Novel Mobile Network Service for Road Safety
#1

Novel Mobile Network Service for Road Safety

.doc   Novel Mobile Network Service for Road Safety.doc (Size: 95 KB / Downloads: 0)
I. Introduction
In most of the developing countries, mobile penetration is
strongly correlated with economic growth and social
benefits. New mobile devices, services and applications
were developed. The whole computing and communication
paradigms were shifted to mobile domain. The area of
Mobile Computing there is considerable research work
done in the field over the past one decade. There are
research work on Ad hoc network protocols,
communication, computing techniques such as application
environment, computing methods etc., Mobile computing
leads to create new awareness to researches such as
Nomadic computing, pervasive computing, sensor networks
etc.,
The development of Mobile technology only based on
communication. The mobile user has communicating with
other mobile user. They are getting services from the fixed
stations like railway reservation, air ticket and booking
hotels etc., The social issues like Highway road
information, hospital information, ambulance information,
Doctors information, Police station information, location
tracing of a particular place, location identification and
terrorist information are not available. The limited numbers
of mobile applications are available.
In these social issues, location tracking is very
important concept due to the highways accident. Now a
day, highway accidents are quit natural and increased the
highway death. In the modern world, nobody can help the
accident people. They are helpless and their accident
information may reach to the Police or Ambulance in a late
hours.
1.1 Accidental Deaths in India
The incidence of accidental deaths has shown a mixed trend
during the decade 1995-2005 with an increase of over 32.2
percent in the year 2005 as compared to 1995. The
population growth during the corresponding period was
20.4 percent whereas the increase in the rate of accidental
deaths during the same period was 9.9 percent. The total of
2, 94,175 accidental deaths were reported in the country
during 2005. Correspondingly, 1.6 percent increase in the
population and 4.7 percent increase in the rate of
Accidental Deaths were reported.
2,71,760 (92.4%) deaths were due to unnatural causes
and the rest 7.6% deaths (22,415) were due to causes
attributable to nature, out of total 2,94,175 accidental
deaths during the year 2005.
1.2. Mobility
Mobility is the most significant feature of mobile nodes in
certain applications such as cellular networks, vehicle
traffic navigation systems, road safety etc., In order to
model the mobility of mobile nodes, different approaches
have been developed. The location information of the
mobile systems is used to either verify whether mobile
nodes are within the boundary of some local zone or to find
out the next possible course of movement in some mobile
systems. However, very little research effort has been made
on extracting the location information in the presence of a
node collision. Such information is very significant in the
area of road safety, disaster management and similar
applications where a quick and accurate location data is
vital. The problem of location extraction of mobile nodes
on a fixed mobile interaction frame work is taken for
investigation.
The second section has the related works of the
proposed model are exploited. The third section has the
Int. J. Advanced Networking and Applications 832
Volume: 02, Issue: 05, Pages: 831-840 (2011)
mathematical concepts used in the proposed model are
explained. The proposed Mobile network architecture
model is described in the section four. In the fifth section,
the evaluation of the proposed architecture is explained.
2. Utilities-based on authentication
The Mobile nodes and the Fixed stations (FS) having
transceiver. The performance of the Transceiver is
increased by the algorithm that is available in the reference
“An iterative algorithm for High Performance
Transceiver” [1].
The idea behind the connection between the Mobile node
and FS is a New Technology for AD-Hoc interconnections
between Hand-Held Terminals and Smart Objects. This
technology has been found in the Literature “Micro power
IR Tag – A new technology for Ad-Hoc interconnection
between the Hand Held Terminals and Smart Objects” [2].
This paper prescribed in the smart object conference,
France at 2003.
Almost all the systems for location tracking depend on
customized hardware. A very few are systems based on
software. A pure software based location tracing system is
defined as WLAN (Wireless Local Area
Network)
which is present in the literature “WLAN Tracker: Location
Tracking and location based services in Wireless LANs”
[1],[3] by Can Komar and Cem Ersoy “Wireless
networking-Tele communication , Newage
The realistic mobility model is available in the
paper ‘Towards Realistic Mobility Models for Mobile Ad
hoc Networks’ [4]
The Shortest Path between the Mobile nodes and
the FS can be calculated by using CPM technology. But
some special algorithm is used in the Project [5] “Fast
shortest path algorithm for Road Network and
implementation” Carl eton University, Honors Project
2005, Liang Dai.
3. Mathematical Approach
Various mathematical concepts are utilized. Basically, in
the mobile ad hoc network design, the network is
formed as a two dimensional graph. The characteristics of
the network are bounded and the boundaries are well
defined. The Network paths are defined. The mobility of
the mobile nodes are utilizing the mathematical queuing
theory[6]. That is the entry of the mobile nodes in to the ad
hoc network is Poisson distribution. Mathematically, the
Fixed stations are considered as a Service channels and the
service discipline as Exponential distribution.
In the mobility of the mobile nodes any collision occurs,
then the shortest path between the fixed station and the
mobile node is calculated using the mathematical method
called critical path method.
3.1. Role of the Poisson and Exponential Distribution
In queuing situation, the number of arrivals and departures
(after served) during an interval of time is controlled by the
following conditions.
Condition 1
The Probability of an event (arrival or departure)
occurring between times t and t+h depends only on the
length of h meaning that the probability does not depend on
either the number of events that occur up to time t or the
specific value of T.
Condition 2:
The probability of an event occurring during a very
small time interval h is positive but less than 1
Condition 3:
At most one event can occur during a very small time
interval h. The implication of these conditions can be
studied by deriving mathematically the probability of n
events occurring during a time interval t. Let Pn(t) be the
probability of n events occurring during time t.
3.2. CPM - Critical Path Method
fig. 1 Network Model
This method follows a solution strategy very similar to
the dynamic programming; however there is a variation
which occurs due to the fact that a network need not be
structured as a sequence of stages. It also has a starting
node and works by computing 'flag values' for the nodes,
however for CPM problems, the flag values represent the
longest time to each node, and the nodes in the network
may be processed in any sequence so long as all preceding
nodes have flags at each step. The arcs are always directed,
for 'activity on arc' and for 'activity on node'. since a
precedence relation states that one activity must be
complete before another begins. But the possibility of
concurrent activities means that there will usually be many
paths through the network, and the longest of these is called
the critical path since it determines the minimal duration.
Int. J. Advanced Networking and Applications 833
Volume: 02, Issue: 05, Pages: 831-840 (2011)
4. Mobile Network Architecture Model
A model of the proposed Architecture has been designed
and developed with the help of the following.
1. Basic Network Model.
2. Mobility model development
3. simulations of collision
4. POS identification
5. Path identification
6. Statistics collection
4.1. Basic Network Model
The Basic Network model consists of a Fixed Stations and
the Mobile Nodes as shown in Fig. 1 In this network, the
mobile nodes communicate with the Fixed Station
wirelessly. These networks are extremely flexible, Selfconfigurable
and they do not require the deployment of any
infrastructure for their operation
4.1.1. Characteristics of Fixed Station
The Fixed station has a high performance transceiver. The
function of transceiver is given below.
A transceiver is a combination transceiver/receiver in a
single package. India radio transceiver, the receiver is
silenced while transmitting. An electronic switch allows the
transceiver and receiver to be connected to the same
antenna and prevents the transceiver output from damaging
the receiver. With a transceiver of this kind, it is
impossible to receive signals while transmitting. This mode
is called half duplex. Transmission and reception often but
not always are done on the same frequency. Some
transceivers are designed to allow reception of signals
during transmission periods. This mode is known as full
duplex and requires that the transceiver and receiver
operate on substantially different frequencies so the
transmitted signal does not interfere with reception.
Cellular and cordless telephone sets use this mode.
Satellite communications networks often employ fullduplex
transceivers at the surface based subscriber points.
The transmitted signal is called the uplink and the received
signal is called the downlink.
The transceiver transmits the fixed stations identification
code to the Mobile nodes. Similarly, it receives the IP
address of the Mobile node which is available in the
boundary of the fixed station. That is, each fixed station
has a fixed range. Within the range, the transceiver signal
can be transmitted.
4.1.2. Characteristics of Mobile nodes
The Mobile nodes are moving around the fixed station
range. The Transceiver in the Mobile node receives the
signal from the fixed station and to transmit the IP address
to the fixed station. The Mobile nodes address is allocated
in the following method.
Nodes requiring global connectivity need a globally
routable IP address for to avoid other solutions like network
address translation (NAT). There are basically two
alternatives to the issue of address allocation. They may be
assigned by a centralized entity (stateful auto configuration)
or can be generated by the nodes themselves (stateless autoconfiguration).
In this work centralized entity can be
utilized. The fixed station has the Database server.
4.2. Mobility model development
Most of the Mobility models are not realistic. The Mobile
nodes are moving in a constant speed and the directions are
same. The path way is straight. But in the real scenario,
there are many interventions may occur when the mobile
nodes moving in the path. The path way is not straight.
They may curve in nature. The realistic Mobility model is
available in the paper [4]. In the proposed model, the
Mobility model is realistic. Since the paths are well
defined, the movements of the mobile nodes are random in
nature. The fixed station has a boundary to transmit the
signal.
4.3. Simulations of collision
The ad hoc Network with M number of FS and ‘N’ number
of mobile nodes are constructed in a simulation process.
Each mobile node is assumed to have a direction, time and
identification number while entering the range of FS. This
information is sent to the FS, the mobile node also receives
the information about the FS like the code of the FS and
status as active or not. The above activities are done when
the mobile node enters the FS range
The network can be simulated arbitrarily with the help of
the number of mobile nodes and the FS using predefined
model characteristics.
The collision is introduced at a random interval of time
between the mobile nodes. The number of occurrences of
collisions could be identified using various techniques.
4.4. Path Identification
When the collision occurs, then immediately the mobile
nodes transceiver shorted out the fixed station identification
that is available in the transceiver of the Mobile node.
Using the Critical Path Method, the optimal fixed stations
are identified and to send the message to that fixed stations
along with the mobile nodes address and the location of the
mobile node. The location of mobile node can be found
with the help of identification of the mobile node, time to
cross the fixed station that is already recorded in the fixed
station, the current fixed station range where the mobile
nodes is available and the direction of the mobile node.
5. Evaluation of Proposed Architecture
5.1. Assumptions and Notations

A mobile network model is chosen with the following set of
assumptions.
Number of fixed stations are assumed as a Police
Station, having a Range and Mobile nodes as Vehicles
having transceiver and the Boundary area B. Collision
spots means the accident of the vehicle are introduced
randomly, since the accidents between the vehicles happens
without prior knowledge. Whenever the accident has
occurred, the POS means the accident location information
is recorded and propagated to the nearest Police station and
the propagation time t is estimated. Thus the path between
Int. J. Advanced Networking and Applications 834
Volume: 02, Issue: 05, Pages: 831-840 (2011)
each Police station and the accident location are estimated
using the path finding algorithm CPM
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: road safety traffic ppt 2013, irc sp 55 guidelines on safety in road construction zones, safety road control using web cam, lto road safety seminar, 24th road safety week india ppt, road safety slogan in sanskrit, nukkad natak script in hindi on road safety pdf,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A novel DC-AC Single Phase Resonant Inverter using soft switching boost seminar addict 1 1,440 19-03-2014, 01:38 AM
Last Post: Guest
  Mobile Number Portability project uploader 1 2,025 11-01-2013, 12:38 PM
Last Post: seminar details
  Mobile Ad Hoc Networks project uploader 1 1,750 20-12-2012, 12:31 PM
Last Post: seminar details
  virtual network computing seminar addict 1 1,364 12-12-2012, 02:07 PM
Last Post: seminar details
  Mobile Application Development with ANDROID seminar addict 1 3,169 29-11-2012, 02:28 PM
Last Post: seminar details
  SMART ANTENNA FOR MOBILE COMMUNICATION seminar details 1 1,596 20-11-2012, 12:27 PM
Last Post: seminar details
  DC Network Theorems seminar details 1 1,311 12-11-2012, 04:20 PM
Last Post: seminar details
  Network Theorems seminar addict 1 1,661 12-11-2012, 04:19 PM
Last Post: seminar details
  EE-201 NETWORK ANALYSIS AND SYNTHESIS seminar paper 1 1,686 09-11-2012, 12:02 PM
Last Post: seminar details
  On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services project uploader 1 2,379 05-11-2012, 11:46 AM
Last Post: Guest

Forum Jump: