期刊文献+
共找到132,060篇文章
< 1 2 250 >
每页显示 20 50 100
Distributed Platooning Control of Automated Vehicles Subject to Replay Attacks Based on Proportional Integral Observers 被引量:1
1
作者 Meiling Xie Derui Ding +3 位作者 Xiaohua Ge Qing-Long Han Hongli Dong Yan Song 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第9期1954-1966,共13页
Secure platooning control plays an important role in enhancing the cooperative driving safety of automated vehicles subject to various security vulnerabilities.This paper focuses on the distributed secure control issu... Secure platooning control plays an important role in enhancing the cooperative driving safety of automated vehicles subject to various security vulnerabilities.This paper focuses on the distributed secure control issue of automated vehicles affected by replay attacks.A proportional-integral-observer(PIO)with predetermined forgetting parameters is first constructed to acquire the dynamical information of vehicles.Then,a time-varying parameter and two positive scalars are employed to describe the temporal behavior of replay attacks.In light of such a scheme and the common properties of Laplace matrices,the closed-loop system with PIO-based controllers is transformed into a switched and time-delayed one.Furthermore,some sufficient conditions are derived to achieve the desired platooning performance by the view of the Lyapunov stability theory.The controller gains are analytically determined by resorting to the solution of certain matrix inequalities only dependent on maximum and minimum eigenvalues of communication topologies.Finally,a simulation example is provided to illustrate the effectiveness of the proposed control strategy. 展开更多
关键词 Automated vehicles platooning control proportional-integral-observers(PIOs) replay attacks TIME-DELAYS
下载PDF
A credibility-aware swarm-federated deep learning framework in internet of vehicles 被引量:1
2
作者 Zhe Wang Xinhang Li +2 位作者 Tianhao Wu Chen Xu Lin Zhang 《Digital Communications and Networks》 SCIE CSCD 2024年第1期150-157,共8页
Although Federated Deep Learning(FDL)enables distributed machine learning in the Internet of Vehicles(IoV),it requires multiple clients to upload model parameters,thus still existing unavoidable communication overhead... Although Federated Deep Learning(FDL)enables distributed machine learning in the Internet of Vehicles(IoV),it requires multiple clients to upload model parameters,thus still existing unavoidable communication overhead and data privacy risks.The recently proposed Swarm Learning(SL)provides a decentralized machine learning approach for unit edge computing and blockchain-based coordination.A Swarm-Federated Deep Learning framework in the IoV system(IoV-SFDL)that integrates SL into the FDL framework is proposed in this paper.The IoV-SFDL organizes vehicles to generate local SL models with adjacent vehicles based on the blockchain empowered SL,then aggregates the global FDL model among different SL groups with a credibility weights prediction algorithm.Extensive experimental results show that compared with the baseline frameworks,the proposed IoV-SFDL framework reduces the overhead of client-to-server communication by 16.72%,while the model performance improves by about 5.02%for the same training iterations. 展开更多
关键词 Swarm learning Federated deep learning Internet of vehicles PRIVACY EFFICIENCY
下载PDF
Ensuring Secure Platooning of Constrained Intelligent and Connected Vehicles Against Byzantine Attacks:A Distributed MPC Framework 被引量:1
3
作者 Henglai Wei Hui Zhang +1 位作者 Kamal AI-Haddad Yang Shi 《Engineering》 SCIE EI CAS CSCD 2024年第2期35-46,共12页
This study investigates resilient platoon control for constrained intelligent and connected vehicles(ICVs)against F-local Byzantine attacks.We introduce a resilient distributed model-predictive platooning control fram... This study investigates resilient platoon control for constrained intelligent and connected vehicles(ICVs)against F-local Byzantine attacks.We introduce a resilient distributed model-predictive platooning control framework for such ICVs.This framework seamlessly integrates the predesigned optimal control with distributed model predictive control(DMPC)optimization and introduces a unique distributed attack detector to ensure the reliability of the transmitted information among vehicles.Notably,our strategy uses previously broadcasted information and a specialized convex set,termed the“resilience set”,to identify unreliable data.This approach significantly eases graph robustness prerequisites,requiring only an(F+1)-robust graph,in contrast to the established mean sequence reduced algorithms,which require a minimum(2F+1)-robust graph.Additionally,we introduce a verification algorithm to restore trust in vehicles under minor attacks,further reducing communication network robustness.Our analysis demonstrates the recursive feasibility of the DMPC optimization.Furthermore,the proposed method achieves exceptional control performance by minimizing the discrepancies between the DMPC control inputs and predesigned platoon control inputs,while ensuring constraint compliance and cybersecurity.Simulation results verify the effectiveness of our theoretical findings. 展开更多
关键词 Model predictive control Resilient control Platoon control Intelligent and connected vehicle Byzantine attacks
下载PDF
Low-Cost Federated Broad Learning for Privacy-Preserved Knowledge Sharing in the RIS-Aided Internet of Vehicles 被引量:1
4
作者 Xiaoming Yuan Jiahui Chen +4 位作者 Ning Zhang Qiang(John)Ye Changle Li Chunsheng Zhu Xuemin Sherman Shen 《Engineering》 SCIE EI CAS CSCD 2024年第2期178-189,共12页
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency... High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV. 展开更多
关键词 Knowledge sharing Internet of vehicles Federated learning Broad learning Reconfigurable intelligent surfaces Resource allocation
下载PDF
Path-Following Control With Obstacle Avoidance of Autonomous Surface Vehicles Subject to Actuator Faults 被引量:1
5
作者 Li-Ying Hao Gege Dong +1 位作者 Tieshan Li Zhouhua Peng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期956-964,共9页
This paper investigates the path-following control problem with obstacle avoidance of autonomous surface vehicles in the presence of actuator faults,uncertainty and external disturbances.Autonomous surface vehicles in... This paper investigates the path-following control problem with obstacle avoidance of autonomous surface vehicles in the presence of actuator faults,uncertainty and external disturbances.Autonomous surface vehicles inevitably suffer from actuator faults in complex sea environments,which may cause existing obstacle avoidance strategies to fail.To reduce the influence of actuator faults,an improved artificial potential function is constructed by introducing the lower bound of actuator efficiency factors.The nonlinear state observer,which only depends on measurable position information of the autonomous surface vehicle,is used to address uncertainties and external disturbances.By using a backstepping technique and adaptive mechanism,a path-following control strategy with obstacle avoidance and fault tolerance is designed which can ensure that the tracking errors converge to a small neighborhood of zero.Compared with existing results,the proposed control strategy has the capability of obstacle avoidance and fault tolerance simultaneously.Finally,the comparison results through simulations are given to verify the effectiveness of the proposed method. 展开更多
关键词 Actuator faults autonomous surface vehicle(ASVs) improved artificial potential function nonlinear state observer obstacle avoidance
下载PDF
Free-walking:Pedestrian inertial navigation based on dual foot-mounted IMU 被引量:1
6
作者 Qu Wang Meixia Fu +6 位作者 Jianquan Wang Lei Sun Rong Huang Xianda Li Zhuqing Jiang Yan Huang Changhui Jiang 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期573-587,共15页
The inertial navigation system(INS),which is frequently used in emergency rescue operations and other situations,has the benefits of not relying on infrastructure,high positioning frequency,and strong real-time perfor... The inertial navigation system(INS),which is frequently used in emergency rescue operations and other situations,has the benefits of not relying on infrastructure,high positioning frequency,and strong real-time performance.However,the intricate and unpredictable pedestrian motion patterns lead the INS localization error to significantly diverge with time.This paper aims to enhance the accuracy of zero-velocity interval(ZVI)detection and reduce the heading and altitude drift of foot-mounted INS via deep learning and equation constraint of dual feet.Aiming at the observational noise problem of low-cost inertial sensors,we utilize a denoising autoencoder to automatically eliminate the inherent noise.Aiming at the problem that inaccurate detection of the ZVI detection results in obvious displacement error,we propose a sample-level ZVI detection algorithm based on the U-Net neural network,which effectively solves the problem of mislabeling caused by sliding windows.Aiming at the problem that Zero-Velocity Update(ZUPT)cannot suppress heading and altitude error,we propose a bipedal INS method based on the equation constraint and ellipsoid constraint,which uses foot-to-foot distance as a new observation to correct heading and altitude error.We conduct extensive and well-designed experiments to evaluate the performance of the proposed method.The experimental results indicate that the position error of our proposed method did not exceed 0.83% of the total traveled distance. 展开更多
关键词 Indoor positioning Inertial navigation system(INS) Zero-velocity update(ZUPT) Internet of things(IoTs) Location-based service(LBS)
下载PDF
BDSec:Security Authentication Protocol for BeiDou-Ⅱ Civil Navigation Message
7
作者 Wu Zhijun Zhang Yuan +2 位作者 Yang Yiming Wang Peng Yue Meng 《China Communications》 SCIE CSCD 2024年第6期206-218,共13页
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a s... Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV. 展开更多
关键词 BDII civil navigation messages(BDIICNAV) BeiDou navigation satellite system(BDS) identity-based cryptography mechanism navigation message authentication protocol(BDSec)
下载PDF
Method of improving pedestrian navigation performance based on chest card
8
作者 CHENG Hao GAO Shuang +2 位作者 CAI Xiaowen WANG Yuxuan WANG Jie 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期987-998,共12页
With the development of positioning technology,loca-tion services are constantly in demand by people.As a primary location service pedestrian navigation has two main approaches based on radio and inertial navigation.T... With the development of positioning technology,loca-tion services are constantly in demand by people.As a primary location service pedestrian navigation has two main approaches based on radio and inertial navigation.The pedestrian naviga-tion based on radio is subject to environmental occlusion lead-ing to the degradation of positioning accuracy.The pedestrian navigation based on micro-electro-mechanical system inertial measurement unit(MIMU)is less susceptible to environmental interference,but its errors dissipate over time.In this paper,a chest card pedestrian navigation improvement method based on complementary correction is proposed in order to suppress the error divergence of inertial navigation methods.To suppress atti-tude errors,optimal feedback coefficients are established by pedestrian motion characteristics.To extend navigation time and improve positioning accuracy,the step length in subsequent movements is compensated by the first step length.The experi-mental results show that the positioning accuracy of the pro-posed method is improved by more than 47%and 44%com-pared with the pure inertia-based method combined with step compensation and the traditional complementary filtering com-bined method with step compensation.The proposed method can effectively suppress the error dispersion and improve the positioning accuracy. 展开更多
关键词 pedestrian navigation micro-electro-mechanical sy-stem(MEMS) inertial navigation complementary filtering
下载PDF
Integrated Active Suspension and Anti-Lock Braking Control for Four-Wheel-Independent-Drive Electric Vehicles
9
作者 Ze Zhao Lei Zhang +3 位作者 Xiaoling Ding Zhiqiang Zhang Shaohua Li Liang Gu 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2024年第1期87-98,共12页
This paper presents an integrated control scheme for enhancing the ride comfort and handling performance of a four-wheel-independent-drive electric vehicle through the coordination of active suspension system(ASS)and ... This paper presents an integrated control scheme for enhancing the ride comfort and handling performance of a four-wheel-independent-drive electric vehicle through the coordination of active suspension system(ASS)and anti-lock braking system(ABS).First,a longitudinal-vertical coupled vehicle dynamics model is established by integrating a road input model.Then the coupling mechanisms between longitudinal and vertical vehicle dynamics are analyzed.An ASS-ABS integrated control system is proposed,utilizing an H∞controller for ASS to optimize load transfer effect and a neural network sliding mode control for ABS implementation.Finally,the effectiveness of the proposed control scheme is evaluated through comprehensive tests conducted on a hardware-in-loop(HIL)test platform.The HIL test results demonstrate that the proposed control scheme can significantly improve the braking performance and ride comfort compared to conventional ABS control methods. 展开更多
关键词 Four-wheel-independent-drive electric vehicles Active suspension system(ASS) Anti-lock braking system(ABS) Vertical-longitudinal vehicle dynamics
下载PDF
The Future Trend of E-Mobility in Terms of Battery Electric Vehicles and Their Impact on Climate Change: A Case Study Applied in Hungary
10
作者 Mohamad Ali Saleh Saleh 《American Journal of Climate Change》 2024年第2期83-102,共20页
The transportation sector is responsible for 25% of the total Carbon dioxide (CO2) emissions, whereas 60.6% of this sector represents small and medium passenger cars. However, as noted by the European Union Long-term ... The transportation sector is responsible for 25% of the total Carbon dioxide (CO2) emissions, whereas 60.6% of this sector represents small and medium passenger cars. However, as noted by the European Union Long-term strategy, there are two ways to reduce the amount of CO2 emissions in the transportation sector. The first way is characterized by creating more efficient vehicles. In contrast, the second way is characterized by changing the fuel used. The current study addressed the second way, changing the fuel type. The study examined the potential of battery electric vehicles (BEVs) as an alternative fuel type to reduce CO2 emissions in Hungarys transportation sector. The study used secondary data retrieved from Statista and stata.com to analyze the future trends of BEVs in Hungary. The results showed that the percentage of BEVs in Hungary in 2022 was 0.4% compared to the total number of registered passenger cars, which is 3.8 million. The simple exponential smoothing (SES) time series forecast revealed that the number of BEVs is expected to reach 84,192 in 2030, indicating a percentage increase of 2.21% in the next eight years. The study suggests that increasing the number of BEVs is necessary to address the negative impact of CO2 emissions on society. The Hungarian Ministry of Innovation and Technologys strategy to reduce the cost of BEVs may increase the percentage of BEVs by 10%, resulting in a potential average reduction of 76,957,600 g/km of CO2 compared to gasoline, diesel, hybrid electric vehicles (HEVs), and plug-in hybrid vehicles (PHEVs). 展开更多
关键词 Battery Electric vehicles (BEVS) GASOLINE DIESEL Hybrid Electric vehicles (HEVs) Plug-In Hybrid vehicles (PHEVs) Climate Change Carbon Dioxide (CO2) Emissions
下载PDF
A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles
11
作者 Naiyu Wang Wenti Yang +4 位作者 Xiaodong Wang Longfei Wu Zhitao Guan Xiaojiang Du Mohsen Guizani 《Digital Communications and Networks》 SCIE CSCD 2024年第1期126-134,共9页
The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic management.Meanwhile,concerns have be... The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic management.Meanwhile,concerns have been raised over the security and privacy of the tons of traffic and vehicle data.In this regard,Federated Learning(FL)with privacy protection features is considered a highly promising solution.However,in the FL process,the server side may take advantage of its dominant role in model aggregation to steal sensitive information of users,while the client side may also upload malicious data to compromise the training of the global model.Most existing privacy-preserving FL schemes in IoV fail to deal with threats from both of these two sides at the same time.In this paper,we propose a Blockchain based Privacy-preserving Federated Learning scheme named BPFL,which uses blockchain as the underlying distributed framework of FL.We improve the Multi-Krum technology and combine it with the homomorphic encryption to achieve ciphertext-level model aggregation and model filtering,which can enable the verifiability of the local models while achieving privacy-preservation.Additionally,we develop a reputation-based incentive mechanism to encourage users in IoV to actively participate in the federated learning and to practice honesty.The security analysis and performance evaluations are conducted to show that the proposed scheme can meet the security requirements and improve the performance of the FL model. 展开更多
关键词 Federated learning Blockchain Privacy-preservation Homomorphic encryption Internetof vehicles
下载PDF
Effect of navigation endoscopy combined with threedimensional printing technology in the treatment of orbital blowout fractures
12
作者 Jin-Hai Yu Yao-Hua Wang +3 位作者 Qi-Hua Xu Chao Xiong An-An Wang Hong-Fei Liao 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2024年第3期570-576,共7页
●AIM:To explore the combined application of surgical navigation nasal endoscopy(NNE)and three-dimensional printing technology(3DPT)for the adjunctive treatment of orbital blowout fractures(OBF).●METHODS:Retrospectiv... ●AIM:To explore the combined application of surgical navigation nasal endoscopy(NNE)and three-dimensional printing technology(3DPT)for the adjunctive treatment of orbital blowout fractures(OBF).●METHODS:Retrospective analysis was conducted on the data of patients with OBF who underwent surgical treatment at the Affiliated Eye Hospital of Nanchang University between July 2012 and November 2022.The control group consisted of patients who received traditional surgical treatment(n=43),while the new surgical group(n=52)consisted of patients who received NNE with 3DPT.The difference in therapeutic effects between the two groups was evaluated by comparing the duration of the operation,best corrected visual acuity(BCVA),enophthalmos difference,recovery rate of eye movement disorder,recovery rate of diplopia,and incidence of postoperative complications.●RESULTS:The study included 95 cases(95 eyes),with 63 men and 32 women.The patients’age ranged from 5 to 67y(35.21±15.75y).The new surgical group and the control group exhibited no statistically significant differences in the duration of the operation,BCVA and enophthalmos difference.The recovery rates of diplopia in the new surgical group were significantly higher than those in the control group at 1mo[OR=0.03,95%CI(0.01–0.15),P<0.0000]and 3mo[OR=0.11,95%CI(0.03–0.36),P<0.0000]postoperation.Additionally,the recovery rates of eye movement disorders at 1 and 3mo after surgery were OR=0.08,95%CI(0.03–0.24),P<0.0000;and OR=0.01,95%CI(0.00–0.18),P<0.0000.The incidence of postoperative complications was lower in the new surgical group compared to the control group[OR=4.86,95%CI(0.95–24.78),P<0.05].●CONCLUSION:The combination of NNE and 3DPT can shorten the recovery time of diplopia and eye movement disorder in patients with OBF. 展开更多
关键词 orbital blowout fracture three-dimensional printing ENDOSCOPY surgical navigation
下载PDF
Anti-Spoofing:Integrated Information Authentication of BeiDou-ⅡCivil Navigation Message
13
作者 Wu Zhijun Liang Cheng +2 位作者 Zhang Yun Liu Rusen Yue Meng 《China Communications》 SCIE CSCD 2024年第9期242-261,共20页
The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can le... The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can lead to wrong location reports and time indication.In order to deal with this threat,we proposed a scheme of anti-spoofing for BDⅡ-CNAV based on integrated information authentication.This scheme generates two type authentication information,one is authentication code information(ACI),which is applied to confirm the authenticity and reliability of satellite time information,and the other is signature information,which is used to authenticate the integrity of satellite location information and other information.Both authentication information is designed to embed into the reserved bits in BDⅡ-CNAV without changing the frame structure.In order to avoid authentication failure caused by public key error or key error,the key or public key prompt information(KPKPI)are designed to remind the receiver to update both keys in time.Experimental results indicate that the scheme can successfully detect spoofing attacks,and the authentication delay is less than 1%of the transmission delay,which meets the requirements of BDⅡ-CNAV information authentication. 展开更多
关键词 anti-spoofing AUTHENTICATION BeiDou-II civil navigation message(BDII-CNAV) SIGNATURE spoofing attack
下载PDF
Analysis for Effects of Temperature Rise of PV Modules upon Driving Distance of Vehicle Integrated Photovoltaic Electric Vehicles
14
作者 Masafumi Yamaguchi Yasuyuki Ota +18 位作者 Taizo Masuda Christian Thiel Anastasios Tsakalidis Arnulf Jaeger-Waldau Kenji Araki Kensuke Nishioka Tatsuya Takamoto Takashi Nakado Kazumi Yamada Tsutomu Tanimoto Yosuke Tomita Yusuke Zushi Kenichi Okumura Takashi Mabuchi Akinori Satou Kyotaro Nakamura Ryo Ozaki Nobuaki Kojima Yoshio Ohshita 《Energy and Power Engineering》 2024年第4期131-150,共20页
The development of vehicle integrated photovoltaics-powered electric vehicles (VIPV-EV) significantly reduces CO<sub>2</sub> emissions from the transport sector to realize a decarbonized society. Although ... The development of vehicle integrated photovoltaics-powered electric vehicles (VIPV-EV) significantly reduces CO<sub>2</sub> emissions from the transport sector to realize a decarbonized society. Although long-distance driving of VIPV-EV without electricity charging is expected in sunny regions, driving distance of VIPV-EV is affected by climate conditions such as solar irradiation and temperature rise of PV modules. In this paper, detailed analytical results for effects of climate conditions such as solar irradiation and temperature rise of PV modules upon driving distance of the VIPV-EV were presented by using test data for Toyota Prius and Nissan Van demonstration cars installed with high-efficiency InGaP/GaAs/InGaAs 3-junction solar cell modules with a module efficiency of more than 30%. The temperature rise of some PV modules studied in this study was shown to be expressed by some coefficients related to solar irradiation, wind speed and radiative cooling. The potential of VIPV-EV to be deployed in 10 major cities was also analyzed. Although sunshine cities such as Phoenix show the high reduction ratio of driving range with 17% due to temperature rise of VIPV modules, populous cities such as Tokyo show low reduction ratio of 9%. It was also shown in this paper that the difference between the driving distance of VIPV-EV driving in the morning and the afternoon is due to PV modules’ radiative cooling. In addition, the importance of heat dissipation of PV modules and the development of high-efficiency PV modules with better temperature coefficients was suggested in order to expand driving range of VIPV-EV. The effects of air-conditioner usage and partial shading in addition to the effects of temperature rise of VIPV modules were suggested as the other power losses of VIPV-EV. 展开更多
关键词 vehicle Integrated Photovoltaics (VIPV) VIPV-Powered Electric vehicles Driving Distance PV Modules Solar Irradiation Temperature Rise Radiative Cooling
下载PDF
A dual adaptive unscented Kalman filter algorithm for SINS-based integrated navigation system
15
作者 LYU Xu MENG Ziyang +4 位作者 LI Chunyu CAI Zhenyu HUANG Yi LI Xiaoyong YU Xingkai 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第3期732-740,共9页
In this study, the problem of measuring noise pollution distribution by the intertial-based integrated navigation system is effectively suppressed. Based on nonlinear inertial navigation error modeling, a nested dual ... In this study, the problem of measuring noise pollution distribution by the intertial-based integrated navigation system is effectively suppressed. Based on nonlinear inertial navigation error modeling, a nested dual Kalman filter framework structure is developed. It consists of unscented Kalman filter (UKF)master filter and Kalman filter slave filter. This method uses nonlinear UKF for integrated navigation state estimation. At the same time, the exact noise measurement covariance is estimated by the Kalman filter dependency filter. The algorithm based on dual adaptive UKF (Dual-AUKF) has high accuracy and robustness, especially in the case of measurement information interference. Finally, vehicle-mounted and ship-mounted integrated navigation tests are conducted. Compared with traditional UKF and the Sage-Husa adaptive UKF (SH-AUKF), this method has comparable filtering accuracy and better filtering stability. The effectiveness of the proposed algorithm is verified. 展开更多
关键词 Kalman filter dual-adaptive integrated navigation unscented Kalman filter(UKF) ROBUST
下载PDF
A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles
16
作者 Feng Zhao Hongtao Ding +3 位作者 Chunhai Li Zhaoyu Su Guoling Liang Changsong Yang 《Computers, Materials & Continua》 SCIE EI 2024年第7期567-585,共19页
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and varia... The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain interactions.During such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication process.Additionally,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency issues.To mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for IoV.This scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree structures.It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security.Finally,we evaluate the performance of CAIoV.Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%. 展开更多
关键词 Blockchain cross-domain authentication internet of vehicle zero-knowledge proof
下载PDF
Survey on digital twins for Internet of Vehicles:Fundamentals,challenges,and opportunities
17
作者 Jiajie Guo Muhammad Bilal +3 位作者 Yuying Qiu Cheng Qian Xiaolong Xu Kim-Kwang Raymond Choo 《Digital Communications and Networks》 SCIE CSCD 2024年第2期237-247,共11页
As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly prevalent.There hav... As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly prevalent.There have been attempts to utilize Digital Twins(DTs)to facilitate the design,evaluation,and deployment of IoV-based systems,for example by supporting high-fidelity modeling,real-time monitoring,and advanced predictive capabilities.However,the literature review undertaken in this paper suggests that integrating DTs into IoV-based system design and deployment remains an understudied topic.In addition,this paper explains how DTs can benefit IoV system designers and implementers,as well as describes several challenges and opportunities for future researchers. 展开更多
关键词 Internet of vehicles Digital twin Simulation Traffic systems
下载PDF
Cognitive Navigation for Intelligent Mobile Robots:A Learning-Based Approach With Topological Memory Configuration
18
作者 Qiming Liu Xinru Cui +1 位作者 Zhe Liu Hesheng Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第9期1933-1943,共11页
Autonomous navigation for intelligent mobile robots has gained significant attention,with a focus on enabling robots to generate reliable policies based on maintenance of spatial memory.In this paper,we propose a lear... Autonomous navigation for intelligent mobile robots has gained significant attention,with a focus on enabling robots to generate reliable policies based on maintenance of spatial memory.In this paper,we propose a learning-based visual navigation pipeline that uses topological maps as memory configurations.We introduce a unique online topology construction approach that fuses odometry pose estimation and perceptual similarity estimation.This tackles the issues of topological node redundancy and incorrect edge connections,which stem from the distribution gap between the spatial and perceptual domains.Furthermore,we propose a differentiable graph extraction structure,the topology multi-factor transformer(TMFT).This structure utilizes graph neural networks to integrate global memory and incorporates a multi-factor attention mechanism to underscore elements closely related to relevant target cues for policy generation.Results from photorealistic simulations on image-goal navigation tasks highlight the superior navigation performance of our proposed pipeline compared to existing memory structures.Comprehensive validation through behavior visualization,interpretability tests,and real-world deployment further underscore the adapt-ability and efficacy of our method. 展开更多
关键词 Graph neural networks(GNNs) spatial memory topological map visual navigation
下载PDF
Toward Trustworthy Decision-Making for Autonomous Vehicles:A Robust Reinforcement Learning Approach with Safety Guarantees
19
作者 Xiangkun He Wenhui Huang Chen Lv 《Engineering》 SCIE EI CAS CSCD 2024年第2期77-89,共13页
While autonomous vehicles are vital components of intelligent transportation systems,ensuring the trustworthiness of decision-making remains a substantial challenge in realizing autonomous driving.Therefore,we present... While autonomous vehicles are vital components of intelligent transportation systems,ensuring the trustworthiness of decision-making remains a substantial challenge in realizing autonomous driving.Therefore,we present a novel robust reinforcement learning approach with safety guarantees to attain trustworthy decision-making for autonomous vehicles.The proposed technique ensures decision trustworthiness in terms of policy robustness and collision safety.Specifically,an adversary model is learned online to simulate the worst-case uncertainty by approximating the optimal adversarial perturbations on the observed states and environmental dynamics.In addition,an adversarial robust actor-critic algorithm is developed to enable the agent to learn robust policies against perturbations in observations and dynamics.Moreover,we devise a safety mask to guarantee the collision safety of the autonomous driving agent during both the training and testing processes using an interpretable knowledge model known as the Responsibility-Sensitive Safety Model.Finally,the proposed approach is evaluated through both simulations and experiments.These results indicate that the autonomous driving agent can make trustworthy decisions and drastically reduce the number of collisions through robust safety policies. 展开更多
关键词 Autonomous vehicle DECISION-MAKING Reinforcement learning Adversarial attack Safety guarantee
下载PDF
FADSF:A Data Sharing Model for Intelligent Connected Vehicles Based on Blockchain Technology
20
作者 Yan Sun Caiyun Liu +1 位作者 Jun Li Yitong Liu 《Computers, Materials & Continua》 SCIE EI 2024年第8期2351-2362,共12页
With the development of technology,the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal.The data of ICV(intelligent connected vehicles)is ... With the development of technology,the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal.The data of ICV(intelligent connected vehicles)is the key to organically maximizing their efficiency.However,in the context of increasingly strict global data security supervision and compliance,numerous problems,including complex types of connected vehicle data,poor data collaboration between the IT(information technology)domain and OT(operation technology)domain,different data format standards,lack of shared trust sources,difficulty in ensuring the quality of shared data,lack of data control rights,as well as difficulty in defining data ownership,make vehicle data sharing face a lot of problems,and data islands are widespread.This study proposes FADSF(Fuzzy Anonymous Data Share Frame),an automobile data sharing scheme based on blockchain.The data holder publishes the shared data information and forms the corresponding label storage on the blockchain.The data demander browses the data directory information to select and purchase data assets and verify them.The data demander selects and purchases data assets and verifies them by browsing the data directory information.Meanwhile,this paper designs a data structure Data Discrimination Bloom Filter(DDBF),making complaints about illegal data.When the number of data complaints reaches the threshold,the audit traceability contract is triggered to punish the illegal data publisher,aiming to improve the data quality and maintain a good data sharing ecology.In this paper,based on Ethereum,the above scheme is tested to demonstrate its feasibility,efficiency and security. 展开更多
关键词 Blockchain connected vehicles data sharing smart contracts credible traceability
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部