Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Pervasive Computing and Its Application to Traffic Collision and Congestion Control

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 100 - Number 5
Year of Publication: 2014
Rahul Srivastava
Kitty Ahuja

Rahul Srivastava and Kitty Ahuja. Article: Pervasive Computing and Its Application to Traffic Collision and Congestion Control. International Journal of Computer Applications 100(5):7-11, August 2014. Full text available. BibTeX

	author = {Rahul Srivastava and Kitty Ahuja},
	title = {Article: Pervasive Computing and Its Application to Traffic Collision and Congestion Control},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {100},
	number = {5},
	pages = {7-11},
	month = {August},
	note = {Full text available}


Pervasive computing means "existing everywhere". It is the growing trend towards embedding microprocessors in everyday objects so they can communicate information. Due to this, all the embedded and mobile computing devices are becoming more and more pervasive and dynamically adaptive. In this paper we have described how a pervasive computing model helps to achieve dynamic adaptation with the environment and ubiquitously handles the overall environment. This paper sketches a hypothetical pervasive computing scenario, and uses them to identify key capabilities missing from today's systems. And for so we have demonstrated a pervasive model which can handle various traffic issues such as deadlock prevention and various random cases like car to car collision, sending signals to the vehicles approaching towards the point of collision and to prevent further deadlock problems. In this paper, we have shown previous problems in the era of computing and its solution achieved by this computing technology. The first section of this paper gives introduction to pervasive computing then second section describes the approach overview of this computing technology, third section deals with its layered architecture and fourth concentrates on case study analysis with explanation of hypothetical scenarios fifth, sixth and seventh deals with the proposed work and finally the last section gives the conclusion and references.


  • Weiser M. , The Computer for the 21st Century, Scientific American, September, 1991.
  • Weiser, M, Brown, J. S. The Coming Age of Calm Technology. In Denning, P. J. , Metcalfe, R. M. (editors), Beyond Calculation: The Next Fifty Years of Computing. Copernicus, 1998.
  • Shang-Wen Cheng, David Garlan, Bradley Schmerl, João Pedro Sousa, Bridget Spitznagel, Peter Steenkiste, Ningning Hu School of Computer Science Carnegie Mellon University 5000 Forbes Ave. Pittsburgh PA 15213 USA
  • 2006 Bundesamt für Sicherheit in der Informationstechnik –BSI Godesberger Allee 185-189, 53175 Bonn, Germany and SecuMedia Verlags-GmbH . Page73 Postfach 1234 55205 Ingelheim, Germany Tel. 06725/93040 Fax. 06725/5994 E-Mail: info@secumedia. de
  • M. Satyanarayanan-Pervasive Computing Vision and Challenges. School of Computer Science, Carnegie Mellon University.
  • Abowd, G. , Allen. and Garlan, D. Using Style to Understand Descriptions of Software Architectures. In Proceedings of SIGSOFT'93: Foundations of Software Engineering, December1993.
  • Abowd, G. , Burmitt, B. , and Shafer, S. (Eds). Ubicomp 2001: Ubiquitous Computing - Third International Conference Atlanta, Georgia, USA, September 30 - October 2, 2001 Proceedings. Lecture Notes in Computer Science 2201, Springer, October 2001
  • David Garlan, Daniel Siewiorek, Asim Smailagic, and Peter Steenkiste. Project Aura: Towards Distraction-Free Pervasive Computing. IEEE Pervasive Computing, 1(2):22–31, April-June 2002.
  • INTERNATIONAL CIVIL AVIATION ORGANIZATION, Biometrics Deployment of Machine Readable Travel Documents, Technical Report, Version 2. 0, 21/05/2004.
  • INOUE, H. , OSAWA, S. et al. , Dedicated Short-Range Communications (DSRC) for AHS Services, Proceedings 2004 IEEE Intelligent Vehicles Symposium, June 14-17, 2004, Parma, Italy, pp-369-374.
  • Technology and Society Magazine, Volume 24, Issue 1, pp. 24 - 33, 2005
  • Michael H. Coen, "Design Principles for Intelligent Environments", Proceedings of the fifteenth national/tenth conference on Artificial intelligence/Innovative applications of artificial intelligence, Madison, Wisconsin, United States; pp. 547 - 554, 1998
  • Guy Dewsbury, "The Social and Psychological Aspects of Smart Home Technology within the Care Sector", Journal of New Technology In The Human Services, Volume 14 , Issue 1-2 , pp. 9-18 , 2001
  • Paul Dourish and Genevieve Bell, "Yesterday's tomorrows: notes on ubiquitous computing's dominant vision", Personal and Ubiquitous Computing, Volume 11, Issue 2, pp. 133 - 143, 2007
  • Yitao Duan and John F. Canny, "Protecting user data in ubiquitous computing: Towards trustworthy environments", Privacy Enhancing Technologies, Volume 3424, pp. 167 - 185, 2005
  • Anne Galloway,"Intimations of everyday life: Ubiquitous computing and the city", Cultural Studie, Volume 18, Issue 2 & 3, pp. 384 - 408, 2004
  • Robert Grimm, "One. world: experiences with a pervasive computing architecture",IEEE Pervasive Computing, Volume 3, Issue 3, pp. 22 - 30, 2004