Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (167)
  • Open Access

    ARTICLE

    Thermodynamics Inspired Co-operative Self-Organization of Multiple Autonomous Vehicles

    Ayesha Maqbool1,*, Farkhanda Afzal2, Tauseef Rana3, Alina Mirza4

    Intelligent Automation & Soft Computing, Vol.28, No.3, pp. 653-667, 2021, DOI:10.32604/iasc.2021.017506 - 20 April 2021

    Abstract This paper presents a co-operative, self-organisation method for Multiple Autonomous Vehicles aiming to share surveillance responsibilities. Spatial organization or formation configuration of multiple vehicles/agents’ systems is crucial for a team of agents to achieve their mission objectives. In this paper we present simple yet efficient thermodynamic inspired formation control framework. The proposed method autonomously allocates region of surveillance to each vehicle and also re-adjusts the area of their responsibilities during the mission. It provides framework for heterogeneous UAVs to scatter themselves optimally in order to provide maximum coverage of a given area. The method is… More >

  • Open Access

    ARTICLE

    Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme

    Geetanjali Rathee1, Razi Iqbal2,*, Adel Khelifi3

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2755-2769, 2021, DOI:10.32604/cmc.2021.017000 - 13 April 2021

    Abstract Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention. Recently Internet of Vehicles (IoVs) has been introduced as one of the applications of pervasive computing that addresses the road safety challenges. Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues. Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data. Due to the lack of existing transportation integration schemes, IoV has not been… More >

  • Open Access

    ARTICLE

    Game-Oriented Security Strategy Against Hotspot Attacks for Internet of Vehicles

    Juan Guo1, Yanzhu Liu2,*, Shan Li3, Zhi Li4, Sonia Kherbachi5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2145-2157, 2021, DOI:10.32604/cmc.2021.016411 - 13 April 2021

    Abstract With the rapid development of mobile communication technology, the application of internet of vehicles (IoV) services, such as for information services, driving safety, and traffic efficiency, is growing constantly. For businesses with low transmission delay, high data processing capacity and large storage capacity, by deploying edge computing in the IoV, data processing, encryption and decision-making can be completed at the local end, thus providing real-time and highly reliable communication capability. The roadside unit (RSU), as an important part of edge computing in the IoV, fulfils an important data forwarding function and provides an interactive communication… More >

  • Open Access

    ARTICLE

    A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks

    A. F. M. Suaib Akhter1,*, A. F. M. Shahen Shah2, Mohiuddin Ahmed3, Nour Moustafa4, Unal Çavuşoğlu1, Ahmet Zengin1

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 229-246, 2021, DOI:10.32604/cmc.2021.015447 - 22 March 2021

    Abstract Vehicular Ad hoc Networks (VANETs) become a very crucial addition in the Intelligent Transportation System (ITS). It is challenging for a VANET system to provide security services and parallelly maintain high throughput by utilizing limited resources. To overcome these challenges, we propose a blockchain-based Secured Cluster-based MAC (SCB-MAC) protocol. The nearby vehicles heading towards the same direction will form a cluster and each of the clusters has its blockchain to store and distribute the safety messages. The message which contains emergency information and requires Strict Delay Requirement (SDR) for transmission are called safety messages (SM).… More >

  • Open Access

    ARTICLE

    Time-Series Data and Analysis Software of Connected Vehicles

    Jaekyu Lee1,2, Sangyub Lee1, Hyosub Choi1, Hyeonjoong Cho2,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2709-2727, 2021, DOI:10.32604/cmc.2021.015174 - 01 March 2021

    Abstract In this study, we developed software for vehicle big data analysis to analyze the time-series data of connected vehicles. We designed two software modules: The first to derive the Pearson correlation coefficients to analyze the collected data and the second to conduct exploratory data analysis of the collected vehicle data. In particular, we analyzed the dangerous driving patterns of motorists based on the safety standards of the Korea Transportation Safety Authority. We also analyzed seasonal fuel efficiency (four seasons) and mileage of vehicles, and identified rapid acceleration, rapid deceleration, sudden stopping (harsh braking), quick starting,… More >

  • Open Access

    ARTICLE

    A Novel Anonymous Authentication Scheme Based on Edge Computing in Internet of Vehicles

    Xiaoliang Wang1, Xinhui She1, Liang Bai2,*, Yang Qing1, Frank Jiang3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3349-3361, 2021, DOI:10.32604/cmc.2021.012454 - 01 March 2021

    Abstract The vehicular cloud computing is an emerging technology that changes vehicle communication and underlying traffic management applications. However, cloud computing has disadvantages such as high delay, low privacy and high communication cost, which can not meet the needs of real-time interactive information of Internet of vehicles. Ensuring security and privacy in Internet of Vehicles is also regarded as one of its most important challenges. Therefore, in order to ensure the user information security and improve the real-time of vehicle information interaction, this paper proposes an anonymous authentication scheme based on edge computing. In this scheme,… More >

  • Open Access

    ARTICLE

    A Fuzzy-Based Bio-Inspired Neural Network Approach for Target Search by Multiple Autonomous Underwater Vehicles in Underwater Environments

    Aolin Sun, Xiang Cao*, Xu Xiao, Liwen Xu

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 551-564, 2021, DOI:10.32604/iasc.2021.01008 - 18 January 2021

    Abstract An essential issue in a target search is safe navigation while quickly finding targets. In order to improve the efficiency of a target search and the smoothness of AUV’s (Autonomous Underwater Vehicle) trajectory, a fuzzy-based bio-inspired neural network approach is proposed in this paper. A bio-inspired neural network is applied to a multi-AUV target search, which can effectively plan search paths. In the meantime, a fuzzy algorithm is introduced into the bio-inspired neural network to make the trajectory of AUV obstacle avoidance smoother. Unlike other algorithms that need repeated training in the parameters selection, the More >

  • Open Access

    ARTICLE

    Enabling Smart Cities with Cognition Based Intelligent Route Decision in Vehicles Empowered with Deep Extreme Learning Machine

    Dildar Hussain1, Muhammad Adnan Khan2,*, Sagheer Abbas3, Rizwan Ali Naqvi4, Muhammad Faheem Mushtaq5, Abdur Rehman3, Afrozah Nadeem2

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 141-156, 2021, DOI:10.32604/cmc.2020.013458 - 30 October 2020

    Abstract The fast-paced growth of artificial intelligence provides unparalleled opportunities to improve the efficiency of various industries, including the transportation sector. The worldwide transport departments face many obstacles following the implementation and integration of different vehicle features. One of these tasks is to ensure that vehicles are autonomous, intelligent and able to grow their repository of information. Machine learning has recently been implemented in wireless networks, as a major artificial intelligence branch, to solve historically challenging problems through a data-driven approach. In this article, we discuss recent progress of applying machine learning into vehicle networks for… More >

  • Open Access

    ARTICLE

    Sliding-Mode Control of Unmanned Underwater Vehicle Using Bio-Inspired Neurodynamics for Discrete Trajectories

    Zhigang Deng1,*, Zhenzhong Chu2, Zaman Mohammed Tousif3

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1503-1515, 2020, DOI:10.32604/iasc.2020.010798 - 24 December 2020

    Abstract Trajectory tracking control can be considered as one of the main researches of unmanned underwater vehicles (UUV). The bio-inspired neurodynamics model was used to make the output continuous and smooth for the inflection points to deal with the speed jump of the conventional tracking controller for discrete trajectories. A horizon-plane trajectory tracking control law is designed using the bio-inspired neurodynamics model and sliding-mode method without chattering. Finally, the simulation of the mentioned two methods is compared with the results showing this as effective and feasible. More >

  • Open Access

    ARTICLE

    An Authentication Mechanism for Autonomous Vehicle ECU Utilizing a Novel Slice-Based PUF Design

    Jihai Yang1, Zongtao Duan1, Muyao Wang2, Jabar Mahmood1, Yuanyuan Xiao1, Yun Yang1,*

    Journal of New Media, Vol.2, No.4, pp. 157-165, 2020, DOI:10.32604/jnm.2020.014309 - 23 December 2020

    Abstract Modern autonomous vehicles are getting progressively popular and increasingly getting closer to the core of future development in transportation field. However, there is no reliable authentication mechanism for the unmanned vehicle communication system, this phenomenon draws attention about the security of autonomous vehicles of people in all aspects. Physical Unclonable Function (PUF) circuits is light-weight, and it can product unique and unpredictable digital signature utilizing the manufacturing variations occur in each die and these exact silicon features cannot be recreated theoretically. Considering security issues of communication between Electronic Control Units (ECUs) in vehicles, we propose… More >

Displaying 131-140 on page 14 of 167. Per Page