Anda di halaman 1dari 39

1.

INTRODUCTION

Traffic congestion is a condition on transport networks that occurs as use


increases and is characterized by slower speeds, longer trip times, and increased
vehicular queuing. The most common example is the physical use of roads by
vehicles. When traffic demand is great enough that the interaction between vehicles
slows the speed of the traffic stream, this results in some congestion.

Traffic congestion occurs when a volume of traffic or modal split generates


demand for space greater than the available street capacity this point is commonly
termed saturation. There are a number of specific circumstances which cause or
aggravate congestion most of them reduce the capacity of a road at a given point or
over a certain length, or increase the number of vehicles required for a given volume
of people or goods.

1
1.1 SCOPE

The scope of Road Traffic Congestion Management Using Vanet tries to


capture congestion situations that may arise for drivers who daily commute on a single
road. Each of the drivers smart phones is equipped with a Traffic App which is
capable of location d e t e c t i o n through Geographic Position based System (GPS).
This information is relayed to a remote server which detects traffic congestion. Once
congestion is confirmed the congestion information is disseminated to the end user
phone through RSUs. The Mobile App transmits the location information at periodic
intervals. Using the latitude, longitude and the current time, the location of each
vehicle is traced. Using location information, the distance moved by the vehicle at a
given time is monitored. If the value is below a fixed threshold, congestion is
suspected in a particular area. If many vehicles in the same area send similar
messages, traffic congestion is confirmed.

2
1.2 OVER VIEW

Traffic congestion is a condition on transport networks that occurs as use increases


and is characterized by slower speeds, longer trip times, and increased vehicular queuing.
Ad-hoc Network (VANET) is a growing technology that assists in Intelligent Transport
Systems. VANETs enable communication between vehicles as well as fixed infrastructure
called Road Side Units (RSU). We propose a distributed, collaborative traffic congestion
detection and dissemination system that uses VANET. Each of the drivers smart phones is
equipped with a Traffic App which is capable of location detection through Geographic
Position based System (GPS). This information is relayed to a remote server which detects
traffic congestion. Once congestion is confirmed the congestion information is disseminated
to the end user phone through RSUs.
The Mobile App transmits the location information at periodic intervals. Using
the latitude, longitude and the current time, the location of each vehicle is traced. Using
location information, the distance moved by the vehicle at a given time is monitored. If the
value is below a fixed threshold, congestion is suspected in a particular area. If many
vehicles in the same area send similar messages, traffic congestion is confirmed. Once traffic
congestion is confirmed, the vehicles approaching the congested area are informed about the
traffic through display boards that are available in the nearest RSUs (traffic signals). The
congestion information is also made available through the Mobile App present in vehicles
approaching the congested area.

3
2. SYSTEM ANALYSIS

The system analysis can be defined as the processes involved in the analysis of
the requirements, designing and developing a computer based system. It includes
both preliminary and detailed stage. During preliminary analysis, takes a quick look
at what is wanted and whether its cost and benefits justify the perceived want.
Detailed analysis includes an in depth look at what is wanted and contain more
reduced cost and benefit studies.

2.1 EXISTING SYSTEM

Currently, traffic information systems are centralized vehicular applications


using technologies like Traffic Message Channel (TMC), provides information about
road traffic conditions. However, it lacks short delay times (due to the centralized
approach), averages information for large geographical areas (due to cost-
sensitiveness of detailed sensor networks and limited radio resources) and does not
have the opportunity to provide services for time critical applications. Such systems
would, for example, not meet the requirements of a congestion avoidance application,
because they have long delays and would require large capacity due to the large
geographical area of service. In contrast, VANET-based systems can have short
delays and the capacity can be reused more efficiently. Moreover, the structure of
VANET can be distributed, which improves the level of independence, scalability and
stability.

Many cities in India have already implemented a video surveillance system for

traffic management. However, this has been done before recent developments in mega

pixel IP cameras and video analytics, so it would be pertinent to discuss the impact of
these two developments and their implications for enforcement of traffic rules.

4
2.1.1 LIMITATIONS OF EXISTING SYSTEM

Greater temptation to drivers to abuse the no entry because the one-way


working is only for a short distance. Transfers onto adjacent roads often results in
increased traffic speed.

2.2 PROPOSED SYSTEM

The vehicular traffic management system consists of a Traffic App installed in


the drivers smart phone and a remote server. The GPS in the drivers smart phone
detects the location of the vehicle. The Traffic App extracts this location information
and sends it periodically to a remote server. The location information consists of the
latitude, longitude, and date and time which can be extracted through a code. This
location information obtained from the smart phone is logged into a database
periodically using GPRS. This location information is used to calculate traffic
congestion. Traffic congestion is calculated by considering the location of the vehicle
and the number of vehicles in a particular location boundary. If a vehicle is found to
transmit the same location information for a prolonged period of time, then the
vehicle is marked for traffic boundary. A traffic boundary is computed with the
marked vehicles location. The number of vehicles within that boundary is estimated.
Each of these vehicles is checked for location to identify the density of traffic. The
congestion information provides information about the existence of congestion in a
particular area.

5
2.2.1 Advantages of Proposed System

Vehicular traffic is one of the most important social and economic issues faced
today resulting in congestion.

Problem occurs when important destinations lie on the same route.

A smart transport system which will provide real time information about
the traffic by p2p is the need of the hour.
The existing smart transport systems demand a need for the construction of
expensive infrastructures or a change in the road structure.
A simple solution to traffic congestion is to gain knowledge about
the traffic congested routes.

The steady population increase in urban areas has led to an exponential


increase in the number of vehicles on road. With tremendous growth in industries the
need to reach the destination within a certain time is on-demand. A single technology
park housing multiple companies with each company accommodating more than a
hundred employees is one such example. In these cases, traffic becomes unavoidable
and there is a need for a solution to avoid vehicular traffic congestion.

Although these systems prove to be very effective, they will consume


enormous amount of time and cost to be deployed. Nowadays, the roads within cities
are well-connected and therefore there are numerous routes for a single destination. If
one route is congested, an alternate route can be taken. Once this knowledge is
gained, it is feasible to identify an alternate path and divert from traffic congested
areas. This solution not only helps in vehicle diversion but also resolves traffic
congestion at a minimal time.

6
2.3 Feasibility Study

Feasibility is defined as the practical extent to which a project can be performed


successfully. The objective of feasibility study is to establish the reasons for
developing the software that is acceptable to the users, adaptable to changes and
conformable to the established standards. Various types of feasibility that are
commonly considered include:

(1) Economic feasibility.


(2) Technical feasibility.
(3) Operational feasibility.

2.3.1 Economic Feasibility

Economic feasibility determines whether the proposed system is capable of


generating financial gains for an organization. It involves cost incurred on the
software development team, estimated cost of hardware, and cost of performing
feasibility study and so on. The proposed system is economically feasible since the
cost incurred for the development of the system produces long term gains. The cost of
hardware and software for the class of application of Society management system is
less. Hence the proposed system is economically feasible.

2.3.2 Technical Feasibility

Technical feasibility assess the current resources (includes hardware and


software) and technology which are required to accomplish the user requirements in
the system within the allocated time and budget. It is concerned with the existing
computer system (hardware and software) and to what extent it can support the
proposed system. The proposed system requires .net platform only.

7
2.3.3 Operational Feasibility

The proposed project would be beneficial to organization satisfying the


objectives when developed and installed. One of the main problems faced during
development of a new system is getting the acceptance from the user. There is support
from the management of organization towards the development of the project. All the
operational aspects are considered carefully. Thus the project is operationally feasible.

2.4 Hardware specification

Pentium 4 Processor.
3GB Free Disk Space(Minimum).
512 MB RAM(Minimum).
3GB Free Disk Space(Minimum).

2.5 Software Specification

Operating System : Windows XP or above.


Front End : C#.Net, Android.
Back End : Microsoft SQL Server 2012.

8
3. SYSTEM DESIGN
3.1 Input design

Input is considered as the process of keying in data into the system, which will be
converted to system format. People from different categories over the world use a web
application. So the input designs given in the application should be really flexible and faster to
use and are important for the success of the application. The easy to use hyperlinks of the
application help in navigating between different pages of the web application in a faster way.

The user need not enter the user ID in the corresponding field since the system identifies
the logged user and gets the user ID default. Also, the current date can be inserted by default. Sub
lists for a particular item can be displayed accordingly. All these provide a better way to handle
the input functions of the system.

Input design is a part of overall system design, which requires very careful attention. If
data going into the system is correct, then the processing and output will magnify these errors.
Thus the designer has a number of clear objects in the different stages of input design

To produce a cost effective method of input.


To achieve the highest possible level of accuracy.

9
3.2 Output Design

The success or failure of a software system is decided by the integrity and correctness
of the output that is produced by the system. One of the main objective behind the automation
of business systems itself is the fast and prompt generation of reports and information in a
short time period with correctness. Prompt and reliable reports are considered to be the
lifeline of every business today. At the same time wrong reports can shatter the business itself
and create huge and irreparable losses for the business. So the output/reports generated by the
system are of paramount importance.

At the beginning of the output design various types of outputs such as external,
internal, operational, and interactive and turnaround are defined. Then the format, content,
location, frequency, volume and sequence of the outputs are specified. The content of the
output must be defined in detail. The system analysis has two specific objectives at this stage.

To interpret and communicate the results of the computer part of a system to


the users in a form, which they can understand, and which meets their
requirements.

To communicate the output design specification to programmers in a way in


which it is unambiguous, comprehensive and capable of being translated into a
programming language.

10
3.3 CODE DESIGN

Register

using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Data;
using System.Data.SqlClient;

public partial class User_TrafficReg : System.Web.UI.Page


{
dboperation db = new dboperation();
protected void Page_Load(object sender, EventArgs e)
{
SqlCommand cmd2 = new SqlCommand();
cmd2.CommandText = "select max(Userid) from Registration1";
txt_userid.Text = db.max_id(cmd2).ToString();
}
protected void Button1_Click(object sender, EventArgs e)
{

SqlCommand cmd3 = new SqlCommand();


cmd3.CommandText="insert into Registration1
values('"+txt_userid.Text+"','"+txt_name.Text+"','"+RadioButtonList1.SelectedItem+"','"+txt_addr.Text+"',"+txt_pho
neno.Text+",'"+txt_email.Text+"','"+txt_pass.Text+"')";
db.execute(cmd3);
Response.Write("<script>alert('save')</script>");
SqlCommand cmd = new SqlCommand();
cmd.CommandText = "insert into login_table values('" + txt_userid.Text + "','" + txt_email.Text + "','" +
txt_pass.Text + "','User')";
db.execute(cmd);
txt_name.Text="";
RadioButtonList1.ClearSelection();
txt_addr.Text="";
txt_phoneno.Text="";
txt_email.Text="";
txt_pass.Text = "";

SqlCommand cmd2 = new SqlCommand();


cmd2.CommandText = "select max(Userid) from Registration1";
txt_userid.Text = db.max_id(cmd2).ToString();
}
}

11
Login

using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Data;
using System.Data.SqlClient;

public partial class Default2 : System.Web.UI.Page


{
dboperation db = new dboperation();
protected void Page_Load(object sender, EventArgs e)
{

}
protected void Button1_Click(object sender, EventArgs e)
{
SqlCommand cmd21=new SqlCommand();
cmd21.CommandText="select * from login_table where username='"+txt_user.Text+"' and
password='"+txt_password.Text+"'";
DataTable dt=db.getdata(cmd21);
if(dt.Rows.Count>0)
{
int id=Convert.ToInt32(dt.Rows[0][0]);
string type=dt.Rows[0][3].ToString();

if(type=="Admin")
{
Session["Ui"]=id;
Response.Redirect("Admin_home.aspx");
}
if(type=="user")
{

Session["Ui"]=id;
Response.Redirect("user_home.aspx");
}

if(type=="service")
{
Session["Ui"]=id;
Response.Redirect("service_home.aspx");
}
}
else
{
Response.Write("<script>alert('invalid id')</script>");
}
}
}

12
3.4.DATA BASE DESIGN

Database design is an important place in designing a system. During this phase


care should be taken to avoid redundancy of information storing into a database, since it leads
to wastage of memory space.

Normalization Techniques:

Normalization is a process of simplifying the relationship between data elements in a record.


Through normalization a collection of data in a records structure is replaced by successive record
structures that are simpler and more predictable and therefore more manageable.

First Normal Form


A relation is said to be in first normal form if the values in the relation are atomic for every
attribute in the relation .By this we mean simply that no attribute value can be a set of values or as it
sometimes expressed, a repeating group.

Second Normal Form


A relation is said to be in second normal form if it is in first normal form and it should satisfy
any one of the following rules.

Primary key is a not a composite primary key

No non-key attribute is fully functionally dependent on full set of primary key

Third Normal Form


A relation is said to be in third normal form if it is in second normal form and if their
exits no transitive dependencies.

Transitive Dependency
If two non-key attributes depends on each other as well as on the primary key then they are
said to be transitively dependent. the above normalization principles where applied to decompose
the data in multiple tables there by making the data to be maintained in a consistent state

13
4. SYSTEM TESTING

4.1 TESTING

System testing is actually a series of different tests whose primary purpose is to fully exercise
the computer-based system. Although each test has a different purpose, all work to verify that
all system elements have been properly integrated and perform allocated functions.

Testing is the final verification and validation activity within the organization itself.
Testing is done to achieve the following goals: to test the quality of the product, to find and
eliminate any residual errors from previous stages, to validate the software as a solution to the
original problem, to demonstrate the presence of all specified functionality in the product, to
estimate the operational reliability of the system. During testing the major activities are
concentrated on the examination and modification of the source code.

14
4.2 TEST TYPES

4.2.1 Unit testing

Unit testing focuses verification efforts on the smallest unit of software design, the
module. This is also known as module testing. The modules are tested separately. These
testing are carried out during programming stage itself. In this testing step, each module is
found to be working satisfactory as regards to the expected outputs from the module.

4.2.2 Integration testing

Integration testing is a systematic testing for constructing the program structure


while at the same time conducting tests to uncover errors associated with in the

interfaces; all the modules are combined and tested as a whole. when conducting this sort of
tests, the analyst may devise test data; the collection of data that analyst used when providing
system accuracy. Another source of test data is the user.

4.2.3 Validation testing

Validation testing is where requirements established as a part of software


requirements analysis is validated against the software that has been constructed. This test
provides the final assurance that the software meets all functional, behavioral and
performance requirements.

Text Field: The text field can contain only the number of characters lesser than or equal to its
size. The text fields are alphanumeric in some tables and alphabetic in other tables. Incorrect
entry always flashes an error message.

Numeric Field: The numeric fields can contain only numbers 0 to 9.An entry of any character
flashes an error messages.

Output testing

After performing the validation testing, the next step is output testing of the
proposed system, since no system could be useful if it does not produce the required output in
the specific format. The output generated by the system under considerations is tested by
asking the users about the format required by them.

15
White box testing

In white box testing knowing the internal working of the product, tests can be
conducted to ensure that internal operations are performed according to specification and all
internal components have been adequately exercised. In white box testing logical path
through the software are tested by providing test cases that exercise specific sets of conditions
and loops.

Using white-box testing software developer can derive test case that

Guarantee that all independent paths within a module have been exercised at least once.

Exercise all logical decisions on their true and false side.

Exercise all loops at their boundaries and within their operational bound.

Exercise internal data structure to ensure their validity.

At every stage of project development I have tested the logics of the program by
supplying the invalid inputs and generating the respective error messages. All the loops and
conditional statements are tested to the boundary conditions and validated properly.

Black box testing

This is a software testing in which the test are doesnt know the internal working of
the item being tested. For example in black box test, on software design the tester only knows
the input and the expected outputs. He doesnt know how the program drives the output. He
doesnt even imaging as to how, the coding is done. He need know only the specification.

The advantages of these testing approaches are

1. The test is unbiased because the designer and tester are independent of each other.

2. The tester needs no specific knowledge on any programming language

3. The test is done from the point of view of the user, not the designer.

4. The test can be designed as soon as the specifications are complete.

16
The disadvantages of these testing approaches are

1. The test can be redundant if the software designer has already run a test case.
2. The test can be difficult to design.
3. Testing every possible input stream is unrealistic.

Acceptance Testing

User Acceptance of a system is the key factor for the success of any system .The
system under consideration is tested for user acceptance by constantly keeping in
touch with the prospective system users at the time of developing and making of
hardware management software system.

17
5. SYSTEM IMPLEMENTATION AND
MAINTENANCE

System implementation is the final phase, i.e., putting the utility into action.
Implementation is the state in the project where theoretical design turned into working
system. The most crucial stage is achieving a new successful system and giving confidence in
new system that it will work efficiently and effectively. The system is implemented only after
thorough checking is done. It involves careful planning, investigation of the current system
and constraints on implementation, design of methods achieve.

Implementation is the stage of the project where the theoretical design is turn into a
working system. The implementation stage is a system project in its own right. It involves
careful planning, investigation of the current system and constraints on implementation,
design of methods to achieve the change over and the evolution method. Once the planning
has been completed the major effort is to ensure that the programs in the system are working
properly. At the same time concentrate on training user staff.

Implementation phase is an important one in which the source code put into the
operation. Before implementing the software, careful documentation is necessary.
Implementation should provide with well defined software requirements, design
specifications. The major milestone for project implementation is successful integration of
software components in the functioning system. During the implementation the configuration
management and quality assurance of requirements design specification and source code are
performed.

18
SYSTEM MAINTENANCE

Maintenance of the software is one of major step in computer animation. Software


which is developed by the engineer, should undergo maintenance process in regular interval
of time goes on new problems arise and it must be corrected accordingly. Maintenance and
enhancement are a long term process.

In this project, the maintenance is carried over by the administrator. Since he is the
key persons to develop this project they know clearly about the project coding structure. So,
they will change the coding whenever required. Regarding the project maintenance, the
changes will occur then and there according to the conditions.

19
6. SCOPE FOR FUTURE ENHANCEMENT

The website can be expanded over worldwide

It can be developed to a traffic control

Mobile apps can be developed

20
7. CONCLUSION

The project entitled ROAD TRAFFIC CONGESTION MANAGEMENT


USING VANET has been developed for the benefits of user to reduce the
congestion. This system is more advanced than existing system. This system is very
user friendly, so the user within minimum knowledge about the computer is able to
operate the system easily.

This system has been developed and is found working effectively. The
developed system is flexible and changes can made easily as and when required. We
tried to make the system maximum user friendly. Services is the main considerations
in the project. The system is protected from any unauthorized access by giving user
name and password during login process. All the necessary validations are carried
out in this project, so that any kind of user can use this software and necessary
messages make them conscious of the error they have made.

The project developed using c#.net & Android. It is based on the requirements
specification of the user and analysis of existing system with flexibility for future
enhancement. Since the system is developed in modules, future enhancement is very
easy.

21
8. BIBLIOGRAPHY

Teachers

Students

Internet

Friends

22
9. APPENDIX
9.1 DATA FLOW DIAGRAM

Basic DFD symbols:

In the DFD, there are four symbols, they are as follows:

A data flow is route, which enables packets of data to travel from one point to
another. Data may flow from a processor and from data store or process. An
arrow line depicts the flow, with arrow head pointing in the direction of the
flow.

A process represents transformation where incoming data flows are changed


in to outgoing data flows.

A data store is a repository of data that is to be stored for use by one or more
processes. It may be as simple as buffer or queue or sophisticated as
relational database. They should have clear names. If a process merely uses
the content of store and does not alter it, the arrow head goes only from the
store to the process. If a process alters the details in the store then a double-
headed arrow is used.

A source or sink is a person or part of an organization which enter or


receives information from the system. But is considered to be outside of the
contest of data flow Mo

23
LEVEL 0

24
25
26
27
9.2 Entity Relationship Diagram

An ER diagram can express the overall structure of the database graphically.


ER diagrams are simple and clear. ER diagrams often use symbols to represent three
different types of information. Boxes are commonly used to represent entities.
Diamonds are normally used to represent relationships and ovals are used to
represent attributes.

Three basic elements in ER models


includes:

Entities are the things about which we seek information

Attributes are the data we collect about the entities

Relationship provide the structure needed to draw information from


multiple entities

E-R Diagram Symbols

= Entity.

= Attribute

= Relation

= Connection

28
ER DIAGRAM

29
9.3 TABLE DESIGN

Login Page

Column Name Data type Description


ui int Primary key
d
Username varchar(50) Username
Password varchar(50) Password
Type varchar(50) Type of the user

Registration Table

Column Name Data type Description

User Id int Primary key

Name varchar(50) Name of the user

Gender varchar(50) F/M

Address varchar(50) Address of the user

Phone No Int Phone No of the user

User name varchar(50) User name

Password varchar(50) Pass word

30
Admin_serviceregtable

Column Name Data Type Description

Id Int Primary key

Name varchar(50) Name of the user

Lon Int Longitude of the area

Lat Int Latitude of the area

Service type varchar(50) services

Contanct No varchar(50) Contact No

Password varchar(50) Pass word

User name varchar(50) User name

Complaint Table
Column Name Data type Description

cId Int Primary key

uid Int User id

Complaint varchar(50) complaint

date Varchar(50) date

Reply varchar(50) reply

31
Congestion Table
Column Name Data type Description

Id Int Primary key

uid varchar(50) User id

Lat varchar(50) Latitude of the area

Lon Varchar(50) Longitude of the area

High traffic area_table


Column Name Data type Description

Id Int Primary key

location varchar(50) Location

time varchar(50) Time

Lon Varchar(50) Longitude of the area

Lat Varchar(50) Latitude of the area

32
Location_table
Column Name Data type Description

Id Int Primary key

uid varchar(50) User id

lat varchar(50) Latitude of the area

Lon Varchar(50) Longitude of the area

Over Speed_table
Column Name Data type Description

Ser No Int Primary key

date varchar(50) date

user id varchar(50) User id

speed Varchar(50) speed

33
Post awareness_table
Column Name Data type Description

awareness id Int Primary key

Awareness varchar(50) Awareness

date varchar(50) date

Set Speed Barrier_table


Column Name Data type Description

vehicle type varchar (50) Primary key

lon varchar(50) Longitude of the area

lat varchar(50) Latitude of the area

Speed limit varchar (50) Speed limt

34
Traffic Light Register_table
Column Name Data type Description

Id Int Primary key

Location varchar(50) Location of the area

Lon varchar(50) Longitude of the area

Lat varchar (50) Latitude of the area

User Report Accident_table


Column Name Data type Description

Id Int Primary key

Location varchar(50) Location of the area

Image varchar(50) Image

Accident type varchar (50) Accident type

Person harmed varchar (50) Name of person

lon Int Longitude of the area

Lat Int Latitude of the area

35
9.4 FORM DESIGN

LOGIN

36
POST AWARENESS

37
NEAR ACCIDENT

38
SERVICE REGISTER

39

Anda mungkin juga menyukai