Advertisement

Journal of Medical Systems

, 42:240 | Cite as

Vehicular Cloud for Smart Driving Using Internet of Things

  • S. Vijayarangam
  • J. Megalai
  • Sivakumar Krishnan
  • Sivakumar Nagarajan
  • M. Ramya DeviEmail author
  • S. Lokesh
Mobile & Wireless Health
  • 81 Downloads
Part of the following topical collections:
  1. Advancements in Internet of Medical Things for Healthcare System

Abstract

The vehicular cloud can be made more reliable by having minimum number of vehicles and their accessibility of the vehicles in the given lane; in addition reliability can also be made using the function called movement of vehicles. The number of vehicles present in the area determines the task that can be accessed in the area and with the help of travelling time of the vehicles the validity of the lane can be determined. In this paper, a research is carried based on the stochastic investigation on the some of attributes of traffic with the help of cloud in street portion to accept the necessary attribute prototypes. In this paper two types of activity is done, first one is free flow movement of vehicle and second one is queuing- up activity. For the first activity, a noticeable traffic model is used to find the free flow movement of the vehicle and some parameters like activity thickness, living time and quantity of vehicles. In case of second activity queuing up model is used to find queue flow and parameters like length of line and time in the line are found. The research outcome will be given to all peoples in road traffic and traffic is the problem in many developed countries and they can be free from traffic. This model suggests an alternate route for the user which is free from traffic.

Keywords

Vehicular cloud Internet of things Stochastic investigation Vehicular cloud computing Random direction mobility model 

References

  1. 1.
    National Institute of Standards and Technology (NIST). Draft cloud computing synopsis and recommendations definition of cloud computing, 2011.Google Scholar
  2. 2.
    Devi, G. U., Balan, E. V., Priyan, M. K., and Gokulnath, C., Mutual authentication scheme for IoT application. Indian J. Sci. Technol, 8(26), 2015.Google Scholar
  3. 3.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., and Zaharia, M., A view of cloud computing. Commun. ACM 53(4):50–58, 2010.CrossRefGoogle Scholar
  4. 4.
    Balan, E. V., Priyan, M. K., Gokulnath, C., and Devi, G. U., Fuzzy based intrusion detection systems in MANET. Proc. Comput. Sci. 50:109–114, 2015.CrossRefGoogle Scholar
  5. 5.
    Gokulnath, C., Priyan, M. K., Balan, E. V., Prabha, K. R., and Jeyanthi, R., Preservation of privacy in data mining by using PCA based perturbation technique. In smart technologies and Management for Computing, communication, controls, energy and materials (ICSTM), 2015 international conference on (pp. 202-206). IEEE, 2015.Google Scholar
  6. 6.
    Olariu, S., Khalil, I., and Abuelela, M., Taking vanet to the clouds. Int J. Pervas. Comput. Commun. 7(1):7–21, 2011.CrossRefGoogle Scholar
  7. 7.
    Lokesh, S., Kumar, P. M., Devi, M. R., Parthasarathy, P., and Gokulnath, C., An automatic tamil speech recognition system by using bidirectional recurrent neural network with self-organizing map. Neural Comput. Appl., 1–11, 2018.Google Scholar
  8. 8.
    Chandra, I., Sivakumar, N., Gokulnath, C. B., and Parthasarathy, P., IoT based fall detection and ambient assisted system for the elderly. Cluster Comput., 1–9, 2018.Google Scholar
  9. 9.
    Khabbaz, M. J., Fawaz, W. F., and Assi, C. M., A simple free-flow traffic model for vehicular intermittently connected networks. IEEE Trans. Intell. Transport. Syst. 13(3):1312–1326, 2012.CrossRefGoogle Scholar
  10. 10.
    Devi, G. U., Priyan, M. K., Balan, E. V., Nath, C. G., and Chandrasekhar, M., Detection of DDoS attack using optimized hop count filtering technique. Indian J. Sci. Technol., 8(26), 2015.Google Scholar
  11. 11.
    Priyan, M. K., Nath, C. G., Balan, E. V., Prabha, K. R., and Jeyanthi, R., Desktop phishing attack detection and elimination using TSO program. Smart Technol. Manag. Comput. Commun. Controls Energy Mater. (ICSTM), 2015 Int. Conf. 198–201, IEEE, 2015.Google Scholar
  12. 12.
    Gokulnath, C. B., and Shantharajah, S. P., An optimized feature selection based on genetic approach and support vector machine for heart disease. Cluster Comput. 1–11, 2018.Google Scholar
  13. 13.
    Balan, E. V., Priyan, M. K., Nath, C. G., and Devi, G. U., Efficient energy scheme for wireless sensor network application. Comput. Intell. Comput. Res. (ICCIC), 2014 IEEE Int. Conf. 1–5. IEEE, 2014.Google Scholar
  14. 14.
    Balan, E. V., Priyan, M. K., and Devi, G. U., Hybrid architecture with misuse and anomaly detection techniques for wireless networks. Commun. Signal Process. (ICCSP), 2015 Int. Conf. 0185–0189. IEEE, 2015.Google Scholar
  15. 15.
    Kanisha, B., Lokesh, S., Kumar, P. M., Parthasarathy, P., and Chandra Babu, G. (). Speech recognition with improved support vector machine using dual classifiers and cross fitness validation. Person. Ubiquitous Comput. 1–9, 2018.Google Scholar
  16. 16.
    Boukerche, A., Oliveira, H. A. B. F., Nakamura, E. F., and Loureiro, A. A. F., Secure localization algorithms for wireless sensor networks. IEEE Commun. Mag. 46(4):96–101, 2008.CrossRefGoogle Scholar
  17. 17.
    de Oliveira, H. A. B. F., Boukerche, A., Nakamura, E. F., and Loureiro, A. A. F., An efficient directed localization recursion protocol for wireless sensor networks. IEEE Trans. Comput. 58(5):677–691, 2009.CrossRefGoogle Scholar
  18. 18.
    Chandra Babu, G., and Shantharajah, S. P., Optimal body mass index cutoff point for cardiovascular disease and high blood pressure. Neural Comput. Appl., 1–10, 2018.Google Scholar
  19. 19.
    Ren, Y. and Boukerche, A., Modeling and managing the trust for wireless and mobile ad hoc networks. 2008 IEEE Int. Conf. Commun. 2129–2133, 2008.Google Scholar
  20. 20.
    Padmavathy, T. V., Vimalkumar, M. N., Nagarajan, S., Babu, G. C., and Parthasarathy, P., Performance analysis of pre-cancerous mammographic image enhancement feature using non-subsampled shearlet transform. Multimed. Tools .Appl., 1–16, 2018.Google Scholar
  21. 21.
    Boukerche, A., and Dzermajko, C., Performance evaluation of data distribution management strategies. Concurr. Comput.: Pract. Exper. 16(15):1545–1573, 2004.CrossRefGoogle Scholar
  22. 22.
    Boukerche, A., McGraw, N. J., Dzermajko, C. and Lu, K., Grid-filtered region based data distribution management in large-scale distributed simulation systems. 38th Ann. Simul. Sym. 259–266, 2005.Google Scholar
  23. 23.
    Lokesh, S., Kumar, P. M., Devi, M. R., Parthasarathy, P., and Gokulnath, C., An Automatic Tamil Speech Recognition system by using Bidirectional Recurrent Neural Network with Self-Organizing Map. Neural Comput. Appl. 1–11.Google Scholar
  24. 24.
    Kumar, P. M., Lokesh, S., Varatharajan, R., Gokulnath, C., and Parthasarathy, P., Cloud and IoT based disease prediction and diagnosis system for healthcare using fuzzy neural classifier. Future Gen. Comput. Syst. 2018.Google Scholar
  25. 25.
    Boukerche, A., Zarrad, A., and Araujo, R., A cross-layer approach-based gnutella for collaborative virtual environments over mobile ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 21(7):911–924, 2010.CrossRefGoogle Scholar
  26. 26.
    Devi, G. U., Priyan, M. K., and Gokulnath, C., Wireless camera network with enhanced SIFT algorithm for human tracking mechanism. Int. J. Internet Technol. Sec. Trans. 8(2):185–194, 2018.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • S. Vijayarangam
    • 1
  • J. Megalai
    • 1
  • Sivakumar Krishnan
    • 2
  • Sivakumar Nagarajan
    • 3
  • M. Ramya Devi
    • 4
    Email author
  • S. Lokesh
    • 5
  1. 1.Priyadarshini Engineering CollegeVaniyambadiIndia
  2. 2.Rathinam Technical CampusCoimbatoreIndia
  3. 3.Vellore Institute of TechnologyVelloreIndia
  4. 4.Hindusthan College of Engineering and TechnologyCoimbatoreIndia
  5. 5.Hindusthan Institute of TechnologyCoimbatoreIndia

Personalised recommendations