scholarly journals LoRa-Based Traffic Flow Detection for Smart-Road

Sensors ◽  
2021 ◽  
Vol 21 (2) ◽  
pp. 338
Author(s):  
David Asiain ◽  
Diego Antolín

This paper presents a wireless traffic flow detection system, mainly focused on conditions in which the traffic flow is slow or stopped, which increases the risk of highway accidents. To achieve this goal, a Low Power Wide Area Network (LPWAN) based on LoRa called Short LoRa has been developed. This LoRa sub-network complies with the European Telecommunications Standards Institute (ETSI) harmonized standard for its compatibility in Europe countries. In addition, the development of the devices has allowed them to also work on a LoRaWAN network. The introduced development has been compared to a reference system mounted with laser barriers that provided a high accurate comparison. Field tests of the system have been carried out and the data obtained in the measurement has been analyzed with two different methods, and both of them were valid for the application. The results can determine vehicle speed with adequate precision at low speeds. The attenuating behavior of the communication signal is also analyzed through the Radio Signal Strength Indicator (RSSI). The relationship between vehicle speed, gate distances and RSSI attenuation has been studied. The system is proven to have efficient results in detecting traffic flow under the conditions for which it has been developed.

2020 ◽  
Vol 17 (7) ◽  
pp. 2876-2881
Author(s):  
Xingguo Cheng ◽  
Chaomeng Chen

In terms of current issues that the sensor’s output signal drifts along with the surrounding strong magnetic field by using the single or dual-axis analog anisotropic magnetoresistive (AMR) sensor in the traffic flow detection, a traffic flow detection system based on ZigBee wireless sensor network is developed and a novel approach by exercising the new digital three-axis AMR sensor to detect the traffic flow is proposed to solve these issues as mentioned above. Using Single Chip Microcomputer (SCM) control technique and utilizing wireless transmitting, an effective algorithm is designed. The algorithm makes it possible to classify vehicle, calculate vehicle speed and count vehicle, in the meantime it provides a reliable and efficient method to collect intelligent transportation data. Even more important, the algorithm has a statistical functions based on MATLAB. The experimental result shows that the novel method has much better measurement accuracy, reliability and redundancy than single or dual-axis method.


IARJSET ◽  
2016 ◽  
Vol 3 (10) ◽  
pp. 60-63 ◽  
Author(s):  
Liu Jun-Fei ◽  
Wu Jian-Zhen ◽  
Li Hong-Qin

Sensors ◽  
2021 ◽  
Vol 21 (10) ◽  
pp. 3568
Author(s):  
Penghui Li ◽  
Xianliang Jiang ◽  
Jiahua Zhu ◽  
Guang Jin

The increase in network applications diversity and different service quality requirements lead to service differentiation, making it more important than ever. In Wide Area Network (WAN), the non-responsive Long-Term Fast (LTF) flows are the main contributors to network congestion. Therefore, detecting and suppressing non-responsive LTF flows represent one of the key points for providing data transmission with controllable delay and service differentiation. However, the existing single-queue management algorithms are designed to serve only a small number of applications with similar requirements (low latency, high throughput, etc.). The lack of mechanisms to distinguish different traffic makes it difficult to implement differentiated services. This paper proposes an active queue management scheme, namely, SQM-LRU, which realizes service differentiation based on Shadow Queue (SQ) and improved Least-Recently-Used (LRU) strategy. The algorithm consists of three essential components: First, the flow detection module is based on the SQ and improved LRU. This module is used to detect non-responsive LTF flows. Second, different flows will be put into corresponding high or low priority sub-queues depending on the flow detection results. Third, the dual-queue adopts CoDel and RED, respectively, to manage packets. SQM-LRU intends to satisfy the stringent delay requirements of responsive flow while maximizing the throughput of non-responsive LTF flow. Our simulation results show that SQM-LRU outperforms traditional solutions with significant improvement in flow detection and reduces the delay, jitter, and Flow Completion Time (FCT) of responsive flow. As a result, it reduced the FCT by up to 50% and attained 95% of the link utilization. Additionally, the low overhead and the operations incur O(1) cost per packet, making it practical for the real network.


Author(s):  
Manuel Mogollon

Virtual private networks (VPN) and IPsec are discussed in this chapter. A VPN emulates a private wide area network (WAN) facility using IP networks, such as the public Internet or private IP backbones. When VPNs are used, the Internet offers the appearance, functionality, and usefulness of a dedicated private network. One of the problems in using the Internet as a WAN is that the Internet is a public network and has relatively little security. IPsec provides the following security services to VPNs: data origin authentication, access control, confidentiality (encryption), connectionless integrity, rejection of replayed packets (a form of partial sequence integrity), and limited traffic flow confidentiality.


Author(s):  
Alberto Alvarellos González ◽  
Juan Rabuñal Dopico

Wave overtopping is a dangerous phenomenon that, in a port environment, takes place when waves that are higher than the port's breakwater meet it and water passes over the structure. This event can lead to property damage or physical harm to port workers. It is difficult to detect an overtopping, so this chapter proposes a solution to the overtopping detection problem by describing the design and development of a system that can detect an overtopping event in real-time and in a real environment. To achieve this goal, the proposed overtopping detection system is based on devices that use ultrasonic ranging sensors and communicate using the Sigfox low-power wide-area network, together with a backend that processes the data the devices send, issuing alerts to inform the interested parties that an overtopping took place.


2014 ◽  
Vol 945-949 ◽  
pp. 3291-3295 ◽  
Author(s):  
Zan Song ◽  
Qing Ye

A road traffic flow detection system is designed based on induction loop, and the control platform is constructed based on the most advanced 32-bit ARM processor and CPLD. The systems hardware framework and software design process are introduced in this paper. The defects of traditional system such as deficient processing capacity and low measurement accuracy are overcome. In this system the data of the frequency change caused by the vehicles through the coil is collected, and the function of vehicles type classification in real-time is added, which is a great improvement compared to traditional induction loop detection system of vehicles.


2018 ◽  
Vol 1 (1) ◽  
Author(s):  
Hongyan Han

The 21st century is the information age, information has become an important strategic resource for social development, social information has become the development trend of the world today and the core, and information security in the information society will play a very important role. With the continuous development of computer networks, global information has become the trend of human development. However, because the computer network has the form of connection diversity, terminal distribution inhomogeneity and network openness, interconnection and other characteristics, resulting in the network vulnerable to hackers, malware and other malicious attacks, the former will cause unpredictable impact on the user , While the latter often causes the system to crash. Whether in the local area network or in the wide area network, there are natural and man-made and many other factors of vulnerability and potential threats. Therefore, the network security measures should be able to all aspects of a variety of threats and vulnerabilities, so as to ensure the confidentiality of network information, integrity and availability.  A t t h e beginning of this article, the beginning of this article, through the analysis of hacker behavior and typical attacks, summarizes the inevitable reasons for the existence of network security vulnerabilities, and summarizes the status of computer network security, as well as the specifi c concepts, classifi cation and limitations of vulnerability scanning technology. The focus of this paper is to improve the original system of the theme module, and the original system to add some features to make it more perfect function. Finally, the shortcomings of the system and some suggestions for further improvement and expansion are put forward.


Author(s):  
Dmitriy Nemchinov

The article presents an analysis of positive practices for ensuring the safety of pedestrians at the inter-section of the city streets carriageway, as well as a description of some innovations of regulatory and tech-nical documents, including an increased number of cases when a safety island can be arranged at a pedestri-an crossing. requirements for providing visibility at a pedestrian crossing to determine the minimum distance of visibility at a pedestrian crossing based on the time required pedestrians for crossing the roadway, recommended options for using ground unregulated pedestrian crossings on trapezoidal artificial irregularities according to GOST R 52605; traffic flow) and Z-shaped (also in the direction of the traffic flow), the requirements for the size of the securi-ty island have been established to allow put bicycle inside of safety island, a recommended set of measures to reduce the vehicle speed and describes the types of activities and describes a method of their application, describes methods zones device with reduced travel speed - residential and school zones, set requirements for turboroundabouts and methods of their design.


Sign in / Sign up

Export Citation Format

Share Document