Autonomous Vehicles, Volume 2
Sybex Inc.,U.S. (Verlag)
978-1-394-15225-4 (ISBN)
Besides communicating with other vehicles, self-driving cars connected to a 5G network will also be able to communicate with different infrastructure elements that make up our roads and other transportation and communication systems. Similarly, an unmanned aerial vehicle (UAV), an aircraft without any human pilot, crew, or passengers on board, can operate under remote control by a human operator, as a remotely-piloted aircraft (RPA), or with various degrees of autonomy. These include autopilot assistance and fully autonomous aircraft that have no provision for human intervention. Transportation is a necessary, but often painful process. With fully autonomous driving, passengers will be freed to accomplish their own goals, turning the dead hours of driving into fruitful hours of learning, working, engaging, and relaxing. Similarly, UAVs can perform functions that human-operated aircraft cannot, whether because of the environment or high-risk situations.
The purpose of the book is to present the needs, designs, and applications of autonomous vehicles. The topics covered range from mechanical engineering to computer science engineering, both areas playing vital roles in programming, managing, generating alerts, and GPS position, artificial intelligence-based prediction of path and events, as well as other high-tech tools, are covered in this book, as well. Whether for the student, veteran engineer, or another industry professional, this book, and its companion volume, are must-haves for any library.
Romil Rawat, PhD, is an assistant professor at Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore. With over 12 years of teaching experience, he has published numerous papers in scholarly journals and conferences. He has also published book chapters and is a board member on two scientific journals. He has received several research grants and has hosted research events, workshops, and training programs. He also has several patents to his credit. Purvee Bhardwaj, PhD, is the Dean of Physical Science at Rabindranath Tagore University Bhopal MP, India. She has published more than 70 papers in scientific and technical journals and one book. She is a lifetime member of multiple scientific societies and has won numerous awards. Upinder Kaur, PhD, is an assistant professor and head of the Department of Computer Science and Engineering at Akal University and has over 12 years of experience in academics and research. Shrikant Telang, is an assistant professor at Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore, India. With over eight years of teaching and research experience, he has several patents to his credit and has won numerous awards. Mukesh Chouhan, is an assistant professor and head of the department in the Department of Computer Science & Engineering, Government Polytechnic College, Sanawad, MP, India. He has published several research papers in referred journals, conference papers and book chapters. K. Sakthidasan Sankaran, is a professor in the Department of Electronics and Communication Engineering at Hindustan Institute of Technology and Science, India. He is a reviewer and an editorial board member for several scholarly journals, and he has published more than 70 papers. He also has three books to his credit.
Preface xiii
1 A Best Fit Strategic Approach for Sample Selections of a Carrier to Minimizing Quantization Error 1
Virendra P. Nikam and Shital S. Dhande
1.1 Introduction 1
1.1.1 Cryptography 2
1.1.2 Steganography 3
1.1.3 Watermarking 3
1.2 Background History 5
1.3 Literature Survey 6
1.4 Proposed Methodology 8
1.4.1 Carrier Selection 8
1.4.2 Carrier Classification 8
1.4.3 Searching Best Fit Sample from Class 9
1.4.4 Updating Result Carrier with Newly Found Best-Fit Sample 10
1.5 Result Analysis 13
1.6 Conclusion 15
1.7 Future Scope 17
References 17
2 A Dual-Polarized Antenna With Circular Parasitic Element for Autonomous Vehicle 19
Manish Varun Yadav and Sudeep Baudha
2.1 Introduction 19
2.2 Autonomous-Vehicle Antenna Design and Principle 21
2.3 Simulated Parameter Study 24
2.4 Simulated Results 25
2.5 Conclusion 30
References 30
3 A Smart Vehicle Antenna for Defence and Satellite Communication 33
Manish Varun Yadav, Swati Varun Yadav, Sudeep Baudha and Ashish Chittora
3.1 Introduction 34
3.2 Design Principle and Structure 35
3.3 Stages of Development 37
3.4 Simulated Parameter Study 38
3.5 Simulated and Measured Results 40
3.6 Conclusion 42
References 44
4 Visual Place Recognition for Simultaneous Localization and Mapping 47
Konstantinos A. Tsintotas, Loukas Bampis and Antonios Gasteratos
4.1 Introduction 47
4.2 The Structure for a Visual Place Recognition System 49
4.2.1 Image Processing 50
4.2.1.1 Global Descriptor Extraction 50
4.2.1.2 Local Descriptors Extraction 51
4.2.2 Map 52
4.2.2.1 Single Image-Based 53
4.2.2.2 Sequence of Images-Based 54
4.2.3 Belief Generator 54
4.2.3.1 Pixel-Wise Similarity 55
4.2.3.2 Euclidean or Cosine Distance 56
4.2.3.3 Vote Density 56
4.2.3.4 Temporal Consistency 57
4.2.3.5 Geometrical Verification 57
4.3 Evaluation 58
4.3.1 Ground Truth 58
4.3.2 Datasets 59
4.3.3 Evaluation Metrics 60
4.4 Paradigms 61
4.4.1 Sequence of Images-Based Visual Word Histograms 61
4.4.2 Dynamic Sequence Segmentation 64
4.4.3 Hierarchical Mapping Through an Incremental Visual Vocabulary 66
4.4.4 Bag of Tracked Words for Incremental Visual Place Recognition 67
4.5 Experimental Results 69
4.6 Future Trends and Conclusion 70
References 71
5 Trust Verification Class (TVCRO) Based Communication for Enhanced of QoS in VANET Environment 81
Akanksha Vyas, Nayan Bhale Amar, Pratiksha Aurangabadkar and Yukti Vyas
5.1 Introduction 82
5.2 Related Work 84
5.3 Theoretical Framework 86
5.4 TVCRO Procedure 90
5.5 Simulation Setup 95
5.6 Results and Discussion 97
5.7 Conclusion 99
References 100
6 Effective Congestion Control Mechanism for Smart Vehicles Using Edge Computing in VANET 105
Poorva Shukla, Sunita Varma and Ravindra Petel
6.1 Introduction 106
6.2 Related Study 109
6.3 Proposed Algorithm 116
6.4 Conclusion 118
Appendix 118
References 119
7 Longitudinally Variant 4W4D Robot Slipagge-Based Path Tracking Control 123
Edgar A. Martínez-García, Roman Lavrenov and Evgeni Magid
7.1 Introduction 124
7.2 Related Work 125
7.3 Vehicle Physical Model 127
7.4 4W4D Z-Turn Control Law 132
7.5 Sensing Models 137
7.6 Path-Tracking Control 139
7.7 Conclusion 145
Acknowledgement 146
References 146
8 Intelligent Autonomous Electric Car 151
Vijay L. Hallappanavar, Chetan M. Bulla and Mahantesh N. Birje
8.1 Introduction 151
8.2 Related Work 154
8.3 Intelligent Autonomous System 155
8.3.1 Object Detection 156
8.3.1.1 Object Detection Using IR Sensor 157
8.3.2 Automatic Cooling 158
8.3.3 Speed Control While Raining 159
8.3.4 Automatic Charging 160
8.3.5 Hardware Requirement 162
8.3.6 Software Requirements 165
8.4 Results 165
8.4.1 Object Detection and Tracking 165
8.4.2 Automatic Cooling 166
8.4.3 Speed Control While Raining 167
8.4.4 Automatic Charging 167
8.5 Conclusions 167
References 168
9 Cluster Optimization Using Metaheuristic JAYA Algorithm for Secure VANETs 173
Gurjot Kaur, Deepti Kakkar and Davinder Singh
9.1 Introduction 174
9.1.1 VANET Architecture 176
9.1.2 VANET Topology 176
9.1.3 Challenges in VANETs 179
9.1.4 Security Issues in VANETs 180
9.1.5 Organization of Chapter 183
9.2 Literature Review 183
9.2.1 Available Security Solutions for VANETs 183
9.2.2 On Trust-Based Security Models 184
9.2.3 Gaps in Existing Trust Model-Based Security Solutions 187
9.2.4 On Clustering in VANETs Using Metaheuristic Techniques 188
9.3 Proposed Work 191
9.3.1 Overview 191
9.3.2 Assumptions 191
9.3.3 Constraints 192
9.3.4 Proposed Methodology 192
9.4 Conclusion 200
References 200
10 Analysis of Domestic Cars in India for Middle-Income Group Using TOPSIS 207
Vibha Aggarwal, Kulwant Singh, Sandeep Gupta, Shipra Bansal, Priyanka Baghla and Navjot Kaur
10.1 Introduction 208
10.2 Methodology 209
10.3 Result and Discussion 214
10.4 Conclusion 214
References 214
11 A Secure Data Authentication-Based Aerial Intelligent Relay Road Side Unit (AIR-RSU) Framework for Intelligent Transportation System Applications 217
A. Samson Arun Raj, M. Roshni Thanka, G. Jaspher Wilisie Kathrine and Yogesh Palanichamy
11.1 Introduction 218
11.1.1 The Need for Data Authentication 218
11.1.2 The Objective of the Proposed Model 219
11.2 Related Works 219
11.3 Application Scenario of The Working Model 222
11.4 Working Process 224
11.4.1 Network Measurement Subsystem 225
11.4.2 Data Authentication Subsystem 227
11.4.3 Service Classification Subsystem 227
11.5 Experimental Process 230
11.6 Conclusion and Future Works 234
References 235
12 Evaluation of Vulnerabilities in IoT-Based Intelligent Agriculture Systems 237
Khongdet Phasinam and Thanwamas Kassanuk
12.1 Introduction 238
12.1.1 Precision Agriculture 238
12.1.2 Internet of Things and Machine Learning for Smart Agriculture and Related Security Concerns 238
12.2 Building Blocks of Internet of Things 241
12.2.1 Sensors 242
12.2.2 Control Unit 244
12.2.3 Communication Module 245
12.3 Literature Survey 247
12.4 Security Issues 249
12.4.1 Heterogeneous Devices and Communication 250
12.4.2 Integrating Physical Devices 250
12.4.3 Constrained Devices 250
12.4.4 Large Scale 250
12.4.5 Privacy 250
12.5 Attacks and Vulnerabilities in Internet of Things Related to Agriculture Field 251
12.6 Conclusion 254
References 255
13 Q Learning Algorithm for Network Resource Management in Vehicular Communication Network 259
Vartika Agarwal and Sachin Sharma
13.1 Introduction 259
13.2 Literature Review 261
13.3 Overview of Network Resource Management in Vehicular Communication Networks 263
13.4 Reinforcement Learning Techniques for Network Resource Management 264
13.5 Applications of Q Learning 266
13.6 Comparative Study and Result Analysis 268
13.7 Impact of Q-Learning 271
13.8 Conclusion 271
References 272
14 Reliable Transportation Solution for Urban Planning: VANET 275
Harshit Srivastava and Deepti Kakkar
14.1 Introduction 276
14.1.1 VANET Architecture 276
14.1.2 VANET Characteristics 278
14.1.3 VANET Standards 278
14.1.4 VANET Communication 279
14.1.5 Implementation of Optimisation Algorithm for VANETs 279
14.2 Cryptography 282
14.2.1 Salient Features of Cryptography 282
14.2.2 Classification of Cryptography (as shown in Figure 14.2) 283
14.3 Common Security Attacks 283
14.4 Gaps in Present Cryptography 284
14.5 Lightweight Cryptography 285
14.5.1 Vital Security Aspects in Lightweight Cryptography 286
14.5.2 Advantages of Lightweight Protocols 287
14.5.3 Objectives of Lightweight Protocols are Classified as 288
14.5.4 Lightweight Cryptography Algorithms 289
14.5.5 Software and Hardware Implementation 290
14.5.5.1 Hardware Lightweight Cryptography 290
14.5.5.2 Software Lightweight Cryptography 291
14.5.6 Division of Lightweight Cryptography 291
14.5.6.1 Symmetric Key Algorithm 292
14.5.6.2 Asymmetric Key 297
14.6 Conclusion 299
14.7 Future Work 300
References 300
15 Implementation of Veco-Taxis in Turbulent Environment for Gas Source Localization 303
Kumar Gaurav
15.1 Introduction 303
15.2 Literature Survey 304
15.3 Methodology 307
15.4 Results and Discussions 310
15.5 Conclusions 314
References 315
16 A Technique for Monitoring Cyber-Attacks on Self-Driving Automobiles-Based VANET 317
Vinod Mahor, Sadhna Bijrothiya, Rina Mishra and Romil Rawat
16.1 Introduction 318
16.2 Related Work 319
16.3 Examining the Proposed Framework 320
16.4 Conclusion 331
References 331
About the Editors 335
Index 337
Erscheinungsdatum | 22.12.2022 |
---|---|
Verlagsort | New York |
Sprache | englisch |
Gewicht | 744 g |
Themenwelt | Geisteswissenschaften ► Geschichte |
Technik ► Maschinenbau | |
ISBN-10 | 1-394-15225-6 / 1394152256 |
ISBN-13 | 978-1-394-15225-4 / 9781394152254 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich