Traffic management system based on wsn in Kuwait: an initial design
This paper discusses traffic problems in the world and emphasizes on Kuwait city as case study. Many of these problems can be solve by building a Traffic Management System based on a Wireless Sensor Network (WSN). TMS is an innovative design for the road that saves time and money for the driver. Thi...
| Main Authors: | Taha, Imad, Alkandari, Abdulrahman, alnasheet, Meshal |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/24471/ http://irep.iium.edu.my/24471/1/TRAFFIC%2BMANAGEMENT%2BSYSTEM%2BBASED%2BON%2BWSN%2BIN%2BKUWAIT%2BAN%2BINITIAL%2BDESIGN.pdf |
Similar Items
Designing a smart city in Kuwait: an initial study
by: Alkandari, Abdulrahman, et al.
Published: (2012)
by: Alkandari, Abdulrahman, et al.
Published: (2012)
Smart cities: a survey
by: Alkandari, Abdulrahman, et al.
Published: (2012)
by: Alkandari, Abdulrahman, et al.
Published: (2012)
Implementation of dynamic fuzzy logic control of traffic
light with accident detection and action system using iTraffic simulation
Simulation
by: Alkandari, Abdulrahman, et al.
Published: (2018)
by: Alkandari, Abdulrahman, et al.
Published: (2018)
Dynamic fuzzy logic traffic light integrated system with accident detection and action
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Comparative study between traffic control methods
Using simulation software
by: Taha Alshaikhli , Imad Fakhri, et al.
Published: (2013)
by: Taha Alshaikhli , Imad Fakhri, et al.
Published: (2013)
Security risk analysis used by Kuwait government sectors
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
An anatomy of IGP and BGP routing protocols
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Accident detection system and method for accident detection
by: Alkandari, Abdulrahman, et al.
Published: (2014)
by: Alkandari, Abdulrahman, et al.
Published: (2014)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
The influence of internet and social media on purchasing
decisions in Kuwait
by: Abdulkareem Al-Enezi, Khalid, et al.
Published: (2018)
by: Abdulkareem Al-Enezi, Khalid, et al.
Published: (2018)
Evaluated reputation-based trust for WSN security
by: Said Alkalbani, Abdullah, et al.
Published: (2014)
by: Said Alkalbani, Abdullah, et al.
Published: (2014)
Achieving security by combining Huffman and SLSB algorithms
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Kuwait government entities e-business continuity and
disaster recovery plan
by: Alenezi, Khalid, et al.
Published: (2014)
by: Alenezi, Khalid, et al.
Published: (2014)
A survey of intrusion detection system using case study Kuwait governments entiteis
by: Alenezi, Khalid, et al.
Published: (2014)
by: Alenezi, Khalid, et al.
Published: (2014)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
Routing protocol design for secure WSN: Review and open research issues
by: Md Zin, Shazana, et al.
Published: (2014)
by: Md Zin, Shazana, et al.
Published: (2014)
The influence of internet and social media on
purchasing decisions in Egypt and a comparison
between Egypt and Kuwait
by: Alenezi, Khalid Abdulkareem, et al.
Published: (2017)
by: Alenezi, Khalid Abdulkareem, et al.
Published: (2017)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
Distance based thresholds for 2-tier relay nodes selection in WSN
by: Azamuddin, Abdul Rahman, et al.
Published: (2019)
by: Azamuddin, Abdul Rahman, et al.
Published: (2019)
The influence of Internet and social media on purchasing
decisions in Indonesia and a comparison between
Indonesia and Kuwait
by: al-enizi, Khalid, et al.
Published: (2019)
by: al-enizi, Khalid, et al.
Published: (2019)
e-Business continuity and disaster recovery plan case study: Kuwait government entities (GEs)
by: Al-Enezi, Khaled Abdulkareem, et al.
Published: (2013)
by: Al-Enezi, Khaled Abdulkareem, et al.
Published: (2013)
Optimal path planning for urban vehicles using
Internet of Things: a new navigation perspective
by: Alawadhi, Nayef, et al.
Published: (2019)
by: Alawadhi, Nayef, et al.
Published: (2019)
WSN based sensing model for smart crowd movement with identification: a conceptual model
by: Nawaz, Naeem A., et al.
Published: (2016)
by: Nawaz, Naeem A., et al.
Published: (2016)
Performance analysis of MAC protocol for cooperative MIMO transmissions in WSN
by: Ahmad, Mohd Riduan, et al.
Published: (2008)
by: Ahmad, Mohd Riduan, et al.
Published: (2008)
Securing WSN with lightweight resource-efficient schemes
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Indoor localization based on Received Signal Strength Indicator (RSSI) in Wireless Sensor Network (WSN)
by: Nur Aina Auni, Ramlan
Published: (2019)
by: Nur Aina Auni, Ramlan
Published: (2019)
Improved K-means clustering and adaptive distance threshold for energy reduction in WSN-IoTs
by: Azamuddin, Ab Rahman, et al.
Published: (2025)
by: Azamuddin, Ab Rahman, et al.
Published: (2025)
Cryptographic hash function: A high level view
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Public key cryptography in resource-constrained WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad
by: Iftikhar , Ahmad
Published: (2019)
by: Iftikhar , Ahmad
Published: (2019)
Storage management
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Disk management
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020)
by: Mohammed, Al-Naeem, et al.
Published: (2020)
Traffic Information System Kuala Lumpur / Tay Tick Seng
by: Tay , Tick Seng
Published: (2003)
by: Tay , Tick Seng
Published: (2003)
Online feature selection based on input significance analysis (ISA) for evolving connectionist systems (ECos)
by: Hassan, Raini, et al.
Published: (2017)
by: Hassan, Raini, et al.
Published: (2017)
Basic storage management
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Basic disk management
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Modeling and analysis of wastewater heat recovery system in Kuwait
by: Aldousari, Meshal R. E. E. M, et al.
Published: (2020)
by: Aldousari, Meshal R. E. E. M, et al.
Published: (2020)
Similar Items
-
Designing a smart city in Kuwait: an initial study
by: Alkandari, Abdulrahman, et al.
Published: (2012) -
Smart cities: a survey
by: Alkandari, Abdulrahman, et al.
Published: (2012) -
Implementation of dynamic fuzzy logic control of traffic
light with accident detection and action system using iTraffic simulation
Simulation
by: Alkandari, Abdulrahman, et al.
Published: (2018) -
Dynamic fuzzy logic traffic light integrated system with accident detection and action
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017) -
Comparative study between traffic control methods
Using simulation software
by: Taha Alshaikhli , Imad Fakhri, et al.
Published: (2013)