SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
International Journal of Engineering Science Invention
ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726
www.ijesi.org Volume 2 Issue 12 ǁ December. 2013 ǁ PP.23-27

Traffic Detection Algorithm Using In Extended Floating Car
Data System Improve the Detection Rate and Level of Services
V.MAHESHKUMAR, L.DEVI, K.KAVITHA
Software Engineer, India
Assistant Professor / Computer Science and Engineering, India
Assistant Professor / Information Technology,, India.

1

ABSTRACT: In Controller area Networks (CANs), authentication is a crucial security requirement to avoid
attacks to both inter-vehicle and vehicle-roadside communication. Vehicles have to be prevented from the
misuse of their private data and the attacks on their privacy. This paper presents the results of a set of extensive
experiments carried out under both daytime and nighttime real traffic conditions. The data were captured using
an enhanced or extended Floating Car Data system (xFCD) that includes a stereo vision sensor for detecting
the local traffic ahead. In this paper, we investigate the authentication and privacy issues in CANs. In this
architecture vehicles are dynamically clustered according to different related metrics from these clusters, a
minimum number of vehicles, equipped with IEEE 802.11 are selected as vehicular gateways to link CAN.
Issues pertaining to gateway selection, gateway advertisement and discovery, service migration between
gateways when exchanging messages between vehicles, there are network issues that must be addressed,
including the hidden terminal problem, high density, high node mobility, and data rate limitations. Road Side
Units (RSUs), vehicles (users) and a Regional Trusted Authority (RTA). In this paper, we consider a CAN
consisting of a city lay and highway, finite numbered registered RSUs nodes along roads and a large number of
vehicles on or by the roads. Our proposed model to use traffic detection algorithm improve the network
performance and efficiency network. We suppose that, the RSUs are always reliable, while vehicles on city ride
and in highway ride is used analyze the various metrics and compared with different routing protocols such as
AODV, DSDV, DSR in simulation

KEYWORDS: xFCD, CANs, RSUs, DR, RTA, TCL, AODV
I.

INTRODUCTION

The benefit expected from vehicular communications and the huge number of vehicles, it is clear that
vehicular communications are likely to become the most relevant realization of mobile ad hoc networks. The
appropriate integration of on-board computers and positioning devices, such as GPS receivers along with
communication capabilities, opens tremendous business opportunities, but also raises formidable research
challenges.
They have many people around the world die every year and many get injured. Implementation of
safety criteria’s such as speed limits and road conditions are applied but still more work is required. This require
use of Controller area Networks (CAN) - is a technology that apply on moving cars as nodes in a network to
create a mobile network. CAN turns every participating car into a wireless router or node, allowing cars
approximately 100 to 300 meters or more according to the protocols used in CAN of each other to connect and,
in turn, create a network with a wide range. The range can vary according to the algorithms and protocols
applied and implemented. As cars fall out of the signal range and drop out of the network, other cars can join in,
connecting vehicles to one another so that a mobile Internet is created. It is estimated that the first systems that
integrate this technology are police and fire vehicles to communicate with each other for safety purposes. Such
network comprises of sensors and On Board Units (OBU) installed in the car as well as Road Side Units (RSU).
The so-called floating car data (FCD) refer to technology that collects traffic state information from a set of
individual vehicles that float in the current traffic. Each vehicle can be seen as a moving sensor operating in a distributed
network. It is equipped with global positioning and communication systems, transmitting its global location, speed, and
direction to a central control unit that integrates the information provided by each one of the vehicles. FCD systems are
being increasingly used in a variety of important applications since they overcome the limitations of fixed traffic monitoring
technologies. If this system achieves a sufficient penetration rate, the service quality in urban traffic would be sufficient. The
CAN have given bundles of benefits to organizations without any discrimination with size. Transformation of the vehicle’s
on-board computer from a nifty gadget to an essential productivity tool has been done by Automobile high speed Internet

www.ijesi.org

23 | Page
Traffic Detection Algorithm Using …
access, making virtually any web technology available in the car. While such a network does have certain safety concerns,
this does not limit CAN’s potential as a productivity tool.

performance. To based on improve the detection rate and to reduce the packet delay on their network.
Compare with existing model to improve the network performance and high level throughput performance on
the network.
Here we have take a more parameters on the network. There are throughput, delivery ratio, packet
delay, and network energy level on the network. In this controller area networks are totally different from the
other networks.

II.

RELATED WORK

The elaboration of data collected by vehicles moving on road network is relevant for traffic
management and for private service providers, which can bundle updated traffic information with navigation
services. Floating data, in its extended acceptation, contains not only time and location provided by a
positioning system, but also information coming from various vehicle sensors. In this paper we describe our
extended data collection system, in which vehicles are able to collect data about their local environment, namely
the presence of road works and traffic slowdowns, by analyzing visual data taken by a looking forward camera
and data from the on-board Electronic Control Unit [1].
Floating Car Data (FCD) fleets are a valuable data source to obtain travel times as basis for traffic
information or route guidance systems. To deliver reliable traffic information and to improve algorithms and
systems for generating FCD from GPS positions their current quality has to be evaluated first. In this
contribution the travel times from actual vehicle trips are compared with travel times for each edge on those
trips as they result from the FCD algorithm. About 540,000 trajectories generated by more than 4,000 taxis at
the four Wednesdays in October 2010 are the basis for this comparison.[3].
The paper presents a new application enabled by Vehicle-to-Vehicle (V2V) communication systems;
our target is to combine V2V with Floating Car Data (FCD) systems and merge advantages of both: the V2V
application warnings to enhance the FCD traffic information precision as well as the information availability;
inversely, V2V communication can also benefit from the FCD system and offer some large-scale road network
traffic information. We present some architecture modifications which are needed to realize this new
application, both in terms of in-vehicle components as well as the networking requirements. The proposed
approach is to be built upon the existing infrastructure of FCD system to lower the implementation cost [4].
This paper presents the results of a set of extensive experiments carried out in daytime and nighttime
conditions in real traffic using an enhanced or extended Floating Car Data system (xFCD) that includes a stereo
vision sensor for detecting the local traffic ahead. The detection component implies the use of previously
monocular approaches developed by our group in combination with new stereo vision algorithms that add
robustness to the detection and increase the accuracy of the measurements corresponding to relative distance and
speed. Besides the stereo pair of cameras, the vehicle is equipped with a low-cost GPS and an electronic device
for CAN Bus interfacing. The xFCD system has been tested in a 198-minutes sequence recorded in real traffic
scenarios with different weather and illumination conditions, which represents the main contribution of this
paper [8].
An experimental implementation of a QoS-aware hybrid routing protocol that uses a flexible mix of
proactive and reactive routing techniques within Mobile Ad hoc Networks (MANETs). After a brief review of
the benefits and applications of proactive, reactive (on demand) and hybrid routing, the architectural details and
protocol operation of SRC’s “Wireless Ad hoc Routing Protocol” (WARP) are given. This paper then discusses
the laboratory testing methodology used during the development of WARP, and gives an experimental
comparison of WARP with a proactive routing protocol – namely Optimized Link State Routing (OLSR).[10].
A hybrid deposit model for low overhead communication where in the sender directly deposits
messages into the destination user-level memory. The destination address is a function of both sender state and
destination state. The motivation is to increase the sender´s role in communication in order to simplify the
destination´s role and thus enable fast, low-cost communication interfaces. The model separates data delivery
from synchronization so as to enable the optimization of simple data delivery while leaving more difficult
synchronization to other mechanisms. With hardware support, the hybrid deposit model looks promising for
applications in parallel, distributed, and real-time computing [13].

www.ijesi.org

24 | Page
Traffic Detection Algorithm Using …

III. PROPOSED APPROACH
These are also similar to MANETs in many ways. For example, both networks are multi-hop mobile networks
having dynamic topology. There is no central entity, and nodes route data themselves across the network. Both MANETs
and CANs are rapidly deployable, without the need of an infrastructure. Although, MANET and CAN, both are mobile
networks, however, the mobility pattern of CAN nodes is such that they move on specific paths (roads) and hence not in
random direction. This gives CANs some advantage over MANETs as the mobility pattern of CAN nodes is predictable.
MANETs are often characterized by limited storage capacity and low battery and processing power.
CANs, on the other hand, do not have such limitations. Sufficient storage capacity and high processing power can
be easily made available in vehicles. Moreover, vehicles also have enough battery power to support long range
communication. Another difference is highly dynamic topology of CANs as vehicles may move at high velocities. This
makes the lifetime of communication links between the nodes quite short. Node density in CANs is also unpredictable;
during rush hours the roads are crowded with vehicles, whereas at other times, lesser vehicles are there. Similarly, some
roads have more traffic than other roads.
The Traffic Detection algorithm for this purpose, the original source of the message or the node that is responsible
for this cancelation or extension should broadcast a message. This message is similar to the original message except that the
new time should be considered instead of the previous time; for cancelation, the time should be zero. In addition, the revision
of the message should be increased by one. We called this message the supplementary message. It should broadcast until the
drop off strategy for the source node stops it from rebroadcasting (the same strategy for the original source).
In proposed method various routing metrics are evaluated in different literatures to signify the importance and
measuring purposes of numerous routing protocols. The collected information is then used to propose a novel approach to
the level-of-service (LOS) calculation. This calculation uses information from both the xFCD and the magnetic loops
deployed in the infrastructure to construct a speed/occupancy hybrid plane that characterizes the traffic state of a continuous
route.

IV. TRAFFIC DETECTION ALGORITHM
Source-S Destination-D T-Traffic Q-queue
If S-->D
Route_Discovery ()
Route reply ()
S-->D
Nodes. Neighbor list ()
Get node id, pkt information
If network= new_nodes then
Check any traffic T
If network=traffic then
Q queue check to D
Else
Traffic Detection to D
Else if
Occur traffic T
If network ≠ T
Route data to D
Else
Dropped Packets
Neigh_ vehicle ()
End if
PERFORMANCE ANALYSIS
Aim of our simulation to analyze the performance of the AODV by using, (CANs) Controller Area
Networks. The replication surroundings are produced in NS-2, in that provides maintain for a wireless networks.
NS-2 was using C++ language and it has used for an Object Oriented Tool Command Language. It came as an
extension of Tool Command Language (TCL). The execution were approved out using a environment of
wireless mobile nodes rootless over a simulation area of 1200 meters x 1200 meters level gap in service for 10
seconds of simulation time [8]. The radio and IEEE 802.11 MAC layer models were used. The network based
data processing or most expensive and data communication level on their performance on the network. Hence,
the simulation experiments do not account for the overhead produced when a multicast members leaves a group.

www.ijesi.org

25 | Page
Traffic Detection Algorithm Using …
Multiple sources create and end sending packets; each data has a steady size of 512 bytes. Each vehicle node to
move randomly on their network, it’s more and most expectable on their networks.

Table 1: Network Parameters
Parameters

value

version
Protocols
Area

Ns-allinone 2.28
AODV
1200m x 1200m

Broadcast Area
Transfer model

250 m
UDP,CBR

Data size

512 bytes

PERFORMANCE RESULTS
The simulation scenario is calculated particularly to charge the collision of system concentration on the
presentation of the network model. The collision of arrangement density is deploying 30 –71 nodes more than a
permanent open area topology of 1200m x 1200m using 5m/s node speed and 3 identical source-destination
connections. AODV have a quantity of metrics that can be used for their performance network.
SIMULATION RESULT:Table 2: Compression Research
No

Nodes

Method

Throughput

1.
2.

0-100
0-100

VD-CAN
TD-CAN

0.68
0.85

Avg
Delay
30.00
18.86

P.D.F
88.05
93.73

THROUGHPUT PERFORMANCE
The ratio of throughput performance overall network performance improve network performance and
packet delivery ratio and minimize packet delay.

Fig1. Performance of throughput

THE DATA DELIVERY FRACTION:The packets are delivered from source to destination on their network. It is calculated by dividing the
number of data received by ending state through the quantity package originated from starting point on network.
PDF = (Pr/Ps)*100
Where Pr is total Data received & Ps is the total data sending on their network.
The End-to-End delay:They have calculate a average number of delay on network, it includes all possible delay caused by
buffering through route detection latency, queuing at the border queue, retransmission delay on medium access
control, spread and move time.

www.ijesi.org

26 | Page
Traffic Detection Algorithm Using …

D = (Tr –Ts)
Where Tr is receive Time and Ts is sent Time.

Fig2. Performance of delay ratio

V.

CONCLUSION

We have presented scheduling dynamic traffic congestion aware routing algorithms for scheduling in
multi-hop wireless networks. The algorithms approximate the performance of perfect matching type scheduling
randomly closed. A key feature that allows the DTCAR algorithms to have low complexity it another way of SDTCAR is that neither algorithm attempts to find a perfect maximal matching.

REFERENCE
[1].
[2].
[3].
[4].
[5].
[6].
[7].
[8].
[9].
[10].
[11].
[12].
[13].
[14].
[15].

Stefano Messelodi, Carla M. Modena,” Intelligent extended floating car data collection”, 2009.
Connected drive powered by intelligence, BMW group of companies, “Car Intelligences”
Günter Kuhns, Rudiger, Peter Wagner, “Self Evaluation of Floating Car Data Based on Travel Times from Actual Vehicle
Trajectories”, 2011.
Lan Lin, Tatsuaki Osafune,” Floating car data system enforcement through vehicle to vehicle communications”.
Gaurav Dhiman, Raid Ayoub,” PDRAM: A Hybrid PRAM and DRAM Main Memory System” 2010.
Ed Perry, Srinivas Ramanathan,” Experiences from Monitoring a Hybrid Fiber-Coaxial Broadband Access Network”, 2000.
Model-driven provisioning of application services in hybrid computing environments, 2013.
R. Quintero, A. Llamazares,” Extended Floating Car Data System - Experimental Study”, 2011.
T O N Y K A R L S S O N,” An Observational Study of the Characteristics of Taxi Floating Car Data Compared to Radar Sensor
Data”, 2012.
Peter Sholander, Andreas Yankopolus and Paul Coccoli,” EXPERIMENTAL COMPARISON OF HYBRID AND PROACTIVE
MANET ROUTING PROTOCOLS”, 2005.
Ralf-Peter Schäfer German Aerospace Center (DLR) Institute of Transport Research,” Traffic Information by Means of Realtime Floating Car Data”.
Marianne Swanson Joan Hash Pauline Bowen,” Guide for Developing Security Plans for Federal Information Systems”, 2012
Randy Osborne,” A Hybrid Deposit Model for Low Overhead Communication in High Speed LANs”, 1998.
Marc Portoles-Comeras, Josep Mangues-Bafalluy,” Performance issues for VoIP call routing in a hybrid ad hoc office
environment”
Werner Huber, Michael Ladke, Extended Floating-Car Data For The Acquisition Of Traffic Information”

www.ijesi.org

27 | Page

Weitere ähnliche Inhalte

Was ist angesagt?

Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Editor IJCATR
 
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSBIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
ijwmn
 
14 27 may17 12mar 7266 7192-1-sm edit septian
14 27 may17 12mar 7266 7192-1-sm edit septian14 27 may17 12mar 7266 7192-1-sm edit septian
14 27 may17 12mar 7266 7192-1-sm edit septian
IAESIJEECS
 
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
rifat1tasnim
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
IJARIIT
 

Was ist angesagt? (17)

Dynamic multiagent method to avoid duplicated information at intersections in...
Dynamic multiagent method to avoid duplicated information at intersections in...Dynamic multiagent method to avoid duplicated information at intersections in...
Dynamic multiagent method to avoid duplicated information at intersections in...
 
An Analytical Review of the Algorithms Controlling Congestion in Vehicular Ne...
An Analytical Review of the Algorithms Controlling Congestion in Vehicular Ne...An Analytical Review of the Algorithms Controlling Congestion in Vehicular Ne...
An Analytical Review of the Algorithms Controlling Congestion in Vehicular Ne...
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
 
IRJET- An Incentive Framework for Cellular Traffic Offloading
IRJET-  	  An Incentive Framework for Cellular Traffic OffloadingIRJET-  	  An Incentive Framework for Cellular Traffic Offloading
IRJET- An Incentive Framework for Cellular Traffic Offloading
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
 
Multicast routing protocol for advanced vehicular ad hoc networks
Multicast routing protocol for advanced vehicular ad hoc networksMulticast routing protocol for advanced vehicular ad hoc networks
Multicast routing protocol for advanced vehicular ad hoc networks
 
Jkmm 345
Jkmm 345Jkmm 345
Jkmm 345
 
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSBIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
 
14 27 may17 12mar 7266 7192-1-sm edit septian
14 27 may17 12mar 7266 7192-1-sm edit septian14 27 may17 12mar 7266 7192-1-sm edit septian
14 27 may17 12mar 7266 7192-1-sm edit septian
 
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
 
A Novel Methodology for Traffic Monitoring and Efficient Data Propagation in ...
A Novel Methodology for Traffic Monitoring and Efficient Data Propagation in ...A Novel Methodology for Traffic Monitoring and Efficient Data Propagation in ...
A Novel Methodology for Traffic Monitoring and Efficient Data Propagation in ...
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
 
A Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehic...
A Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehic...A Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehic...
A Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehic...
 
Study of vanet routing protocols for end to end delay
Study of vanet routing protocols for end to end delayStudy of vanet routing protocols for end to end delay
Study of vanet routing protocols for end to end delay
 
STUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAY
STUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAYSTUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAY
STUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAY
 
1720 1724
1720 17241720 1724
1720 1724
 
A Data Collection Scheme with Multi-Agent Based Approach for VSNS
A Data Collection Scheme with Multi-Agent Based Approach for VSNSA Data Collection Scheme with Multi-Agent Based Approach for VSNS
A Data Collection Scheme with Multi-Agent Based Approach for VSNS
 

Andere mochten auch (8)

IDCC 2511 Avenant portant sur l'annexe 1 relatif aux CQP
IDCC 2511 Avenant portant sur l'annexe 1 relatif aux CQP IDCC 2511 Avenant portant sur l'annexe 1 relatif aux CQP
IDCC 2511 Avenant portant sur l'annexe 1 relatif aux CQP
 
Bernard de-mandeville-1
Bernard de-mandeville-1Bernard de-mandeville-1
Bernard de-mandeville-1
 
Košice
KošiceKošice
Košice
 
Ionic
IonicIonic
Ionic
 
Sms global services
Sms global servicesSms global services
Sms global services
 
Fopl index discussion paper
Fopl index discussion paperFopl index discussion paper
Fopl index discussion paper
 
Prof Sec Feb 2016
Prof Sec Feb 2016Prof Sec Feb 2016
Prof Sec Feb 2016
 
experimento de liquidos
experimento de liquidosexperimento de liquidos
experimento de liquidos
 

Ähnlich wie International Journal of Engineering and Science Invention (IJESI)

Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksCross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
IJCNCJournal
 
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSCROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
IJCNCJournal
 
Inter vehicular communication using packet network theory
Inter vehicular communication using packet network theoryInter vehicular communication using packet network theory
Inter vehicular communication using packet network theory
eSAT Publishing House
 
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc NetworksReal-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
IJCNCJournal
 
Congestion control & collision avoidance algorithm in intelligent transportation
Congestion control & collision avoidance algorithm in intelligent transportationCongestion control & collision avoidance algorithm in intelligent transportation
Congestion control & collision avoidance algorithm in intelligent transportation
IAEME Publication
 
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc NetworkDeterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
paperpublications3
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
pijans
 
Real time vehicle counting in complex scene for traffic flow estimation using...
Real time vehicle counting in complex scene for traffic flow estimation using...Real time vehicle counting in complex scene for traffic flow estimation using...
Real time vehicle counting in complex scene for traffic flow estimation using...
Journal Papers
 
Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception ...
Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception ...Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception ...
Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception ...
ijtsrd
 

Ähnlich wie International Journal of Engineering and Science Invention (IJESI) (20)

Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksCross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
 
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSCROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
 
Inter vehicular communication using packet network theory
Inter vehicular communication using packet network theoryInter vehicular communication using packet network theory
Inter vehicular communication using packet network theory
 
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc NetworksReal-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
 
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc NetworksReal-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks
 
Optimal Content Downloading in Vehicular Network with Density Measurement
Optimal Content Downloading in Vehicular Network with Density MeasurementOptimal Content Downloading in Vehicular Network with Density Measurement
Optimal Content Downloading in Vehicular Network with Density Measurement
 
Medium access in cloud-based for the internet of things based on mobile vehic...
Medium access in cloud-based for the internet of things based on mobile vehic...Medium access in cloud-based for the internet of things based on mobile vehic...
Medium access in cloud-based for the internet of things based on mobile vehic...
 
A Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsA Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETs
 
Congestion control & collision avoidance algorithm in intelligent transportation
Congestion control & collision avoidance algorithm in intelligent transportationCongestion control & collision avoidance algorithm in intelligent transportation
Congestion control & collision avoidance algorithm in intelligent transportation
 
Big data traffic management in vehicular ad-hoc network
Big data traffic management in vehicular ad-hoc network Big data traffic management in vehicular ad-hoc network
Big data traffic management in vehicular ad-hoc network
 
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc NetworkDeterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
 
Augastiny_VANET advantages and disadvantages.pptx
Augastiny_VANET advantages and disadvantages.pptxAugastiny_VANET advantages and disadvantages.pptx
Augastiny_VANET advantages and disadvantages.pptx
 
Real time vehicle counting in complex scene for traffic flow estimation using...
Real time vehicle counting in complex scene for traffic flow estimation using...Real time vehicle counting in complex scene for traffic flow estimation using...
Real time vehicle counting in complex scene for traffic flow estimation using...
 
Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception ...
Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception ...Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception ...
Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception ...
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
 
Optimal content downloading in vehicular network with density measurement
Optimal content downloading in vehicular network with density measurementOptimal content downloading in vehicular network with density measurement
Optimal content downloading in vehicular network with density measurement
 
journal publications
 journal publications journal publications
journal publications
 
Review on IoT Based Bus Scheduling System using Wireless Sensor Network
Review on IoT Based Bus Scheduling System using Wireless Sensor NetworkReview on IoT Based Bus Scheduling System using Wireless Sensor Network
Review on IoT Based Bus Scheduling System using Wireless Sensor Network
 
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSINTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

International Journal of Engineering and Science Invention (IJESI)

  • 1. International Journal of Engineering Science Invention ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 www.ijesi.org Volume 2 Issue 12 ǁ December. 2013 ǁ PP.23-27 Traffic Detection Algorithm Using In Extended Floating Car Data System Improve the Detection Rate and Level of Services V.MAHESHKUMAR, L.DEVI, K.KAVITHA Software Engineer, India Assistant Professor / Computer Science and Engineering, India Assistant Professor / Information Technology,, India. 1 ABSTRACT: In Controller area Networks (CANs), authentication is a crucial security requirement to avoid attacks to both inter-vehicle and vehicle-roadside communication. Vehicles have to be prevented from the misuse of their private data and the attacks on their privacy. This paper presents the results of a set of extensive experiments carried out under both daytime and nighttime real traffic conditions. The data were captured using an enhanced or extended Floating Car Data system (xFCD) that includes a stereo vision sensor for detecting the local traffic ahead. In this paper, we investigate the authentication and privacy issues in CANs. In this architecture vehicles are dynamically clustered according to different related metrics from these clusters, a minimum number of vehicles, equipped with IEEE 802.11 are selected as vehicular gateways to link CAN. Issues pertaining to gateway selection, gateway advertisement and discovery, service migration between gateways when exchanging messages between vehicles, there are network issues that must be addressed, including the hidden terminal problem, high density, high node mobility, and data rate limitations. Road Side Units (RSUs), vehicles (users) and a Regional Trusted Authority (RTA). In this paper, we consider a CAN consisting of a city lay and highway, finite numbered registered RSUs nodes along roads and a large number of vehicles on or by the roads. Our proposed model to use traffic detection algorithm improve the network performance and efficiency network. We suppose that, the RSUs are always reliable, while vehicles on city ride and in highway ride is used analyze the various metrics and compared with different routing protocols such as AODV, DSDV, DSR in simulation KEYWORDS: xFCD, CANs, RSUs, DR, RTA, TCL, AODV I. INTRODUCTION The benefit expected from vehicular communications and the huge number of vehicles, it is clear that vehicular communications are likely to become the most relevant realization of mobile ad hoc networks. The appropriate integration of on-board computers and positioning devices, such as GPS receivers along with communication capabilities, opens tremendous business opportunities, but also raises formidable research challenges. They have many people around the world die every year and many get injured. Implementation of safety criteria’s such as speed limits and road conditions are applied but still more work is required. This require use of Controller area Networks (CAN) - is a technology that apply on moving cars as nodes in a network to create a mobile network. CAN turns every participating car into a wireless router or node, allowing cars approximately 100 to 300 meters or more according to the protocols used in CAN of each other to connect and, in turn, create a network with a wide range. The range can vary according to the algorithms and protocols applied and implemented. As cars fall out of the signal range and drop out of the network, other cars can join in, connecting vehicles to one another so that a mobile Internet is created. It is estimated that the first systems that integrate this technology are police and fire vehicles to communicate with each other for safety purposes. Such network comprises of sensors and On Board Units (OBU) installed in the car as well as Road Side Units (RSU). The so-called floating car data (FCD) refer to technology that collects traffic state information from a set of individual vehicles that float in the current traffic. Each vehicle can be seen as a moving sensor operating in a distributed network. It is equipped with global positioning and communication systems, transmitting its global location, speed, and direction to a central control unit that integrates the information provided by each one of the vehicles. FCD systems are being increasingly used in a variety of important applications since they overcome the limitations of fixed traffic monitoring technologies. If this system achieves a sufficient penetration rate, the service quality in urban traffic would be sufficient. The CAN have given bundles of benefits to organizations without any discrimination with size. Transformation of the vehicle’s on-board computer from a nifty gadget to an essential productivity tool has been done by Automobile high speed Internet www.ijesi.org 23 | Page
  • 2. Traffic Detection Algorithm Using … access, making virtually any web technology available in the car. While such a network does have certain safety concerns, this does not limit CAN’s potential as a productivity tool. performance. To based on improve the detection rate and to reduce the packet delay on their network. Compare with existing model to improve the network performance and high level throughput performance on the network. Here we have take a more parameters on the network. There are throughput, delivery ratio, packet delay, and network energy level on the network. In this controller area networks are totally different from the other networks. II. RELATED WORK The elaboration of data collected by vehicles moving on road network is relevant for traffic management and for private service providers, which can bundle updated traffic information with navigation services. Floating data, in its extended acceptation, contains not only time and location provided by a positioning system, but also information coming from various vehicle sensors. In this paper we describe our extended data collection system, in which vehicles are able to collect data about their local environment, namely the presence of road works and traffic slowdowns, by analyzing visual data taken by a looking forward camera and data from the on-board Electronic Control Unit [1]. Floating Car Data (FCD) fleets are a valuable data source to obtain travel times as basis for traffic information or route guidance systems. To deliver reliable traffic information and to improve algorithms and systems for generating FCD from GPS positions their current quality has to be evaluated first. In this contribution the travel times from actual vehicle trips are compared with travel times for each edge on those trips as they result from the FCD algorithm. About 540,000 trajectories generated by more than 4,000 taxis at the four Wednesdays in October 2010 are the basis for this comparison.[3]. The paper presents a new application enabled by Vehicle-to-Vehicle (V2V) communication systems; our target is to combine V2V with Floating Car Data (FCD) systems and merge advantages of both: the V2V application warnings to enhance the FCD traffic information precision as well as the information availability; inversely, V2V communication can also benefit from the FCD system and offer some large-scale road network traffic information. We present some architecture modifications which are needed to realize this new application, both in terms of in-vehicle components as well as the networking requirements. The proposed approach is to be built upon the existing infrastructure of FCD system to lower the implementation cost [4]. This paper presents the results of a set of extensive experiments carried out in daytime and nighttime conditions in real traffic using an enhanced or extended Floating Car Data system (xFCD) that includes a stereo vision sensor for detecting the local traffic ahead. The detection component implies the use of previously monocular approaches developed by our group in combination with new stereo vision algorithms that add robustness to the detection and increase the accuracy of the measurements corresponding to relative distance and speed. Besides the stereo pair of cameras, the vehicle is equipped with a low-cost GPS and an electronic device for CAN Bus interfacing. The xFCD system has been tested in a 198-minutes sequence recorded in real traffic scenarios with different weather and illumination conditions, which represents the main contribution of this paper [8]. An experimental implementation of a QoS-aware hybrid routing protocol that uses a flexible mix of proactive and reactive routing techniques within Mobile Ad hoc Networks (MANETs). After a brief review of the benefits and applications of proactive, reactive (on demand) and hybrid routing, the architectural details and protocol operation of SRC’s “Wireless Ad hoc Routing Protocol” (WARP) are given. This paper then discusses the laboratory testing methodology used during the development of WARP, and gives an experimental comparison of WARP with a proactive routing protocol – namely Optimized Link State Routing (OLSR).[10]. A hybrid deposit model for low overhead communication where in the sender directly deposits messages into the destination user-level memory. The destination address is a function of both sender state and destination state. The motivation is to increase the sender´s role in communication in order to simplify the destination´s role and thus enable fast, low-cost communication interfaces. The model separates data delivery from synchronization so as to enable the optimization of simple data delivery while leaving more difficult synchronization to other mechanisms. With hardware support, the hybrid deposit model looks promising for applications in parallel, distributed, and real-time computing [13]. www.ijesi.org 24 | Page
  • 3. Traffic Detection Algorithm Using … III. PROPOSED APPROACH These are also similar to MANETs in many ways. For example, both networks are multi-hop mobile networks having dynamic topology. There is no central entity, and nodes route data themselves across the network. Both MANETs and CANs are rapidly deployable, without the need of an infrastructure. Although, MANET and CAN, both are mobile networks, however, the mobility pattern of CAN nodes is such that they move on specific paths (roads) and hence not in random direction. This gives CANs some advantage over MANETs as the mobility pattern of CAN nodes is predictable. MANETs are often characterized by limited storage capacity and low battery and processing power. CANs, on the other hand, do not have such limitations. Sufficient storage capacity and high processing power can be easily made available in vehicles. Moreover, vehicles also have enough battery power to support long range communication. Another difference is highly dynamic topology of CANs as vehicles may move at high velocities. This makes the lifetime of communication links between the nodes quite short. Node density in CANs is also unpredictable; during rush hours the roads are crowded with vehicles, whereas at other times, lesser vehicles are there. Similarly, some roads have more traffic than other roads. The Traffic Detection algorithm for this purpose, the original source of the message or the node that is responsible for this cancelation or extension should broadcast a message. This message is similar to the original message except that the new time should be considered instead of the previous time; for cancelation, the time should be zero. In addition, the revision of the message should be increased by one. We called this message the supplementary message. It should broadcast until the drop off strategy for the source node stops it from rebroadcasting (the same strategy for the original source). In proposed method various routing metrics are evaluated in different literatures to signify the importance and measuring purposes of numerous routing protocols. The collected information is then used to propose a novel approach to the level-of-service (LOS) calculation. This calculation uses information from both the xFCD and the magnetic loops deployed in the infrastructure to construct a speed/occupancy hybrid plane that characterizes the traffic state of a continuous route. IV. TRAFFIC DETECTION ALGORITHM Source-S Destination-D T-Traffic Q-queue If S-->D Route_Discovery () Route reply () S-->D Nodes. Neighbor list () Get node id, pkt information If network= new_nodes then Check any traffic T If network=traffic then Q queue check to D Else Traffic Detection to D Else if Occur traffic T If network ≠ T Route data to D Else Dropped Packets Neigh_ vehicle () End if PERFORMANCE ANALYSIS Aim of our simulation to analyze the performance of the AODV by using, (CANs) Controller Area Networks. The replication surroundings are produced in NS-2, in that provides maintain for a wireless networks. NS-2 was using C++ language and it has used for an Object Oriented Tool Command Language. It came as an extension of Tool Command Language (TCL). The execution were approved out using a environment of wireless mobile nodes rootless over a simulation area of 1200 meters x 1200 meters level gap in service for 10 seconds of simulation time [8]. The radio and IEEE 802.11 MAC layer models were used. The network based data processing or most expensive and data communication level on their performance on the network. Hence, the simulation experiments do not account for the overhead produced when a multicast members leaves a group. www.ijesi.org 25 | Page
  • 4. Traffic Detection Algorithm Using … Multiple sources create and end sending packets; each data has a steady size of 512 bytes. Each vehicle node to move randomly on their network, it’s more and most expectable on their networks. Table 1: Network Parameters Parameters value version Protocols Area Ns-allinone 2.28 AODV 1200m x 1200m Broadcast Area Transfer model 250 m UDP,CBR Data size 512 bytes PERFORMANCE RESULTS The simulation scenario is calculated particularly to charge the collision of system concentration on the presentation of the network model. The collision of arrangement density is deploying 30 –71 nodes more than a permanent open area topology of 1200m x 1200m using 5m/s node speed and 3 identical source-destination connections. AODV have a quantity of metrics that can be used for their performance network. SIMULATION RESULT:Table 2: Compression Research No Nodes Method Throughput 1. 2. 0-100 0-100 VD-CAN TD-CAN 0.68 0.85 Avg Delay 30.00 18.86 P.D.F 88.05 93.73 THROUGHPUT PERFORMANCE The ratio of throughput performance overall network performance improve network performance and packet delivery ratio and minimize packet delay. Fig1. Performance of throughput THE DATA DELIVERY FRACTION:The packets are delivered from source to destination on their network. It is calculated by dividing the number of data received by ending state through the quantity package originated from starting point on network. PDF = (Pr/Ps)*100 Where Pr is total Data received & Ps is the total data sending on their network. The End-to-End delay:They have calculate a average number of delay on network, it includes all possible delay caused by buffering through route detection latency, queuing at the border queue, retransmission delay on medium access control, spread and move time. www.ijesi.org 26 | Page
  • 5. Traffic Detection Algorithm Using … D = (Tr –Ts) Where Tr is receive Time and Ts is sent Time. Fig2. Performance of delay ratio V. CONCLUSION We have presented scheduling dynamic traffic congestion aware routing algorithms for scheduling in multi-hop wireless networks. The algorithms approximate the performance of perfect matching type scheduling randomly closed. A key feature that allows the DTCAR algorithms to have low complexity it another way of SDTCAR is that neither algorithm attempts to find a perfect maximal matching. REFERENCE [1]. [2]. [3]. [4]. [5]. [6]. [7]. [8]. [9]. [10]. [11]. [12]. [13]. [14]. [15]. Stefano Messelodi, Carla M. Modena,” Intelligent extended floating car data collection”, 2009. Connected drive powered by intelligence, BMW group of companies, “Car Intelligences” Günter Kuhns, Rudiger, Peter Wagner, “Self Evaluation of Floating Car Data Based on Travel Times from Actual Vehicle Trajectories”, 2011. Lan Lin, Tatsuaki Osafune,” Floating car data system enforcement through vehicle to vehicle communications”. Gaurav Dhiman, Raid Ayoub,” PDRAM: A Hybrid PRAM and DRAM Main Memory System” 2010. Ed Perry, Srinivas Ramanathan,” Experiences from Monitoring a Hybrid Fiber-Coaxial Broadband Access Network”, 2000. Model-driven provisioning of application services in hybrid computing environments, 2013. R. Quintero, A. Llamazares,” Extended Floating Car Data System - Experimental Study”, 2011. T O N Y K A R L S S O N,” An Observational Study of the Characteristics of Taxi Floating Car Data Compared to Radar Sensor Data”, 2012. Peter Sholander, Andreas Yankopolus and Paul Coccoli,” EXPERIMENTAL COMPARISON OF HYBRID AND PROACTIVE MANET ROUTING PROTOCOLS”, 2005. Ralf-Peter Schäfer German Aerospace Center (DLR) Institute of Transport Research,” Traffic Information by Means of Realtime Floating Car Data”. Marianne Swanson Joan Hash Pauline Bowen,” Guide for Developing Security Plans for Federal Information Systems”, 2012 Randy Osborne,” A Hybrid Deposit Model for Low Overhead Communication in High Speed LANs”, 1998. Marc Portoles-Comeras, Josep Mangues-Bafalluy,” Performance issues for VoIP call routing in a hybrid ad hoc office environment” Werner Huber, Michael Ladke, Extended Floating-Car Data For The Acquisition Of Traffic Information” www.ijesi.org 27 | Page