A wireless sensor network for traffic surveillance
|
|
|
- Charles Garrison
- 10 years ago
- Views:
Transcription
1 A wireless sensor network for traffic surveillance Sing Yiu Cheung, Sinem Coleri, Ram Rajagopal, Pravin Varaiya University of California, Berkeley
2 Outline Traffic measurement Wireless Sensor Networks Vehicle Count, Occupancy, Speed Vehicle Classification Vehicle Re-identification Communication protocol Future work 2
3 Traffic Applications Freeway Ramp Metering Freeway Traffic Data Stop-Bar Detection Advance Detection Parking Enforcement System Counts Traffic Signal Control Parking Guidance 3
4 Freeway Traffic Management Cellular Traffic Control ACCIDENT! Traffic Management Center Internet PeMS Measurement Backhaul Processing Control & Info 4
5 Intersection Signal Control Adaptive Traffic Signal Control System raw data feedback & decisions Measurements: detectors & signals Actuator signals Source: Mirchandani, P. and L. Head, Rhodes Traffic-adaptive control system, TRB
6 Data Requirements Freeway detectors must report count, occupancy, speed every 30 s, 95% accuracy Intersection detectors must report vehicle presence at intersection within 0.1 s, 99% accuracy Parking detectors must report events within one minute, 90-99% accuracy 6
7 Current Traffic Measurement Technologies Inductive loop Video Microwave radar Loop detector is the standard; lasts years but unreliable; closing lane to cut loops in pavement is disruptive; alternatives are microwave radar, video Can wireless sensor networks compete? 7
8 Outline Traffic measurement Wireless Sensor Networks Vehicle Count, Occupancy, Speed Vehicle Classification Vehicle Re-identification Communication protocol Future Work 8
9 Wireless Magnetic Sensor Networks Sensor node Access point Freeway Intersection Sensor nodes Detect vehicles by change in earth s magnetic field Transmit data to access point via radio Access point reports to signal controller or TMC Low cost, non-intrusive, flexible, easy to install 9
10 Prototype sensor Node Protective cover can withstand 9000kg 3-axis magnetometer, microprocessor, radio transceiver, antenna, battery 10
11 Sensys Vehicle Detector Station 2 Hardened plastic mounted flush with pavement surface, 10 year battery life GPS receiver, GPRS/CDMA interface, poe, or power over RS485 Note: Varaiya is a director of Sensys Networks, Inc 11
12 Advantages of Wireless Sensing 12
13 Advantages of Wireless Sensing 13
14 Outline Traffic measurement Wireless Sensor Networks Vehicle Count, Occupancy, Speed Vehicle Classification Vehicle Re-identification Communication protocol Future work 14
15 Magnetometer: Basic principle Earth s magnetic field Distorted field Ferrous object HMC1051Z 15
16 Vehicle Detection (count) z axis measurement as vehicle goes over node vehicle signal running average detection signal seconds Note sharp, localized threshold crossing 16
17 Occupancy and speed by Node Pair Configuration vehicle signal from node 1 vehicle signal from node 2 speed = 6 /time detection signal from node 1 occupancy detection signal from node 2 17
18 CCIT test results on I-80 (1/3) 18
19 CCIT test results on I-80 (2/3) 19
20 CCIT test results on I-80(3/3) 20
21 Outline Traffic measurement Wireless Sensor Networks Vehicle Count, Occupancy, Speed Vehicle Classification Vehicle Re-identification Communication protocol Future work 21
22 FHWA 13 Classes Classify detected vehicle from signal 22
23 Classification approach Collect labeled samples, (x 1,y 1 ),, (x N,y N ), x i R n(i), class of x i = y i {1,, 13} Train good classifier, f: x i y i Classify new sample x as f(x) 23
24 Difficulties Large and unequal sample vector size: Vehicle length 5-20 m, speed 2-25 m/s, so duration is s, f s = 128/256 Hz, 3-axes, so size n(i) is samples; inter-vehicle spacing 2-4 s Approach: Convert to fixed vector size n Preprocessing: h: x i R n(i) R n all i Extract features (compress): f: R n R k, k << n Train classifier: g: R k {1,, 13} Overall: f = g h: R n(i) {1,, 13} 24
25 Preprocessing + compression A 1. Normalize sample vector to zero mean, [-1,1] and fixed sample size n: if n(i) > n downsample; if n(i) < n upsample 2. Extract features by principal components: If X is M n matrix of M test sample vectors {x i } with SVD X = USV T, X T X = VS 2 V, project x i onto subspace of k eigenvectors with 90-99% of variation 3. Computationally expensive steps 25
26 Example A (n=2971) % variation # components 26
27 Preprocessing + compression B 1.Replace sample vector x i of size n(i) by vector of fixed size k (k=10, 20) with components = average value of x i in bins of size n(i)/k 2.Extract principal components if necessary 3.Eliminates speed variation, but also length 27
28 Example B (k=10) 28
29 Preprocessing + compression C 1. Extract (-1,0,1) hill pattern 2. Add zero padding to obtain (-1,0,1) vector of fixed size k 29
30 Example C Very high compression 30
31 Classification Schemes 1. Support vector machines (SVM) using radial basis function kernel k(u,v) = exp(- u-v 2 ) 2. K-Nearest-Neighbor (KNN) scheme Several variants depending on distance and voting schemes 31
32 839 vehicles KNN results (1/4) Class # Trucks 50% from each class are randomly selected for training; 50% left for testing Correct rate is average from 10 trials Length information is not used 32
33 KNN results (2/4) using length may improve accuracy 33
34 KNN results (3/4) [%] Classified as Counts Observed Class Avg. Counts FWHA Class Total # Average correct rate is 64% 34
35 KNN results (4/4) Distribution of Magnetic Length FWHA Class Estimated Magnetic Length [m] FHWA Classes Magnetic Length [m] Mean Std Dev
36 Outline Traffic measurement Wireless Sensor Networks Vehicle Count, Occupancy, Speed Vehicle Classification Vehicle Re-identification Communication protocol Future work 36
37 Vehicle re-identification Use an array of nodes to compensate for offset Experiment conducted with 7 test vehicles Buick Le Sabre 97 (x 2) Toyota Corolla 89 LandRover Range Rover 96 Ford Taurus 96 Ford Taurus 2000 Ford WindStar (Van) Each vehicle driven over SN array 5 times: Note 2 vehicles are the same model 37
38 Compress with 10 ave bar No length or speed information Compare correlation of the Average-Bar from all three axes 100% correct reidentification among all 7 test vehicles Compressed data from same vehicle 38
39 Summary Wireless magnetic sensor network has better detection properties than alternatives What about lifetime? Depends on energy consumption 39
40 Outline Traffic measurement Wireless Sensor Networks Vehicle Count, Occupancy, Speed Vehicle Classification Vehicle Re-identification Communication protocol Future work 40
41 Energy Calculations Focus on radio energy Suppose battery rating is 2 3V In 1 year = 8700 hours, average power budget is 230 μa for 1 year lifetime 23 μa for 10 year lifetime What kind of protocol and data rate can be supported with this power budget? 41
42 Mica2 CSMA protocol requires listen before transmit and constant listen at 10mA current Gives lifetime < 10 days with no transmission Mica2 CSMA protocol Source: Shnayder, V et al. SenSys
43 Sensys network architecture AP 1000 Repeater 100 All links are one-hop AP uses one channel; Repeater uses a different channel 43
44 Sensys TDMA Protocol (1/2) 125 msec frame divided into 64 time slots Each sensor in the network gets to transmit in one time slot each frame So latency is less than 125msec Timeslots permit 50 bytes of data 125 msec frame Sync TS0 TS1 TS2 TS3 TS62 TS63 VSN B Time slot 3 TX VSN A Time slot 1 TX 44
45 Sensys TDMA Protocol (2/2) Time-slot 0 is the sync timeslot sent from the AP to the sensors; this timeslot also contains global parameters such as the detection parameters, the transmit interval, etc. Time-slot 2 is used for software download Time-slots 4 and 34 are used for ACK packets from the AP to the sensors Remaining time-slots can be used by sensors 125 msec frame Sync TS0 TS1 TS2 TS3 TS62 TS63 45
46 Conclusion Wireless sensor networks for traffic measurement are promising and pose interesting problems of Signal processing Power consumption Engineering design 46
47 Outline Traffic measurement Wireless Sensor Networks Vehicle Count, Occupancy, Speed Vehicle Classification Vehicle Re-identification Communication protocol Future work 47
48 Future work Use accelerometers to estimate truck weight 48
49 Equations of motion Model pavement as Euler beam with elastic foundation with a moving load: 49
50 A simulation: L=1km, 0 /2 = 1.23Hz 9.8 Hz 4.7 Hz Hz 3.7 Hz Acceleration peak ~ mg 50
51 Conclusions Most research in sensor networks is generic: platform, protocols Applications require specific designs and great deal of engineering TDMA-based protocols offer great advantages over random access protocols Need to combine sensing with control 51
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
Traffic Monitoring Systems. Technology and sensors
Traffic Monitoring Systems Technology and sensors Technology Inductive loops Cameras Lidar/Ladar and laser Radar GPS etc Inductive loops Inductive loops signals Inductive loop sensor The inductance signal
2. SYSTEM ARCHITECTURE AND HARDWARE DESIGN
Design and Evaluation of a Wireless Sensor Network for Monitoring Traffic Yuhe Zhang 1, 2, Xi Huang 1, 2, Li Cui 1,, Ze Zhao 1 Tel: +86-10-6260 0724, Fax: +86-10-6256 2701 1 Inst. of Computing Technology,
How To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
Doppler Traffic Flow Sensor For Traveler Information Systems. October, 2007 1
Doppler Traffic Flow Sensor For Traveler Information Systems October, 2007 1 Traffic congestion costs $70B a year Road construction can t keep up with demand Congestion spreading to smaller cities Many
Time Domain and Frequency Domain Techniques For Multi Shaker Time Waveform Replication
Time Domain and Frequency Domain Techniques For Multi Shaker Time Waveform Replication Thomas Reilly Data Physics Corporation 1741 Technology Drive, Suite 260 San Jose, CA 95110 (408) 216-8440 This paper
siemens.com/mobility Radar detectors of the Heimdall family High detection rate, easy installation
siemens.com/mobility Radar detectors of the Heimdall family High detection rate, easy installation Heimdall radar detectors from Siemens: A family that provides valuable benefits, Heimdall is the watchman
RTMS Solutions. Detection solutions to fit your city s needs.
RTMS Solutions Detection solutions to fit your city s needs. Keeping your daily commute free of congestion - and maintenance. Behind the scenes in cities all over the world, RTMS radar detection solutions
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Basic Network Design
Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
Using Received Signal Strength Variation for Surveillance In Residential Areas
Using Received Signal Strength Variation for Surveillance In Residential Areas Sajid Hussain, Richard Peters, and Daniel L. Silver Jodrey School of Computer Science, Acadia University, Wolfville, Canada.
Traffic Surveillance by Wireless Sensor Networks: Final Report
CALIFORNIA PATH PROGRAM INSTITUTE OF TRANSPORTATION STUDIES UNIVERSITY OF CALIFORNIA, BERKELEY Traffic Surveillance by Wireless Sensor Networks: Final Report Sing-Yiu Cheung Pravin Varaiya California PATH
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
AIR DRM. DRM+ Showcase
AIR DRM DRM+ Showcase New Delhi, 23 rd 27 th May 2011 The Report was prepared by Digital Radio Mondiale Consortium (DRM) & All India Radio (AIR) Version: 2011-07-26 Index: 1. Introduction 2. DRM+ System
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
CELL PHONE TRACKING. Index. Purpose. Description. Relevance for Large Scale Events. Options. Technologies. Impacts. Integration potential
CELL PHONE TRACKING Index Purpose Description Relevance for Large Scale Events Options Technologies Impacts Integration potential Implementation Best Cases and Examples 1 of 10 Purpose Cell phone tracking
INVESTIGATION OF ASIM 29X, CANOGA, RTMS, SAS-1, SMARTSENSOR, TIRTL & OTHER SENSORS FOR AUTOMATIC VEHICLE CLASSIFICATION
INVESTIGATION OF ASIM 29X, CANOGA, RTMS, SAS-1, SMARTSENSOR, TIRTL & OTHER SENSORS FOR AUTOMATIC VEHICLE CLASSIFICATION RESEARCH NEED This research will add to the national and local state-of-the-art on
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
2.0 System Description
2.0 System Description The wireless alarm system consists of two or more alarm units within a specified range of one another. Each alarm unit employs a radio transceiver, allowing it to communicate with
Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
Ramp Metering. Index. Purpose. Description. Relevance for Large Scale Events. Options. Technologies. Impacts. Integration potential.
Ramp Metering Index Purpose Description Relevance for Large Scale Events Options Technologies Impacts Integration potential Implementation Best Cases and Examples 1 of 7 Purpose Ramp metering is a technique
The 5G Infrastructure Public-Private Partnership
The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility
Integrated Data System Structure for Active Traffic Management - Planning and Operation
Integrated Data System Structure for Active Traffic Management - Planning and Operation NATMEC 2010 Dr. Xiao-Yun Lu, Research Engineer California PATH, U. C. Berkeley J. Palen, Caltrans DRI 1 Outlines
Context and Activity Recognition (aka Sensors + Inference ) Varun Manjunatha CMSC 818G
Context and Activity Recognition (aka Sensors + Inference ) Varun Manjunatha CMSC 818G Three Papers 1) Zhou, et al. IODetector: A Generic Service for Indoor Outdoor Detection 2) Miluzzo, et al. Sensing
International Journal of Recent Trends in Electrical & Electronics Engg., Feb. 2014. IJRTE ISSN: 2231-6612
Spoofing Attack Detection and Localization of Multiple Adversaries in Wireless Networks S. Bhava Dharani, P. Kumar Department of Computer Science and Engineering, Nandha College of Technology, Erode, Tamilnadu,
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either
Appendix A - Cost Estimate Spreadsheet
CCTV Camera, PTZ Per Each $18,500 $1,250 12 $33,500 Closed circuit television (CCTV) camera with pan, tilt, zoom (PTZ) functionality in a dome enclosure. CCTV Camera, Fixed Per Each $14,000 $1,250 12 $29,000
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National
Delay-Aware Big Data Collection Strategies for Sensor Cloud Services Dr. Chi-Tsun (Ben), Cheng
Delay-Aware Big Data Collection Strategies for Sensor Cloud Services Dr. Chi-Tsun (Ben), Cheng [email protected] http://www.eie.polyu.edu.hk/~bcheng/ An Overview Introduction Wireless Sensor
Multipath fading in wireless sensor mote
Multipath fading in wireless sensor mote Vaishali M.Tech (VLSI), IMSEC, Ghaziabad/MTU, Noida Abstract: In this paper we study about the new technology as to transfer the data with the help of smart device,
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,
Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson
Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson Internet of Things The Internet of Things (IoT) is a computing
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
Performance Monitoring and Control in Contention- Based Wireless Sensor Networks
Performance Monitoring and Control in Contention- Based Wireless Sensor Networks Thomas Lindh #1, Ibrahim Orhan #2 # School of Technology and Health, KTH Royal Institute of Technology Marinens vag 30,
Course Project Documentation
Course Project Documentation CS308 Project Android Interface Firebird API TEAM 2: Pararth Shah (09005009) Aditya Ayyar (09005001) Darshan Kapashi (09005004) Siddhesh Chaubal (09005008) Table Of Contents
Chapter 2 Literature Review
Chapter 2 Literature Review 2.1 - Introduction A review of existing literature was performed to support the study undertaken in this thesis. A general survey was first performed to chronicle past research
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
DAG based In-Network Aggregation for Sensor Network Monitoring
DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless
Mac Protocols for Wireless Sensor Networks
Mac Protocols for Wireless Sensor Networks Hans-Christian Halfbrodt Advisor: Pardeep Kumar Institute of Computer Science Freie Universität Berlin, Germany [email protected] January 2010 Contents
Scalable Traffic Video Analytics using Hadoop MapReduce
Scalable Traffic Video Analytics using Hadoop MapReduce Vaithilingam Anantha Natarajan Subbaiyan Jothilakshmi Venkat N Gudivada Department of Computer Science and Engineering Annamalai University Tamilnadu,
An inertial haptic interface for robotic applications
An inertial haptic interface for robotic applications Students: Andrea Cirillo Pasquale Cirillo Advisor: Ing. Salvatore Pirozzi Altera Innovate Italy Design Contest 2012 Objective Build a Low Cost Interface
Small Satellite Attitude Determination With RF Carrier Phase Measurement
Politecnico di Torino Electronics Department IAC-09.C1.6.9 Small Satellite Attitude Determination With RF Carrier Phase Measurement Danilo Roascio, Leonardo M. Reyneri, Claudio Sansoé, Maurizio Bruno International
Vision based Vehicle Tracking using a high angle camera
Vision based Vehicle Tracking using a high angle camera Raúl Ignacio Ramos García Dule Shu [email protected] [email protected] Abstract A vehicle tracking and grouping algorithm is presented in this work
- Monitoring Array: a seismic or infrasound array, including from 1(4) to 20 Remote Elements (RE) and one Central Recording Facility (CRF).
Page 1 of 30 Page 2 of 30 1. Basic terminology - Monitoring Array: a seismic or infrasound array, including from 1(4) to 20 Remote Elements (RE) and one Central Recording Facility (CRF). - Remote Element:
Logging of RF Power Measurements
Logging of RF Power Measurements By Orwill Hawkins Logging of measurement data is critical for effective trend, drift and Exploring the use of RF event analysis of various processes. For RF power measurements,
ECE 333: Introduction to Communication Networks Fall 2002
ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98
Ch 2.3.3 GSM In the early 80 s the European community decided to work together to define a cellular system that would permit full roaming in all countries and give the network providers freedom to provide
SmartDiagnostics Application Note Wireless Interference
SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine
Controlled Random Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu [email protected] Communications Laboratory 09.03.2004 Content of Presentation
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA
COMM.ENG INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA 9/6/2014 LECTURES 1 Objectives To give a background on Communication system components and channels (media) A distinction between analogue
CHAPTER 3 AVI TRAVEL TIME DATA COLLECTION
CHAPTER 3 AVI TRAVEL TIME DATA COLLECTION 3.1 - Introduction Travel time information is becoming more important for applications ranging from congestion measurement to real-time travel information. Several
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - [email protected]
Surveillance System Using Wireless Sensor Networks
Surveillance System Using Wireless Sensor Networks Dan Nguyen, Leo Chang Computer Engineering, Santa Clara University Santa Clara, California, USA [email protected] [email protected] Abstract The
UNDERSTANDING RADIO FREQUENCY AND BC HYDRO S SMART METERS
UNDERSTANDING RADIO FREQUENCY AND BC HYDRO S SMART METERS SUMMARY Radio frequency (RF) technology has been around for over years and is a part of everyday life radios, TVs and medic alert systems are examples.
TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
Datasheet. Powerful 2x2 MIMO airmax BaseStation. Models: M5, RM5-Ti, M3, M365, M2, RM2-Ti, M900. Advanced Software Technology to Maximize Performance
Powerful 2x2 MIMO airmax BaseStation Models: M5, RM5-Ti, M3, M365, M2, RM2-Ti, M900 Advanced Software Technology to Maximize Performance Plug and Play Integration with airmax Antennas Frequency and Channel
How To Understand The Gsm And Mts Mobile Network Evolution
Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins
Accuracy of Pneumatic Road Tube Counters
Accuracy of Pneumatic Road Tube Counters By: Patrick McGowen and Michael Sanderson Abstract: Pneumatic road tube counters are a tool that is commonly used to conduct traffic counts on streets and roads.
521493S Computer Graphics. Exercise 2 & course schedule change
521493S Computer Graphics Exercise 2 & course schedule change Course Schedule Change Lecture from Wednesday 31th of March is moved to Tuesday 30th of March at 16-18 in TS128 Question 2.1 Given two nonparallel,
Logitech Advanced 2.4 GHz Technology With Unifying Technology
Logitech Advanced 2.4 GHz Technology Revision 070709 July 7, 2009 TABLE OF CONTENTS 1 INTRODUCTION: THE MOVE TO WIRELESS PERIPHERALS IN BUSINESS...3 2 SYSTEM OVERVIEW...4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN
THE BENEFITS OF SIGNAL GROUP ORIENTED CONTROL
THE BENEFITS OF SIGNAL GROUP ORIENTED CONTROL Authors: Robbin Blokpoel 1 and Siebe Turksma 2 1: Traffic Engineering Researcher at Peek Traffic, [email protected] 2: Product manager research
GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving
GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving 1 Space Division Multiple Access of the signals from the MSs A BTS with n directed antennae covers mobile stations
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
Chapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
Traffic Management for a Smarter City:Istanbul Istanbul Metropolitan Municipality
Traffic Management for a Smarter City:Istanbul Istanbul Metropolitan Municipality Traffic Management for a Smarter City: Istanbul There is no doubt for Traffic Management to be an issue in a crowded city
ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
Monitoring Software using Sun Spots. Corey Andalora February 19, 2008
Monitoring Software using Sun Spots Corey Andalora February 19, 2008 Abstract Sun has developed small devices named Spots designed to provide developers familiar with the Java programming language a platform
GPS Based Low Cost Intelligent Vehicle Tracking System (IVTS)
2012 International Conference on Traffic and Transportation Engineering (ICTTE 2012) IPCSIT vol. 26 (2012) (2012) IACSIT Press, Singapore GPS Based Low Cost Intelligent Vehicle Tracking System (IVTS) Dr.
A comparison of radio direction-finding technologies. Paul Denisowski, Applications Engineer Rohde & Schwarz
A comparison of radio direction-finding technologies Paul Denisowski, Applications Engineer Rohde & Schwarz Topics General introduction to radiolocation Manual DF techniques Doppler DF Time difference
Robot Sensors. Outline. The Robot Structure. Robots and Sensors. Henrik I Christensen
Robot Sensors Henrik I Christensen Robotics & Intelligent Machines @ GT Georgia Institute of Technology, Atlanta, GA 30332-0760 [email protected] Henrik I Christensen (RIM@GT) Sensors 1 / 38 Outline 1
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents
High Resolution RF Analysis: The Benefits of Lidar Terrain & Clutter Datasets
0 High Resolution RF Analysis: The Benefits of Lidar Terrain & Clutter Datasets January 15, 2014 Martin Rais 1 High Resolution Terrain & Clutter Datasets: Why Lidar? There are myriad methods, techniques
SPYTEC 3000 The system for GSM communication monitoring
SPYTEC 3000 The system for GSM communication monitoring The SPYTEC 3000 system is intended for passive (if system encryption is absent of if A5.2 encryption is used) or semi-active (if A5.1 encryption
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse
Cellular Network Organization Cellular Wireless Networks Use multiple low-power transmitters (100 W or less) Areas divided into cells Each served by its own antenna Served by base station consisting of
Traffic Volume Counts
Traffic Volume Counts Prepare 1. Communicate with other staff/departments 2. Review historical data trends 3. Review citizen input 4. Request traffic control Select Location 1. Select the proper location
