Browse Definitions :
Definition

automatic vehicle locator (AVL)

An automatic vehicle locator (AVL) is a device that makes use of the Global Positioning System ( GPS ) to enable a business or agency to remotely track the location of its vehicle fleet by using the Internet. These devices combine GPS technology, cellular communications, street-level mapping, and an intuitive user interface, with the ostensible goal of improving fleet management and customer service. For example, a company using an AVL system is able to pinpoint the longitude, latitude, ground speed, and course direction of a given vehicle. The vehicle's location can be quickly found and it could be rerouted to provide timely delivery to a nearby customer. AVL systems also enable companies to structure delivery routes more efficiently by compiling a database of vehicle information, including location of customers in relation to established delivery routes.

AVL systems generally include a network of vehicles that are equipped with a mobile radio receiver, a GPS receiver, a GPS modem, and a GPS antenna. This network connects with a base radio consisting of a PC computer station as well as a GPS receiver and interface. GPS uses interactive maps rather than static map images on the Web. This means users can perform conventional GPS functions such as zoom, pan, identify and queries.

AVL systems can be used to increase the accountability of field personnel and boost the efficiency of a company's dispatching procedure. Dispatchers can get a real-time snapshot of driver adherence to a route, provide customers with an estimated time of arrival, and communicate directly with drivers. Public safety agencies, such as police department or fire departments, can use AVL technology to improve response times by being able to dispatch the closest vehicles for emergencies.

Most AVL suppliers have created products that don't require dedicated servers and require minimal training of dispatchers. AVL systems use mouse clicks instead of keystrokes to page a single vehicle, a designated group of vehicles or an entire fleet. The Aertrax system, for example, operates without expensive receivers or other equipment. It can be operated with a PC or desktop that connects to the Internet. Aertrax includes a completely self-contained unit that uses a minimal amount of power from the vehicle in which it is installed. This unit transmits GPS location data, either on a regularly timed basis or in response to a command. This data is then converted into mapping that is instantly available via the Internet.

In Corpus Christi, Texas, a regional transit authority is collaborating with Texas A&M University-Corpus Christi to develop an AVL system that not only would enable it to track bus locations but also enable automated ridership data collection and dynamic routing. Until recently, the availability of GPS to the commercial and civil sectors had been controlled by the U.S. Department of Defense through an internationally imposed degradation standard known as Selective Availability. This standard degraded the accuracy of civilian GPS so that the highest degree of accuracy was reserved for the military. SA restrictions have since been lifted, enabling GPS to be dispersed for commercial application.

This was last updated in January 2011

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

To learn more about AVL and GPS Tracking Solutions for vehicles visit www.HighPointGPS.com
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close