Traffic pattern detection for creating a simulated traffic zone experience

ABSTRACT

The described technology is generally directed towards generating a simulated virtual experience that represents predicted interaction of a user/vehicle with traffic in a traffic zone. A user who is considering entering a traffic zone (e.g., that charges a fee for usage) can request a simulated virtual experience of what is likely to occur if the user decides to enter. Based on the simulated virtual experience, which can be a graphical visualization in 3D, the user can make an informed decision as to whether to enter and pay, or not enter. User-specific data such as user preferences and other provided criterion can be used with respect to generating the simulated virtual experience. For current users about to enter the zone, current traffic data is used along with historical data in generating the simulated virtual experience.

TECHNICAL FIELD

The subject application is related to wireless communication systems andtraffic zones, and more particularly to using wireless communicationsystems and traffic management systems to provide a predicted trafficexperience with respect to a user entering a traffic zone.

BACKGROUND

Congestion pricing/charging zones refer to certain roads in whichvehicles are charged a fee for usage in an effort to reduce trafficcongestion, reduce pollution and raise revenue. For example, Singaporeand London have congestion pricing schemes for the use of certain roads.Other cities are considering similar schemes.

Driving in such zones can be (or when implemented will be) relativelyexpensive. A user has little knowledge of what will happen if a trafficcongestion zone is entered, for example, whether there will be very slowtraffic, whether another route might be faster, whether waiting islikely to provide a better result, and so forth. Before certain userswho have choices decide on whether to pay the extra money to enter sucha zone, the users would like to have such knowledge.

BRIEF DESCRIPTION OF THE DRAWINGS

The technology described herein is illustrated by way of example and notlimited in the accompanying figures in which like reference numeralsindicate similar elements and in which:

FIG. 1 illustrates an example traffic zone that uses a wirelesscommunication system and vehicle sensors to provide a simulated virtualexperience to a user device, in accordance with various aspects andimplementations of the subject disclosure.

FIG. 2 is a block diagram representation of example components used togenerate a traffic zone based on various possible example data, inaccordance with various aspects and implementations of the subjectdisclosure.

FIG. 3 is a block diagram representation of example components used togenerate a simulated virtual experience based on various data, inaccordance with various aspects and implementations of the subjectdisclosure

FIGS. 4 and 5 comprise a block diagram representation of examplecomponents showing show how a traffic zone traffic management system cancommunicate with a city authority service delivery network and integratewith city endpoints with respect to a traffic zone, in accordance withvarious aspects and implementations of the subject disclosure.

FIG. 6 illustrates a flow diagram of example operations of a trafficzone management system to generate a simulated virtual experience, inaccordance with various aspects and implementations of the subjectdisclosure.

FIG. 7 illustrates a flow diagram of example operations related togenerating a simulated virtual experience, in accordance with variousaspects and implementations of the subject disclosure.

FIG. 8 illustrates a flow diagram of example operations related toobtaining and presenting a simulated virtual experience on a userdevice, in accordance with various aspects and implementations of thesubject disclosure.

FIG. 9 illustrates a flow diagram of example operations related togenerating a simulated virtual experience based on various data, inaccordance with various aspects and implementations of the subjectdisclosure.

FIG. 10 illustrates an example block diagram of an example mobilehandset operable to engage in a system architecture that facilitateswireless communications according to one or more embodiments describedherein.

FIG. 11 illustrates an example block diagram of an example computeroperable to engage in a system architecture that facilitates wirelesscommunications according to one or more embodiments described herein.

DETAILED DESCRIPTION

Briefly, one or more aspects of the technology described herein aregenerally directed towards providing a simulated user experience withrespect to usage of a traffic zone. The simulated experience can be avisual representation of predicted traffic, predicted vehicle and/orpedestrian encounters, predicted times to destinations, estimated costof entering, dwelling and exiting the traffic zone, and so forth.

The simulated visual representation can be a three-dimensional (3D)video rendering, a two-dimensional video rendering, and/or audibleoutput. A rendering can be sped up in time, e.g., a ten-minute videorendering of the predicted traffic experience in real time can be shownin a minute, so as to not distract the driver. A map can be presentedshowing predicted times and traffic, for example; the map can beinteractive to zoom in and/or navigate through a mapped area.

The simulated user experience of traffic zone usage can be current (asclose to real time as possible), such as for a user approaching atraffic zone who wants to determine whether to enter. Current trafficdata, along with historical data, can be used to make the prediction.Alternative routes can be recommended, including routes within thetraffic zone or routes that bypass the traffic zone, at least in part.

The simulated user experience of traffic zone usage can be non-realtime, such as minutes, hours or even days in the future. To this end,historical traffic data can be used to predict what a user is likely toencounter at a user-specified time, to assist users contemplating a tripinto a traffic zone.

User-specific data, such as user preference data, can be used as part ofthe predicted experience. For example, a user preference setting or thelike can specify avoiding routes where there is significant trucktraffic and/or poor air quality. Another user preference setting canspecify a time constraint to help avoid delay. Many other useruser-specific/user-specified data can be factored into and/or presentedin conjunction with (or output instead of) the virtual experience,including but not limited to air pressure (which affects medicalconditions such as a user with asthma), temperature, weather, roadconditions (snow, ice, rain, wind), allergy information and so forththat a user may want to consider before entering a defined zone.

Thus, aspects of the technology can detect traffic pattern in real timeto create a virtual simulated (e.g., 3D) experience of traffic situationin a traffic zone before entering the traffic zone or paying any entryfees. This can be considered as giving the user an opportunity to “testdrive” the predicted experience.

One or more embodiments are now described with reference to thedrawings, wherein like reference numerals are used to refer to likeelements throughout. In the following description, for purposes ofexplanation, numerous specific details are set forth in order to providea thorough understanding of the various embodiments. It is evident,however, that the various embodiments can be practiced without thesespecific details (and without applying to any particular networkedenvironment or standard).

As used in this disclosure, in some embodiments, the terms “component,”“system” and the like are intended to refer to, or comprise, acomputer-related entity or an entity related to an operational apparatuswith one or more specific functionalities, wherein the entity can beeither hardware, a combination of hardware and software, software, orsoftware in execution. As an example, a component may be, but is notlimited to being, a process running on a processor, a processor, anobject, an executable, a thread of execution, computer-executableinstructions, a program, and/or a computer. By way of illustration andnot limitation, both an application running on a server and the servercan be a component.

One or more components may reside within a process and/or thread ofexecution and a component may be localized on one computer and/ordistributed between two or more computers. In addition, these componentscan execute from various computer readable media having various datastructures stored thereon. The components may communicate via localand/or remote processes such as in accordance with a signal having oneor more data packets (e.g., data from one component interacting withanother component in a local system, distributed system, and/or across anetwork such as the Internet with other systems via the signal). Asanother example, a component can be an apparatus with specificfunctionality provided by mechanical parts operated by electric orelectronic circuitry, which is operated by a software application orfirmware application executed by a processor, wherein the processor canbe internal or external to the apparatus and executes at least a part ofthe software or firmware application. As yet another example, acomponent can be an apparatus that provides specific functionalitythrough electronic components without mechanical parts, the electroniccomponents can comprise a processor therein to execute software orfirmware that confers at least in part the functionality of theelectronic components. While various components have been illustrated asseparate components, it will be appreciated that multiple components canbe implemented as a single component, or a single component can beimplemented as multiple components, without departing from exampleembodiments.

Further, the various embodiments can be implemented as a method,apparatus or article of manufacture using standard programming and/orengineering techniques to produce software, firmware, hardware or anycombination thereof to control a computer to implement the disclosedsubject matter. The term “article of manufacture” as used herein isintended to encompass a computer program accessible from anycomputer-readable (or machine-readable) device or computer-readable (ormachine-readable) storage/communications media. For example, computerreadable storage media can comprise, but are not limited to, magneticstorage devices (e.g., hard disk, floppy disk, magnetic strips), opticaldisks (e.g., compact disk (CD), digital versatile disk (DVD)), smartcards, and flash memory devices (e.g., card, stick, key drive). Ofcourse, those skilled in the art will recognize many modifications canbe made to this configuration without departing from the scope or spiritof the various embodiments.

Moreover, terms such as “mobile device,” smart device,” “userequipment,” “mobile device equipment,” “mobile station,” “mobile,”subscriber station,” “access terminal,” “terminal,” “handset,”“communication device,” (and/or terms representing similar terminology)can refer to a wireless device utilized by a subscriber or mobile deviceof a wireless communication service to receive or convey data, control,voice, video, sound, gaming or substantially any data-stream orsignaling-stream. The foregoing terms are utilized interchangeablyherein and with reference to the related drawings. Likewise, the terms“access point (AP),” “Base Station (BS),” BS transceiver, BS device,cell site, cell site device, “gNode B (gNB),” “evolved Node B (eNodeB),” “home Node B (HNB)” and the like, are utilized interchangeably inthe application, and refer to a wireless network component or appliancethat transmits and/or receives data, control, voice, video, sound,gaming or substantially any data-stream or signaling-stream from one ormore subscriber stations. Data and signaling streams can be packetizedor frame-based flows.

Furthermore, the terms “device,” “communication device,” “mobiledevice,” “subscriber,” “customer entity,” “consumer,” “customer entity,”“entity” and the like are employed interchangeably throughout, unlesscontext warrants particular distinctions among the terms. It should beappreciated that such terms can refer to human entities or automatedcomponents supported through artificial intelligence (e.g., a capacityto make inference based on complex mathematical formalisms), which canprovide simulated vision, sound recognition and so forth.

Embodiments described herein can be exploited in substantially anywireless communication technology, comprising, but not limited to,wireless fidelity (Wi-Fi), global system for mobile communications(GSM), universal mobile telecommunications system (UMTS), worldwideinteroperability for microwave access (WiMAX), enhanced general packetradio service (enhanced GPRS), third generation partnership project(3GPP) long term evolution (LTE), third generation partnership project 2(3GPP2) ultra mobile broadband (UMB), high speed packet access (HSPA),Z-Wave, Zigbee and other 802.XX wireless technologies and/or legacytelecommunication technologies.

FIG. 1 illustrates an example system 100 comprising a traffic zone 102,such as for charging vehicles for usage. FIG. 1 illustrates the trafficzone 102 in the shape of a circle, which may be customized by acontrolling entity such as a city. It should be noted that any area canbe defined (to a reasonable accuracy) as a traffic zone, including acircle, oval, any regular or irregular polygon, as well as areas thatinclude smaller exclusion or otherwise differing areas (such as a squareblock within a ten square block area). Moreover, a traffic zone can bechanged (e.g., expanded or contracted) based on any criterion orcriteria, such as time of day, amount of congestion, and so forth.Multiple traffic zones can be configured.

In FIG. 1, the closely dashed lines curved and straight lines representroads on which any number of vehicles (six such vehicles V0-V5 aredepicted) may be traveling or parked. Note that the vehicle direction isdetected by the system and in FIG. 1 is represented by the respectivearrow accompanying the respective block that represents a vehicle; thevehicle V4 was traveling in a certain direction but has not movedrecently and thus is detected by the system 100 as likely being parked,as represented by the “?P” label in FIG. 1.

As will be understood, the technology is based on a wirelesscommunication system, as represented in FIG. 1 via cell sites/basestations 102-109, that communicate with user equipments in the vehicles.Note that while nine such cell sites/base stations 101-109 are depicted,it is understood that any practical number of such sites may be presentin a given scenario.

Roadside units RSU1-RSU7 (sometimes referred to as roadside equipment,or RSE; any practical number may be present in a given implementation)also work in conjunction with the cell sites/base stations 101-109 todetect a vehicle's location in the traffic zone or near the trafficzone. In general, the roadside units RSU1-RSU7 can detect and report theamount of traffic and the speed of traffic and general informationregarding the type of vehicle data. If a vehicle includes a transponderdevice, more specific information regarding the vehicle type may bedetected. Note that the roadside units RSU1-RSU7 may comprise edgegateway devices to facilitate faster operations and reduced datatransmission for real time or near-real time system 100 operation.

In general, the cell sites/base stations 101-109 monitor the location ofthe vehicle, based on a user equipment (typically a driver's cell phoneor a more dedicated wireless user equipment device such as a devicewithin the vehicle) and thus can determine whether a vehicle is presentwithin a defined traffic zone. It should be noted that globalpositioning systems (GPS) are useful, but do not provide a viablesolution in many scenarios because, for example, GPS does not functionwell in “urban canyons” where traffic monitoring as described herein ismost likely to be implemented. Further, not every user equipment has GPScapabilities, or often has GPS turned off. RSU detection andtiming-based user equipment location can be used in such scenarios.

As shown in FIG. 1, the cell sites/base stations 101-109 and roadsideunits RSU1-RSU7 communicate with a traffic zone management system 112,which in turn communicates with a city (or other governmental such ascounty) authority service delivery network 114. Additional details ofthe traffic zone management system 112 and the city authority servicedelivery network 114 are described with reference to FIGS. 4 and 5.

Also shown in FIG. 1 is the concept of a warning zone 116. Vehiclesdetected in the warning zone 116 that are approaching the traffic zone102 can be notified that they are about to enter the traffic zone 102,particularly for traffic zones that charge a price for vehicle operationtherein. Thus, the approaching vehicle V1 receives such a warning, whilethe departed vehicle V5 does not. A user equipment within the vehiclecan provide the warning, e.g., on a display and/or audibly, and can alsoshow the estimated price for entering the zone 102. A displayed and/oraudible message can be given to the user equipment in vehicle V5indicating that the vehicle has left the zone, possibly along with theprice charged.

As described herein, a user/vehicle approaching the warning zone 116(such as the vehicle V0) or in the warning zone 116 (such as the vehicleV1) can request a simulated virtual experience that predicts andshows/describes what the user is likely to experience if the trafficzone 102 is entered. This helps a user decide on whether to proceed.Note that it is also feasible for a user already in the traffic zone 102to request such a virtual experience, to help decide whether to exit thetraffic zone 102 or take some alternative action (e.g., stop for lunch).

Note that in one or more implementations, a traffic zone area andwarning zone area can be fixed or dynamically established by outputtingboundary coordinates to a user equipment; (for a circle and ellipse, acenter point and radius or major/minor axis data, respectively, can beprovided). Indeed, almost any number of criterion, combined orindividually considered, can be used to create and/or modify a trafficzone. FIG. 2 shows some possible variables that can be considered by atraffic zone generator 230 component when generating a traffic zone,which can be per-user, per-group of users, per-vehicle and/or per groupof vehicles.

For example, consider that a user equipment 232 couples with atransponder 234 and can thus report user-specific data (e.g., identity)and vehicle type data to the traffic zone generator 230. It should benoted that in one or more alternative implementations, the transpondercan (e.g., directly or indirectly) provide the user identity data andvehicle information to the traffic zone generator via one or more of theRSUs.

The user data 236 can be used to access user profile data that canfactor into pricing, e.g., subscriber data (such as prepaid or not),discount data (e.g., for students, residents, seniors, low income usersand so on), authorized city employee or not, registered carpool user,rideshare provider, and so on. The vehicle data can be used to modifythe pricing, e.g., electric, hybrid, gas, diesel, axles, length,commercial versus passenger, bus, taxi and so on.

Data from the roadside units (RSUs) can be used by a current trafficprocessing component 240 to determine current traffic data 242,including average current speed and the number of vehicles, whichindicate a current level of traffic congestion. Note that suchinformation can also come from the user equipments that are active inthe system.

State data 244 including dynamic information such as time of day, day ofweek, whether an event is taking place, where any construction is takingplace and so forth may be used by the traffic zone generator 230. Static(or semi-static) state data such as road classification (e.g., highway,main thoroughfare, side street, boulevard, one-way street) and zoningcan be used, as well as revenue models.

Historical data 246, which can include third party data such as obtainedfrom rideshare services, can be used to predict congestion and the like,such as to configure a traffic zone so as to start charging in thattraffic zone before actual congestion occurs, which will thereby reducetraffic. In addition to historical sensor data related to vehicletraffic, historical data 246 can include pedestrian data, bicycle data,number of parked cars, and so forth. Such historical data 246 can be perroad, per intersection, per time of day, and so on. Historical data 246also can be used to predict revenue, e.g., to determine a daily orhourly rate, as well as configure one or more traffic zones topredictably reduce expected traffic to a desired amount but not so muchthat too little revenue is collected.

With the above information, the traffic zone generator 230 can determineand output traffic zone coordinates 250 (or the like) and warning zonecoordinates 252 (or the like) to the user equipment 232. Any of theinformation available to and output by the traffic zone generator 230can also be provided to a pricing server 260 to determine theappropriate financial charge to apply to the user based on location andtiming data 262 provided to the billing engine 260 by the wirelesscommunications system 264.

Note that dwelling time within the traffic zone is one possible billingcriterion, e.g., the longer a user and vehicle remain in the trafficzone, such as beyond a threshold time, the higher the amount billed.This, for example, can deter a rideshare vehicle from remaining in acongested traffic zone for an inordinate amount of time.

It should be noted that backup systems can be used for users/vehiclesthat do not have a user equipment or transponder, and to ensure that auser does not deactivate (e.g., turn off or shield) a user equipment ortransponder. For example, cameras can be used to capture license plateimages at select locations, with a higher price charged for suchnon-participating vehicles.

Thus, variable zone pricing can be defined based on real time andhistorical traffic data. A traffic zone control system collects, fromsensors, the traffic average speed, traffic volume (number ofvehicles/hour or other time unit), traffic density, lane occupancy(e.g., percentage), vehicle length (for vehicle classification), lengthof queue at an intersection, and when a vehicle is driving in the wrongdirection (e.g., on a one-way street), and sends to an intelligentpricing server 460 (FIG. 4) for real time zone financial charges.Customizable pricing can be modified based on subscriber profile data.

The technology described herein leverages a wireless communicationsnetwork to broadcast area cordoning boundary data to RSUs and smartconnected devices. Note that smart phone applications can communicatewith RSUs via near field communications techniques, whereby dependencyon network coverage is not needed in such a scenario.

With respect to a simulated traffic experience, FIG. 3 shows a number ofexample components and data that can be used to predict, generate andoutput a requested simulated traffic experience, which can beuser-specific to an individual user or group of users. In one or moreimplementations, a road side unit (RSU) 330 as represented by block 332senses real-time traffic at via sensors, along with transceivers thatcan communicate with vehicle transponders and/or receivers in properlyequipped vehicles, for example. This sensed information, including butnot limited to speed, number of vehicles and vehicle type information isreferred to herein as traffic metadata.

In order to operate more efficiently and provide better accuracy, in oneor more implementations one or more machine-learned mathematical models334 are developed using historical data and embedded in the road sideunit 330, which can be considered edge gateways. In this alternative,the mathematical models are used by a filtering and/or classificationcomponent 336 to filter and/or classify the traffic metadata into asignificantly reduced amount of traffic data 338. More particularly,having such mathematical models at the roadside units, which can bedifferent models customized for different sensors, respectively,eliminates the need for sending redundant data, basically insteadsending traffic metadata deltas/anomalies to the traffic managementsystem operating in a centralized “cloud” or the like. This edgecomputing solution facilitates faster and more realistic and accuratesimulated experiences based on more current data. Notwithstanding, otheralternatives, including having cloud servers receive and process theactual data are feasible.

Attributes of the sensory data can be modified before being sent to thetraffic management servers. For example, a percentage value representingthe amount of semi-trailer truck traffic can be sent, rather thansending individual truck data, that is, forty vehicles per minute havepassed RSU4, ten percent of which were semi-trailer trucks. In this way,users who do not like to drive while a lot of truck traffic is presentcan be notified. Note that user profile data 340 (e.g., preference data)can be used in learning the mathematical models 334 to facilitate suchattribute modification. Further, note that security keys or the like canbe implemented in the road side units and the traffic management systemto encrypt/decrypt the content.

In the example of FIG. 3, the reduced traffic data 338 is received by arecommendation engine 342, which can combine the reduced traffic data338 with historical data 344 to develop a more complete representationof the current traffic situation. The recommendation engine can updatethe historical data 344, which, for example, can be used for subsequenttraffic estimation as well as updating the mathematical models. Thetraffic data is further processed by the recommendation engine 342 usinguser-specific data (profiles and preferences) as well as with dynamicparameters (e.g., whether the user qualifies for a zone pricing discountor carpool lanes) received from the user's/vehicles. Note thathistorical data can also include information such as expected pedestriantraffic, parking availability, and so forth).

The user profile data 340 can be used by the recommendation engine 342and a rules engine 346 and to determine whether a simulated trafficexperience is to be generated (block 348), as doing so if not neededunnecessarily consumes resources. By way of example, consider that acurrent user 340 has indicated (via criteria provided to therecommendation engine along with the user's identity and currentlocation and direction data) that he needs to get to a point in thetraffic zone within fifteen minutes and would like a simulated virtualexperience. The recommendation engine 342 data processing determinesthat the current traffic situation cannot get the user 340 there in timeby any route. Instead of triggering the generating of the simulatedvirtual experience, the recommendation engine can indicate to the rulesengine 346 that the user's criteria cannot be met, and thereby respondwith a message indicating the issue rather than providing the requestedsimulated virtual experience. Whether to provide a requested simulatedvirtual experience or not can be determined based on any othercriterion, such as more truck traffic than the user's preference dataindicates is acceptable, more carbon monoxide than the user's preferencedata indicates is acceptable, and so on. A user can modify or overridesuch preference data settings to receive a simulated virtual experience.

If instead the preference criterion or criteria is met such that thedesired output is detected, the recommendation engine 342 triggers therules engine 346 in the network to run the simulated experiencegenerator (output engine) to create the virtualized 3D version of theZone experience. A feedback loop can be applied in real time to createthe desired results. In this way, the current user 350 can receive theexperience (e.g., via the wireless network) based on relatively verycurrent traffic data, and thereby make an informed decision as to how toproceed.

In this way, a user/subscriber can view a virtualized (e.g., 3Dgraphical video) representation of the traffic pattern, inducing forexample, expected price, the number of vehicles, types of vehicles,greenhouse gas index, traveling speed in near real time as the sensordata is weaved into the virtualized experience. Note that a user devicecan also have an application or the like that maintains some static orsemi-static data such as road images, vehicle type images and so forthso that the amount of downloaded experience data can be reduced to onlysend changes (e.g., coordinates and types of other vehicles) relative tothe semi-static data.

Other information 352 such as advertising, weather reports, incidentreports and so forth may be presented in conjunction with the simulatedtraffic experience. The other information can be user-specific andtailored to a user based on the user's preference data, user profile orthe like.

A traffic zone is not limited to city roads and highways or the like. Inaddition, building sensors for a parking garage, sensors forvenues/convention centers state fairs or amusement parks can also beused to help define a traffic zone. A user's profile data preferencedata can be used to create machine-learned models that can beimplemented in any of these other sensors.

There are various ways to monetize the above system, including monthlysubscription charges, a one-time fee, a per-usage fee, purchase of anapplication, advertising revenue, and so forth. At the same time, nopre-provisioning of an account or pre-payment or the like is needed. Forexample, if a user/subscriber decides to proceed with entering thetraffic zone, the user can opt in with a one-time payment via SMS orother means, and can have an option to pay via a digital wallet orcreate an account.

It is feasible for the predicted experience to differ from the actualexperience, and therefore be different from a user's expectations. Inone implementation, a user can exit the traffic zone within a “graceperiod” for example, indicate dissatisfaction and get some type ofcredit, such as a digital credit towards an online purchase, a creditfor downloadable content or streaming audio/video, a digital coupon usedtowards a restaurant discount, and so on.

Another usage of the simulated virtual experience technology is topredict an experience in the more distant future. To this end, a futureuser 354 can provide a user identifier (UID) and a planned time (and ifappropriate a certain destination in the traffic zone). Using historicaldata, as well as possibly other data (such as planned construction), avirtual experience can be generated for a future user. Thus, forexample, a user at 10 am who is considering entering a traffic zone at 1pm can view a predicted virtual experience of what to expect. If notparticularly desirable, the user can vary the time and try again. Inthis way, user can then make a more informed decision, e.g., wait until2 pm and save five dollars in tolling as well as save eight minutes oftravel time. Note that such a prediction is not as accurate as a nearreal time prediction, (and thus likely would not qualify for credits ifthe user experience is not as expected), but still assists a user inmaking an informed decision when planning a trip.

FIGS. 4 and 5 provide additional details of traffic zone trafficmanagement system 440, and related components including a city authorityservice delivery network 442. The traffic zone traffic management system440 couples to various city endpoints 550 (FIG. 5) via an access layer444, which can be a broadband, Wi-Fi, wireless (e.g., 5G) link, or anycombination thereof.

A typical example city authority service delivery network 442 includescommunication systems 446, operation crew access 448, mobile access 450such as for users' traffic-related mobile device application(s), apublic website 450 (e.g., that provides traffic camera sites, userbilling review and payments and so forth), and collaborative dataanalytics 454, which can analyze traffic patterns and the like based ontraffic information obtained by the city directly and/or from thirdparties such as compiled by rideshare services.

In one or more implementations, the traffic zone traffic managementsystem 440 “cloud” includes an intelligent pricing system 460 (such asthe pricing server of FIG. 3) that can determine pricing based on thevarious variable information including the customizable zone and theuser profile data 338/customer profile data store and data servers 462.A recommendation engine 464 can be used to recommend alternative routesand the like to users in the customizable traffic zone as well as thoseusers about to enter the traffic zone. A traveler information system 466can provide users with other travel-related information. An analyticsengine 468 can be used to process and analyze collected data, such asfor use by the recommendation engine 464.

A billing engine 470 can determine and apply bills to customers based ontheir customer profile data along with other factors described hereinand the price determined by the intelligent pricing system for aconfigured traffic zone and a user's use thereof.

FIG. 5 shows how via the network access layer 444 the traffic zonetraffic management system 440 can integrate with existing infrastructureincluding various city endpoints. Typical example city endpoints cancomprise weather sensors 550 that provide weather information that canbe processed by smart traffic controllers with real time analytics andadaptive signal timing. Smart traffic controllers 552(1)-552(n) aredepicted, and it can be readily appreciated that any practical numbermay be present. Note that in one or more implementations, such smarttraffic controllers 552(1)-552(n) comprise edge gateway devices (asopposed to operating in the cloud) in order to reduce latency andcommunication of large amounts of data and thereby provide faster realtime operation, decision making, and so forth.

The smart traffic controllers 552(1)-552(n), which obtain feedback fromspecified sensors, perform real time analytics that can be used tocontrol various traffic-related devices, such as variable speed controldevices 554, dynamic lane control devices 556, changeable message signs558, and traffic signal management 560.

In addition to integrating with existing infrastructure, the smarttraffic controllers 552(1)-552(n) also integrate with customizabletraffic zones as described herein, including to receive trafficzone-related information from and provide traffic zone-relatedinformation to one or more RSUs 562, to and from the wirelesscommunication system in general (e.g., to send pricing and othermessages to user equipments), and, for example, to change relevantchangeable message signs 558 to indicate the current price of acustomizable traffic zone (e.g., notwithstanding any discounts).

The flow diagram of example operations of FIG. 6 summarize variousaspects of the technology in one or more implementations. At operation602, the reduced traffic data is received on a regular basis from thevarious sensors as described herein. This information is combined withhistorical data at operation 604 to construct the current trafficinformation. Note that the current traffic information is useful forother purposes beyond a simulated virtual experience, including, forexample, to modify a traffic zone, change zone pricing, and so forth.

At operation 606 a traffic zone management and control system receives arequest for a simulated virtual experience. In this example, considerthat the request is from a current user, and thus for accuracy, as to aspossible to real time data is desired. The user device providesuser/vehicle identification, location information, direction informationand also can specify any other criterion as entered by a user, such as atime limit for getting to a destination.

Operation 608 obtains the user-specific data, such as user preferencesnot necessarily indicated by the user device, but instead associatedwith the user on a permanent basis until changed by the user.Non-limiting examples of such user-specific data can include apreference to avoid trucks (e.g., as a percentage of vehicles), apreference to avoid heavy traffic (e.g., number of vehicles per road), apreference to avoid pollution above a certain limit, a preference to usecertain roads and avoid others, weather, road conditions, air pressure,and so on.

Operation 610 represents a determination of whether the user's desiredexperience can be met, e.g., the user can reach a desired destination intwenty-five minutes or less and air pollution is below the user'sspecified limit. If not, operation 612 notifies the user of the issues,e.g., via text and/or audio messaging, and thus avoids the generation ofthe simulated virtual experience, thereby conserving resources whileavoiding the user viewing an experience that does not meet the user'sspecified requirements.

If instead the desired experience can be met (according to aprediction). Operation 614 triggers the virtual experience generation.Operation 616 transmits the data to the user device that facilitatespresenting the user experience on the user device. The presentation canbe shown in 3D graphics, 2D graphics, in actual time, slow motion, fastmotion, an annotated mapping, output via audio, and so forth. The outputcan be based on user preferences and/or modified by user interactionwith the output device.

In this way, the user can make an informed decision on whether to entera traffic zone, including based on price, time, traffic density, andother possible information such as vehicle types, parking availability,pedestrian traffic, air quality, and so forth.

One or more aspects are generally represented in FIG. 7, and cancorrespond to system comprising a processor and a memory that storesexecutable instructions that, when executed by the processor, facilitateperformance of operations. Example operation 702 represents obtaininguser-specific data for a user identity associated with a vehicle.Example operation 704 represents obtaining time-based traffic dataassociated with a traffic zone. Example operation 706 representsgenerating simulated virtual experience data, corresponding to apredicted interaction experience with traffic in the traffic zone, basedon the user-specific data and the time-based data. Example operation 708represents communicating the simulated virtual experience data to adevice for presentation of a simulated virtual experience to the user.

Obtaining the time-based traffic data can comprise receiving reduceddata from a traffic sensor.

Further operations can comprise embedding modeling data that is based onhistorical traffic data, in the traffic sensor, to facilitate thereceiving the reduced data from the traffic sensor.

The time-based data can comprise current data that is processed toobtain the simulated virtual experience data relative to a current time.The time-based data can comprise historical data that is processed toobtain the simulated virtual experience data relative to a future time.

The user-specific data can comprise information directed to avoidance ofother traffic. The user-specific data can comprise information directedto avoidance of: a type of traffic or an emission level.

Further operations can comprise predicting, based on the user-specificdata and the time-based data, estimated pricing data corresponding tothe simulated virtual experience, and outputting the estimated pricingdata.

Further operations can comprise issuing a credit to the vehicle occupantin response to the simulated virtual experience can comprise by athreshold criterion from an actual experience in the traffic zone.

Presenting the simulated virtual experience occurs in response to atriggering rule being satisfied.

The user-specific data can comprise a variable parameter correspondingto a traffic zone discount. The user-specific data can comprise avariable parameter corresponding to at least one of: user identityinformation, carpool eligibility or urgency information.

Further operations can comprise guiding the user to a desired routerelative to the traffic-related zone based on the user-specific data.

One or more aspects are generally represented in FIG. 8, and cancorrespond to a method, e.g., of example operations. Operation 802represents communicating, by a device comprising a processor,user-specific data to a traffic service. Operation 804 representsreceiving simulated virtual experience data generated by the trafficservice based on the user-specific data and time-based traffic data.Operation 806 represents presenting, based on the simulated virtualexperience data, a virtual experience corresponding to a predictedfuture experience with traffic.

Presenting the virtual experience can comprise outputting athree-dimensional visual rendering to a display device. Presenting thevirtual experience can comprise outputting a visual rendering to adisplay device, in which the visual rendering is sped up relative to thepredicted experience.

One or more aspects are represented in FIG. 9, and can correspond tooperations, e.g., of a machine-readable storage medium, comprisingexecutable instructions that, when executed by a processor facilitateperformance of the operations. Example operation 902 representsobtaining current traffic data associated with a traffic zone for avehicle that is determined to be approaching the traffic zone. Exampleoperation 904 represents generating simulated virtual experience databased on the current traffic data. Example operation 906 representscommunicating the simulated virtual experience data to a wireless deviceassociated with the vehicle for presenting a simulated virtualexperience corresponding to a predicted interaction between the vehicleand predicted traffic in the traffic zone.

Further operations can comprise receiving user-specific data, anddetermining predicted billing data based on the user-specific data andthe simulated virtual experience data.

Further operations can comprise embedding modeling data that is based onhistorical traffic data, in a traffic sensor, and wherein the obtainingthe current traffic data comprises receiving reduced data that isfiltered or classified via the modeling data from the traffic sensor.

Generating the simulated virtual experience data based on the currenttraffic data can comprise generating three-dimensional visual renderingdata.

As can be seen, the technology operates independent of access networks(Wifi/3GPP/Broadband) and regardless of wireless carriers that thesensor devices are using. With the technology, there is no need for apre-provisioned account. User privacy is avoided by not using cameras totake pictures of car license plates (until the user enters the zone andthe user is otherwise paying for traffic zone usage), in part becausethe technology is based on the location or proximity of the user inrelations to a traffic zone. The user only needs an application on amobile device to regularly get device data and present a simulatedexperience. In this way, users can “test drive” the experience beforeentry into a traffic zone, and can get credits if the expectation is notmet.

Referring now to FIG. 10, illustrated is a schematic block diagram of anexample end-user device such as a user equipment) that can be a mobiledevice 1000 capable of connecting to a network in accordance with someembodiments described herein. Although a mobile handset 1000 isillustrated herein, it will be understood that other devices can be amobile device, and that the mobile handset 1000 is merely illustrated toprovide context for the embodiments of the various embodiments describedherein. The following discussion is intended to provide a brief, generaldescription of an example of a suitable environment 1000 in which thevarious embodiments can be implemented. While the description includes ageneral context of computer-executable instructions embodied on amachine-readable storage medium, those skilled in the art will recognizethat the various embodiments also can be implemented in combination withother program modules and/or as a combination of hardware and software.

Generally, applications (e.g., program modules) can include routines,programs, components, data structures, etc., that perform particulartasks or implement particular abstract data types. Moreover, thoseskilled in the art will appreciate that the methods described herein canbe practiced with other system configurations, includingsingle-processor or multiprocessor systems, minicomputers, mainframecomputers, as well as personal computers, hand-held computing devices,microprocessor-based or programmable consumer electronics, and the like,each of which can be operatively coupled to one or more associateddevices.

A computing device can typically include a variety of machine-readablemedia. Machine-readable media can be any available media that can beaccessed by the computer and includes both volatile and non-volatilemedia, removable and non-removable media. By way of example and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media can include volatileand/or non-volatile media, removable and/or non-removable mediaimplemented in any method or technology for storage of information, suchas computer-readable instructions, data structures, program modules orother data. Computer storage media can include, but is not limited to,RAM, ROM, EEPROM, flash memory or other memory technology, CD ROM,digital video disk (DVD) or other optical disk storage, magneticcassettes, magnetic tape, magnetic disk storage or other magneticstorage devices, or any other medium which can be used to store thedesired information and which can be accessed by the computer.

Communication media typically embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism, and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of the anyof the above should also be included within the scope ofcomputer-readable media.

The handset 1000 includes a processor 1002 for controlling andprocessing all onboard operations and functions. A memory 1004interfaces to the processor 1002 for storage of data and one or moreapplications 1006 (e.g., a video player software, user feedbackcomponent software, etc.). Other applications can include voicerecognition of predetermined voice commands that facilitate initiationof the user feedback signals. The applications 1006 can be stored in thememory 1004 and/or in a firmware 1008, and executed by the processor1002 from either or both the memory 1004 or/and the firmware 1008. Thefirmware 1008 can also store startup code for execution in initializingthe handset 1000. A communications component 1010 interfaces to theprocessor 1002 to facilitate wired/wireless communication with externalsystems, e.g., cellular networks, VoIP networks, and so on. Here, thecommunications component 1010 can also include a suitable cellulartransceiver 1011 (e.g., a GSM transceiver) and/or an unlicensedtransceiver 1013 (e.g., Wi-Fi, WiMax) for corresponding signalcommunications. The handset 1000 can be a device such as a cellulartelephone, a PDA with mobile communications capabilities, andmessaging-centric devices. The communications component 1010 alsofacilitates communications reception from terrestrial radio networks(e.g., broadcast), digital satellite radio networks, and Internet-basedradio services networks.

The handset 1000 includes a display 1012 for displaying text, images,video, telephony functions (e.g., a Caller ID function), setupfunctions, and for user input. For example, the display 1012 can also bereferred to as a “screen” that can accommodate the presentation ofmultimedia content (e.g., music metadata, messages, wallpaper, graphics,etc.). The display 1012 can also display videos and can facilitate thegeneration, editing and sharing of video quotes. A serial I/O interface1014 is provided in communication with the processor 1002 to facilitatewired and/or wireless serial communications (e.g., USB, and/or IEEE1094) through a hardwire connection, and other serial input devices(e.g., a keyboard, keypad, and mouse). This supports updating andtroubleshooting the handset 1000, for example. Audio capabilities areprovided with an audio I/O component 1016, which can include a speakerfor the output of audio signals related to, for example, indication thatthe user pressed the proper key or key combination to initiate the userfeedback signal. The audio I/O component 1016 also facilitates the inputof audio signals through a microphone to record data and/or telephonyvoice data, and for inputting voice signals for telephone conversations.

The handset 1000 can include a slot interface 1018 for accommodating aSIC (Subscriber Identity Component) in the form factor of a cardSubscriber Identity Module (SIM) or universal SIM 1020, and interfacingthe SIM card 1020 with the processor 1002. However, it is to beappreciated that the SIM card 1020 can be manufactured into the handset1000, and updated by downloading data and software.

The handset 1000 can process IP data traffic through the communicationcomponent 1010 to accommodate IP traffic from an IP network such as, forexample, the Internet, a corporate intranet, a home network, a personarea network, etc., through an ISP or broadband cable provider. Thus,VoIP traffic can be utilized by the handset 800 and IP-based multimediacontent can be received in either an encoded or decoded format.

A video processing component 1022 (e.g., a camera) can be provided fordecoding encoded multimedia content. The video processing component 1022can aid in facilitating the generation, editing and sharing of videoquotes. The handset 1000 also includes a power source 1024 in the formof batteries and/or an AC power subsystem, which power source 1024 caninterface to an external power system or charging equipment (not shown)by a power I/O component 1026.

The handset 1000 can also include a video component 1030 for processingvideo content received and, for recording and transmitting videocontent. For example, the video component 1030 can facilitate thegeneration, editing and sharing of video quotes. A location trackingcomponent 1032 facilitates geographically locating the handset 1000. Asdescribed hereinabove, this can occur when the user initiates thefeedback signal automatically or manually. A user input component 1034facilitates the user initiating the quality feedback signal. The userinput component 1034 can also facilitate the generation, editing andsharing of video quotes. The user input component 1034 can include suchconventional input device technologies such as a keypad, keyboard,mouse, stylus pen, and/or touch screen, for example.

Referring again to the applications 1006, a hysteresis component 1036facilitates the analysis and processing of hysteresis data, which isutilized to determine when to associate with the access point. Asoftware trigger component 1038 can be provided that facilitatestriggering of the hysteresis component 1038 when the Wi-Fi transceiver1013 detects the beacon of the access point. A SIP client 1040 enablesthe handset 1000 to support SIP protocols and register the subscriberwith the SIP registrar server. The applications 1006 can also include aclient 1042 that provides at least the capability of discovery, play andstore of multimedia content, for example, music.

The handset 1000, as indicated above related to the communicationscomponent 810, includes an indoor network radio transceiver 1013 (e.g.,Wi-Fi transceiver). This function supports the indoor radio link, suchas IEEE 802.11, for the dual-mode GSM handset 1000. The handset 1000 canaccommodate at least satellite radio services through a handset that cancombine wireless voice and digital radio chipsets into a single handhelddevice.

In order to provide additional context for various embodiments describedherein, FIG. 11 and the following discussion are intended to provide abrief, general description of a suitable computing environment 1100 inwhich the various embodiments of the embodiment described herein can beimplemented. While the embodiments have been described above in thegeneral context of computer-executable instructions that can run on oneor more computers, those skilled in the art will recognize that theembodiments can be also implemented in combination with other programmodules and/or as a combination of hardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the technology described herein can be practiced with othercomputer system configurations, including single-processor ormultiprocessor computer systems, minicomputers, mainframe computers,Internet of Things (IoT) devices, distributed computing systems, as wellas personal computers, hand-held computing devices, microprocessor-basedor programmable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The illustrated embodiments of the embodiments herein can be alsopracticed in distributed computing environments where certain tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed computing environment, programmodules can be located in both local and remote memory storage devices.

Computing devices typically include a variety of media, which caninclude computer-readable storage media, machine-readable storage media,and/or communications media, which two terms are used herein differentlyfrom one another as follows. Computer-readable storage media ormachine-readable storage media can be any available storage media thatcan be accessed by the computer and includes both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media or machine-readablestorage media can be implemented in connection with any method ortechnology for storage of information such as computer-readable ormachine-readable instructions, program modules, structured data orunstructured data.

Computer-readable storage media can include, but are not limited to,random access memory (RAM), read only memory (ROM), electricallyerasable programmable read only memory (EEPROM), flash memory or othermemory technology, compact disk read only memory (CD-ROM), digitalversatile disk (DVD), Blu-ray disc (BD) or other optical disk storage,magnetic cassettes, magnetic tape, magnetic disk storage or othermagnetic storage devices, solid state drives or other solid statestorage devices, or other tangible and/or non-transitory media which canbe used to store desired information. In this regard, the terms“tangible” or “non-transitory” herein as applied to storage, memory orcomputer-readable media, are to be understood to exclude onlypropagating transitory signals per se as modifiers and do not relinquishrights to all standard storage, memory or computer-readable media thatare not only propagating transitory signals per se.

Computer-readable storage media can be accessed by one or more local orremote computing devices, e.g., via access requests, queries or otherdata retrieval protocols, for a variety of operations with respect tothe information stored by the medium.

Communications media typically embody computer-readable instructions,data structures, program modules or other structured or unstructureddata in a data signal such as a modulated data signal, e.g., a carrierwave or other transport mechanism, and includes any information deliveryor transport media. The term “modulated data signal” or signals refersto a signal that has one or more of its characteristics set or changedin such a manner as to encode information in one or more signals. By wayof example, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

With reference again to FIG. 11, the example environment 1100 forimplementing various embodiments of the aspects described hereinincludes a computer 1102, the computer 1102 including a processing unit1104, a system memory 1106 and a system bus 1108. The system bus 1108couples system components including, but not limited to, the systemmemory 1106 to the processing unit 1104. The processing unit 1104 can beany of various commercially available processors. Dual microprocessorsand other multi-processor architectures can also be employed as theprocessing unit 1104.

The system bus 1108 can be any of several types of bus structure thatcan further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 1106includes ROM 1110 and RAM 1112. A basic input/output system (BIOS) canbe stored in a non-volatile memory such as ROM, erasable programmableread only memory (EPROM), EEPROM, which BIOS contains the basic routinesthat help to transfer information between elements within the computer1102, such as during startup. The RAM 1112 can also include a high-speedRAM such as static RAM for caching data.

The computer 1102 further includes an internal hard disk drive (HDD)1114 (e.g., EIDE, SATA), one or more external storage devices 1116(e.g., a magnetic floppy disk drive (FDD) 1116, a memory stick or flashdrive reader, a memory card reader, etc.) and an optical disk drive 1120(e.g., which can read or write from a CD-ROM disc, a DVD, a BD, etc.).While the internal HDD 1114 is illustrated as located within thecomputer 1102, the internal HDD 1114 can also be configured for externaluse in a suitable chassis (not shown). Additionally, while not shown inenvironment 1100, a solid state drive (SSD) could be used in additionto, or in place of, an HDD 1114. The HDD 1114, external storagedevice(s) 1116 and optical disk drive 1120 can be connected to thesystem bus 1108 by an HDD interface 1124, an external storage interface1126 and an optical drive interface 1128, respectively. The interface1124 for external drive implementations can include at least one or bothof Universal Serial Bus (USB) and Institute of Electrical andElectronics Engineers (IEEE) 1094 interface technologies. Other externaldrive connection technologies are within contemplation of theembodiments described herein.

The drives and their associated computer-readable storage media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 1102, the drives andstorage media accommodate the storage of any data in a suitable digitalformat. Although the description of computer-readable storage mediaabove refers to respective types of storage devices, it should beappreciated by those skilled in the art that other types of storagemedia which are readable by a computer, whether presently existing ordeveloped in the future, could also be used in the example operatingenvironment, and further, that any such storage media can containcomputer-executable instructions for performing the methods describedherein.

A number of program modules can be stored in the drives and RAM 1112,including an operating system 1130, one or more application programs1132, other program modules 1134 and program data 1136. All or portionsof the operating system, applications, modules, and/or data can also becached in the RAM 1112. The systems and methods described herein can beimplemented utilizing various commercially available operating systemsor combinations of operating systems.

Computer 1102 can optionally comprise emulation technologies. Forexample, a hypervisor (not shown) or other intermediary can emulate ahardware environment for operating system 1130, and the emulatedhardware can optionally be different from the hardware illustrated inFIG. 11. In such an embodiment, operating system 1130 can comprise onevirtual machine (VM) of multiple VMs hosted at computer 1102.Furthermore, operating system 1130 can provide runtime environments,such as the Java runtime environment or the .NET framework, forapplications 1132. Runtime environments are consistent executionenvironments that allow applications 1132 to run on any operating systemthat includes the runtime environment. Similarly, operating system 1130can support containers, and applications 1132 can be in the form ofcontainers, which are lightweight, standalone, executable packages ofsoftware that include, e.g., code, runtime, system tools, systemlibraries and settings for an application.

Further, computer 1102 can be enable with a security module, such as atrusted processing module (TPM). For instance with a TPM, bootcomponents hash next in time boot components, and wait for a match ofresults to secured values, before loading a next boot component. Thisprocess can take place at any layer in the code execution stack ofcomputer 1102, e.g., applied at the application execution level or atthe operating system (OS) kernel level, thereby enabling security at anylevel of code execution.

A user can enter commands and information into the computer 1102 throughone or more wired/wireless input devices, e.g., a keyboard 1138, a touchscreen 1140, and a pointing device, such as a mouse 1142. Other inputdevices (not shown) can include a microphone, an infrared (IR) remotecontrol, a radio frequency (RF) remote control, or other remote control,a joystick, a virtual reality controller and/or virtual reality headset,a game pad, a stylus pen, an image input device, e.g., camera(s), agesture sensor input device, a vision movement sensor input device, anemotion or facial detection device, a biometric input device, e.g.,fingerprint or iris scanner, or the like. These and other input devicesare often connected to the processing unit 1104 through an input deviceinterface 1144 that can be coupled to the system bus 1108, but can beconnected by other interfaces, such as a parallel port, an IEEE 1094serial port, a game port, a USB port, an IR interface, a BLUETOOTH®interface, etc.

A monitor 1146 or other type of display device can be also connected tothe system bus 1108 via an interface, such as a video adapter 1148. Inaddition to the monitor 1146, a computer typically includes otherperipheral output devices (not shown), such as speakers, printers, etc.

The computer 1102 can operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 1150. The remotecomputer(s) 1150 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentappliance, a peer device or other common network node, and typicallyincludes many or all of the elements described relative to the computer1102, although, for purposes of brevity, only a memory/storage device1152 is illustrated. The logical connections depicted includewired/wireless connectivity to a local area network (LAN) 1154 and/orlarger networks, e.g., a wide area network (WAN) 1156. Such LAN and WANnetworking environments are commonplace in offices and companies, andfacilitate enterprise-wide computer networks, such as intranets, all ofwhich can connect to a global communications network, e.g., theInternet.

When used in a LAN networking environment, the computer 1102 can beconnected to the local network 1154 through a wired and/or wirelesscommunication network interface or adapter 1158. The adapter 1158 canfacilitate wired or wireless communication to the LAN 1154, which canalso include a wireless access point (AP) disposed thereon forcommunicating with the adapter 1158 in a wireless mode.

When used in a WAN networking environment, the computer 1102 can includea modem 1160 or can be connected to a communications server on the WAN1156 via other means for establishing communications over the WAN 1156,such as by way of the Internet. The modem 1160, which can be internal orexternal and a wired or wireless device, can be connected to the systembus 1108 via the input device interface 1144. In a networkedenvironment, program modules depicted relative to the computer 1102 orportions thereof, can be stored in the remote memory/storage device1152. It will be appreciated that the network connections shown areexample and other means of establishing a communications link betweenthe computers can be used.

When used in either a LAN or WAN networking environment, the computer1102 can access cloud storage systems or other network-based storagesystems in addition to, or in place of, external storage devices 1116 asdescribed above. Generally, a connection between the computer 1102 and acloud storage system can be established over a LAN 1154 or WAN 1156e.g., by the adapter 1158 or modem 1160, respectively. Upon connectingthe computer 1102 to an associated cloud storage system, the externalstorage interface 1126 can, with the aid of the adapter 1158 and/ormodem 1160, manage storage provided by the cloud storage system as itwould other types of external storage. For instance, the externalstorage interface 1126 can be configured to provide access to cloudstorage sources as if those sources were physically connected to thecomputer 1102.

The computer 1102 can be operable to communicate with any wirelessdevices or entities operatively disposed in wireless communication,e.g., a printer, scanner, desktop and/or portable computer, portabledata assistant, communications satellite, any piece of equipment orlocation associated with a wirelessly detectable tag (e.g., a kiosk,news stand, store shelf, etc.), and telephone. This can include WirelessFidelity (Wi-Fi) and BLUETOOTH® wireless technologies. Thus, thecommunication can be a predefined structure as with a conventionalnetwork or simply an ad hoc communication between at least two devices.

The computer is operable to communicate with any wireless devices orentities operatively disposed in wireless communication, e.g., aprinter, scanner, desktop and/or portable computer, portable dataassistant, communications satellite, any piece of equipment or locationassociated with a wirelessly detectable tag (e.g., a kiosk, news stand,restroom), and telephone. This includes at least Wi-Fi and Bluetooth™wireless technologies. Thus, the communication can be a predefinedstructure as with a conventional network or simply an ad hoccommunication between at least two devices.

Wi-Fi, or Wireless Fidelity, allows connection to the Internet from acouch at home, a bed in a hotel room, or a conference room at work,without wires. Wi-Fi is a wireless technology similar to that used in acell phone that enables such devices, e.g., computers, to send andreceive data indoors and out; anywhere within the range of a basestation. Wi-Fi networks use radio technologies called IEEE802.11 (a, b,g, n, etc.) to provide secure, reliable, fast wireless connectivity. AWi-Fi network can be used to connect computers to each other, to theInternet, and to wired networks (which use IEEE802.3 or Ethernet). Wi-Finetworks operate in the unlicensed 2.4 and 8 GHz radio bands, at an 11Mbps (802.11b) or 84 Mbps (802.11a) data rate, for example, or withproducts that contain both bands (dual band), so the networks canprovide real-world performance similar to the basic “10BaseT” wiredEthernet networks used in many offices.

As it employed in the subject specification, the term “processor” canrefer to substantially any computing processing unit or devicecomprising, but not limited to comprising, single-core processors;single-processors with software multithread execution capability;multi-core processors; multi-core processors with software multithreadexecution capability; multi-core processors with hardware multithreadtechnology; parallel platforms; and parallel platforms with distributedshared memory. Additionally, a processor can refer to an integratedcircuit, an application specific integrated circuit (ASIC), a digitalsignal processor (DSP), a field programmable gate array (FPGA), aprogrammable logic controller (PLC), a complex programmable logic device(CPLD), a discrete gate or transistor logic, discrete hardwarecomponents, or any combination thereof designed to perform the functionsdescribed herein. Processors can exploit nano-scale architectures suchas, but not limited to, molecular and quantum-dot based transistors,switches and gates, in order to optimize space usage or enhanceperformance of user equipment. A processor also can be implemented as acombination of computing processing units.

In the subject specification, terms such as “store,” “data store,” “datastorage,” “database,” “repository,” “queue”, and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can comprise both volatile andnonvolatile memory. In addition, memory components or memory elementscan be removable or stationary. Moreover, memory can be internal orexternal to a device or component, or removable or stationary. Memorycan comprise various types of media that are readable by a computer,such as hard-disc drives, zip drives, magnetic cassettes, flash memorycards or other types of memory cards, cartridges, or the like.

By way of illustration, and not limitation, nonvolatile memory cancomprise read only memory (ROM), programmable ROM (PROM), electricallyprogrammable ROM (EPROM), electrically erasable ROM (EEPROM), or flashmemory. Volatile memory can comprise random access memory (RAM), whichacts as external cache memory. By way of illustration and notlimitation, RAM is available in many forms such as synchronous RAM(SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rateSDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), anddirect Rambus RAM (DRRAM). Additionally, the disclosed memory componentsof systems or methods herein are intended to comprise, without beinglimited to comprising, these and any other suitable types of memory.

In particular and in regard to the various functions performed by theabove described components, devices, circuits, systems and the like, theterms (including a reference to a “means”) used to describe suchcomponents are intended to correspond, unless otherwise indicated, toany component which performs the specified function of the describedcomponent (e.g., a functional equivalent), even though not structurallyequivalent to the disclosed structure, which performs the function inthe herein illustrated example aspects of the embodiments. In thisregard, it will also be recognized that the embodiments comprise asystem as well as a computer-readable medium having computer-executableinstructions for performing the acts and/or events of the variousmethods.

Computing devices typically comprise a variety of media, which cancomprise computer-readable storage media and/or communications media,which two terms are used herein differently from one another as follows.Computer-readable storage media can be any available storage media thatcan be accessed by the computer and comprises both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structureddata, or unstructured data.

Computer-readable storage media can include, but are not limited to,random access memory (RAM), read only memory (ROM), electricallyerasable programmable read only memory (EEPROM), flash memory or othermemory technology, solid state drive (SSD) or other solid-state storagetechnology, compact disk read only memory (CD ROM), digital versatiledisk (DVD), Blu-ray disc or other optical disk storage, magneticcassettes, magnetic tape, magnetic disk storage or other magneticstorage devices or other tangible and/or non-transitory media which canbe used to store desired information.

In this regard, the terms “tangible” or “non-transitory” herein asapplied to storage, memory or computer-readable media, are to beunderstood to exclude only propagating transitory signals per se asmodifiers and do not relinquish rights to all standard storage, memoryor computer-readable media that are not only propagating transitorysignals per se. Computer-readable storage media can be accessed by oneor more local or remote computing devices, e.g., via access requests,queries or other data retrieval protocols, for a variety of operationswith respect to the information stored by the medium.

On the other hand, communications media typically embodycomputer-readable instructions, data structures, program modules orother structured or unstructured data in a data signal such as amodulated data signal, e.g., a carrier wave or other transportmechanism, and comprises any information delivery or transport media.The term “modulated data signal” or signals refers to a signal that hasone or more of its characteristics set or changed in such a manner as toencode information in one or more signals. By way of example, and notlimitation, communications media comprise wired media, such as a wirednetwork or direct-wired connection, and wireless media such as acoustic,RF, infrared and other wireless media

Further, terms like “user equipment,” “user device,” “mobile device,”“mobile,” station,” “access terminal,” “terminal,” “handset,” andsimilar terminology, generally refer to a wireless device utilized by asubscriber or user of a wireless communication network or service toreceive or convey data, control, voice, video, sound, gaming, orsubstantially any data-stream or signaling-stream. The foregoing termsare utilized interchangeably in the subject specification and relateddrawings. Likewise, the terms “access point,” “node B,” “base station,”“evolved Node B,” “cell,” “cell site,” and the like, can be utilizedinterchangeably in the subject application, and refer to a wirelessnetwork component or appliance that serves and receives data, control,voice, video, sound, gaming, or substantially any data-stream orsignaling-stream from a set of subscriber stations. Data and signalingstreams can be packetized or frame-based flows. It is noted that in thesubject specification and drawings, context or explicit distinctionprovides differentiation with respect to access points or base stationsthat serve and receive data from a mobile device in an outdoorenvironment, and access points or base stations that operate in aconfined, primarily indoor environment overlaid in an outdoor coveragearea. Data and signaling streams can be packetized or frame-based flows.

Furthermore, the terms “user,” “subscriber,” “customer,” “consumer,” andthe like are employed interchangeably throughout the subjectspecification, unless context warrants particular distinction(s) amongthe terms. It should be appreciated that such terms can refer to humanentities, associated devices, or automated components supported throughartificial intelligence (e.g., a capacity to make inference based oncomplex mathematical formalisms) which can provide simulated vision,sound recognition and so forth. In addition, the terms “wirelessnetwork” and “network” are used interchangeable in the subjectapplication, when context wherein the term is utilized warrantsdistinction for clarity purposes such distinction is made explicit.

Moreover, the word “exemplary” is used herein to mean serving as anexample, instance, or illustration. Any aspect or design describedherein as “exemplary” is not necessarily to be construed as preferred oradvantageous over other aspects or designs. Rather, use of the wordexemplary is intended to present concepts in a concrete fashion. As usedin this application, the term “or” is intended to mean an inclusive “or”rather than an exclusive “or”. That is, unless specified otherwise, orclear from context, “X employs A or B” is intended to mean any of thenatural inclusive permutations. That is, if X employs A; X employs B; orX employs both A and B, then “X employs A or B” is satisfied under anyof the foregoing instances. In addition, the articles “a” and “an” asused in this application and the appended claims should generally beconstrued to mean “one or more” unless specified otherwise or clear fromcontext to be directed to a singular form.

In addition, while a particular feature may have been disclosed withrespect to only one of several implementations, such feature may becombined with one or more other features of the other implementations asmay be desired and advantageous for any given or particular application.Furthermore, to the extent that the terms “includes” and “including” andvariants thereof are used in either the detailed description or theclaims, these terms are intended to be inclusive in a manner similar tothe term “comprising.”

The above descriptions of various embodiments of the subject disclosureand corresponding figures and what is described in the Abstract, aredescribed herein for illustrative purposes, and are not intended to beexhaustive or to limit the disclosed embodiments to the precise formsdisclosed. It is to be understood that one of ordinary skill in the artmay recognize that other embodiments having modifications, permutations,combinations, and additions can be implemented for performing the same,similar, alternative, or substitute functions of the disclosed subjectmatter, and are therefore considered within the scope of thisdisclosure. Therefore, the disclosed subject matter should not belimited to any single embodiment described herein, but rather should beconstrued in breadth and scope in accordance with the claims below.

What is claimed is:
 1. A system, comprising: a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, the operations comprising: obtaining user-specific data for a user identity associated with a vehicle; obtaining time-based traffic data associated with a traffic zone that comprises a warning zone surrounding the traffic zone; in response to the vehicle entering the warning zone, generating simulated virtual experience data, corresponding to a predicted interaction experience of the vehicle with traffic and air pollution in the traffic zone during a predicted time range that the vehicle will traverse the traffic zone, based on the user-specific data and the time-based traffic data, wherein the time-based traffic data comprises air pollution data associated with roads in the traffic zone; and communicating the simulated virtual experience data to a device for presentation of a simulated virtual experience to the user identity.
 2. The system of claim 1, wherein the obtaining the time-based traffic data comprises receiving reduced data from a traffic sensor.
 3. The system of claim 2, wherein the operations further comprise, embedding modeling data that is based on historical traffic data, in the traffic sensor, to facilitate the receiving the reduced data from the traffic sensor.
 4. The system of claim 1, wherein the time-based traffic data comprises current data that is processed to obtain the simulated virtual experience data relative to a current time.
 5. The system of claim 1, wherein the time-based traffic data comprises historical data that is processed to obtain the simulated virtual experience data relative to the predicted time range.
 6. The system of claim 1, wherein the user-specific data comprises information directed to avoidance of other traffic.
 7. The system of claim 1, wherein the user-specific data comprises information directed to avoidance of: a type of traffic or an air pollution level.
 8. The system of claim 1, wherein the operations further comprise predicting, based on the user-specific data and the time-based traffic data, estimated pricing data corresponding to the simulated virtual experience, and outputting the estimated pricing data.
 9. The system of claim 1, wherein the operations further comprise issuing a credit to the user identity in response to the simulated virtual experience differing by a threshold criterion from an actual experience in the traffic zone.
 10. The system of claim 1, wherein the presenting the simulated virtual experience occurs in response to a triggering rule being satisfied.
 11. The system of claim 1, wherein the user-specific data comprises a variable parameter corresponding to a traffic zone discount.
 12. The system of claim 1, wherein the user-specific data comprises a variable parameter corresponding to at least one of: user identity information, carpool eligibility or urgency information.
 13. The system of claim 1, wherein the operations further comprise guiding the user identity to a desired route relative to the traffic based on the user-specific data.
 14. A method, comprising: in response to a vehicle entering a warning zone surrounding a congestion pricing zone, communicating, by a device comprising a processor, user-specific data to a traffic service; receiving, by the device, simulated virtual experience data generated by the traffic service based on the user-specific data and time-based traffic data, wherein the simulated virtual experience data is based on a predicted time that the vehicle will enter the congestion pricing zone, and wherein the simulated virtual experience data comprises air pollution data associated with areas in the congestion pricing zone; and presenting, by the device, based on the simulated virtual experience data, a virtual experience corresponding to a predicted future experience of the vehicle with traffic and air pollution in the congestion pricing zone.
 15. The method of claim 14, wherein the presenting the virtual experience comprises outputting a three-dimensional visual rendering to a display device.
 16. The method of claim 14, wherein the presenting the virtual experience comprises outputting a visual rendering to a display device, and wherein the visual rendering is sped up relative to the predicted future experience.
 17. A non-transitory machine-readable medium, comprising executable instructions that, when executed by a processor facilitate performance of operations, the operations comprising: obtaining current traffic data associated with a traffic zone for a vehicle that is determined to have entered a warning zone associated with the traffic zone; generating simulated virtual experience data based on the current traffic data, wherein the simulated virtual experience data comprises air pollution data associated with traffic in the traffic zone; and communicating the simulated virtual experience data to a wireless device associated with the vehicle for presenting a simulated virtual experience corresponding to a predicted interaction between the vehicle and predicted traffic and air pollution in the traffic zone during a predicted time range that the vehicle will occupy the traffic zone.
 18. The non-transitory machine-readable medium of claim 17, wherein the operations further comprise receiving user-specific data, and determining predicted billing data based on the user-specific data and the simulated virtual experience data.
 19. The non-transitory machine-readable medium of claim 17, wherein the operations further comprise, embedding modeling data that is based on historical traffic data, in a traffic sensor, and wherein the obtaining the current traffic data comprises receiving reduced data that is filtered or classified via the modeling data from the traffic sensor.
 20. The non-transitory machine-readable medium of claim 17, wherein the generating the simulated virtual experience data based on the current traffic data comprises generating three-dimensional visual rendering data. 