Article 10
Article 10
Article 10
Indian Journal of Science and Technology, Vol 11(44), DOI: 10.17485/ijst/2018/v11i44/137642, November 2018 ISSN (Online): 0974-5645
Abstract
Objective: Traffic enforcement systems are very important implementations of different technologies used worldwide.
Collecting data of violators by the traffic police is not always feasible in the current system of practice in India, as they are
not connected to the online database. Methods: This study introduces android based camera phone and tablet with latest
mobile data network facility as a technical field tool for the police to issue or check the traffic law enforcement status with
cost effective and rapid operational solution for present scenario. Findings: The traffic policeman is given an android
mobile working on Mobile data technology. When a violator is stopped, he/she is asked to produce his/her driving license
and other registration details. On the basis of these details, the device will be able to retrieve data relating to previous
offences committed by the driver or the vehicle from its database. The terminal prints the tickets and it is updated online.
Each device is capable of acting as a payment receiving station for any notice generated by any other device and issue the
receipt. Application: Moreover, this study introduced a system that will also enable the policemen to know whether the
vehicle involved in the traffic rule violation is stolen, the previous history of the vehicle or driver in accidents, and whether
any notice from the traffic police is pending against the vehicle.
Keywords: Advanced Video Graphics Array (AVGA), Mobile Cloud Computing, Road and Traffic Enforcement, Universal
Mobile Telecommunications System (UMTS), GPS
all the data from the sensors of the new project and to enormous growth of vehicles, poor traffic enforcement is
merge them with the existing data to run the project one of the major causes for traffic congestion and poor
effectively and efficiently. In1, the author demonstrated discipline on roads. Road users do not follow traffic rules
the importance of a business intelligence system for and violation of these rules has become norm rather than
operating, engineering, researching and managing aspects an exception. Existing manual monitoring and ticketing
of the project. But Traffic police currently have limited system prevalent in most of the cities is not effective, as
resources and they are assigned to tasks that cannot be deterrence level is minimum. In manual monitoring and
automated2–4. ticketing system, there is no mechanism to punish repeat
Many countries have been using speed and red- offenders. The system is also not transparent as manual
light enforcement cameras5. However, the automatic booking system breeds corruption and harassment9.
enforcement camera technology, like any resource, is The traffic management system provides a real-time
expensive and cannot be deployed everywhere at all data detection and notification mechanism to detect
times6. Almost three decades of use, automated traffic traffic speed violation, also to notify the police and the car
enforcement has mainly been applied to speed and red owner of the committed violation in order to be able to
light violations. In the recent years, however, there has been take the right procedure at the right time, resulting in an
an extension to other violations, e.g., following distance, increasing rate of saved lives. There are systems to identify
lane keeping, and toll payment violations. The increased whether the driver is alcoholic, or not. The speed of vehicle
use of digital video and image processing technology, as is measured and checked if vehicle is in over speed then
well as the electronic identification of vehicles, has paved shutdown signal is send to the vehicle then vehicle gets
the way for extending the applications to a still wider slow down and stopped. There are some mechanisms to
spectrum of violations, as well as making the enforcement check the vehicle parameters and document (Vehicle Reg.
considerably more efficient in the future7. The ESRA no, Seat belt status, alcohol status, insurance, tax etc.) status
(European Survey of Road users’ safety Attitudes) was if anything finds improper then the car gets arrested and
to develop a system for gathering reliable information stopped. Usage of Radio Frequency Identification (RFID)
about people’s attitudes towards road safety in a number technology can detect the theft vehicle when a vehicle
of European countries. This objective has been achieved gets theft10. The idea is to design a framework that can be
and the initial expectations have even been exceeded. utilized to design happening on the road and afterward
The outputs of the ESRA project can become building sends SMS to both the owner of the vehicle and the police
blocks of a road safety monitoring system in Europe that additionally take a picture. The proposed framework
goes beyond monitoring road traffic casualties and also comprises of microcontroller, RFID and Global System
includes indicators for the underlying causal factors. The for Mobile communications (GSM). The framework is
ESRA project has also demonstrated the feasibility and having two RFID readers alongside a tag that is joined to
the added value of joint data collection on road safety the vehicle and GSM is used to notify the vehicle’s owner
attitudes and performance by partner organizations in and police through SMS. Moreover, a photo of a vehicle is
a large number of European countries. The intention is taken by means of the camera and a fine is charged when
to repeat this initiative on a biennial or triennial basis, the speed limit is exceeded11. The point of the examination
retaining a core set of questions in every wave allowing is to fabricate a sensor framework for foundation to
the development of time series of road safety performance vehicle, which can transmit the data gave by active signs
indicators. This would become a solid foundation for a put making progress toward adjust the vehicle’s velocity
joint European (or even global) monitoring system on and prevent impacts. By active signs we mean normal
road safety attitudes and behavior8. activity signals that includes long-extend active RFID
Today, Indian Metros like New Delhi, Mumbai, labels with data put away into them. This data is gathered
Kolkata, Chennai, Bangalore and Hyderabad have nearly progressively by RFID sensors set on board of the vehicle,
20 million vehicles. As a consequence, there are too which will convert to consequently change its rate to
many vehicles occupying disproportionately inadequate adjust to the circumstances of the street. Specifically, it
quantum of roads. Therefore, the greatest challenge for included a fuzzy logic control algorithm to calculate the
city police managers is traffic management at par with longitudinal velocity of the vehicle, with actuators which
maintenance of order and prevention of crime. Apart from control the vehicle’s throttle and brake to reach and keep up
2 Vol 11 (44) | November 2018 | www.indjst.org Indian Journal of Science and Technology
Y. Mohana Roopa, M. Ramesh Babu and D. Kishore Babu
a given target speed12. Wi-Fi Traffic Enforcement (WiTE) finger print technology using the smart phone, finger-
is placing a Wi-Fi card on-board of all vehicles. This card print scanner. Traffic police can catch the pending ticket
is able to communicate with various Wi-Fi Access Points defaulters, theft vehicles, fake addressed vehicles, address
(APs) in an infrastructure along the roads of a city, where changed vehicle owners, wanted vehicles, watched vehicles,
APs will be available at all intersections. These APs can crime involved vehicles, vehicle numbers containing
either be an existing infrastructure or a specifically built multiple owners and vehicle transferred through brokers
infrastructure for the WiTE system. When simulating the who are not reflected in the RTA registers on the road.
system on OPNET Network Modeler, a Free Space Wi-Fi Traffic cops can also make e-Tickets on traffic violators
environment is used13. without stopping the vehicle on the roads can be sent the
Existing solutions include Radio Frequency traffic violation tickets to their concerned address of the
Identification (RFID) used for tolling13, Camera-based owner of the vehicle.
used for red light crossing violations14. Also, Radars15,
Wireless Magnetic Sensors16 and Induction Loops are 2.1.1 Android Smart Phone Module
used for speeding violations17. There are also Global
Terminal with GSM modem along with the UMTS
Positioning System (GPS)-based traffic monitoring
technology for the data transmission as communication
technologies; however, such solutions are mainly used for
network device. An alternative terminal should support
congestion reporting rather than traffic enforcement.
the UMTS/LTE system for communicating between
Each of the currently available solutions addresses
the Unit and the e-Challan data control room. Data
mainly a single violation, requiring a combination of
transmission should not exceed more than a second for
several solutions to address them all. The lack of a single
1KB data transmission from the unit to the Centralized
comprehensive system is the motivation for this study.
Data Base Server at e-Challan control room. Connectivity
should be established from unit to the server within 2 to 4
2. A New Geo-based Traffic secs for each unit power start-up.
Enforcement
2.1.2 Printer Module
New Geo-based Traffic Enforcement is recommended
Handheld terminal must contain the built in printer
with many advanced features to the existing application
containing thermal printing technology. Printer contains
like GPS based smart camera phones, UMTS/ LTE latest
and supports e-inches printer rolls. All the printouts
mobile internet technology, An Android application,
should work based on the thermal print technology should
Mobile multimodal communication.
be able to print the violations list for the continuous for
the period of 8hrs as minimum requirement. Printer
2.1 Methodology
should print at least a minimum of 28 to 32 characters
The system should allow the visible violations and per line. Printer should print a line within a time of 0.01
captures the image of the violations for the evidence scope. sec per line.
The captured information along with the image should
be stored in the remote centralized server. The captured 2.1.3 GPS Module
information and image should be transferred through
Global Position System should be able to integrate
UMTS (3G) (Through Mobile cloud) LTE (4G) from the
later on upgrade the handheld terminal to retrieve the
smart phone to the control room. Smart Phone should
information of the coordinates for finding out the geo
have a wide range display unit for better view preferably
location of camera sent photograph.
(Video Graphics Array) VGA display or Advanced Video
Graphics Array (AVGA) technology. Police official uses
the Smart Phone for new traffic challan tickets based on 2.1.4 Incident Records Module
the vehicle registration number or using the finger prints Visible traffic violations. Images for the traffic violation
from the fingerprint scanner of the smart phone. Traffic evidences. The primary violations can be noted down
police are able to find the multiple violators based on the using the handheld terminal. The primary traffic violation
Vol 11 (44) | November 2018 | www.indjst.org Indian Journal of Science and Technology 3
Road and Traffic Enforcement System Using GPS Enabled Mobile Cloud Computing
image should be in color. An incident record should have violation data including vehicle registration number with
at least two images with at least one image clarity shown the existing RTA database and for generation of challans
in the number plate and the traffic violation including the has to be provided by the vender. In case the customer has
red-light on the traffic signal. Images must clearly enable any legacy system with required database, the vendor has
the make and the model of the offending vehicle to be to provide necessary software and technical support for
identified. Images forming part of an incident record matching, retrieving and generation of challans from the
must be sufficient quality to prove the offence in the court existing database.
of law.
Incident data block: Each incident record must 2.1.7 Control Room Communication Module
have the following records, Site identification, name The system should have appropriate means of
and location. Traffic police station jurisdiction. Nearest communication between the control room (in station)
junction. Date and time of traffic violation/offence. and controllers (out station) installed at various junctions.
Booking officers name, cadre, and traffic police It should have the facility to transfer violation data
station/department. Vehicle registration code and vehicle capture on the hard disk to the control room either on
number. demand or automatically through PTS/broadband/fibre
optic/wireless etc. The interface software should support
2.1.5 Device Communication and Processing transmission of data irrespective of communication
Module network that is PSTN/broadband/fibre optic/wireless
Electronics of processing module, communication etc, necessary hardware and software interface for this
module should be maintained at server side management purpose should be provided by the bidder.
using UMTS/LTE mobile technology.
Data will be passing through the handheld terminal 2.1.8 Access Control Security Module
to the server and the data will be stored in the centralized The violation data will be transmitted using the GSM
server. Handheld terminal should not contain and store and UMTS/LTE technology from the handheld terminals
the data except handheld protocol. to the centralized server using the HTTPS (Hyper Text
Transfer Protocol secure) server. Appropriate encryption
2.1.6 User Interface Facility Module keys must be used for the encryption process and
The User Interface to be designed to have simple operation application should maintain the digital signature facilities
as required. The interface should be updated during the and important key loggers. The operator/user should
period of warranty/AMC as per new suggestions and be able to download the violator’s violations and images
operational requirements. The User Interface broadly from the public gateway. Administrator/Supervisor–
should fall into the categories of viewing violations access the system status, change configuration settings,
and system configuration. The violation viewer should change access codes and passwords, delete records.
provide a means of listing the invalid violations along with User/operator- access to download incident records,
the reasons of invalidation without deleting the records. log files and challan payment status. They cannot change
Software should provide interface for taking prints of the the configuration settings or mode of operation.
violations (including image and other details preferred).
A read only log of user actions to be maintained in the 2.1.9 MIS Reporting Module
server at the back office for each instance. There should The system must be able to give statistical information
be a password access system along with the user type based on the e-challans and e-ticket system.
(admin, user). Number of Challans booked Number of violations
All challans should have an image along with the Number of challan defaulters, Number of challan
violation details including the classification of the payments. Flow Diagram of proposed Android based
offence, place of offence, police station jurisdiction, solution for Road safety and Traffic Enforcement
speed, dangerous driving etc. The software should also be System as shown in Figure 1(a). The extension of
capable of generating query based statistical reports on contact, MIS/View in Figure 1(a) as shown in Figure 1(b)
the violation data. Necessary software for matching the respectively.
4 Vol 11 (44) | November 2018 | www.indjst.org Indian Journal of Science and Technology
Y. Mohana Roopa, M. Ramesh Babu and D. Kishore Babu
(a) (b)
Figure 1. (a) Flow diagram of proposed android based solution for road safety and traffic enforcement system, (b) Flow
Diagram of contract.
3. Proposed Solution systems are in any other case bodily secured. Policy should
be evolved to outline the phrases and situations.
A complete administrative facts protection policy ought
to be advanced which defines the records belongings that
this paper needs to defend, and defines the importance 4. Conclusion
of each computer users and computer operators to make The present method is designed in such a way, that it makes
certain protection of these property. This approach more comfortable to use the application with providing
encouraged that supervisory computing servers be the electronic field devices/gadgets with readymade
protected with the aid of a firewall. This will allow crew solution installed. The study highlights the key benefits to
to higher control how they’re accessed and used. The the department and public as well. Consequently, gaining
Kerberos/some other network authentication provider the local success will generate the market awareness and
turned into recommended for users of the data, Violation improve the sales.
related applications. Its miles additionally endorsed
that users will be needed to supplement their Kerberos
authentication with token authentication. 5. References
Similarly, a few customers unable to use Kerberos 1. Sher M, Shifrin G. Automatic traffic enforcement camera
authentication (generally because of insufficient desktop operation, based on a business intelligence system. Springer
assets) will rather be need to apply a token to authenticate International Publishing AG, LNBIP. 2017; 282:16 –31.
them. A token usually uses either a task/reaction set of rules, https://doi.org/10.1007/978-3-319-57487-5_2
or a clock-driven set of rules to create one-time passwords, 2. Elvik R. Speed limits, enforcement, and health consequences.
which cannot be re-used later, although they’re disclosed Annual Review of Public Health. 2012; 33:225–38. https://
with the aid of network sniffing. A token verification doi.org/10.1146/annurev-publhealth-031811-124634.
server gives token authentication offerings for the server. PMid:22224882
Customers storing sensitive statistics on their computing 3. Elvik R. Speed enforcement in Norway: Testing a game-
theoretic model of the interaction between drivers and the
device computer systems might be required to guard the
police. Accident Analysis and Prevention. 2015; 84:128–33.
information the usage of computer get entry to manage
https://doi.org/10.1016/j.aap.2015.08.017. PMid:26342893
and encryption software program until the computer
Vol 11 (44) | November 2018 | www.indjst.org Indian Journal of Science and Technology 5
Road and Traffic Enforcement System Using GPS Enabled Mobile Cloud Computing
4. Wijers PJ. Automated enforcement, get it right, make it safe. 12. Kathawala YA, Tueck B. The use of RFID for traffic
16th Road Safety on Four Continents Conference Beijing, management. International Journal of Technology, Policy
China; 2013. p. 1–15. and Management. 2008; 8(2). https://doi.org/10.1504/
5. Automated Traffic Monitoring System [Internet]. [cited IJTPM.2008.017215
2014 May 11]. Available from: https://ieeexplore.ieee.org/ 13. Ramesh Babu M, Mohana Roopa Y. Component-based self-
document/6887618. adaptive middleware architecture for networked embedded
6. SriRam G, Mohana Roopa Y. A threshold multi authority systems. International Journal of Applied Engineering
CP_ ABE access control scheme to verify attribute set in Research. 2017; 12(12):3029–34.
public cloud storage. International Journal of Creative 14. TIPMRA. How Speed Trap Radar Works [Internet].
Research Thoughts. 2018; 6(1):1310–15. [cited 2011]. Available from: http://www.scirp.org/
7. Buttler I. Enforcement and support for road safety policy (S(351jmbntvnsjt1aadkposzje))/reference/References
measures. ESRA thematic report no. 6. ESRA project Papers.aspx?ReferenceID=782536.
(European Survey of Road users’ safety Attitudes; 2016. 15. Sifuentes E. Wireless magnetic sensor node for vehicle
p. 1–50. detection with optical wake-up. IEEE Sensors Journal. 2011;
8. Angel Mariya TP. Traffic enforcement system. International 11(8):1669–76. https://doi.org/10.1109/JSEN.2010.2103937
Research Journal of Engineering and Technology. 2016; 16. Praveena A, Mohana Roopa Y. Resource allocation using
3(9):1222–6. entropy based FIFO method in mobile cloud computing.
9. Lujaina Al S. Automobile speed violation detection system International Journal of Engineering Sciences Review.
using RFID and GSM technologies. International Journal 2013; 4(1):1–4.
of Applied Information Systems Foundation of Computer 17. Byon Y, Shalaby A, Abdulhai B. Travel Time Collection and
Science. 2014; 7(6). Traffic Monitoring via GPS Technologies. Proceedings of
10. Mishra A. Design of RF based speed control system for the IEEE Intelligent Transportation Systems Conference
vehicles. International Journal of Advanced Research in ITSC, Toronto; 2006. p. 677–82. https://doi.org/10.1109/
Computer and Communication Engineering. 2012; 1(8): ITSC.2006.1706820
1–4.
11. Gendi FW. Wi-Fi Traffic Enforcement System (WiTE).
Journal of Transportation Technologies. 2013; 3:142–8.
https://doi.org/10.4236/jtts.2013.32014
6 Vol 11 (44) | November 2018 | www.indjst.org Indian Journal of Science and Technology