Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (168)
  • Open Access

    ARTICLE

    How Do V2V and V2I Messages Affect the Performance of Driving Smart Vehicles?

    Abdullah Alsaleh1,2,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2313-2336, 2023, DOI:10.32604/csse.2023.039682 - 28 July 2023

    Abstract Intelligent transportation systems (ITSs) are becoming increasingly popular as they support efficient coordinated transport. ITSs aim to improve the safety, efficiency and reliability of road transportation through integrated approaches to the exchange of relevant information. Mobile ad-hoc networks (MANETs) and vehicle ad-hoc networks (VANETs) are integral components of ITS. The VANET is composed of interconnected vehicles with sensitivity capabilities to exchange traffic, positioning, weather and emergency information. One of the main challenges in VANET is the reliable and timely dissemination of information between vehicular nodes to improve decision-making processes. This paper illustrates challenges in VANET… More >

  • Open Access

    ARTICLE

    RO-SLAM: A Robust SLAM for Unmanned Aerial Vehicles in a Dynamic Environment

    Jingtong Peng*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2275-2291, 2023, DOI:10.32604/csse.2023.039272 - 28 July 2023

    Abstract When applied to Unmanned Aerial Vehicles (UAVs), existing Simultaneous Localization and Mapping (SLAM) algorithms are constrained by several factors, notably the interference of dynamic outdoor objects, the limited computing performance of UAVs, and the holes caused by dynamic objects removal in the map. We proposed a new SLAM system for UAVs in dynamic environments to solve these problems based on ORB-SLAM2. We have improved the Pyramid Scene Parsing Network (PSPNet) using Depthwise Separable Convolution to reduce the model parameters. We also incorporated an auxiliary loss function to supervise the hidden layer to enhance accuracy. Then… More >

  • Open Access

    ARTICLE

    Single Image Desnow Based on Vision Transformer and Conditional Generative Adversarial Network for Internet of Vehicles

    Bingcai Wei, Di Wang, Zhuang Wang, Liye Zhang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 1975-1988, 2023, DOI:10.32604/cmes.2023.027727 - 26 June 2023

    Abstract With the increasing popularity of artificial intelligence applications, machine learning is also playing an increasingly important role in the Internet of Things (IoT) and the Internet of Vehicles (IoV). As an essential part of the IoV, smart transportation relies heavily on information obtained from images. However, inclement weather, such as snowy weather, negatively impacts the process and can hinder the regular operation of imaging equipment and the acquisition of conventional image information. Not only that, but the snow also makes intelligent transportation systems make the wrong judgment of road conditions and the entire system of… More > Graphic Abstract

    Single Image Desnow Based on Vision Transformer and Conditional Generative Adversarial Network for Internet of Vehicles

  • Open Access

    ARTICLE

    A Novel Ego Lanes Detection Method for Autonomous Vehicles

    Bilal Bataineh*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1941-1961, 2023, DOI:10.32604/iasc.2023.039868 - 21 June 2023

    Abstract Autonomous vehicles are currently regarded as an interesting topic in the AI field. For such vehicles, the lane where they are traveling should be detected. Most lane detection methods identify the whole road area with all the lanes built on it. In addition to having a low accuracy rate and slow processing time, these methods require costly hardware and training datasets, and they fail under critical conditions. In this study, a novel detection algorithm for a lane where a car is currently traveling is proposed by combining simple traditional image processing with lightweight machine learning… More >

  • Open Access

    ARTICLE

    A Trailblazing Framework of Security Assessment for Traffic Data Management

    Abdulaziz Attaallah1, Khalil al-Sulbi2, Areej Alasiry3, Mehrez Marzougui3, Neha Yadav4, Syed Anas Ansar5,*, Pawan Kumar Chaurasia4, Alka Agrawal4

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1853-1875, 2023, DOI:10.32604/iasc.2023.039761 - 21 June 2023

    Abstract Connected and autonomous vehicles are seeing their dawn at this moment. They provide numerous benefits to vehicle owners, manufacturers, vehicle service providers, insurance companies, etc. These vehicles generate a large amount of data, which makes privacy and security a major challenge to their success. The complicated machine-led mechanics of connected and autonomous vehicles increase the risks of privacy invasion and cyber security violations for their users by making them more susceptible to data exploitation and vulnerable to cyber-attacks than any of their predecessors. This could have a negative impact on how well-liked CAVs are with… More >

  • Open Access

    ARTICLE

    Submarine Hunter: Efficient and Secure Multi-Type Unmanned Vehicles

    Halah Hasan Mahmoud1, Marwan Kadhim Mohammed Al-Shammari1, Gehad Abdullah Amran2,3,*, Elsayed Tag eldin4,*, Ala R. Alareqi5, Nivin A. Ghamry6, Ehaa ALnajjar7, Esmail Almosharea8

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 573-589, 2023, DOI:10.32604/cmc.2023.039363 - 08 June 2023

    Abstract Utilizing artificial intelligence (AI) to protect smart coastal cities has become a novel vision for scientific and industrial institutions. One of these AI technologies is using efficient and secure multi-environment Unmanned Vehicles (UVs) for anti-submarine attacks. This study’s contribution is the early detection of a submarine assault employing hybrid environment UVs that are controlled using swarm optimization and secure the information in between UVs using a decentralized cybersecurity strategy. The Dragonfly Algorithm is used for the orientation and clustering of the UVs in the optimization approach, and the Re-fragmentation strategy is used in the Network… More >

  • Open Access

    ARTICLE

    Traffic Sign Detection with Low Complexity for Intelligent Vehicles Based on Hybrid Features

    Sara Khalid1, Jamal Hussain Shah1,*, Muhammad Sharif1, Muhammad Rafiq2, Gyu Sang Choi3,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 861-879, 2023, DOI:10.32604/cmc.2023.035595 - 08 June 2023

    Abstract Globally traffic signs are used by all countries for healthier traffic flow and to protect drivers and pedestrians. Consequently, traffic signs have been of great importance for every civilized country, which makes researchers give more focus on the automatic detection of traffic signs. Detecting these traffic signs is challenging due to being in the dark, far away, partially occluded, and affected by the lighting or the presence of similar objects. An innovative traffic sign detection method for red and blue signs in color images is proposed to resolve these issues. This technique aimed to devise… More >

  • Open Access

    ARTICLE

    A New System for Road Traffic Optimisation Using the Virtual Traffic Light Technology

    Ahmad A. A. Alkhatib*, Adnan A. Hnaif, Thaer Sawalha

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 637-656, 2023, DOI:10.32604/csse.2023.037345 - 26 May 2023

    Abstract Large cities suffer from traffic congestion, particularly at intersections, due to a large number of vehicles, which leads to the loss of time by increasing carbon emissions, including fuel consumption. Therefore, the need for optimising the flow of vehicles at different intersections and reducing the waiting time is a critical challenge. Conventional traffic lights have been used to control traffic flow at different intersections and have been improved to become more efficient by using different algorithms, sensors and cameras. However, they also face some challenges, such as high-cost installation, operation, and maintenance issues. This paper… More >

  • Open Access

    ARTICLE

    Container-Based Internet of Vehicles Edge Application Migration Mechanism

    Sujie Shao, Shihan Tian*, Shaoyong Guo, Xuesong Qiu

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4867-4891, 2023, DOI:10.32604/cmc.2023.038280 - 29 April 2023

    Abstract Internet of Vehicles (IoV) applications integrating with edge computing will significantly drive the growth of IoV. However, the contradiction between the high-speed mobility of vehicles, the delay sensitivity of corresponding IoV applications and the limited coverage and resource capacity of distributed edge servers will pose challenges to the service continuity and stability of IoV applications. IoV application migration is a promising solution that can be supported by application containerization, a technology forseamless cross-edge-server application migration without user perception. Therefore, this paper proposes the container-based IoV edge application migration mechanism, consisting of three parts. The first… More >

  • Open Access

    ARTICLE

    Secure Blockchain-Enabled Internet of Vehicles Scheme with Privacy Protection

    Jiansheng Zhang1, Yang Xin1,*, Yuyan Wang2, Xiaohui Lei2, Yixian Yang1

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6185-6199, 2023, DOI:10.32604/cmc.2023.038029 - 29 April 2023

    Abstract The car-hailing platform based on Internet of Vehicles (IoV) technology greatly facilitates passengers’ daily car-hailing, enabling drivers to obtain orders more efficiently and obtain more significant benefits. However, to match the driver closest to the passenger, it is often necessary to process the location information of the passenger and driver, which poses a considerable threat to privacy disclosure to the passenger and driver. Targeting these issues, in this paper, by combining blockchain and Paillier homomorphic encryption algorithm, we design a secure blockchain-enabled IoV scheme with privacy protection for online car-hailing. In this scheme, firstly, we… More >

Displaying 51-60 on page 6 of 168. Per Page