A Review on Smart Helmetvvv
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2021, Vol 9, Issue 3
Abstract
Over speeding, intoxicated driving, and reckless driving are the leading causes of mortality among two-wheeler drivers. If emergency medical services had received accident information and been on the site in time, many lives might have been spared. To address these existing problems, we are working on a helmet that will provide the greatest answer. These are all the main issues which motivated us to start this project. The purpose of our research is to develop a low-cost intelligence helmet that can detect alcohol consumption and prevent road accidents. This intelligent helmet's main goal is to keep the user secure. To do this, advanced functions such as alcohol monitoring, collision detection, position tracking, and use as a handsfree device, as well as solar powered as well as fall identification, are employed. In our project, wearing a helmet is required; otherwise, the ignition switch would not turn on. If the rider is inebriated or an accident occurs, the ignition switch is immediately locked, and a message with their current position is sent to their registered phone number. It has a Bluetooth function that allows you to receive a call while driving.
Authors and Affiliations
Kalpana Munjal
Secure Big Data Access Control Policies for Cloud Computing Environment
As the term indicates the Big data it means we are work for the something big or can say something large in the Amount, Data the high volume is known as the big data.Now a Day for storing the data file in the Computer Sc...
Detection of Human Behaviour by Object Recognition using Deep Learning: A Review
The major drawback of the society is the falsehood of human nature; so prediction of nature of the individual by analysing the video or image of that person is highly necessary. From the post World War II period due to t...
Text Mining: Process and Techniques
Massive amount of digital data is available in form of unstructured text. It is highly required to extract useful information from this textual data. The process to discover non-trivial information and knowledge which ar...
Entropy Based Deep Attention Mechanism (EDAM) To Mitigate Denial of Service (Dos) Attack Orchestrated Through Idempotent Operation
Measuring entropy in a system represents the degree of uncertainty that characterizes the smooth, free and fair conduct of the network operations. The change in quantum of entropy value raises an alarm of the unscrupulo...
GPU-Graphics Processing Unit
In this paper we describe GPU and its computing. GPU (Graphics Processing Unit) is an extremely multi-threaded architecture and then is broadly used for graphical and now nongraphical computations. The main advantage of...