Automatic Traffic Lights Control Using ARM7 Based On CO2 Emissions
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2013, Vol 1, Issue 7
Abstract
Monitoring and controlling of city traffic is becoming a difficult task in most of the city. With the ever increasing number of vehicles on the road, the Traffic Monitoring Authority has to find new methods of overcoming such a problem. Present Traffic Light Controllers (TLCs) is based on microcontroller and microprocessor which have limitations because it uses the pre-defined hardware, which is functioning according to the program that does not have the flexibility of modification on real time basis Due to the fixed time intervals of green, orange and red signals the waiting time is more and vehicle uses more fuel. This proposed project makes use of Networks along with Embedded Technology. This paper aims to design a safe and efficient traffic flow by reducing the effect of CO2 emitted from vehicles at that region and assign the right way which minimizes the delay or waiting time at road. The CO2 level emitted from vehicles in all directions will be transmitted through CO2 sensor we used in our system which is to sense the Carbon di-oxide emissions from the vehicles. The receiver at the TLC will receive the information. The information from all directions is transmitted and received through the Zigbee wireless communication. Based on CO2 levels, the traffic light indication will be given in the appropriate directions. The status will be shown in LCD and SMS alert will be sent to the Traffic Control Room using Global System for Mobile Communications (GSM).
Authors and Affiliations
S. L. Siva Jyothi| ECE Department, BVC Engineering College, Odalarevu, pragjyodev.s@gmail.com, K. Rajasekhar| ECE Department, BVC Engineering College, Odalarevu, raja.bubbly@gmail.com, P. Harika| ECE Department, BVC Engineering College, Odalarevu, harikapangam@gmail.com, M. S. Madhan Mohan rao| ECE Department, BVC Engineering College, Odalarevu, msmm141@yahoo.co.in
Defeating Ddos Attack By Using Software Puzzle Scheme
Denial of-administration and passed on DoS are among the genuine dangers to cutting edge security, and customer bewilder, which requests a customer to perform computationally exorbitant operations before being yielde...
Providing Efficient Privacy Of Xml Data By Using Anonymity
Scientists mine the extensive information got from various sources having distinctive configurations like database information and XML. Protection is one of most critical component while exchanging the information to...
Anonymous Asserts Profile Protection In Mobile Social Networks
In The Current Environment Through Social Network People Can Find Others And Make Their Own Network. An Individual User Can Have Multiple Accounts Of Social Networking Sites. In This Paper We Proposed An Algorithm Fo...
Implementation of High Speed Area Efficient Fixed Width Multiplier
The aim of project is to design a proposed truncated multiplier with less area utilization and low power comparing with previous multipliers. The proposed method finally reduces the number of full adders and half add...
Multicast Routing In MANETS
Numerous system applications require transmitting the same single duplicate of information parcels simultaneously to numerous destinations, it is called multicasting. The Multicast steering has generous impact in MAN...