Browse Subject Headings
Autonomous Vehicles, Volume 2 : Smart Vehicles for Communication
Autonomous Vehicles, Volume 2 : Smart Vehicles for Communication
Click to enlarge
Author(s): Bhardwaj, Purvee
Rawat, Romil
ISBN No.: 9781394152254
Pages: 352
Year: 202301
Format: Trade Cloth (Hard Cover)
Price: $ 269.10
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Preface xiii 1 A Best Fit Strategic Approach for Sample Selections of a Carrier to Minimizing Quantization Error 1 Virendra P. Nikam and Shital S. Dhande 1.1 Introduction 1 1.1.1 Cryptography 2 1.1.2 Steganography 3 1.


1.3 Watermarking 3 1.2 Background History 5 1.3 Literature Survey 6 1.4 Proposed Methodology 8 1.4.1 Carrier Selection 8 1.4.


2 Carrier Classification 8 1.4.3 Searching Best Fit Sample from Class 9 1.4.4 Updating Result Carrier with Newly Found Best-Fit Sample 10 1.5 Result Analysis 13 1.6 Conclusion 15 1.7 Future Scope 17 References 17 2 A Dual-Polarized Antenna With Circular Parasitic Element for Autonomous Vehicle 19 Manish Varun Yadav and Sudeep Baudha 2.


1 Introduction 19 2.2 Autonomous-Vehicle Antenna Design and Principle 21 2.3 Simulated Parameter Study 24 2.4 Simulated Results 25 2.5 Conclusion 30 References 30 3 A Smart Vehicle Antenna for Defence and Satellite Communication 33 Manish Varun Yadav, Swati Varun Yadav, Sudeep Baudha and Ashish Chittora 3.1 Introduction 34 3.2 Design Principle and Structure 35 3.3 Stages of Development 37 3.


4 Simulated Parameter Study 38 3.5 Simulated and Measured Results 40 3.6 Conclusion 42 References 44 4 Visual Place Recognition for Simultaneous Localization and Mapping 47 Konstantinos A. Tsintotas, Loukas Bampis and Antonios Gasteratos 4.1 Introduction 47 4.2 The Structure for a Visual Place Recognition System 49 4.2.1 Image Processing 50 4.


2.1.1 Global Descriptor Extraction 50 4.2.1.2 Local Descriptors Extraction 51 4.2.2 Map 52 4.


2.2.1 Single Image-Based 53 4.2.2.2 Sequence of Images-Based 54 4.2.3 Belief Generator 54 4.


2.3.1 Pixel-Wise Similarity 55 4.2.3.2 Euclidean or Cosine Distance 56 4.2.3.


3 Vote Density 56 4.2.3.4 Temporal Consistency 57 4.2.3.5 Geometrical Verification 57 4.3 Evaluation 58 4.


3.1 Ground Truth 58 4.3.2 Datasets 59 4.3.3 Evaluation Metrics 60 4.4 Paradigms 61 4.4.


1 Sequence of Images-Based Visual Word Histograms 61 4.4.2 Dynamic Sequence Segmentation 64 4.4.3 Hierarchical Mapping Through an Incremental Visual Vocabulary 66 4.4.4 Bag of Tracked Words for Incremental Visual Place Recognition 67 4.5 Experimental Results 69 4.


6 Future Trends and Conclusion 70 References 71 5 Trust Verification Class (TVCRO) Based Communication for Enhanced of QoS in VANET Environment 81 Akanksha Vyas, Nayan Bhale Amar, Pratiksha Aurangabadkar and Yukti Vyas 5.1 Introduction 82 5.2 Related Work 84 5.3 Theoretical Framework 86 5.4 TVCRO Procedure 90 5.5 Simulation Setup 95 5.6 Results and Discussion 97 5.7 Conclusion 99 References 100 6 Effective Congestion Control Mechanism for Smart Vehicles Using Edge Computing in VANET 105 Poorva Shukla, Sunita Varma and Ravindra Petel 6.


1 Introduction 106 6.2 Related Study 109 6.3 Proposed Algorithm 116 6.4 Conclusion 118 Appendix 118 References 119 7 Longitudinally Variant 4W4D Robot Slipagge-Based Path Tracking Control 123 Edgar A. Martínez-García, Roman Lavrenov and Evgeni Magid 7.1 Introduction 124 7.2 Related Work 125 7.3 Vehicle Physical Model 127 7.


4 4W4D Z-Turn Control Law 132 7.5 Sensing Models 137 7.6 Path-Tracking Control 139 7.7 Conclusion 145 Acknowledgement 146 References 146 8 Intelligent Autonomous Electric Car 151 Vijay L. Hallappanavar, Chetan M. Bulla and Mahantesh N. Birje 8.1 Introduction 151 8.


2 Related Work 154 8.3 Intelligent Autonomous System 155 8.3.1 Object Detection 156 8.3.1.1 Object Detection Using IR Sensor 157 8.3.


2 Automatic Cooling 158 8.3.3 Speed Control While Raining 159 8.3.4 Automatic Charging 160 8.3.5 Hardware Requirement 162 8.3.


6 Software Requirements 165 8.4 Results 165 8.4.1 Object Detection and Tracking 165 8.4.2 Automatic Cooling 166 8.4.3 Speed Control While Raining 167 8.


4.4 Automatic Charging 167 8.5 Conclusions 167 References 168 9 Cluster Optimization Using Metaheuristic JAYA Algorithm for Secure VANETs 173 Gurjot Kaur, Deepti Kakkar and Davinder Singh 9.1 Introduction 174 9.1.1 VANET Architecture 176 9.1.2 VANET Topology 176 9.


1.3 Challenges in VANETs 179 9.1.4 Security Issues in VANETs 180 9.1.5 Organization of Chapter 183 9.2 Literature Review 183 9.2.


1 Available Security Solutions for VANETs 183 9.2.2 On Trust-Based Security Models 184 9.2.3 Gaps in Existing Trust Model-Based Security Solutions 187 9.2.4 On Clustering in VANETs Using Metaheuristic Techniques 188 9.3 Proposed Work 191 9.


3.1 Overview 191 9.3.2 Assumptions 191 9.3.3 Constraints 192 9.3.4 Proposed Methodology 192 9.


4 Conclusion 200 References 200 10 Analysis of Domestic Cars in India for Middle-Income Group Using TOPSIS 207 Vibha Aggarwal, Kulwant Singh, Sandeep Gupta, Shipra Bansal, Priyanka Baghla and Navjot Kaur 10.1 Introduction 208 10.2 Methodology 209 10.3 Result and Discussion 214 10.4 Conclusion 214 References 214 11 A Secure Data Authentication-Based Aerial Intelligent Relay Road Side Unit (AIR-RSU) Framework for Intelligent Transportation System Applications 217 A. Samson Arun Raj, M. Roshni Thanka, G. Jaspher Wilisie Kathrine and Yogesh Palanichamy 11.


1 Introduction 218 11.1.1 The Need for Data Authentication 218 11.1.2 The Objective of the Proposed Model 219 11.2 Related Works 219 11.3 Application Scenario of The Working Model 222 11.4 Working Process 224 11.


4.1 Network Measurement Subsystem 225 11.4.2 Data Authentication Subsystem 227 11.4.3 Service Classification Subsystem 227 11.5 Experimental Process 230 11.6 Conclusion and Future Works 234 References 235 12 Evaluation of Vulnerabilities in IoT-Based Intelligent Agriculture Systems 237 Khongdet Phasinam and Thanwamas Kassanuk 12.


1 Introduction 238 12.1.1 Precision Agriculture 238 12.1.2 Internet of Things and Machine Learning for Smart Agriculture and Related Security Concerns 238 12.2 Building Blocks of Internet of Things 241 12.2.1 Sensors 242 12.


2.2 Control Unit 244 12.2.3 Communication Module 245 12.3 Literature Survey 247 12.4 Security Issues 249 12.4.1 Heterogeneous Devices and Communication 250 12.


4.2 Integrating Physical Devices 250 12.4.3 Constrained Devices 250 12.4.4 Large Scale 250 12.4.5 Privacy 250 12.


5 Attacks and Vulnerabilities in Internet of Things Related to Agriculture Field 251 12.6 Conclusion 254 References 255 13 Q Learning Algorithm for Network Resource Management in Vehicular Communication Network 259 Vartika Agarwal and Sachin Sharma 13.1 Introduction 259 13.2 Literature Review 261 13.3 Overview of Network Resource Management in Vehicular Communication Networks 263 13.4 Reinforcement Learning Techniques for Network Resource Management 264 13.5 Applications of Q Learning 266 13.6 Comparative Study and Result Analysis 268 13.


7 Impact of Q-Learning 271 13.8 Conclusion 271 References 272 14 Reliable Transportation Solution for Urban Planning: VANET 275 Harshit Srivastava and Deepti Kakkar 14.1 Introduction 276 14.1.1 VANET Architecture 276 14.1.2 VANET Characteristics 278 14.1.


3 VANET Standards 278 14.1.4 VANET Communication 279 14.1.5 Implementation of Optimisation Algorithm for VANETs 279 14.2 Cryptography 282 14.2.1 Salient Features of Cryptography 282 14.


2.2 Classification of Cryptography (as shown in Figure 14.2) 283 14.3 Common Security Attacks 283 14.4 Gaps in Present Cryptography 284 14.5 Lightweight Cryptography 285 14.5.1 Vital Security Aspects in Lightweight Cryptography 286 14.


5.2 Advantages of Lightweight Protocols 287 14.5.3 Objectives of Lightweight Protocols are Classified as 288 14.5.4 Lightweight Cryptography Algorithms 289 14.5.5 Software and Hardware Implementation 290 14.


5.5.1 Hardware Lightweight Cryptography 290 14.5.5.2 Software Lightweight Cryptography 291 14.5.6 Division of Lightweight Cryptography 291 14.


5.6.1 Symmetric Key Algorithm 292 14.5.6.2 Asymmetric Key 297 14.6 Conclusion 299 14.7 Future Work 300 References 300 15 Implementation of Veco-Taxis in Turbulent Environment for Gas Source Localization 303 Kumar Gaurav 15.


1 Introduction 303 15.2 Literature Survey 304 15.3 Methodology 307 15.4 Results and Discussions 310 15.5 Conclusions 314 References 315 16 A Technique for Monitoring Cyber-Attacks on Self-Driving Automobiles-Based VANET 317 Vinod Mahor, Sadhna Bijrothiya, Rina Mishra and Romil Rawat 16.1 Introduction 318 16.2 Related Work 319 16.3 Examining the Proposed Framework 320 16.


4 Conclusion 331 References 331 About the Editors 3.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...
Browse Subject Headings