SlideShare a Scribd company logo
1 of 4
Download to read offline
International
OPEN ACCESS Journal
Of Modern Engineering Research (IJMER)
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 3 | Mar. 2014 | 65 |
Design Of Hand-Held Alert System Providing Security For
Individuals Using Vehicular Ad-Hoc Network
Sharvika Paliwal1
, Ms. V. N. Katkar2
Department of Computer Science and Engineering G. H. Raisoni Institute of Engineering and Technology for
Women's, Nagpur, Maharashtra, India
I. Introduction
VANETs are the subgroup of MANETs with the distinguishing property that the nodes are vehicles
like cars, trucks, buses and motorcycles. Such systems aim to provide communications between individual
vehicles said as V2V (IVC) and between vehicles and nearby fixed equipment, or roadside units said as
(V2R/V2I). This implies that node movement is restricted by factors like road course, encompassing traffic and
traffic regulations. Because of the restricted node movement it is a feasible assumption that the VANET will be
supported by some fixed infrastructure that assists with some services and can provide access to stationary
networks. The fixed infrastructure will be deployed at critical locations like slip roads, service stations,
dangerous intersections or places well-known for hazardous weather conditions. Thus the goal of VANET, is to
improve traffic safety by providing timely information to drivers and concerned authorities. VANET provides
Inter Vehicular Communication (IVC), Hybrid Vehicle Communication (HVC) and Roadside Vehicle
Communication (RVC). But with respect to project only IVC is beneficial, so that the message of panic area is
given to the other vehicles of that area i.e. the broadcasting of panic or alert message to the vehicles present in
the vicinity of victim.
We have also witnessed a significant increase in the number of attacks on public, in recent years, but
we haven’t yet managed to restrict those attacks. Due to such street attacks on people, it has become difficult for
people to travel safely on roads. To have a helping hand in restricting the attacks, we are introducing a new
concept of “Alarm scheme using VANET protocols for safety applications”. This is executed by using the
electronic devices and new technologies. To implement this concept, in practice, a person has to carry a small
safety unit equipped with RF(Radio Frequency) Communication system and GSM/GPS(Global System for
Mobile/Global Positioning System) services.
Radiofrequency signals are the most widely used means of wireless communication, next to Infrared
light. Unlike infrared light, RF‐signals have advantage in the fact that the signal can travel around obstacles to
reach the destination. RF‐signals allow reliable communications across wide range of distances. Radio
technology is as reliable and almost as inexpensive as Infrared light. The frequency band which is selected for
the worldwide is the available 2.4 GHz (known from Bluetooth and Wi-Fi) and the protocol is based on the
IEEE 802.15.4 standard.
GSM i.e. Global System for Mobile Communications, originally Groupe Spécial Mobile, is a standard
set developed by the ETSI to describe protocols for second generation digital cellular networks used by mobile
phones. The GSM standard was developed for replacing the first generation analog cellular networks, and
originally described a digital circuit-switched network optimized for full duplex voice telephony.
Using GPS (Global Positioning System) and a GPS tracking unit we can determine the precise location
of a vehicle, person, or other asset to which it is attached and to record the position of the asset at regular
Abstract: Vehicular Ad-hoc Network (VANET) and Mobile Ad-hoc Network (MANET) provide a
distinguish approach for Intelligent Transport System (ITS). The existing applications in VANET
provide secure message passing and circulation of data within the range, but there are very few
applications where individual's security is taken into consideration. In new applications we can make
one which provides safety for individuals on road or indirectly related to roads or vehicles. For making
such an application we will be using Radio Frequency (RF) signals, VANET network, GPS and GSM
techniques. RF signals will be generating input signals; vehicles for making an alarm for generated
signals; VANET network to spread the information about panic area to the other vehicles in range; GPS
& GSM to track the location & position of victim and send this information to authorized helping system
respectively. Thus using all above techniques and principles we are designing a scheme which provides
safety using VANET protocols.
Keywords: RF signals; VANET; GSM; GPS.
Design of Hand-held Alert system Providing Security for Individuals using Vehicular Ad-hoc Network
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 3 | Mar. 2014 | 66 |
intervals. The recorded location data can be stored within the tracking unit, or it may be transmitted to a central
location data base, or internet-connected computer, using a cellular GPRS or SMS, radio or satellite modems
embedded in the unit. This allows the asset's location to be displayed against a map backdrop either in real time
or when analyzing the track later, using GPS tracking software.
The problem statement says: VANET provides us with road safety measures, secure message passing,
traffic jam updates, services like e-mail, audio/video sharing and internetworking. But nowhere individual's
security is not taken into consideration, we are designing an alarming system for those individuals using
VANET protocols.
The objectives to overcome the problems are as follows: 1. To create a technique which helps an
individual, who is in non secure state, to communicate to the nearest communicative station, using technologies
and VANET protocols & principles for proper help. 2. Uses a gadget which produces a panic alarm through the
vehicles, using RF signals.
II. Literature Survey
Vaishak P., T. Sivakumar [1], has described in this paper about the efficient network connectivity
because, when data is send from vehicle , it is possible that the track of node or vehicle may change, so for
secure transfer of message a reliable network has to be maintained. Interoperability between VANET module
and WiMAX are possible for achieving reliable network connectivity and for secure data transfer and also to
obtain high end to end ratio. This paper proposes a protocol has been made which constitutes the combination of
WiMAX and VANET technologies. So using this combination we can send message either through WiMax or
VANET module.
Iman M. Almomani, Nour Y. Alkhalil, Enas M. Ahmad and Rania M. Jodeh [2], has described in this
paper about the transferring of data or information or messages via GSM (Global System for Mobile) and
GPRS (General Packet Radio Service) between the vehicles and the internet environment. It also comprises
about the working architectures of vehicle positioning and vehicle tracking using GPS (Global Positioning
System). This system is useful for fleet operators in monitoring driving behavior of employees or parents
monitoring their teen drivers. Moreover, this system can be used in theft prevention as a retrieval device in
addition of working as a security system combined with car alarms. The main contribution of this paper is
providing two types of end user applications, a web application and a mobile application. This way the proposed
system provides a ubiquitous vehicle tracking system with maximum accessibility for the user anytime and
anywhere.
Zongwei Luo, Tianle Zhang and Chunlu Wgan [3], has explained about the architectures using a
mobile relay network or a connected network which is made for a node to node communication, for an
Intelligent Transport System, for the purpose of travelling information. RFID enabled Vehicular Ad hoc
Network (VANET) emerges as an alternative which can leverage mobile nodes to bridge the gap between
information isolated islands often existing in mobile and wireless networks.
Sae Fujii, Atsushi Fujita, Takaaki Umedu Hirozumi Yamaguchi, Teruo Higashino and Shigeru
KanedaandMineo Takai [4], has described in this paper about the vehicle to vehicle communication (V2V),
which is the primary goal of VANET, using GPS services and other communication techniques. The proposed
system operates in a distributed manner and works even if all vehicles nearby do not or cannot participate in the
system. Each vehicle acquires various pieces of positioning information with different degrees of accuracies
depending on the sources and regency of information
Ghassan Samara, Wafaa A.H. Al-Salihy and R. Sures [5], has described in this paper about the security
issues related to VANET. In simple words, the problems and solutions to keep data safe and secure are provided
in this paper, for authenticated message passing. The need for a robust VANET networks is strongly dependent
on their security and privacy features, which will be discussed in this paper. In this paper a various types of
security problems and challenges of VANET been analyzed and discussed; we also discuss a set of solutions
presented to solve these challenges and problems.
Vasilis Verroios, Carmen Ruiz Vicente and Alex Delis [6], In this paper, we propose a broadcasting
protocol that alerts drivers about the presence of moving vehicles demonstrating hazardous driving behavior. In
order to limit the volume of redundant transmissions, our approach selects the vehicles to be responsible for
transmitting the emergency information for a hazardous vehicle. In this context, we provide mechanisms to
create and maintain a chain of transmitters. This chain “covers” the road sections on which a hazardous vehicle
is moving.
Our protocol attempts to increase the probability that an endangered vehicle does obtain timely
information about a hazardous vehicle and reduce the total communication traffic imposed in urban
environments where the vehicles’ density is often high.
Design of Hand-held Alert system Providing Security for Individuals using Vehicular Ad-hoc Network
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 3 | Mar. 2014 | 67 |
III. Proposed Research And Methodology To Be Employed
A. Proposed Research:
The concept of this project mainly focuses on the safety measures of public on streets. Whenever a
person carrying a safety unit with himself is attacked by someone on a street, he has to press the panic button of
the Safety Unit. As soon as the panic button is pressed, a noisy alarm will get activated in the nearby vehicles
with the help of RF Communication. After that, this alarm will also get activated in other vehicles. Here,
VANET Technology is used. Eventually, a message will be sent to the nearby Police station to inform the police
about the incident. The proposed architecture is shown in fig a.
Since a noisy alarm is activated in the vehicles, the driver of the vehicle will stop the vehicle and check
for the fault. Due to this, automatically, a crowd will be created and attention will be gathered towards the
happening incident. Also with the help of GPS system, police can locate the victim and help him in the best way
they can. Because of all these actions, the attacker might get caught and the motive of restricting the attacks can
be achieved at a certain extent.
B. Proposed Methodology:
In the research methodology we will consider the following steps for complete working of application:
Step1: Communication between gadget and first vehicle will be done using RF signaling technique; out of four
switches, when any of the switch is triggered, the safety alarm of nearest vehicle get's activated, the signal
reaches till vehicle using RF signals
Step2: The position of victim will be located using GPS of the nearest vehicle whose safety alarm was
generated; the location of alarming vehicle is obtained, so that the area of troubled person is noted.
Step3: Communication between vehicle to vehicle i.e. V2V will be done using VANET technique; this is
required to circulate the message of panic situation to the vehicles who are in range and can help.
Step4: Communication between vehicle and authorized help like police will be done via GSM technology;
when the switch is triggered by person at that same time the message is given to the authorized helping station
using GSM technology.
IV. Expected Outcome
This paper helps in proposing a new methodology for designing an alarming system for individuals on
roadside or in vehicles using the RF technology and VANET system for making the alarm work. The sending of
messages to the authorized station via the GSM network and also locating the victim's area with the help of the
alarming vehicle. In future we will work with the GPS to locate the exact position and location of victim and
VANET communication for communicating with the nearby vehicles present in the range of victim's gadget.
This paper concentrates on the public safety measures using electronic gadgets. This concept includes new
invented technologies such as VANET which proves advantageous to the system. This paper also covers the
literature survey of all the technologies involved in the system.
Design of Hand-held Alert system Providing Security for Individuals using Vehicular Ad-hoc Network
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 3 | Mar. 2014 | 68 |
REFERENCES
[1] Vaishak.P, T.Sivakumar, "An Efficient Routing Protocol for Minimizing Multi-hop in VANET using WiMAX " ,
International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013, ISSN 2229-5518.
[2] Iman M. Almomani, Nour Y. Alkhalil, Enas M. Ahmad and Rania M. Jodeh, "Ubiquitous GPS Vehicle Tracking and
Management System", IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies
(AEECT), 2011.
[3] Zongwei Luo, Tianle Zhang and Chunlu Wgan, "RFID Enabled Vehicular Wireless Query for Travel Information in
Intelligent Transportation System", IEEE International Conference on RFID-Technologies and Applications, 2011.
[4] Sae Fujii, Atsushi Fujita, Takaaki Umedu Hirozumi Yamaguchi, Teruo Higashino, Shigeru KanedaandMineo Takai,
"Cooperative Vehicle Positioning via V2V Communications and Onboard Sensors", IEEE 2011.
[5] Ghassan Samara, Wafaa A.H. Al-Salihy and R. Sures, "Security Analysis of Vehicular Ad Hoc Networks", Second
International Conference on Network Applications, Protocols and Services, 2010.
[6] Vasilis Verroios, Carmen Ruiz Vicente and Alex Delis, "Alerting for Vehicles Demonstrating Hazardous Driving
Behavior", MobiDE ’12, Scottsdale, Arizona, USA, 2012 ACM 978-1- 4503-1442-8/12/05.

More Related Content

What's hot

Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
 
A review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networksA review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networksjournalBEEI
 
Various Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANETVarious Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANETKishan Patel
 
A Framework for Incident Detection And Notification in Vehicular Ad Hoc Networks
A Framework for Incident Detection And Notification in Vehicular Ad Hoc NetworksA Framework for Incident Detection And Notification in Vehicular Ad Hoc Networks
A Framework for Incident Detection And Notification in Vehicular Ad Hoc NetworksMichele Weigle
 
Towards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular NetworksTowards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular NetworksTELKOMNIKA JOURNAL
 
V2V Training, Vehicle to-vehicle (v2v) communications training
V2V Training, Vehicle to-vehicle (v2v) communications trainingV2V Training, Vehicle to-vehicle (v2v) communications training
V2V Training, Vehicle to-vehicle (v2v) communications trainingBryan Len
 
1102060,1102073,1102083
1102060,1102073,11020831102060,1102073,1102083
1102060,1102073,1102083Maksuda Mou
 
Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Ashok Mishra
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
 
vechile to vechile communication
vechile to vechile communicationvechile to vechile communication
vechile to vechile communicationSangita Das
 
VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs PresentationiQra Rafaqat
 
Providing Location Security in Vehicular Networks
Providing Location Security in Vehicular NetworksProviding Location Security in Vehicular Networks
Providing Location Security in Vehicular NetworksMichele Weigle
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET Journal
 

What's hot (20)

Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
 
A review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networksA review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networks
 
VEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOKVEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOK
 
Various Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANETVarious Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANET
 
VANET Clustering Survey
VANET Clustering SurveyVANET Clustering Survey
VANET Clustering Survey
 
A Framework for Incident Detection And Notification in Vehicular Ad Hoc Networks
A Framework for Incident Detection And Notification in Vehicular Ad Hoc NetworksA Framework for Incident Detection And Notification in Vehicular Ad Hoc Networks
A Framework for Incident Detection And Notification in Vehicular Ad Hoc Networks
 
Towards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular NetworksTowards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular Networks
 
V2V Training, Vehicle to-vehicle (v2v) communications training
V2V Training, Vehicle to-vehicle (v2v) communications trainingV2V Training, Vehicle to-vehicle (v2v) communications training
V2V Training, Vehicle to-vehicle (v2v) communications training
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 
1102060,1102073,1102083
1102060,1102073,11020831102060,1102073,1102083
1102060,1102073,1102083
 
Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication System
 
vechile to vechile communication
vechile to vechile communicationvechile to vechile communication
vechile to vechile communication
 
Issues of routing in vanet
Issues of routing in vanetIssues of routing in vanet
Issues of routing in vanet
 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568
 
VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs Presentation
 
Jh2516461655
Jh2516461655Jh2516461655
Jh2516461655
 
Providing Location Security in Vehicular Networks
Providing Location Security in Vehicular NetworksProviding Location Security in Vehicular Networks
Providing Location Security in Vehicular Networks
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
 

Viewers also liked

Image Denoising Based On Wavelet for Satellite Imagery: A Review
Image Denoising Based On Wavelet for Satellite Imagery: A  ReviewImage Denoising Based On Wavelet for Satellite Imagery: A  Review
Image Denoising Based On Wavelet for Satellite Imagery: A ReviewIJMER
 
Prediction of Deflection and Stresses of Laminated Composite Plate with Arti...
Prediction of Deflection and Stresses of Laminated Composite  Plate with Arti...Prediction of Deflection and Stresses of Laminated Composite  Plate with Arti...
Prediction of Deflection and Stresses of Laminated Composite Plate with Arti...IJMER
 
Performance of MMSE Denoise Signal Using LS-MMSE Technique
Performance of MMSE Denoise Signal Using LS-MMSE  TechniquePerformance of MMSE Denoise Signal Using LS-MMSE  Technique
Performance of MMSE Denoise Signal Using LS-MMSE TechniqueIJMER
 
Application of Neural Network for Cell Formation in Group Technology
Application of Neural Network for Cell Formation in Group  TechnologyApplication of Neural Network for Cell Formation in Group  Technology
Application of Neural Network for Cell Formation in Group TechnologyIJMER
 
Heavy Mineral Studies of Beach Sands of Vagathor, North Goa, India
Heavy Mineral Studies of Beach Sands of Vagathor, North Goa,  IndiaHeavy Mineral Studies of Beach Sands of Vagathor, North Goa,  India
Heavy Mineral Studies of Beach Sands of Vagathor, North Goa, IndiaIJMER
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingIJMER
 
Worker Scheduling for Maintenance Modeling Software
Worker Scheduling for Maintenance Modeling SoftwareWorker Scheduling for Maintenance Modeling Software
Worker Scheduling for Maintenance Modeling SoftwareIJMER
 
Effect of artificial roughness on Thermal and Thermohydraulic efficiency in R...
Effect of artificial roughness on Thermal and Thermohydraulic efficiency in R...Effect of artificial roughness on Thermal and Thermohydraulic efficiency in R...
Effect of artificial roughness on Thermal and Thermohydraulic efficiency in R...IJMER
 
A Novel High Performance H-Bridge Converter Topology for 8/6 pole SRM Drive
A Novel High Performance H-Bridge Converter Topology for 8/6  pole SRM DriveA Novel High Performance H-Bridge Converter Topology for 8/6  pole SRM Drive
A Novel High Performance H-Bridge Converter Topology for 8/6 pole SRM DriveIJMER
 
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...IJMER
 
Feature Extraction from the Satellite Image Gray Color and Knowledge Discove...
Feature Extraction from the Satellite Image Gray Color and  Knowledge Discove...Feature Extraction from the Satellite Image Gray Color and  Knowledge Discove...
Feature Extraction from the Satellite Image Gray Color and Knowledge Discove...IJMER
 
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D Cubic Enclosure
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D  Cubic EnclosureCFD Analysis of Heat Transfer and Flow Characteristics in A 3D  Cubic Enclosure
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D Cubic EnclosureIJMER
 
Study of Local Binary Pattern for Partial Fingerprint Identification
Study of Local Binary Pattern for Partial Fingerprint  IdentificationStudy of Local Binary Pattern for Partial Fingerprint  Identification
Study of Local Binary Pattern for Partial Fingerprint IdentificationIJMER
 
SISO MMSE-PIC detector in MIMO-OFDM systems
SISO MMSE-PIC detector in MIMO-OFDM systemsSISO MMSE-PIC detector in MIMO-OFDM systems
SISO MMSE-PIC detector in MIMO-OFDM systemsIJMER
 
Calculating Voltage Instability Using Index Analysis in Radial Distribution ...
Calculating Voltage Instability Using Index Analysis in Radial  Distribution ...Calculating Voltage Instability Using Index Analysis in Radial  Distribution ...
Calculating Voltage Instability Using Index Analysis in Radial Distribution ...IJMER
 
Ac32618621
Ac32618621Ac32618621
Ac32618621IJMER
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...IJMER
 
Amulti-Agent Architecture for a Co-Modal Transport System
Amulti-Agent Architecture for a Co-Modal Transport SystemAmulti-Agent Architecture for a Co-Modal Transport System
Amulti-Agent Architecture for a Co-Modal Transport SystemIJMER
 
Data Mining Techniques in Higher Education an Empirical Study for the Univer...
Data Mining Techniques in Higher Education an Empirical Study  for the Univer...Data Mining Techniques in Higher Education an Empirical Study  for the Univer...
Data Mining Techniques in Higher Education an Empirical Study for the Univer...IJMER
 

Viewers also liked (20)

Image Denoising Based On Wavelet for Satellite Imagery: A Review
Image Denoising Based On Wavelet for Satellite Imagery: A  ReviewImage Denoising Based On Wavelet for Satellite Imagery: A  Review
Image Denoising Based On Wavelet for Satellite Imagery: A Review
 
Prediction of Deflection and Stresses of Laminated Composite Plate with Arti...
Prediction of Deflection and Stresses of Laminated Composite  Plate with Arti...Prediction of Deflection and Stresses of Laminated Composite  Plate with Arti...
Prediction of Deflection and Stresses of Laminated Composite Plate with Arti...
 
Performance of MMSE Denoise Signal Using LS-MMSE Technique
Performance of MMSE Denoise Signal Using LS-MMSE  TechniquePerformance of MMSE Denoise Signal Using LS-MMSE  Technique
Performance of MMSE Denoise Signal Using LS-MMSE Technique
 
Application of Neural Network for Cell Formation in Group Technology
Application of Neural Network for Cell Formation in Group  TechnologyApplication of Neural Network for Cell Formation in Group  Technology
Application of Neural Network for Cell Formation in Group Technology
 
Heavy Mineral Studies of Beach Sands of Vagathor, North Goa, India
Heavy Mineral Studies of Beach Sands of Vagathor, North Goa,  IndiaHeavy Mineral Studies of Beach Sands of Vagathor, North Goa,  India
Heavy Mineral Studies of Beach Sands of Vagathor, North Goa, India
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
Worker Scheduling for Maintenance Modeling Software
Worker Scheduling for Maintenance Modeling SoftwareWorker Scheduling for Maintenance Modeling Software
Worker Scheduling for Maintenance Modeling Software
 
Effect of artificial roughness on Thermal and Thermohydraulic efficiency in R...
Effect of artificial roughness on Thermal and Thermohydraulic efficiency in R...Effect of artificial roughness on Thermal and Thermohydraulic efficiency in R...
Effect of artificial roughness on Thermal and Thermohydraulic efficiency in R...
 
A Novel High Performance H-Bridge Converter Topology for 8/6 pole SRM Drive
A Novel High Performance H-Bridge Converter Topology for 8/6  pole SRM DriveA Novel High Performance H-Bridge Converter Topology for 8/6  pole SRM Drive
A Novel High Performance H-Bridge Converter Topology for 8/6 pole SRM Drive
 
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
 
Feature Extraction from the Satellite Image Gray Color and Knowledge Discove...
Feature Extraction from the Satellite Image Gray Color and  Knowledge Discove...Feature Extraction from the Satellite Image Gray Color and  Knowledge Discove...
Feature Extraction from the Satellite Image Gray Color and Knowledge Discove...
 
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D Cubic Enclosure
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D  Cubic EnclosureCFD Analysis of Heat Transfer and Flow Characteristics in A 3D  Cubic Enclosure
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D Cubic Enclosure
 
Study of Local Binary Pattern for Partial Fingerprint Identification
Study of Local Binary Pattern for Partial Fingerprint  IdentificationStudy of Local Binary Pattern for Partial Fingerprint  Identification
Study of Local Binary Pattern for Partial Fingerprint Identification
 
SISO MMSE-PIC detector in MIMO-OFDM systems
SISO MMSE-PIC detector in MIMO-OFDM systemsSISO MMSE-PIC detector in MIMO-OFDM systems
SISO MMSE-PIC detector in MIMO-OFDM systems
 
Calculating Voltage Instability Using Index Analysis in Radial Distribution ...
Calculating Voltage Instability Using Index Analysis in Radial  Distribution ...Calculating Voltage Instability Using Index Analysis in Radial  Distribution ...
Calculating Voltage Instability Using Index Analysis in Radial Distribution ...
 
Ac32618621
Ac32618621Ac32618621
Ac32618621
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
 
Amulti-Agent Architecture for a Co-Modal Transport System
Amulti-Agent Architecture for a Co-Modal Transport SystemAmulti-Agent Architecture for a Co-Modal Transport System
Amulti-Agent Architecture for a Co-Modal Transport System
 
Data Mining Techniques in Higher Education an Empirical Study for the Univer...
Data Mining Techniques in Higher Education an Empirical Study  for the Univer...Data Mining Techniques in Higher Education an Empirical Study  for the Univer...
Data Mining Techniques in Higher Education an Empirical Study for the Univer...
 

Similar to Hand-Held Alert System Using VANET Protocols

Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc NetworkDeterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Networkpaperpublications3
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
 
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATIONA GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATIONRK CONSULTANCY SERVICES
 
Communications in Vehicular networks
Communications in Vehicular networksCommunications in Vehicular networks
Communications in Vehicular networksDaisyWatson5
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and HashingPallavi Agarwal
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
 
Way to green intelligent traffic control with vanet
Way to green intelligent traffic control with vanetWay to green intelligent traffic control with vanet
Way to green intelligent traffic control with vanetIAEME Publication
 
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An AnalysisChallenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An Analysisidescitation
 
Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...IJERA Editor
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Dr. Amarjeet Singh
 
Vehicular adhoc network for communication
Vehicular adhoc network for communicationVehicular adhoc network for communication
Vehicular adhoc network for communicationathirayanpericse
 
Differential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsDifferential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsIJCSIS Research Publications
 

Similar to Hand-Held Alert System Using VANET Protocols (20)

Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc NetworkDeterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
 
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATIONA GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
A GRID VEHICULAR NODE LOCALIZATION SYSTEM VANET WITH LINER ERROR PROPAGATION
 
Communications in Vehicular networks
Communications in Vehicular networksCommunications in Vehicular networks
Communications in Vehicular networks
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
 
Jn2416531655
Jn2416531655Jn2416531655
Jn2416531655
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
 
Way to green intelligent traffic control with vanet
Way to green intelligent traffic control with vanetWay to green intelligent traffic control with vanet
Way to green intelligent traffic control with vanet
 
Jh2516461655
Jh2516461655Jh2516461655
Jh2516461655
 
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An AnalysisChallenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
 
Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
 
Vehicular adhoc network for communication
Vehicular adhoc network for communicationVehicular adhoc network for communication
Vehicular adhoc network for communication
 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 
Differential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsDifferential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETs
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 

Hand-Held Alert System Using VANET Protocols

  • 1. International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 3 | Mar. 2014 | 65 | Design Of Hand-Held Alert System Providing Security For Individuals Using Vehicular Ad-Hoc Network Sharvika Paliwal1 , Ms. V. N. Katkar2 Department of Computer Science and Engineering G. H. Raisoni Institute of Engineering and Technology for Women's, Nagpur, Maharashtra, India I. Introduction VANETs are the subgroup of MANETs with the distinguishing property that the nodes are vehicles like cars, trucks, buses and motorcycles. Such systems aim to provide communications between individual vehicles said as V2V (IVC) and between vehicles and nearby fixed equipment, or roadside units said as (V2R/V2I). This implies that node movement is restricted by factors like road course, encompassing traffic and traffic regulations. Because of the restricted node movement it is a feasible assumption that the VANET will be supported by some fixed infrastructure that assists with some services and can provide access to stationary networks. The fixed infrastructure will be deployed at critical locations like slip roads, service stations, dangerous intersections or places well-known for hazardous weather conditions. Thus the goal of VANET, is to improve traffic safety by providing timely information to drivers and concerned authorities. VANET provides Inter Vehicular Communication (IVC), Hybrid Vehicle Communication (HVC) and Roadside Vehicle Communication (RVC). But with respect to project only IVC is beneficial, so that the message of panic area is given to the other vehicles of that area i.e. the broadcasting of panic or alert message to the vehicles present in the vicinity of victim. We have also witnessed a significant increase in the number of attacks on public, in recent years, but we haven’t yet managed to restrict those attacks. Due to such street attacks on people, it has become difficult for people to travel safely on roads. To have a helping hand in restricting the attacks, we are introducing a new concept of “Alarm scheme using VANET protocols for safety applications”. This is executed by using the electronic devices and new technologies. To implement this concept, in practice, a person has to carry a small safety unit equipped with RF(Radio Frequency) Communication system and GSM/GPS(Global System for Mobile/Global Positioning System) services. Radiofrequency signals are the most widely used means of wireless communication, next to Infrared light. Unlike infrared light, RF‐signals have advantage in the fact that the signal can travel around obstacles to reach the destination. RF‐signals allow reliable communications across wide range of distances. Radio technology is as reliable and almost as inexpensive as Infrared light. The frequency band which is selected for the worldwide is the available 2.4 GHz (known from Bluetooth and Wi-Fi) and the protocol is based on the IEEE 802.15.4 standard. GSM i.e. Global System for Mobile Communications, originally Groupe Spécial Mobile, is a standard set developed by the ETSI to describe protocols for second generation digital cellular networks used by mobile phones. The GSM standard was developed for replacing the first generation analog cellular networks, and originally described a digital circuit-switched network optimized for full duplex voice telephony. Using GPS (Global Positioning System) and a GPS tracking unit we can determine the precise location of a vehicle, person, or other asset to which it is attached and to record the position of the asset at regular Abstract: Vehicular Ad-hoc Network (VANET) and Mobile Ad-hoc Network (MANET) provide a distinguish approach for Intelligent Transport System (ITS). The existing applications in VANET provide secure message passing and circulation of data within the range, but there are very few applications where individual's security is taken into consideration. In new applications we can make one which provides safety for individuals on road or indirectly related to roads or vehicles. For making such an application we will be using Radio Frequency (RF) signals, VANET network, GPS and GSM techniques. RF signals will be generating input signals; vehicles for making an alarm for generated signals; VANET network to spread the information about panic area to the other vehicles in range; GPS & GSM to track the location & position of victim and send this information to authorized helping system respectively. Thus using all above techniques and principles we are designing a scheme which provides safety using VANET protocols. Keywords: RF signals; VANET; GSM; GPS.
  • 2. Design of Hand-held Alert system Providing Security for Individuals using Vehicular Ad-hoc Network | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 3 | Mar. 2014 | 66 | intervals. The recorded location data can be stored within the tracking unit, or it may be transmitted to a central location data base, or internet-connected computer, using a cellular GPRS or SMS, radio or satellite modems embedded in the unit. This allows the asset's location to be displayed against a map backdrop either in real time or when analyzing the track later, using GPS tracking software. The problem statement says: VANET provides us with road safety measures, secure message passing, traffic jam updates, services like e-mail, audio/video sharing and internetworking. But nowhere individual's security is not taken into consideration, we are designing an alarming system for those individuals using VANET protocols. The objectives to overcome the problems are as follows: 1. To create a technique which helps an individual, who is in non secure state, to communicate to the nearest communicative station, using technologies and VANET protocols & principles for proper help. 2. Uses a gadget which produces a panic alarm through the vehicles, using RF signals. II. Literature Survey Vaishak P., T. Sivakumar [1], has described in this paper about the efficient network connectivity because, when data is send from vehicle , it is possible that the track of node or vehicle may change, so for secure transfer of message a reliable network has to be maintained. Interoperability between VANET module and WiMAX are possible for achieving reliable network connectivity and for secure data transfer and also to obtain high end to end ratio. This paper proposes a protocol has been made which constitutes the combination of WiMAX and VANET technologies. So using this combination we can send message either through WiMax or VANET module. Iman M. Almomani, Nour Y. Alkhalil, Enas M. Ahmad and Rania M. Jodeh [2], has described in this paper about the transferring of data or information or messages via GSM (Global System for Mobile) and GPRS (General Packet Radio Service) between the vehicles and the internet environment. It also comprises about the working architectures of vehicle positioning and vehicle tracking using GPS (Global Positioning System). This system is useful for fleet operators in monitoring driving behavior of employees or parents monitoring their teen drivers. Moreover, this system can be used in theft prevention as a retrieval device in addition of working as a security system combined with car alarms. The main contribution of this paper is providing two types of end user applications, a web application and a mobile application. This way the proposed system provides a ubiquitous vehicle tracking system with maximum accessibility for the user anytime and anywhere. Zongwei Luo, Tianle Zhang and Chunlu Wgan [3], has explained about the architectures using a mobile relay network or a connected network which is made for a node to node communication, for an Intelligent Transport System, for the purpose of travelling information. RFID enabled Vehicular Ad hoc Network (VANET) emerges as an alternative which can leverage mobile nodes to bridge the gap between information isolated islands often existing in mobile and wireless networks. Sae Fujii, Atsushi Fujita, Takaaki Umedu Hirozumi Yamaguchi, Teruo Higashino and Shigeru KanedaandMineo Takai [4], has described in this paper about the vehicle to vehicle communication (V2V), which is the primary goal of VANET, using GPS services and other communication techniques. The proposed system operates in a distributed manner and works even if all vehicles nearby do not or cannot participate in the system. Each vehicle acquires various pieces of positioning information with different degrees of accuracies depending on the sources and regency of information Ghassan Samara, Wafaa A.H. Al-Salihy and R. Sures [5], has described in this paper about the security issues related to VANET. In simple words, the problems and solutions to keep data safe and secure are provided in this paper, for authenticated message passing. The need for a robust VANET networks is strongly dependent on their security and privacy features, which will be discussed in this paper. In this paper a various types of security problems and challenges of VANET been analyzed and discussed; we also discuss a set of solutions presented to solve these challenges and problems. Vasilis Verroios, Carmen Ruiz Vicente and Alex Delis [6], In this paper, we propose a broadcasting protocol that alerts drivers about the presence of moving vehicles demonstrating hazardous driving behavior. In order to limit the volume of redundant transmissions, our approach selects the vehicles to be responsible for transmitting the emergency information for a hazardous vehicle. In this context, we provide mechanisms to create and maintain a chain of transmitters. This chain “covers” the road sections on which a hazardous vehicle is moving. Our protocol attempts to increase the probability that an endangered vehicle does obtain timely information about a hazardous vehicle and reduce the total communication traffic imposed in urban environments where the vehicles’ density is often high.
  • 3. Design of Hand-held Alert system Providing Security for Individuals using Vehicular Ad-hoc Network | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 3 | Mar. 2014 | 67 | III. Proposed Research And Methodology To Be Employed A. Proposed Research: The concept of this project mainly focuses on the safety measures of public on streets. Whenever a person carrying a safety unit with himself is attacked by someone on a street, he has to press the panic button of the Safety Unit. As soon as the panic button is pressed, a noisy alarm will get activated in the nearby vehicles with the help of RF Communication. After that, this alarm will also get activated in other vehicles. Here, VANET Technology is used. Eventually, a message will be sent to the nearby Police station to inform the police about the incident. The proposed architecture is shown in fig a. Since a noisy alarm is activated in the vehicles, the driver of the vehicle will stop the vehicle and check for the fault. Due to this, automatically, a crowd will be created and attention will be gathered towards the happening incident. Also with the help of GPS system, police can locate the victim and help him in the best way they can. Because of all these actions, the attacker might get caught and the motive of restricting the attacks can be achieved at a certain extent. B. Proposed Methodology: In the research methodology we will consider the following steps for complete working of application: Step1: Communication between gadget and first vehicle will be done using RF signaling technique; out of four switches, when any of the switch is triggered, the safety alarm of nearest vehicle get's activated, the signal reaches till vehicle using RF signals Step2: The position of victim will be located using GPS of the nearest vehicle whose safety alarm was generated; the location of alarming vehicle is obtained, so that the area of troubled person is noted. Step3: Communication between vehicle to vehicle i.e. V2V will be done using VANET technique; this is required to circulate the message of panic situation to the vehicles who are in range and can help. Step4: Communication between vehicle and authorized help like police will be done via GSM technology; when the switch is triggered by person at that same time the message is given to the authorized helping station using GSM technology. IV. Expected Outcome This paper helps in proposing a new methodology for designing an alarming system for individuals on roadside or in vehicles using the RF technology and VANET system for making the alarm work. The sending of messages to the authorized station via the GSM network and also locating the victim's area with the help of the alarming vehicle. In future we will work with the GPS to locate the exact position and location of victim and VANET communication for communicating with the nearby vehicles present in the range of victim's gadget. This paper concentrates on the public safety measures using electronic gadgets. This concept includes new invented technologies such as VANET which proves advantageous to the system. This paper also covers the literature survey of all the technologies involved in the system.
  • 4. Design of Hand-held Alert system Providing Security for Individuals using Vehicular Ad-hoc Network | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 3 | Mar. 2014 | 68 | REFERENCES [1] Vaishak.P, T.Sivakumar, "An Efficient Routing Protocol for Minimizing Multi-hop in VANET using WiMAX " , International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013, ISSN 2229-5518. [2] Iman M. Almomani, Nour Y. Alkhalil, Enas M. Ahmad and Rania M. Jodeh, "Ubiquitous GPS Vehicle Tracking and Management System", IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), 2011. [3] Zongwei Luo, Tianle Zhang and Chunlu Wgan, "RFID Enabled Vehicular Wireless Query for Travel Information in Intelligent Transportation System", IEEE International Conference on RFID-Technologies and Applications, 2011. [4] Sae Fujii, Atsushi Fujita, Takaaki Umedu Hirozumi Yamaguchi, Teruo Higashino, Shigeru KanedaandMineo Takai, "Cooperative Vehicle Positioning via V2V Communications and Onboard Sensors", IEEE 2011. [5] Ghassan Samara, Wafaa A.H. Al-Salihy and R. Sures, "Security Analysis of Vehicular Ad Hoc Networks", Second International Conference on Network Applications, Protocols and Services, 2010. [6] Vasilis Verroios, Carmen Ruiz Vicente and Alex Delis, "Alerting for Vehicles Demonstrating Hazardous Driving Behavior", MobiDE ’12, Scottsdale, Arizona, USA, 2012 ACM 978-1- 4503-1442-8/12/05.