Traffic control method, device and system
A control method and location information technology, applied in the field of data processing, can solve problems such as gaining time and consuming manpower and material resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0086] First, the structure of the traffic control system to which this application is applicable is demonstrated. see figure 1 As shown, it is a schematic structural diagram of a traffic control system 100 provided by the embodiment of the present application. The system 100 includes a roadside communication device 110 , an edge computing device 120 , and a signal conversion device 130 . Wherein, the roadside communication device 110 is communicatively connected with the edge computing device 120 , and is configured to receive an emergency handling request sent by a terminal device associated with a target passing object, and forward the emergency handling request to the edge computing device 120 . The edge computing device 120 is connected in communication with the signal conversion device 130, and is used to obtain the movement state information of the target passing object in response to receiving the emergency event processing request, and determine and adjust the display...
Embodiment 2
[0096] see figure 2 As shown, the device executing the access control method may be an edge computing device. The following describes the traffic control method provided by Embodiment 2 of the present application from the perspective that the execution subject is an edge computing device. A traffic control method provided in an embodiment of the present application includes the following steps:
[0097] S201: In response to receiving an emergency handling request sent by a terminal device associated with a target passing object, acquire movement state information of the target passing object.
[0098] In a specific implementation, the edge computing device may locate the target passing object in response to receiving an emergency event processing request sent by the terminal device associated with the target passing object, and then obtain the moving state information of the target passing object.
[0099] Here, the target traffic object can be a special vehicle, such as an...
Embodiment 3
[0125] see image 3 As shown, the device executing the access control method may be an edge computing device. The following describes the traffic control method provided by Embodiment 3 of the present application from the perspective that the execution subject is an edge computing device. A traffic control method provided in an embodiment of the present application includes the following steps:
[0126] S301: In response to receiving an emergency handling request sent by a terminal device associated with a target passing object, acquire movement state information of the target passing object.
[0127] In a specific implementation, the edge computing device may locate the target passing object in response to receiving an emergency event processing request sent by the terminal device associated with the target passing object, and then obtain the moving state information of the target passing object.
[0128] Here, the target traffic object can be a special vehicle, such as an ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


