans les VANETs,” Proceedings of the conference CFIP NOTERE 2015, 2015.
[4] Cheng, Z., Chow, M. Y., Jung, D., and Jeon, J., “A big data based deep learning approach for vehicle speed
prediction,” 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE), 2017, pp. 389-394.
[5] Al Najada, Hamzah, and Imad Mahgoub, “Anticipation and alert system of congestion and accidents in VANET
using Big Data analysis for Intelligent Transportation Systems,” 2016 IEEE Symposium Series on Computational
Intelligence (SSCI), 2016, pp. 1-8.
[6] Marz, Nathan, and James Warren., “Big Data: Principles and best practices of scalable real-time data systems,”
New York; Manning Publications Co., 2015.
[7] Mahajan, Anshul, and Arvinder Kaur, “Predictive Urban Traffic Flow Model using Vehicular Big Data,” Indian
Journal of Science and Technology, vol. 9, no. 42, pp. 1-8, 2016.
[8] Bo-Rang Lin, Tsan-Pin Wang, “Dynamic Reporting Mechanisms for Trust Management in Vehicular Ad-hoc
Networks,” AIT, 2016
[9] Daniel, Alfred, Anand Paul, and Awais Ahmad., “Near real-time big data analysis on vehicular networks,” 2015
International Conference on Soft-Computing and Networks Security (ICSNS), 2015, pp. 1-7.
[10] Yu, Hyun, Joon Yoo, and Sanghyun Ahn, “A VANET routing based on the real-time road vehicle density in the
city environment,” 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN),
pp. 333-337, 2013, doi: 10.1109/ICUFN.2013.6614836.
[11] Zhao, H., Yu, H., Mao, T., Zhang, M., and Zhu, H., “Vehicle Accident Risk Prediction Over AdaBoost from
VANETs,” 2018 10th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC),
2018, pp. 39-43, doi: 10.1109/IHMSC.2018.10115.
[12] Cheng, N., Lyu, F., Chen, J., Xu, W., Zhou, H., Zhang, S., and Shen, X., “Big data driven vehicular networks,”
IEEE Network, vol. 32, no. 6, pp. 160-167, 2018.
[13] Gawas, Mahadev A., Manas Mulay, and V. Bhatia, “Cross Layer Approach for Neighbor Node Selection in
VANET Routing,” 2018 11th International Symposium on Communication Systems, Networks & Digital Signal
Processing (CSNDSP), 2018, pp. 1-6, doi: 10.1109/CSNDSP.2018.8471840.
9. Int J Elec & Comp Eng ISSN: 2088-8708
Big data traffic management in vehicular ad-hoc network (Tantaoui Mouad)
3491
[14] Al Najada, Hamzah, and Imad Mahgoub., “Big vehicular traffic data mining: Towards accident and congestion
prevention,” 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016,
pp. 256-261, doi: 10.1109/IWCMC.2016.7577067
[15] Alinani, Annadil and Alinani, Karim., “Real-Time Push-Based Data Forwarding for Target Tracking in Vehicular
Named Data Networking,” 2018 IEEE Smart World, Ubiquitous Intelligence & Computing, Advanced & Trusted
Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and
Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), 2018, pp. 1587-1592,
doi: 10.1109/SmartWorld.2018.00272.
[16] M. Arun, and B. Pandey, “Asymmetric encryption based secure and efficient data gathering technique in VANET,”
2017 7th International Conference on Cloud Computing, Data Science and Engineering-Confluence, 2017,
pp. 369-372, doi: 10.1109/CONFLUENCE.2017.7943177.
[17] Xu, W., Zhou, H., Cheng, N., Lyu, F., Shi, W., Chen, J., and Shen, X., “Internet of vehicles in big data era,”
IEEE/CAA Journal of Automatica Sinica, 2017, vol. 5, no. 1, pp. 19-35, doi: 10.1109/JAS.2017.7510736.
[18] Al Najada, Hamzah, and Imad Mahgoub, “Autonomous vehicles safe-optimal trajectory selection based on big data
analysis and predefined user preferences,” 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile
Communication Conference (UEMCON), 2016, pp. 1-6, doi: 10.1109/UEMCON.2016.7777922.
[19] N. Shaik, and P. K. Malik., “A Retrospection of Channel Estimation Techniques for 5G Wireless Communications:
Opportunities and Challenges,” International Journal of Advanced Science and Technology, vol. 29, no. 5,
pp. 8469-8479, 2020.
[20] Xiaoyong, Lu Wei, and Zhang Feng, “History, current status and future of big data management systems,” Journal
of Software, vol. 30, no 1, pp. 127-141, 2019, doi: 10.13328/j.cnki.jos.005644.
[21] Lin, S., Luo, B., Luo, J., Wang, Z., and Wei, Y., “Guizhou Big Data Management System and Key Technology,”
2018 26th Int. Conference on Geoinformatics, pp. 1-7, 2018, doi: 10.1109/GEOINFORMATICS.2018.8557109.
[22] Chen, H. Y., “Design and Realization of a Distributed Big Data Management System,” Advanced Materials
Research, vol. 1030, pp. 1900-1904, 2014, doi:10.4028/www.scientific.net/amr.1030-1032.1900.
[23] Raj, A., and D’Souza, R., “A Review on Hadoop Eco System for Big Data,” International Journal of Scientific
Research in Computer Science, Engineering and Information Technology, 2019, doi: 10.32628/CSEIT195172.
[24] Brunswicker, S., Bertino, E., and Matei, S., “Big data for open digital innovation–a research roadmap,” Big Data
Research, vol. 2, no. 2, pp. 53-58, doi: 10.1016/j.bdr.2015.01.008.
[25] Bukhari, S. S., Park, J., and Shin, D. R., “Hadoop based Demography Big Data Management System,” 2018 19th
IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and
Parallel/Distributed Computing (SNPD), 2018, pp. 93-98, doi:10.1109/snpd.2018.8441032.
[26] Malik, P. K., Wadhwa, D. S. and Khinda, J. S., “A Survey of Device to Device and Cooperative Communication
for the Future Cellular Networks,” Int J Wireless Inf Networks, pp. 1-22, 2020, doi: 10.1007/s10776-020-00482-8.
[27] A. Rahim, P. K. Mallik, V. A. Sankar Ponnapalli., "Fractal Antenna Design for Overtaking on Highways in 5G
Vehicular Communication Ad-hoc Networks Environment," International Journal of Engineering and Advanced
Technology (IJEAT), vol. 9, no. 1S6, 2019, pp 157-160, doi: 10.35940/ijeat.A1031.1291S619.
[28] Ho, Tin Kam, “Random Decision Forests,” Proceedings of 3rd international conference on document analysis and
recognition, 1995, pp. 278-282.
[29] Leo Breiman, “Random Forests,” Machine Learning, vol. 45, no. 1, pp. 5-32, 2001.