Cooperative intelligent traffic system communication between bicycles

ABSTRACT

A cooperative intelligent traffic system is provided for use between bicycles, motorcycles, and other vehicles. Sensor data from mobile devices and other sensor devices associated with the vehicle can be sent to an edge network computing device (e.g., a multi-access edge computing device) and be processed at the edge network to identify threats and hazards, and then transmit the threat assessment data to other bicycles, motorcycles, and vehicles nearby. The threat assessment data can be used by the operators of the other vehicles to warn them of upcoming threats, hazards, road conditions, and other pertinent conditions.

RELATED APPLICATIONS

The subject patent application is a continuation of, and claims priorityto each of, U.S. patent application Ser. No. 16/382,401 (now U.S. Pat.No. 11,151,877), filed Apr. 12, 2019, and entitled “COOPERATIVEINTELLIGENT TRAFFIC SYSTEM COMMUNICATION BETWEEN BICYCLES,” which is acontinuation of U.S. patent application Ser. No. 15/963,964 (now U.S.Pat. No. 10,304,338), filed Apr. 26, 2018, and entitled “COOPERATIVEINTELLIGENT TRAFFIC SYSTEM COMMUNICATION BETWEEN BICYCLES,” theentireties of which applications are hereby incorporated by referenceherein.

TECHNICAL FIELD

The present application relates generally to the field of mobilecommunications and, more specifically, to enabling a cooperativeintelligent traffic control system between vehicles using multi-accessedge computing sensor data from a wireless device associated with abicycle device.

BACKGROUND

Motorcycling and bicycling can be risky forms of transportation,especially when traveling in groups due to limited visibility of theroad ahead. Connected car solutions cannot be ported easily to thesebikes because they have limited cabin space to mount/store advancedsensors.

BRIEF DESCRIPTION OF THE DRAWINGS

Non-limiting and non-exhaustive embodiments of the subject disclosureare described with reference to the following figures, wherein likereference numerals refer to like parts throughout the various viewsunless otherwise specified.

FIG. 1 illustrates an example cooperative intelligent traffic system inaccordance with various aspects and embodiments of the subjectdisclosure.

FIG. 2 illustrates an example cooperative intelligent traffic system inaccordance with various aspects and embodiments of the subjectdisclosure.

FIG. 3 illustrates an example cooperative intelligent traffic system inaccordance with various aspects and embodiments of the subjectdisclosure.

FIG. 4 illustrates an example cooperative intelligent traffic system inaccordance with various aspects and embodiments of the subjectdisclosure.

FIG. 5 illustrates an example cooperative intelligent traffic system inaccordance with various aspects and embodiments of the subjectdisclosure.

FIG. 6 illustrates an example multi-access edge computing device inaccordance with various aspects and embodiments of the subjectdisclosure.

FIG. 7 illustrates an example method for facilitating a cooperativeintelligent traffic system in accordance with various aspects andembodiments of the subject disclosure.

FIG. 8 illustrates an example method for facilitating a cooperativeintelligent traffic system in accordance with various aspects andembodiments of the subject disclosure.

FIG. 9 illustrates an example block diagram of an example user equipmentthat can be a mobile handset operable to provide sensor data and receivethreat information in accordance with various aspects and embodiments ofthe subject disclosure.

FIG. 10 illustrates an example block diagram of a computer that can beoperable to execute processes and methods in accordance with variousaspects and embodiments of the subject disclosure.

FIG. 11 illustrates an example block diagram of a non-limitingembodiment of a mobile network platform in accordance with variousaspects described herein

DETAILED DESCRIPTION

One or more embodiments are now described with reference to thedrawings, wherein like reference numerals are used to refer to likeelements throughout. In the following description, for purposes ofexplanation, numerous specific details are set forth in order to providea thorough understanding of the various embodiments. It is evident,however, that the various embodiments can be practiced without thesespecific details (and without applying to any particular networkedenvironment or standard).

Various embodiments disclosed herein provide for a cooperativeintelligent traffic system between bicycles, motorcycles, and othervehicles. Sensor data from mobile devices and other sensor devicesassociated with the vehicle can be sent to an edge network computingdevice (e.g., a multi-access edge computing device) and be processed atthe edge network to identify threats, hazards or performancerecommendations (speed, heartrate, pulse, cadence), and then transmitthe threat assessment data to other bicycles, motorcycles, and vehiclesnearby. The threat assessment data can be used by the operators of theother vehicles to warn them of upcoming threats, hazards, roadconditions, and other pertinent conditions.

By performing the processing at the edge of the network and instead ofhaving cloud servers perform the processing, the latency can be reduced,offering much faster notifications of conditions to trailing vehicles.Offloading of processing achieves resource savings for energy-constrainttwo-wheeled vehicles such as bikes. For bicycles that traveling in agroup, a one or two second lag time between the sensor device at thefront of the pack sending the sensor data to the cloud server, and thena trailing bicycle from getting the warning would be too long. Instead,by performing the processing at the edge network, via a multi-accessedge computing device, the latency can be massively reduced by criticalmilliseconds, enabling a trailing bicycle to have enough warning tododge the hazard or perform some other safety maneuver.

Any sensor integration can involve different limitations. Cars haverelatively unlimited electrical power, and cars have places that areprotected from the elements. Bikes a strong platforms for sufficientbattery power, but need everything to be waterproofed. Pedestrians needthings as light and small as possible. Kickscooters, such as the footpowered models from companies like Razor, fall somewhere between bikesand pedestrians, but need more resilience than either bikes orpedestrians.

One advantage of these progressively smaller and slower platforms isthat the sensors can provide useful metrics even if the accuracydiminishes with size. Bikes don't need 100 kph (60 mph) speed sensors.Pedestrians don't need 30 kph (20 mph) speed sensors. Bikes andpedestrians don't need to detect fixed objects 100 yards away.Essentially, vehicle-to-vehicle sensor platforms designed for cars andtrucks are not appropriate for pedestrians, although they can shareinformation with the bicycle based sensors

Common smartphones, smart watches, Augmented Reality Goggles (so therider can still see), etc. are able to improve how Smart Bikeinformation is fed to the bike riders. However, a wide variety of visualor tactile devices can relay the smart bike results to the bike rider.Existing bicycle computers(speedometer/cadence/time/distance/Odometer/Stopwatch) could alsodisplay Smart Bike instructions for avoiding trouble or improvingefficiency. This innovation will quantify what is today only visible tothe trained observer, and relay those metrics and deduced conclusions toother Smart Bike Riders in a time frame that provides each Smart BikeRider to take advantage of that information. When Bike A has a flattire, maybe Bike B can hear the tire pop, but Bike D, E, F, G, H, etc.will likely not hear the pop, but could still avoid the rapidly stoppingBike A. A startling example is during races like the Tour de France,while sprinting to the day's finish, dozens might hit the pavementbecause of one Bike's failure. A collection of Smart Bikes could steeror brake to avoid a bloody tangle of bodies and bikes. How the ridersreceive redirections is obvious when common electronic gadgets areconsidered. We can expand the scope of the innovation to connectingBikes AND Pedestrians AND Skateboarders AND Scooters AND etc. Theseadditional agents of change could be instrumented by a smartphone or asmart watch. Then their location and activity information become moreinputs to the real time management system

While reference is generally made throughout the disclosure to an uplinkdata transmissions, in other embodiments, the principles disclosedherein can apply to downlink transmissions as well.

In various embodiments, a network device can comprise a processor and amemory that stores executable instructions that, when executed by theprocessor facilitate performance of operations. The operations cancomprise receiving, by the network device of a radio access network,sensor data from a first wireless device associated with a firstbicycle. The operations can also comprise identifying, by the networkdevice, threat assessment data associated with a hazard to a secondbicycle trailing the first bicycle based on the sensor data. Theoperations can also comprise transmitting, by the network device, thethreat assessment data to a second wireless device associated with thesecond bicycle.

In another embodiment, method comprises receiving, by an edge networkdevice comprising a processor, sensor data from a sensor device attachedto a first bicycle, wherein the sensor device comprises an accelerometerthat measures an acceleration of the first bicycle. The method can alsocomprise determining, by the edge network device, hazard data based onthe sensor data, wherein the hazard data comprises information about apresence of a hazard that is determined based on an acceleration of thefirst bicycle above a defined acceleration. The method can also comprisetransmitting, by the edge network device, the hazard data to a mobiledevice associated with a second bicycle, wherein the hazard data isconfigured to alert a rider of the second bicycle to the presence of thehazard.

In another embodiment, a machine-readable storage medium, comprisingexecutable instructions that, when executed by a processor of an edgenetwork device, facilitate performance of operations. The operations cancomprise receiving sensor data and location data from a first mobiledevice associated with a first bicycle, wherein the first mobile devicecomprises an accelerometer that measures an acceleration of the firstbicycle. The operations can also comprise determining a location of aroad obstruction based on the location data and based on theacceleration of the first mobile device being determined to be above adefined acceleration. The operations can also comprise transmitting roadobstruction data to a second mobile device associated with a secondbicycle, wherein the road obstruction data is representative of an alertto a rider of the second bicycle of the location of the roadobstruction.

As used in this disclosure, in some embodiments, the terms “component,”“system” and the like are intended to refer to, or comprise, acomputer-related entity or an entity related to an operational apparatuswith one or more specific functionalities, wherein the entity can beeither hardware, a combination of hardware and software, software, orsoftware in execution. As an example, a component may be, but is notlimited to being, a process running on a processor, a processor, anobject, an executable, a thread of execution, computer-executableinstructions, a program, and/or a computer. By way of illustration andnot limitation, both an application running on a server and the servercan be a component.

One or more components may reside within a process and/or thread ofexecution and a component may be localized on one computer and/ordistributed between two or more computers. In addition, these componentscan execute from various computer readable media having various datastructures stored thereon. The components may communicate via localand/or remote processes such as in accordance with a signal having oneor more data packets (e.g., data from one component interacting withanother component in a local system, distributed system, and/or across anetwork such as the Internet with other systems via the signal). Asanother example, a component can be an apparatus with specificfunctionality provided by mechanical parts operated by electric orelectronic circuitry, which is operated by a software application orfirmware application executed by a processor, wherein the processor canbe internal or external to the apparatus and executes at least a part ofthe software or firmware application. As yet another example, acomponent can be an apparatus that provides specific functionalitythrough electronic components without mechanical parts, the electroniccomponents can comprise a processor therein to execute software orfirmware that confers at least in part the functionality of theelectronic components. While various components have been illustrated asseparate components, it will be appreciated that multiple components canbe implemented as a single component, or a single component can beimplemented as multiple components, without departing from exampleembodiments.

Further, the various embodiments can be implemented as a method,apparatus or article of manufacture using standard programming and/orengineering techniques to produce software, firmware, hardware or anycombination thereof to control a computer to implement the disclosedsubject matter. The term “article of manufacture” as used herein isintended to encompass a computer program accessible from anycomputer-readable (or machine-readable) device or computer-readable (ormachine-readable) storage/communications media. For example, computerreadable storage media can comprise, but are not limited to, magneticstorage devices (e.g., hard disk, floppy disk, magnetic strips), opticaldisks (e.g., compact disk (CD), digital versatile disk (DVD)), smartcards, and flash memory devices (e.g., card, stick, key drive). Ofcourse, those skilled in the art will recognize many modifications canbe made to this configuration without departing from the scope or spiritof the various embodiments.

Moreover, terms such as “mobile device equipment,” “mobile station,”“mobile,” subscriber station,” “access terminal,” “terminal,” “handset,”“communication device,” “mobile device” (and/or terms representingsimilar terminology) can refer to a wireless device utilized by asubscriber or mobile device of a wireless communication service toreceive or convey data, control, voice, video, sound, gaming orsubstantially any data-stream or signaling-stream. The foregoing termsare utilized interchangeably herein and with reference to the relateddrawings. Likewise, the terms “access point (AP),” “Base Station (BS),”BS transceiver, BS device, cell site, cell site device, “gNode B (gNB),”“evolved Node B (eNode B),” “home Node B (HNB)” and the like, areutilized interchangeably in the application, and refer to a wirelessnetwork component or appliance that transmits and/or receives data,control, voice, video, sound, gaming or substantially any data-stream orsignaling-stream from one or more subscriber stations. Data andsignaling streams can be packetized or frame-based flows.

Furthermore, the terms “device,” “communication device,” “mobiledevice,” “subscriber,” “customer entity,” “consumer,” “customer entity,”“entity” and the like are employed interchangeably throughout, unlesscontext warrants particular distinctions among the terms. It should beappreciated that such terms can refer to human entities or automatedcomponents supported through artificial intelligence (e.g., a capacityto make inference based on complex mathematical formalisms), which canprovide simulated vision, sound recognition and so forth.

Embodiments described herein can be exploited in substantially anywireless communication technology, comprising, but not limited to,wireless fidelity (Wi-Fi), global system for mobile communications(GSM), universal mobile telecommunications system (UMTS), worldwideinteroperability for microwave access (WiMAX), enhanced general packetradio service (enhanced GPRS), third generation partnership project(3GPP) long term evolution (LTE), third generation partnership project 2(3GPP2) ultra mobile broadband (UMB), high speed packet access (HSPA),Z-Wave, Zigbee and other 802.XX wireless technologies and/or legacytelecommunication technologies.

FIG. 1 illustrates an example cooperative intelligent traffic system 100in accordance with various aspects and embodiments of the subjectdisclosure. In system 100, a UE device 102 associated with a bicycle 110can send sensor data to a multi-access edge computing device 108associated with a network node 106. The multi-access edge computingdevice 108 can analyze the sensor data and send the results of theanalysis to UE 104 associated with bicycle 112.

In an embodiment, the multi-access edge computing device 108 can be ahardware device housed at or near the network node 106. In otherembodiments, the multi-access edge computing device 108 can be a virtualmachine instantiated at one or more computers at the network node 106and be configured to analyze the sensor data and provide threat analysisfeedback and other data to the UE 104.

Multi-access edge computing (MEC) is a network architecture concept thatenables cloud computing capabilities and an IT service environment atthe edge of the cellular network. The basic idea behind MEC is that byrunning applications and performing related processing tasks closer tothe cellular customer, core network data traffic is reduced andapplications respond faster due to the reduced physical distance betweenclient and server, and energy can be saved eventually by offloadingprocessing into the cloud but adding additional communication overheadand latency to the communication. MEC technology is designed to beimplemented between cellular base stations and the mobile core network,and enables flexible and rapid deployment of new applications andservices for customers. Combining elements of information technology andtelecommunications networking, MEC also allows cellular operators toopen their radio access network (RAN) to authorized third-parties, suchas application developers and content providers.

The reduced latency of MEC is particularly useful in the case of theintelligent traffic system 100 in that feedback and analysis based onsensor data received from the UE 102 can very quickly be forwarded to UE104, allowing the operator of the bicycle 112 to respond to theanalysis.

In an embodiment, UE 102 and UE 104 can be mounted on the respectivebicycles 110 and 112, or can be in the pockets or otherwisemounted/and/or attached to the riders of the bicycles 110 and 112. Insome various embodiments, the UE 102 and 104 can be mobile phones or canbe dedicated, specialized devices operable for the intelligent trafficsystem 100. The UEs can be different devices as well, where UE 102 couldcomprise one or more sensor devices and UE 104 could be a display deviceor other device configured to provide feedback, notifications, alerts,and information to the rider of the bicycle 112. In some embodiments, UE104 could be an augmented reality device that can provide alerts andinformation to the rider. As an example, the UE 104 could be a glasses,goggles, smart watches, smart clothes, or other device integrated into awearable form factor or in to a helmet that can provide a heads updisplay (HUD) for the rider alerting them of road hazards, plannedmaneuvers and other information via the HUD. Road obstacles, hazards,and other determined threats can be displayed on the HUD of the rider ofthe bicycle 112 as an augmented reality display, enabling the rider tosee where the obstacles and hazards are even though they may notactually be visible to the rider as of yet. The UE 104 can also provideaudible alerts or information based on the analysis performed by the MECdevice 108.

In an embodiment, the UE 102 and 104 can communicate with the networknode via cellular (e.g., 3G, 4G, 5G, etc.), Wi-Fi, WiMax, or otherwireless communications protocol. In an embodiment, the wirelesscommunication protocol can be ultra-reliable and low latency (URLLC)communication for reduced latency, and in other embodiments can beenhanced Mobile Broadband data (eMBB) or massive Machine TypeCommunications (mMTC).

It is to be appreciated that while bicycles are shown in FIG. 1 , anddescribed here and elsewhere in the detailed description, in otherembodiments, other vehicles, cars, motorcycles, are possible. Theprinciples disclosed herein can also apply to pedestrians holding mobiledevices and other devices suitable for collecting sensor data andtransmitting the sensor data to the MEC device 108 via the network node106 and receiving threat assessment analysis data back from the MECdevice 108.

Turning now to FIG. 2 , illustrated is an example cooperativeintelligent traffic system 200 in accordance with various aspects andembodiments of the subject disclosure. In system 200, a sensor device202 associated with a bicycle or other vehicle can send sensor data to amulti-access edge computing device 208 associated with a network node206. The multi-access edge computing device 208 can analyze the sensordata and send the results of the analysis to UE 204 associated withanother bicycle or vehicle.

The sensor device 202 can be a mobile phone or other device equippedwith one or more sensors. In some embodiments, the sensor device 202 canbe communicably coupled to a mobile device that transmits the sensordata to the MEC device 208 via the network node 206. In someembodiments, the sensor device 202 can be mounted on the bicycle, wornby the rider of the bicycle, or otherwise mounted on or carried by therider.

The sensor device 202 can determine the existence of a road obstructionor hazard 210 using one or more sensing mechanisms. The sensor dataabout the hazard 210 can be sent to the MEC device 208 which analyzesthe data in order to determine a threat assessment or determine whetheran alert should be sent to UE 204. The assessment or alert data can besent to UE 204 which enables the rider operating the bicycle associatedwith UE 204 to dodge, avoid, or otherwise be alerted to the presence ofhazard 210.

The sensor device 202 can include one or more accelerometers thatdetermine the location of the hazard 210 based on detecting suddenchanges in movement, either side to side, or braking, or accelerating,and send the accelerometer data to the MEC device 208. The MEC device208 can determine the level of threat based on the acceleration levels.For instance, if the acceleration is above a predetermined threshold,the MEC device 208 can determine that a threat exists, and send an alertto the UE 204.

The sensor device 202 can also include cameras, optical or wirelessrangefinders, speedometers, rotary encoders, microphones, GPS devices,and other sensing devices to capture varying sensor data which can beused by the MEC device 208 to determine the existence and nature of thehazard 210. The MEC device 208 can use a plurality of the sensing datato determine the existence, extent, and seriousness of the hazard 210.

For example, sensor device 202 can detect movement as if the bicyclewere dodging an obstruction, (e.g., pothole, curb, pedestrian, fallenbicycle, etc.). During this period, a camera device on the sensor device202 can also be recording video of the event, which is streamed to theMEC device 208. The MEC device 208 can perform image analysis to try andrecognize whether there is an obstruction, what type, and then providethe appropriate feedback to the UE 204. If the sensor device 202 detectsa movement, but then the MEC device 208 does not recognize any roadobstruction, the MEC device 208 may determine not to send any alert tothe UE 204. In other embodiments, it may send an alert or notificationthat is a weak alert. If an object is recognized as an obstruction, thealert or notification can be a strong alert. Weak alerts and strongalerts can be color coded, different pitches, shapes, or have othervariations to alert the rider associated with UE 204 to the confidenceof the alert or notification.

The multi-access edge computing device 208 can determine the location ofthe sensor device 202 based on either network location services or basedon GPS data received from the sensor device in order to plot and/orotherwise record the location of the hazard 210. The location can beused to superimpose the hazard on an augmented reality displayassociated with UE 204 to provide the rider with a view of where thehazard is. The location can also be used to select the UE 204 from amonga group of UEs. For instance, if there are multiple bicycles trailingthe first bicycle associated with the sensor device 202, but they arespread out, the MEC device 208 can determine the location of the hazardand the location and traveling direction of the other bicycles (viatheir respective UEs) and then select to which UE to send the alertbased on the relevance of the alert to each UE device. For example, ifthe UE 204 is trailing directly behind the sensor device 202, then thealert for the hazard 210 is particularly relevant, but if another UE,also trailing behind, but some distance to the side of the sensor device202, may not require the warning. The selection of which devices havealerts sent to them by the MEC device 208 can thus be a function of thelocation of the hazard 210, the size of the hazard 210 (as determined bya camera or other sensor on the sensor device 210), and the location andtraveling direction of the other UEs.

The MEC device 208 can also determine to send data to UE 204 based ongroup selection data associated with the UE 204. In an embodiment, theriders of the first bicycle associated with sensor device 202 and thesecond bicycle associated with UE 204 can be members of a group (e.g., ariding team, friends, etc.) and elect to share data with each other toimprove the safety of the ride. The group selection can be made beforethe ride has started or during the ride. In other embodiments, the MECdevice 208 can determine to share data based on the proximity of thedevices to each other. As an example, even if the bicyclists are notmembers of a group, but are otherwise riding near each other, the MECdevice 208 can determine the distance between the riders, and if it isless than a predetermined distance, the MEC device 208 can automaticallydetermine to share the data from the sensor device 202 with the UE 204.The proximity cutoff can be selected by either or both of the riders ofUE 204 and sensor device 202, or based on preference informationassociated with identity profiles of each device, or based on the speedof the devices. For instance, if the bicycles are traveling at a fastspeed, the proximity can be larger so that the threat assessment can beprovided with enough time for the rider to react and avoid the hazard210.

In an embodiment, both UE 204 and sensor device 202 can be configured tosend sensor feedback to the MEC device 208 and receive the threatassessment data from the MEC 208. In other embodiments, UE 204 may onlybe configured to receive the threat assessment data from the MEC device208 and may not be equipped to collect and/or send sensor data, or therider may not wish to share sensor data with the MEC device 208. In suchan embodiment, the MEC device 208 can then send localized advertisementsto UE 204 to make up for the lack of ability to share sensor data. Theadvertisements can be displayed via video or images, on an augmentedreality display, or be audible advertisements.

Turning now to FIG. 3 , illustrated is an example cooperativeintelligent traffic system 300 in accordance with various aspects andembodiments of the subject disclosure. In system 300, a UE device 302associated with bicycle 308 or other vehicle can send sensor data to anetwork node 306. The network node 306 can analyze the sensor data andsend the results of the analysis to UE 304 associated with bicycle 310or other vehicle.

In an embodiment, the network node 306 and network node 312 can havedefined cell areas of service and as the bicycle 308 moves from one cellarea (e.g., associated with network node 306) to another cell area(e.g., associated with network node 312), the UE 302 can switch fromtransmitting the sensor data from network node 306 to network node 312.When the switch happens, a multi-access edge computing deviceinstantiated at network node 312 can begin processing the sensor datafor consumption by the UE 304 associated with bicycle 310. If the UE 304is within range of network node 312, network node 312 can transmit thethreat assessment data to the UE 304. If, in another embodiment, the UE304 is not yet within range of network node 312, the network node 312can use a backhaul network to transmit the threat assessment data andother results of the sensor data processing to network node 306 fortransmission to UE 304.

Turning now to FIG. 4 , illustrated is an example cooperativeintelligent traffic system 400 in accordance with various aspects andembodiments of the subject disclosure. In the embodiment shown in FIG. 4, a rider 404 can dodge a hazard 402, and the sensor data can betransmitted to the network node (e.g., node 106 and associated MECdevice 108), where the sensor feedback can be processed, and the resultsof the feedback can be sent to a device associated with rider 406. Thealert or notification about the hazard 402 can also include a maneuversuggestion 408 to dodge or otherwise avoid hazard 402.

The maneuver 408 can be based on modeling the movement of the rider 404based on the acceleration data and/or rangefinder data transmitted by adevice associated with rider 404. For example, as rider 404 dodges thehazard 402 by veering to the right, the MEC device can interpret theacceleration data provided by a UE device or other sensor associatedwith rider 404 as a maneuver to dodge a hazard based on the level ofacceleration (e.g., being above a predetermined threshold), based on theamount of deviation from a route or prior path, and based on othersensor data (range finder data, image data, etc.). The MEC device canthen suggest a similar maneuver (e.g., maneuver 408) to rider 406 toavoid the hazard 402. The direction of the maneuver, the intensity ofthe maneuver, and other information can also be based on the sensor datareceived from rider 404.

Turning now to FIG. 5 , illustrated is an example cooperativeintelligent traffic system 500 in accordance with various aspects andembodiments of the subject disclosure. In the embodiment shown in FIG. 5, a paceline or peloton of bicyclists can be sending sensor data to aMEC device 508 and receive threat assessment data or other relevantinformation back from the MEC device 508. As an example, the MEC device508 can receive sensor data from riders at the front of the paceline(e.g., rider 502) and send the threat assessment data to riders to therear (e.g., riders 504 and 506). Similarly, the MEC device 508 can alsoreceive sensor data from rider 504 and provide threat assessment databased on the sensor data from rider 504 to rider 506.

As the paceline changes, as rider 502 moves from the front to the backand rider 504 moves to the front, the MEC device 508 can detect thesechanges and adjust which sensor data is analyzed and delivered to theappropriate riders. For example, as rider 502 moves to the back, theirsensor data is not as relevant as the sensor data from rider 504, and soMEC device 508 can primarily analyze sensor data from rider 504 todeliver threat assessments to riders 506 and 502.

The threat assessment data provided by MEC 508 can also includeinformation about the path and other maneuvers by riders near the frontto riders at the back, and does not have to relate to road obstructionsor hazards. This can enable riders at the back to anticipate changes indirections to avoid accidents and other similar events. The threatassessment data can also include information about bicycle accidentsnear the front, as sensor data can be analyzed by MEC device 508 todetect accidents (sudden loss in speed, large acceleration etc.), andriders near the rear can be alerted to these accidents (audiblemessage/tone, visual warning, augmented reality warning, etc.).

Turning now to FIG. 6 , illustrated is an example multi-access edgecomputing system 600 in accordance with various aspects and embodimentsof the subject disclosure.

The multi-access edge computing device 602 can be a hardware devicehoused at or near the base station device/eNodeB/gNodeB (e.g., networknode 106). In other embodiments, the multi-access edge computing device602 can be a virtual machine instantiated at one or more computers atthe base station device and be configured to analyze the sensor data andprovide threat analysis feedback and other data to one or more bicycleriders.

Multi-access edge computing (MEC) is a network architecture concept thatenables cloud computing capabilities and an IT service environment atthe edge of the cellular network. The basic idea behind MEC is that byrunning applications and performing related processing tasks closer tothe cellular customer, network congestion is reduced and applicationsperform better. MEC technology is designed to be implemented at thecellular base stations, and enables flexible and rapid deployment of newapplications and services for customers. Combining elements ofinformation technology and telecommunications networking, MEC alsoallows cellular operators to open their radio access network (RAN) toauthorized third-parties, such as application developers and contentproviders.

The multi-access edge computing device 602 can include a sensorcomponent 604 that receives sensor data from a first wireless deviceassociated with a first bicycle or other vehicle. The sensor data caninclude at least one of location data representative of a location ofthe first wireless device, acceleration data representative of anacceleration of the first wireless device, speedometer datarepresentative of a speed of the first wireless device, and distancemeasurement data representative of a distance between the first wirelessdevice and the hazard. The sensor data can be received by cellulartransmission, Wi-Fi, WiMax, or other radio frequency communicationprotocol.

The multi-access edge computing device 602 can also include a threatanalysis component 606 that determines threat assessment data associatedwith a hazard to a second bicycle trailing the first bicycle based onthe sensor data.

A selection component 608 can be provided to determine which UEs to sendthe threat assessment to. The selection of which devices have alertssent to them by the selection component 608 can be a function of thelocation of the hazard, the size of the hazard (as determined by acamera or other sensor on the sensor device), and the location andtraveling direction of the other UEs.

The selection component 608 can also determine to send data to UE basedon group selection data associated with the UE. In an embodiment, theriders of the first bicycle associated with sensor device and the secondbicycle associated with UE can be members of a group (e.g., a ridingteam, friends, etc.) and elect to share data with each other to improvethe safety of the ride. The group selection can be made before the ridehas started or during the ride. In other embodiments, the selectioncomponent 608 can determine to share data based on the proximity of thedevices to each other. As an example, even if the bicyclists are notmembers of a group, but are otherwise riding near each other, theselection component 608 can determine the distance between the riders,and if it is less than a predetermined distance, the selection component608 can automatically determine to share the data from a sensor device aparticular UE. The proximity cutoff can be selected by either or both ofthe riders of UE and sensor device, or based on preference informationassociated with identity profiles of each device, or based on the speedof the devices. For instance, if the bicycles are traveling at a fastspeed, the proximity can be larger so that the threat assessment can beprovided with enough time for the rider to react and avoid the hazard.

An avoidance component 610 can be provided to suggest a maneuver oravoidance technique for a trailing bicycle to perform in order to avoida road obstacle or the hazard. The maneuver can be based on modeling themovement of the rider based on the acceleration data and/or rangefinderdata transmitted by a device associated with the rider. For example, asrider dodges the hazard by veering to the right, the avoidance component610 can interpret the acceleration data provided by a UE device or othersensor associated with rider 404 as a maneuver to dodge a hazard basedon the level of acceleration (e.g., being above a predeterminedthreshold), based on the amount of deviation from a route or prior path,and based on other sensor data (range finder data, image data, etc.).The avoidance component 610 can then suggest a similar maneuver (e.g.,maneuver) to rider to avoid the hazard. The direction of the maneuver,the intensity of the maneuver, and other information can also be basedon the sensor data received from rider.

FIGS. 7-8 illustrates a process in connection with the aforementionedsystems. The processes in FIGS. 7-8 can be implemented for example bythe systems in FIGS. 1-5 respectively. While for purposes of simplicityof explanation, the methods are shown and described as a series ofblocks, it is to be understood and appreciated that the claimed subjectmatter is not limited by the order of the blocks, as some blocks mayoccur in different orders and/or concurrently with other blocks fromwhat is depicted and described herein. Moreover, not all illustratedblocks may be required to implement the methods described hereinafter.

FIG. 7 illustrates an example method 700 for facilitating a cooperativeintelligent traffic system in accordance with various aspects andembodiments of the subject disclosure.

Method 700 can begin at 702 where the method includes receiving, by anedge network device comprising a processor, sensor data from a sensordevice attached to a first bicycle, wherein the sensor device comprisesan accelerometer that measures an acceleration of the first bicycle.

At 704, the method includes determining, by the edge network device,hazard data based on the sensor data, wherein the hazard data comprisesinformation about a presence of a hazard that is determined based on anacceleration of the first bicycle above a defined acceleration.

At 706, the method includes transmitting, by the edge network device,the hazard data to a mobile device associated with a second bicycle,wherein the hazard data is configured to alert a rider of the secondbicycle to the presence of the hazard.

FIG. 8 illustrates an example method 700 for facilitating a cooperativeintelligent traffic system in accordance with various aspects andembodiments of the subject disclosure.

Method 800 can begin at 802 wherein the method includes receiving, bythe network device of a radio access network, sensor data from a firstwireless device associated with a first bicycle.

At 804, the method can include identifying, by the network device,threat assessment data associated with a hazard to a second bicycletrailing the first bicycle based on the sensor data.

At 806, the method can include transmitting, by the network device, thethreat assessment data to a second wireless device associated with thesecond bicycle.

Referring now to FIG. 9 , illustrated is a schematic block diagram of anexample end-user device such as a user equipment) that can be a mobiledevice 900 capable of connecting to a network in accordance with someembodiments described herein. Although a mobile handset 900 isillustrated herein, it will be understood that other devices can be amobile device, and that the mobile handset 900 is merely illustrated toprovide context for the embodiments of the various embodiments describedherein. The following discussion is intended to provide a brief, generaldescription of an example of a suitable environment 900 in which thevarious embodiments can be implemented. While the description includes ageneral context of computer-executable instructions embodied on amachine-readable storage medium, those skilled in the art will recognizethat the various embodiments also can be implemented in combination withother program modules and/or as a combination of hardware and software.

Generally, applications (e.g., program modules) can include routines,programs, components, data structures, etc., that perform particulartasks or implement particular abstract data types. Moreover, thoseskilled in the art will appreciate that the methods described herein canbe practiced with other system configurations, includingsingle-processor or multiprocessor systems, minicomputers, mainframecomputers, as well as personal computers, hand-held computing devices,microprocessor-based or programmable consumer electronics, and the like,each of which can be operatively coupled to one or more associateddevices.

A computing device can typically include a variety of machine-readablemedia. Machine-readable media can be any available media that can beaccessed by the computer and includes both volatile and non-volatilemedia, removable and non-removable media. By way of example and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media can include volatileand/or non-volatile media, removable and/or non-removable mediaimplemented in any method or technology for storage of information, suchas computer-readable instructions, data structures, program modules orother data. Computer storage media can include, but is not limited to,RAM, ROM, EEPROM, flash memory or other memory technology, CD ROM,digital video disk (DVD) or other optical disk storage, magneticcassettes, magnetic tape, magnetic disk storage or other magneticstorage devices, or any other medium which can be used to store thedesired information and which can be accessed by the computer.

Communication media typically embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism, and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of the anyof the above should also be included within the scope ofcomputer-readable media.

The handset 900 includes a processor 902 for controlling and processingall onboard operations and functions. A memory 904 interfaces to theprocessor 902 for storage of data and one or more applications 906(e.g., a video player software, user feedback component software, etc.).Other applications can include voice recognition of predetermined voicecommands that facilitate initiation of the user feedback signals. Theapplications 906 can be stored in the memory 904 and/or in a firmware908, and executed by the processor 902 from either or both the memory904 or/and the firmware 908. The firmware 908 can also store startupcode for execution in initializing the handset 900. A communicationscomponent 910 interfaces to the processor 902 to facilitatewired/wireless communication with external systems, e.g., cellularnetworks, VoIP networks, and so on. Here, the communications component910 can also include a suitable cellular transceiver 911 (e.g., a GSMtransceiver) and/or an unlicensed transceiver 913 (e.g., Wi-Fi, WiMax)for corresponding signal communications. The handset 900 can be a devicesuch as a cellular telephone, a PDA with mobile communicationscapabilities, and messaging-centric devices. The communicationscomponent 910 also facilitates communications reception from terrestrialradio networks (e.g., broadcast), digital satellite radio networks, andInternet-based radio services networks.

The handset 900 includes a display 912 for displaying text, images,video, telephony functions (e.g., a Caller ID function), setupfunctions, and for user input. For example, the display 912 can also bereferred to as a “screen” that can accommodate the presentation ofmultimedia content (e.g., music metadata, messages, wallpaper, graphics,etc.). The display 912 can also display videos and can facilitate thegeneration, editing and sharing of video quotes. A serial I/O interface914 is provided in communication with the processor 902 to facilitatewired and/or wireless serial communications (e.g., USB, and/or IEEE1394) through a hardwire connection, and other serial input devices(e.g., a keyboard, keypad, and mouse). This supports updating andtroubleshooting the handset 900, for example. Audio capabilities areprovided with an audio I/O component 916, which can include a speakerfor the output of audio signals related to, for example, indication thatthe user pressed the proper key or key combination to initiate the userfeedback signal. The audio I/O component 916 also facilitates the inputof audio signals through a microphone to record data and/or telephonyvoice data, and for inputting voice signals for telephone conversations.

The handset 900 can include a slot interface 918 for accommodating a SIC(Subscriber Identity Component) in the form factor of a card SubscriberIdentity Module (SIM) or universal SIM 920, and interfacing the SIM card920 with the processor 902. However, it is to be appreciated that theSIM card 920 can be manufactured into the handset 900, and updated bydownloading data and software.

The handset 900 can process IP data traffic through the communicationcomponent 910 to accommodate IP traffic from an IP network such as, forexample, the Internet, a corporate intranet, a home network, a personarea network, etc., through an ISP or broadband cable provider. Thus,VoIP traffic can be utilized by the handset 800 and IP-based multimediacontent can be received in either an encoded or decoded format.

A video processing component 922 (e.g., a camera) can be provided fordecoding encoded multimedia content. The video processing component 922can aid in facilitating the generation, editing and sharing of videoquotes. The handset 900 also includes a power source 924 in the form ofbatteries and/or an AC power subsystem, which power source 924 caninterface to an external power system or charging equipment (not shown)by a power 110 component 926.

The handset 900 can also include a video component 930 for processingvideo content received and, for recording and transmitting videocontent. For example, the video component 930 can facilitate thegeneration, editing and sharing of video quotes. A location trackingcomponent 932 facilitates geographically locating the handset 900. Asdescribed hereinabove, this can occur when the user initiates thefeedback signal automatically or manually. A user input component 934facilitates the user initiating the quality feedback signal. The userinput component 934 can also facilitate the generation, editing andsharing of video quotes. The user input component 934 can include suchconventional input device technologies such as a keypad, keyboard,mouse, stylus pen, and/or touch screen, for example.

Referring again to the applications 906, a hysteresis component 936facilitates the analysis and processing of hysteresis data, which isutilized to determine when to associate with the access point. Asoftware trigger component 938 can be provided that facilitatestriggering of the hysteresis component 938 when the Wi-Fi transceiver913 detects the beacon of the access point. A SIP client 940 enables thehandset 900 to support SIP protocols and register the subscriber withthe SIP registrar server. The applications 906 can also include a client942 that provides at least the capability of discovery, play and storeof multimedia content, for example, music.

The handset 900, as indicated above related to the communicationscomponent 810, includes an indoor network radio transceiver 913 (e.g.,Wi-Fi transceiver). This function supports the indoor radio link, suchas IEEE 802.11, for the dual-mode GSM handset 900. The handset 900 canaccommodate at least satellite radio services through a handset that cancombine wireless voice and digital radio chipsets into a single handhelddevice.

Referring now to FIG. 10 , there is illustrated a block diagram of acomputer 1000 operable to execute the functions and operations performedin the described example embodiments. For example, a network node (e.g.,network node 106, network node 206, e.g.,) or multi-access edgecomputing device 108, 208, etc., may contain components as described inFIG. 10 . The computer 1000 can provide networking and communicationcapabilities between a wired or wireless communication network and aserver and/or communication device. In order to provide additionalcontext for various aspects thereof, FIG. 10 and the followingdiscussion are intended to provide a brief, general description of asuitable computing environment in which the various aspects of theembodiments can be implemented to facilitate the establishment of atransaction between an entity and a third party. While the descriptionabove is in the general context of computer-executable instructions thatcan run on one or more computers, those skilled in the art willrecognize that the various embodiments also can be implemented incombination with other program modules and/or as a combination ofhardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the various methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The illustrated aspects of the various embodiments can also be practicedin distributed computing environments where certain tasks are performedby remote processing devices that are linked through a communicationsnetwork. In a distributed computing environment, program modules can belocated in both local and remote memory storage devices.

Computing devices typically include a variety of media, which caninclude computer-readable storage media or communications media, whichtwo terms are used herein differently from one another as follows.

Computer-readable storage media can be any available storage media thatcan be accessed by the computer and includes both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structureddata, or unstructured data. Computer-readable storage media can include,but are not limited to, RAM, ROM, EEPROM, flash memory or other memorytechnology, CD-ROM, digital versatile disk (DVD) or other optical diskstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices, or other tangible and/or non-transitorymedia which can be used to store desired information. Computer-readablestorage media can be accessed by one or more local or remote computingdevices, e.g., via access requests, queries or other data retrievalprotocols, for a variety of operations with respect to the informationstored by the medium.

Communications media can embody computer-readable instructions, datastructures, program modules or other structured or unstructured data ina data signal such as a modulated data signal, e.g., a carrier wave orother transport mechanism, and includes any information delivery ortransport media. The term “modulated data signal” or signals refers to asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in one or more signals. By way ofexample, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

Referring now to FIG. 10 , there is illustrated a block diagram of acomputer 1000 operable to execute the functions and operations performedin the described example embodiments. For example, a network node (e.g.,network node 106, gNB 202, e.g.,) may contain components as described inFIG. 10 . The computer 1000 can provide networking and communicationcapabilities between a wired or wireless communication network and aserver and/or communication device. In order to provide additionalcontext for various aspects thereof, FIG. 10 and the followingdiscussion are intended to provide a brief, general description of asuitable computing environment in which the various aspects of theembodiments can be implemented to facilitate the establishment of atransaction between an entity and a third party. While the descriptionabove is in the general context of computer-executable instructions thatcan run on one or more computers, those skilled in the art willrecognize that the various embodiments also can be implemented incombination with other program modules and/or as a combination ofhardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the various methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The illustrated aspects of the various embodiments can also be practicedin distributed computing environments where certain tasks are performedby remote processing devices that are linked through a communicationsnetwork. In a distributed computing environment, program modules can belocated in both local and remote memory storage devices.

Computing devices typically include a variety of media, which caninclude computer-readable storage media or communications media, whichtwo terms are used herein differently from one another as follows.

Computer-readable storage media can be any available storage media thatcan be accessed by the computer and includes both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structureddata, or unstructured data. Computer-readable storage media can include,but are not limited to, RAM, ROM, EEPROM, flash memory or other memorytechnology, CD-ROM, digital versatile disk (DVD) or other optical diskstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices, or other tangible and/or non-transitorymedia which can be used to store desired information. Computer-readablestorage media can be accessed by one or more local or remote computingdevices, e.g., via access requests, queries or other data retrievalprotocols, for a variety of operations with respect to the informationstored by the medium.

Communications media can embody computer-readable instructions, datastructures, program modules or other structured or unstructured data ina data signal such as a modulated data signal, e.g., a carrier wave orother transport mechanism, and includes any information delivery ortransport media. The term “modulated data signal” or signals refers to asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in one or more signals. By way ofexample, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

With reference to FIG. 10 , implementing various aspects describedherein with regards to the end-user device can include a computer 1000,the computer 1000 including a processing unit 1004, a system memory 1006and a system bus 1008. The system bus 1008 couples system componentsincluding, but not limited to, the system memory 1006 to the processingunit 1004. The processing unit 1004 can be any of various commerciallyavailable processors. Dual microprocessors and other multi-processorarchitectures can also be employed as the processing unit 1004.

The system bus 1008 can be any of several types of bus structure thatcan further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 1006includes read-only memory (ROM) 1027 and random access memory (RAM)1012. A basic input/output system (BIOS) is stored in a non-volatilememory 1027 such as ROM, EPROM, EEPROM, which BIOS contains the basicroutines that help to transfer information between elements within thecomputer 1000, such as during start-up. The RAM 1012 can also include ahigh-speed RAM such as static RAM for caching data.

The computer 1000 further includes an internal hard disk drive (HDD)1014 (e.g., EIDE, SATA), which internal hard disk drive 1014 can also beconfigured for external use in a suitable chassis (not shown), amagnetic floppy disk drive (FDD) 1016, (e.g., to read from or write to aremovable diskette 1018) and an optical disk drive 1020, (e.g., readinga CD-ROM disk 1022 or, to read from or write to other high capacityoptical media such as the DVD). The hard disk drive 1014, magnetic diskdrive 1016 and optical disk drive 1020 can be connected to the systembus 1008 by a hard disk drive interface 1024, a magnetic disk driveinterface 1026 and an optical drive interface 1028, respectively. Theinterface 1024 for external drive implementations includes at least oneor both of Universal Serial Bus (USB) and IEEE 1394 interfacetechnologies. Other external drive connection technologies are withincontemplation of the subject embodiments.

The drives and their associated computer-readable media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 1000 the drives and mediaaccommodate the storage of any data in a suitable digital format.Although the description of computer-readable media above refers to aHDD, a removable magnetic diskette, and a removable optical media suchas a CD or DVD, it should be appreciated by those skilled in the artthat other types of media which are readable by a computer 1000, such aszip drives, magnetic cassettes, flash memory cards, cartridges, and thelike, can also be used in the example operating environment, andfurther, that any such media can contain computer-executableinstructions for performing the methods of the disclosed embodiments.

A number of program modules can be stored in the drives and RAM 1012,including an operating system 1030, one or more application programs1032, other program modules 1034 and program data 1036. All or portionsof the operating system, applications, modules, and/or data can also becached in the RAM 1012. It is to be appreciated that the variousembodiments can be implemented with various commercially availableoperating systems or combinations of operating systems.

A user can enter commands and information into the computer 1000 throughone or more wired/wireless input devices, e.g., a keyboard 1038 and apointing device, such as a mouse 1040. Other input devices (not shown)may include a microphone, an IR remote control, a joystick, a game pad,a stylus pen, touch screen, or the like. These and other input devicesare often connected to the processing unit 1004 through an input deviceinterface 1042 that is coupled to the system bus 1008, but can beconnected by other interfaces, such as a parallel port, an IEEE 1394serial port, a game port, a USB port, an IR interface, etc.

A monitor 1044 or other type of display device is also connected to thesystem bus 1008 through an interface, such as a video adapter 1046. Inaddition to the monitor 1044, a computer 1000 typically includes otherperipheral output devices (not shown), such as speakers, printers, etc.

The computer 1000 can operate in a networked environment using logicalconnections by wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 1048. The remotecomputer(s) 1048 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentdevice, a peer device or other common network node, and typicallyincludes many or all of the elements described relative to the computer,although, for purposes of brevity, only a memory/storage device 1050 isillustrated. The logical connections depicted include wired/wirelessconnectivity to a local area network (LAN) 1052 and/or larger networks,e.g., a wide area network (WAN) 1054. Such LAN and WAN networkingenvironments are commonplace in offices and companies, and facilitateenterprise-wide computer networks, such as intranets, all of which mayconnect to a global communications network, e.g., the Internet.

When used in a LAN networking environment, the computer 1000 isconnected to the local network 1052 through a wired and/or wirelesscommunication network interface or adapter 1056. The adapter 1056 mayfacilitate wired or wireless communication to the LAN 1052, which mayalso include a wireless access point disposed thereon for communicatingwith the wireless adapter 1056.

When used in a WAN networking environment, the computer 1000 can includea modem 1058, or is connected to a communications server on the WAN1054, or has other means for establishing communications over the WAN1054, such as by way of the Internet. The modem 1058, which can beinternal or external and a wired or wireless device, is connected to thesystem bus 1008 through the input device interface 1042. In a networkedenvironment, program modules depicted relative to the computer, orportions thereof, can be stored in the remote memory/storage device1050. It will be appreciated that the network connections shown areexemplary and other means of establishing a communications link betweenthe computers can be used.

The computer is operable to communicate with any wireless devices orentities operatively disposed in wireless communication, e.g., aprinter, scanner, desktop and/or portable computer, portable dataassistant, communications satellite, any piece of equipment or locationassociated with a wirelessly detectable tag (e.g., a kiosk, news stand,restroom), and telephone. This includes at least Wi-Fi and Bluetooth™wireless technologies. Thus, the communication can be a predefinedstructure as with a conventional network or simply an ad hoccommunication between at least two devices.

Wi-Fi, or Wireless Fidelity, allows connection to the Internet from acouch at home, a bed in a hotel room, or a conference room at work,without wires. Wi-Fi is a wireless technology similar to that used in acell phone that enables such devices, e.g., computers, to send andreceive data indoors and out; anywhere within the range of a basestation. Wi-Fi networks use radio technologies called IEEE802.11 (a, b,g, n, etc.) to provide secure, reliable, fast wireless connectivity. AWi-Fi network can be used to connect computers to each other, to theInternet, and to wired networks (which use IEEE802.3 or Ethernet). Wi-Finetworks operate in the unlicensed 2.4 and 5 GHz radio bands, at an 11Mbps (802.11b) or 54 Mbps (802.11a) data rate, for example, or withproducts that contain both bands (dual band), so the networks canprovide real-world performance similar to the basic “10BaseT” wiredEthernet networks used in many offices.

FIG. 11 presents an example embodiment 1100 of a mobile network platform1110 that can implement and exploit one or more aspects of the disclosedsubject matter described herein. Generally, wireless network platform1110 can include components, e.g., nodes, gateways, interfaces, servers,or disparate platforms, that facilitate both packet-switched (PS) (e.g.,internet protocol (IP), frame relay, asynchronous transfer mode (ATM))and circuit-switched (CS) traffic (e.g., voice and data), as well ascontrol generation for networked wireless telecommunication. As anon-limiting example, wireless network platform 1110 can be included intelecommunications carrier networks, and can be considered carrier-sidecomponents as discussed elsewhere herein. Mobile network platform 1110includes CS gateway node(s) 1112 which can interface CS traffic receivedfrom legacy networks like telephony network(s) 1140 (e.g., publicswitched telephone network (PSTN), or public land mobile network (PLMN))or a signaling system #7 (SS7) network 1170. Circuit switched gatewaynode(s) 1112 can authorize and authenticate traffic (e.g., voice)arising from such networks. Additionally, CS gateway node(s) 1112 canaccess mobility, or roaming, data generated through SS7 network 1170;for instance, mobility data stored in a visited location register (VLR),which can reside in memory 1130. Moreover, CS gateway node(s) 1112interfaces CS-based traffic and signaling and PS gateway node(s) 1118.As an example, in a 3GPP UMTS network, CS gateway node(s) 1112 can berealized at least in part in gateway GPRS support node(s) (GGSN). Itshould be appreciated that functionality and specific operation of CSgateway node(s) 1112, PS gateway node(s) 1118, and serving node(s) 1116,is provided and dictated by radio technology(ies) utilized by mobilenetwork platform 1110 for telecommunication. Mobile network platform1110 can also include the MMEs, HSS/PCRFs, SGWs, and PGWs disclosedherein.

In addition to receiving and processing CS-switched traffic andsignaling, PS gateway node(s) 1118 can authorize and authenticatePS-based data sessions with served mobile devices. Data sessions caninclude traffic, or content(s), exchanged with networks external to thewireless network platform 1110, like wide area network(s) (WANs) 1150,enterprise network(s) 1170, and service network(s) 1180, which can beembodied in local area network(s) (LANs), can also be interfaced withmobile network platform 1110 through PS gateway node(s) 1118. It is tobe noted that WANs 1150 and enterprise network(s) 1160 can embody, atleast in part, a service network(s) like IP multimedia subsystem (IMS).Based on radio technology layer(s) available in technology resource(s)1117, packet-switched gateway node(s) 1118 can generate packet dataprotocol contexts when a data session is established; other datastructures that facilitate routing of packetized data also can begenerated. To that end, in an aspect, PS gateway node(s) 1118 caninclude a tunnel interface (e.g., tunnel termination gateway (TTG) in3GPP UMTS network(s) (not shown)) which can facilitate packetizedcommunication with disparate wireless network(s), such as Wi-Finetworks.

In embodiment 1100, wireless network platform 1110 also includes servingnode(s) 1116 that, based upon available radio technology layer(s) withintechnology resource(s) 1117, convey the various packetized flows of datastreams received through PS gateway node(s) 1118. It is to be noted thatfor technology resource(s) 1117 that rely primarily on CS communication,server node(s) can deliver traffic without reliance on PS gatewaynode(s) 1118; for example, server node(s) can embody at least in part amobile switching center. As an example, in a 3GPP UMTS network, servingnode(s) 1116 can be embodied in serving GPRS support node(s) (SGSN).

For radio technologies that exploit packetized communication, server(s)1114 in wireless network platform 1110 can execute numerous applicationsthat can generate multiple disparate packetized data streams or flows,and manage (e.g., schedule, queue, format . . . ) such flows. Suchapplication(s) can include add-on features to standard services (forexample, provisioning, billing, customer support . . . ) provided bywireless network platform 1110. Data streams (e.g., content(s) that arepart of a voice call or data session) can be conveyed to PS gatewaynode(s) 1118 for authorization/authentication and initiation of a datasession, and to serving node(s) 1116 for communication thereafter. Inaddition to application server, server(s) 1114 can include utilityserver(s), a utility server can include a provisioning server, anoperations and maintenance server, a security server that can implementat least in part a certificate authority and firewalls as well as othersecurity mechanisms, and the like. In an aspect, security server(s)secure communication served through wireless network platform 1110 toensure network's operation and data integrity in addition toauthorization and authentication procedures that CS gateway node(s) 1112and PS gateway node(s) 1118 can enact. Moreover, provisioning server(s)can provision services from external network(s) like networks operatedby a disparate service provider; for instance, WAN 1150 or GlobalPositioning System (GPS) network(s) (not shown). Provisioning server(s)can also provision coverage through networks associated to wirelessnetwork platform 1110 (e.g., deployed and operated by the same serviceprovider), such as femto-cell network(s) (not shown) that enhancewireless service coverage within indoor confined spaces and offload RANresources in order to enhance subscriber service experience within ahome or business environment by way of UE 1175.

It is to be noted that server(s) 1114 can include one or more processorsconfigured to confer at least in part the functionality of macro networkplatform 1110. To that end, the one or more processor can execute codeinstructions stored in memory 1130, for example. It is should beappreciated that server(s) 1114 can include a content manager 1115,which operates in substantially the same manner as describedhereinbefore.

In example embodiment 1100, memory 1130 can store information related tooperation of wireless network platform 1110. Other operationalinformation can include provisioning information of mobile devicesserved through wireless platform network 1110, subscriber databases;application intelligence, pricing schemes, e.g., promotional rates,flat-rate programs, couponing campaigns; technical specification(s)consistent with telecommunication protocols for operation of disparateradio, or wireless, technology layers; and so forth. Memory 1130 canalso store information from at least one of telephony network(s) 1140,WAN 1150, enterprise network(s) 1160, or SS7 network 1170. In an aspect,memory 1130 can be, for example, accessed as part of a data storecomponent or as a remotely connected memory store.

As used in this application, the terms “system,” “component,”“interface,” and the like are generally intended to refer to acomputer-related entity or an entity related to an operational machinewith one or more specific functionalities. The entities disclosed hereincan be either hardware, a combination of hardware and software,software, or software in execution. For example, a component may be, butis not limited to being, a process running on a processor, a processor,an object, an executable, a thread of execution, a program, and/or acomputer. By way of illustration, both an application running on aserver and the server can be a component. One or more components mayreside within a process and/or thread of execution and a component maybe localized on one computer and/or distributed between two or morecomputers. These components also can execute from various computerreadable storage media having various data structures stored thereon.The components may communicate via local and/or remote processes such asin accordance with a signal having one or more data packets (e.g., datafrom one component interacting with another component in a local system,distributed system, and/or across a network such as the Internet withother systems via the signal). As another example, a component can be anapparatus with specific functionality provided by mechanical partsoperated by electric or electronic circuitry that is operated bysoftware or firmware application(s) executed by a processor, wherein theprocessor can be internal or external to the apparatus and executes atleast a part of the software or firmware application. As yet anotherexample, a component can be an apparatus that provides specificfunctionality through electronic components without mechanical parts,the electronic components can comprise a processor therein to executesoftware or firmware that confers at least in part the functionality ofthe electronic components. An interface can comprise input/output (I/O)components as well as associated processor, application, and/or APIcomponents.

Furthermore, the disclosed subject matter may be implemented as amethod, apparatus, or article of manufacture using standard programmingand/or engineering techniques to produce software, firmware, hardware,or any combination thereof to control a computer to implement thedisclosed subject matter. The term “article of manufacture” as usedherein is intended to encompass a computer program accessible from anycomputer-readable device, computer-readable carrier, orcomputer-readable media. For example, computer-readable media caninclude, but are not limited to, a magnetic storage device, e.g., harddisk; floppy disk; magnetic strip(s); an optical disk (e.g., compactdisk (CD), a digital video disc (DVD), a Blu-ray Disc™ (BD)); a smartcard; a flash memory device (e.g., card, stick, key drive); and/or avirtual device that emulates a storage device and/or any of the abovecomputer-readable media.

As it employed in the subject specification, the term “processor” canrefer to substantially any computing processing unit or devicecomprising, but not limited to comprising, single-core processors;single-processors with software multithread execution capability;multi-core processors; multi-core processors with software multithreadexecution capability; multi-core processors with hardware multithreadtechnology; parallel platforms; and parallel platforms with distributedshared memory. Additionally, a processor can refer to an integratedcircuit, an application specific integrated circuit (ASIC), a digitalsignal processor (DSP), a field programmable gate array (FPGA), aprogrammable logic controller (PLC), a complex programmable logic device(CPLD), a discrete gate or transistor logic, discrete hardwarecomponents, or any combination thereof designed to perform the functionsdescribed herein. Processors can exploit nano-scale architectures suchas, but not limited to, molecular and quantum-dot based transistors,switches and gates, in order to optimize space usage or enhanceperformance of user equipment. A processor also can be implemented as acombination of computing processing units.

In the subject specification, terms such as “store,” “data store,” “datastorage,” “database,” “repository,” “queue”, and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can comprise both volatile andnonvolatile memory. In addition, memory components or memory elementscan be removable or stationary. Moreover, memory can be internal orexternal to a device or component, or removable or stationary. Memorycan comprise various types of media that are readable by a computer,such as hard-disc drives, zip drives, magnetic cassettes, flash memorycards or other types of memory cards, cartridges, or the like.

By way of illustration, and not limitation, nonvolatile memory cancomprise read only memory (ROM), programmable ROM (PROM), electricallyprogrammable ROM (EPROM), electrically erasable ROM (EEPROM), or flashmemory. Volatile memory can comprise random access memory (RAM), whichacts as external cache memory. By way of illustration and notlimitation, RAM is available in many forms such as synchronous RAM(SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rateSDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), anddirect Rambus RAM (DRRAM). Additionally, the disclosed memory componentsof systems or methods herein are intended to comprise, without beinglimited to comprising, these and any other suitable types of memory.

In particular and in regard to the various functions performed by theabove described components, devices, circuits, systems and the like, theterms (including a reference to a “means”) used to describe suchcomponents are intended to correspond, unless otherwise indicated, toany component which performs the specified function of the describedcomponent (e.g., a functional equivalent), even though not structurallyequivalent to the disclosed structure, which performs the function inthe herein illustrated example aspects of the embodiments. In thisregard, it will also be recognized that the embodiments comprise asystem as well as a computer-readable medium having computer-executableinstructions for performing the acts and/or events of the variousmethods.

Computing devices typically comprise a variety of media, which cancomprise computer-readable storage media and/or communications media,which two terms are used herein differently from one another as follows.Computer-readable storage media can be any available storage media thatcan be accessed by the computer and comprises both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structureddata, or unstructured data.

Computer-readable storage media can include, but are not limited to,random access memory (RAM), read only memory (ROM), electricallyerasable programmable read only memory (EEPROM), flash memory or othermemory technology, solid state drive (SSD) or other solid-state storagetechnology, compact disk read only memory (CD ROM), digital versatiledisk (DVD), Blu-ray disc or other optical disk storage, magneticcassettes, magnetic tape, magnetic disk storage or other magneticstorage devices or other tangible and/or non-transitory media which canbe used to store desired information.

In this regard, the terms “tangible” or “non-transitory” herein asapplied to storage, memory or computer-readable media, are to beunderstood to exclude only propagating transitory signals per se asmodifiers and do not relinquish rights to all standard storage, memoryor computer-readable media that are not only propagating transitorysignals per se. Computer-readable storage media can be accessed by oneor more local or remote computing devices, e.g., via access requests,queries or other data retrieval protocols, for a variety of operationswith respect to the information stored by the medium.

On the other hand, communications media typically embodycomputer-readable instructions, data structures, program modules orother structured or unstructured data in a data signal such as amodulated data signal, e.g., a carrier wave or other transportmechanism, and comprises any information delivery or transport media.The term “modulated data signal” or signals refers to a signal that hasone or more of its characteristics set or changed in such a manner as toencode information in one or more signals. By way of example, and notlimitation, communications media comprise wired media, such as a wirednetwork or direct-wired connection, and wireless media such as acoustic,RF, infrared and other wireless media

Further, terms like “user equipment,” “user device,” “mobile device,”“mobile,” station,” “access terminal,” “terminal,” “handset,” andsimilar terminology, generally refer to a wireless device utilized by asubscriber or user of a wireless communication network or service toreceive or convey data, control, voice, video, sound, gaming, orsubstantially any data-stream or signaling-stream. The foregoing termsare utilized interchangeably in the subject specification and relateddrawings. Likewise, the terms “access point,” “node B,” “base station,”“evolved Node B,” “cell,” “cell site,” and the like, can be utilizedinterchangeably in the subject application, and refer to a wirelessnetwork component or appliance that serves and receives data, control,voice, video, sound, gaming, or substantially any data-stream orsignaling-stream from a set of subscriber stations. Data and signalingstreams can be packetized or frame-based flows. It is noted that in thesubject specification and drawings, context or explicit distinctionprovides differentiation with respect to access points or base stationsthat serve and receive data from a mobile device in an outdoorenvironment, and access points or base stations that operate in aconfined, primarily indoor environment overlaid in an outdoor coveragearea. Data and signaling streams can be packetized or frame-based flows.

Furthermore, the terms “user,” “subscriber,” “customer,” “consumer,” andthe like are employed interchangeably throughout the subjectspecification, unless context warrants particular distinction(s) amongthe terms. It should be appreciated that such terms can refer to humanentities, associated devices, or automated components supported throughartificial intelligence (e.g., a capacity to make inference based oncomplex mathematical formalisms) which can provide simulated vision,sound recognition and so forth. In addition, the terms “wirelessnetwork” and “network” are used interchangeable in the subjectapplication, when context wherein the term is utilized warrantsdistinction for clarity purposes such distinction is made explicit.

Moreover, the word “exemplary” is used herein to mean serving as anexample, instance, or illustration. Any aspect or design describedherein as “exemplary” is not necessarily to be construed as preferred oradvantageous over other aspects or designs. Rather, use of the wordexemplary is intended to present concepts in a concrete fashion. As usedin this application, the term “or” is intended to mean an inclusive “or”rather than an exclusive “or”. That is, unless specified otherwise, orclear from context, “X employs A or B” is intended to mean any of thenatural inclusive permutations. That is, if X employs A; X employs B; orX employs both A and B, then “X employs A or B” is satisfied under anyof the foregoing instances. In addition, the articles “a” and “an” asused in this application and the appended claims should generally beconstrued to mean “one or more” unless specified otherwise or clear fromcontext to be directed to a singular form.

In addition, while a particular feature may have been disclosed withrespect to only one of several implementations, such feature may becombined with one or more other features of the other implementations asmay be desired and advantageous for any given or particular application.Furthermore, to the extent that the terms “includes” and “including” andvariants thereof are used in either the detailed description or theclaims, these terms are intended to be inclusive in a manner similar tothe term “comprising.”

The above descriptions of various embodiments of the subject disclosureand corresponding figures and what is described in the Abstract, aredescribed herein for illustrative purposes, and are not intended to beexhaustive or to limit the disclosed embodiments to the precise formsdisclosed. It is to be understood that one of ordinary skill in the artmay recognize that other embodiments having modifications, permutations,combinations, and additions can be implemented for performing the same,similar, alternative, or substitute functions of the disclosed subjectmatter, and are therefore considered within the scope of thisdisclosure. Therefore, the disclosed subject matter should not belimited to any single embodiment described herein, but rather should beconstrued in breadth and scope in accordance with the claims below.

What is claimed is:
 1. A method, comprising: selecting, by networkequipment comprising a processor, second bicycles in a defined arearelative to a first bicycle in motion, wherein a size of the definedarea is selected based on a speed of the motion of the first bicycle;receiving, by network equipment comprising a processor, respectivesensor data from the second bicycles in the defined area; determining,by the network equipment, a threat to the first bicycle based on firstsensor data from a second bicycle of the second bicycles within thedefined area; and transmitting, by the network equipment, an alert ofthe threat to a user equipment associated with the first bicycle.
 2. Themethod of claim 1, wherein the defined area is in front of the firstbicycle in a direction of the motion of the first bicycle.
 3. The methodof claim 1, wherein the size of the defined area increases as the speedof the motion of the first bicycle increases.
 4. The method of claim 1,wherein determining the threat to the first bicycle based on the firstsensor data comprises determining a level of acceleration of the secondbicycle indicated in the first sensor data that is indicative of thethreat.
 5. The method of claim 1, wherein determining the threat to thefirst bicycle based on the first sensor data comprises determining alevel of braking of the second bicycle indicated in the first sensordata that is indicative of the threat.
 6. The method of claim 1, whereindetermining the threat to the first bicycle based on the first sensordata comprises determining a sideways motion of the second bicycleindicated in the first sensor data that is indicative of the threat. 7.The method of claim 1, wherein the first sensor data comprises imagedata of the threat, and the alert comprises a graphical display of theimage data.
 8. Network equipment, comprising: a processor; and a memorythat stores executable instructions that, when executed by theprocessor, facilitate performance of operations, comprising: selectingsecond motorized cycles in a defined area relative to a first motorizedcycle in motion, wherein a size of the defined area is selected based ona speed of the motion of the first motorized cycle; examining respectivesensor data from the second motorized cycles in the defined area;determining a threat to the first motorized cycle based on first sensordata from a second motorized cycle of the second motorized cycles withinthe defined area; and communicating a notification of the threat to auser equipment associated with the first motorized cycle.
 9. The networkequipment of claim 8, wherein the defined area is in front of the firstmotorized cycle in a direction of the motion of the first motorizedcycle.
 10. The network equipment of claim 8, wherein the size of thedefined area changes proportionally to the speed of the motion of thefirst motorized cycle.
 11. The network equipment of claim 8, whereindetermining the threat to the first motorized cycle based on the firstsensor data comprises determining a level of acceleration of the secondmotorized cycle indicated in the first sensor data that is indicative ofthe threat.
 12. The network equipment of claim 8, wherein determiningthe threat to the first motorized cycle based on the first sensor datacomprises determining a level of braking of the second motorized cycleindicated in the first sensor data that is indicative of the threat. 13.The network equipment of claim 8, wherein determining the threat to thefirst motorized cycle based on the first sensor data comprisesdetermining a lateral threat as a result of a sideways motion of thesecond motorized cycle indicated in the first sensor data that isindicative of the threat.
 14. The network equipment of claim 8, whereinthe first sensor data comprises image data corresponding to the threat,and the notification comprises a graphical display of the image data.15. A non-transitory machine-readable medium, comprising executableinstructions that, when executed by a processor of network equipment,facilitate performance of operations, comprising: selecting secondvehicles in a defined area relative to a first vehicle in motion,wherein a size of the defined area is selected based on a speed of themotion of the first vehicle; analyzing respective sensor data from thesecond vehicles in the defined area; determining a threat to the firstvehicle based on first sensor data from a second vehicle of the secondvehicles within the defined area; and sending a warning of the threat toa user equipment associated with the first vehicle.
 16. Thenon-transitory machine-readable medium of claim 15, wherein the definedarea is in front of the first vehicle in a direction of the motion ofthe first vehicle.
 17. The non-transitory machine-readable medium ofclaim 15, wherein the size of the defined area increases with velocityincreases of the first vehicle.
 18. The non-transitory machine-readablemedium of claim 15, wherein determining the threat to the first vehiclebased on the first sensor data comprises determining a level ofacceleration of the second vehicle indicated in the first sensor datathat is indicative of the threat.
 19. The non-transitorymachine-readable medium of claim 15, wherein determining the threat tothe first vehicle based on the first sensor data comprises determining alevel of braking of the second vehicle indicated in the first sensordata that is indicative of the threat.
 20. The non-transitorymachine-readable medium of claim 15, wherein determining the threat tothe first vehicle based on the first sensor data comprises determining alateral motion of the second vehicle indicated in the first sensor datathat is indicative of the threat, and wherein a direction of the lateralmotion is perpendicular or substantially perpendicular to a direction ofthe first vehicle.