Traffic surveillance and vehicle identification in ghat curves using Arduino
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 5
Abstract
Arduino is a great device for collecting, storing and transferring data from various sensors but there are times you need to make your data accessible from any place over the internet. The solution could be still advanced by developing a cloud based real time web publishing application that allows publishing any data with latency of 0.1 second. A robust real time vehicle detection algorithm for both signals is developed. Magnetic sensors turned out to be superior, achieving detection rates above 97% in the field, and led to the abandonment of future research using acoustic sensors. Vehicle classification and re identification schemes for low cost, low power platforms with very limited computation resources are developed and tested. The vehicle classification algorithms require orders of magnitude fewer computation resources while achieving correct classification rates comparable to the best of all published vehicle classification schemes inn tests with a large database, including 800 trucks. The algorithm for vehicle re identification is tested on a limited left-turn re identification experiment. The result is encouraging, but much more work is needed.
Authors and Affiliations
Pavithra Poornima. S
Awareness of Women Participants as an Indicator of Implementation Structure of MNREGA
Though women employment was not the soul objectives of the scheme yet in its development goals it comes automatically. The design features of this scheme especially to attract women make this scheme gender sensitive. Al...
Modelling and Simulation of Dc to Ac Converter for Renewable Energy Source Using Simulink
This paper deals with modeling and simulation of DC-AC converter for Renewable Energy Source. DC from the solar cell is stepped up using a Boost converter. The output of the Boost converter is converted in to three-phas...
A Review on Novel SAT KAMAN protocol to prevent DOS attacks in MANET
The Kerberos assisted authentication protocol is the efficient protocol that have been used for this identity validation. Kaman is the extension of Kerberos protocol with the use of Kaman nodes in the ad hoc network are...
Extraction and Recognition of Facial Expression
Face recognition from image or video is popular topic in biometric research. It has many practical applications like video surveillance, access control, personal identification, forensic and law enforcement. Facial expr...
Power Quality Improvement using Super Capacitor for an Isolated Power Generation
Power generation will be formed in many weak distribution networks, after renewable energy sources are connected to them. It is very important to increase the reliability and efficiency of using these renewable energy s...