Augmented Intelligence Toward Smart Vehicular Applications.
Material type:
- text
- computer
- online resource
- 9781000259957
- 629.0460285
- TE228.3 .A946 2021
Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Foreword (by Dr. Xabiel García Pañeda). -- Foreword (by Dr. Neeraj Chaudhary). -- Preface -- Editors -- List of Contributors -- Part 1 Introduction -- Chapter 1 Augmented Intelligence and Edge Computing: Introduction and Trending Features -- 1.1 Introduction to Augmented Intelligence -- 1.2 Artificial Intelligence and Its Applications -- 1.3 Comparing Artificial Intelligence and Augmented Intelligence -- 1.4 Edge Computing -- 1.5 Preparing for the IoT-Driven Future -- 1.6 Defining the IoT's Edge -- 1.7 Edge Computing Builds Privacy and Security -- 1.8 Benefits of Edge Computing -- 1.9 Applications -- 1.10 Challenges -- 1.11 Conclusion -- References -- Chapter 2 Edge Computing and Embedded Storage -- 2.1 Introduction -- 2.2.1 The Working of Edge Computing -- 2.2.2 Edge Computing Builds Privacy and Security -- 2.2 Related Works Based on Security Threats -- 2.3 Threat Background -- 2.4 Threat Model -- 2.4.1 Infrastructure Network -- 2.4.2 Infrastructure as Service -- 2.4.3 Infrastructure as Virtualization -- 2.4.4 User Devices -- 2.5 Open Challenges Relating to Security in Edge Computing -- 2.6 Summary -- References -- Chapter 3 Application of VANET to Avoid Pedestrian Collision in Automotive Vehicles -- 3.1 Introduction -- 3.2 Literature Review -- 3.3 Vehicular Ad Hoc Network -- 3.4 VANET Model Overview -- 3.5 VANET Settings -- 3.6 System Architecture and Working of VANETs -- 3.7 Application -- 3.8 Conclusion -- References -- Part 2 Designing and Evaluation -- Chapter 4 Design of Platoon Controller with V2V Communication for Highways -- 4.1 Introduction -- 4.2 Concept of Look-Ahead Platooning -- 4.3 Modelling of the Platoon -- 4.4 Proposed Controller Methodology -- 4.4.1 PID Controller Design -- 4.4.2 MPC Control Strategy -- 4.5 Platoon Maneuvers.
4.6 Simulation Framework -- 4.7 Key Observations -- 4.8 Challenges -- 4.9 Summary -- Acknowledgments -- References -- Chapter 5 Using Computer Simulations for Quantifying Impact of Infrastructure Changes for Autonomous Vehicles -- 5.1 Introduction -- 5.2 Literature Review -- 5.3 Simulation Environment -- 5.3.1 VTD-ROS Interface -- 5.4 Proposed Bus Bay Designs -- 5.4.1 Bus Bay Design 1: Redesign of Taxi Pick-up/Drop-off Point to the Shared Bay for Bus and AV Shuttle -- 5.4.2 Bus Bay Design 2 - Elongated Bus Bay -- 5.4.3 Bus Bay Design 3 - AV Pick-up/Drop-off Point Separated from Bus Bay -- 5.5 Results and Discussion -- 5.5.1 Traffic Radius of 1.5 km around AV -- 5.5.2 Traffic Radius of 2.5 km around AV -- 5.5.3 Traffic Radius of 5 km around AV -- 5.6 Summary -- References -- Chapter 6 A Comprehensive Simulation Environment for Testing the Applications of a V2X Infrastructure -- 6.1 Introduction -- 6.2 Related Work -- 6.2.1 V2X Simulation Platforms -- 6.2.2 Existing Traffic Congestion Mitigation Methods -- 6.2.3 V2X-Based Traffic Congestion Mitigation -- 6.2.4 Green Light Optimized Speed Advisory -- 6.3 Simulator Design -- 6.3.1 Time Synchronization between a Continuous-Time Simulation Environment and a Discrete-Event Simulator -- 6.3.2 Dynamic Addition and Removal of Nodes in NS3 -- 6.3.3 Choice of Appropriate Mobility Model in NS3 -- 6.4 Simulation Setup -- 6.4.1 Traffic Network -- 6.4.2 Signal Timing -- 6.4.3 Fuel Consumption Modeling -- 6.4.4 Communication Simulation -- 6.5 Simulation Results -- 6.6 Conclusion and Future Work -- References -- Appendix A -- Chapter 7 A Novel Approach in Communication Security of Internet-of-Vehicles Using the Concept of Recurrence Relation and Symmetric Key -- 7.1 Introduction -- 7.2 Literature Survey -- 7.3 Attacks on IoVs -- 7.3.1 IoVs or VANETs -- 7.3.2 Impersonation Attack -- 7.3.3 Sybil Attack.
7.3.4 Eavesdropping -- 7.3.5 Routing attacks -- 7.3.6 Repudiation -- 7.3.7 Man-in-the-middle attack -- 7.3.8 Symmetric key encryption -- 7.4 Solution Domain and Objectives -- 7.4.1 Symmetric key generation -- 7.5 Methodology -- 7.6 Results and Discussions -- 7.7 Conclusion -- References -- Part 3 Smart Safety Measures and Applications -- Chapter 8 Hybrid Data Structures for Fast Queuing Operations in Vehicular Communication -- 8.1 Introduction -- 8.2 Literature Survey -- 8.3 Message Classifications and Priority Assignment in Vehicular Communications -- 8.4 Quick Enqueue and Dequeue Operations -- 8.5 Summary -- References -- Chapter 9 An IOT-Based Accident Detection and Rescue System - A Prototype -- 9.1 Introduction -- 9.2 Literature Survey -- 9.3 Research Gap -- 9.4 Motivation -- 9.5 Aim -- 9.6 Key Contributions -- 9.7 Methodology -- 9.8 Hardware Implementation of the Proposed System -- 9.9 Software Implementation of the Proposed System -- 9.10 Results -- 9.11 Conclusion -- 9.12 Future Scope -- References -- Chapter 10 Intelligent Mobility for Minimizing the Impact of Traffic Incidents on Transportation Networks -- 10.1 Introduction -- 10.2 Different Types of Incidents -- 10.3 Causes of Incidents -- 10.4 What Is Intelligent Mobility? -- 10.5 Incident Duration Prediction -- 10.6 Incident Impact Prediction -- 10.7 Other Technologies -- 10.8 Conclusion -- References -- Index.
The text discusses the role of artificial intelligence, human-computer interaction, big data analytics, augmented intelligence and edge computing in intelligent transportation systems.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.