2021 2nd Global Conference for Advancement in Technology (GCAT) 2021
DOI: 10.1109/gcat52182.2021.9587585
|View full text |Cite
|
Sign up to set email alerts
|

IOT based Smart Traffic Signal Violation Monitoring System using Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Common traffic violation detection systems, such as the IoT-based smart traffic signal violation monitoring system using edge computing [20], predominantly rely on vision systems utilising cameras. However, in mining operations, camera-based detection is suboptimal in challenging conditions, notably dust.…”
Section: Traffic Violations Detection Methodsmentioning
confidence: 99%
“…Common traffic violation detection systems, such as the IoT-based smart traffic signal violation monitoring system using edge computing [20], predominantly rely on vision systems utilising cameras. However, in mining operations, camera-based detection is suboptimal in challenging conditions, notably dust.…”
Section: Traffic Violations Detection Methodsmentioning
confidence: 99%
“…To keep their functionality working properly without any security breaches to avoid traffic jams, the general architecture shown before is where computer vision can run directly at the junction without transferring the data to the nearby data centre. Meghana et al [39] developed a method in which aRaspberry Pi along with a Pi Camera is used to capture events at a traffic junction and image processing of the data happens on the device. This research showcases that these kind of jobs are viable but the problem comes down to the overwhelming of the Pi devices.…”
Section: Real-world Applicationsmentioning
confidence: 99%
“…However, this field still faces challenges, including the amount of data, cooperation among vehicles, and privacy, and these challenges can be tackled by different methods, such as federated learning [21]. Edge computing has been used for traffic management (e.g., [22,23]), but with little focus on traffic violation monitoring (e.g., [12,24,25]). Similarly, fog computing has been used for traffic management (e.g., [19,26]) but with little focus on monitoring violations (e.g., [27]).…”
Section: Related Workmentioning
confidence: 99%