Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (20)

Search Parameters:
Keywords = intra-/inter-vehicle system

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 3018 KB  
Article
Research on the Spatiotemporal Patterns of New Energy Vehicle Promotion Level in China
by Yanmei Wang, Fanlong Zeng and Mingke He
World Electr. Veh. J. 2025, 16(8), 456; https://doi.org/10.3390/wevj16080456 - 11 Aug 2025
Viewed by 501
Abstract
Exploring the regional disparities in and spatiotemporal evolution of the new energy vehicle promotion level (NEVPL) is essential for facilitating low-carbon and environmentally sustainable development. This study employs a multidimensional index system to assess the NEVPL across 31 Chinese provinces from 2017 to [...] Read more.
Exploring the regional disparities in and spatiotemporal evolution of the new energy vehicle promotion level (NEVPL) is essential for facilitating low-carbon and environmentally sustainable development. This study employs a multidimensional index system to assess the NEVPL across 31 Chinese provinces from 2017 to 2023, utilizing data on NEV ownership, annual NEV sales, the number of public charging piles, and the vehicle-to-pile ratio. The NEVPL scores were estimated using the Entropy-TOPSIS method. Spatial patterns and the mechanisms of regional disparities were examined using a suite of spatial analytical techniques, including the standard deviation ellipse (SDE), gravity center analysis, Dagum Gini coefficient decomposition, and kernel density estimation. The results reveal three principal findings. First, NEVPL exhibited a sustained upward trend nationwide. The eastern region consistently maintained a leading position, the central and western regions demonstrated steady growth, and the northeastern region remained underdeveloped, leading to an expanding regional gap. Second, spatial distribution transitioned from an early dispersed pattern to a structure characterized by both agglomeration and differentiation. The promotional center gradually shifted toward the southeast, and high-value regions became increasingly isolated, forming island-like clusters. Third, spatial inequality was mainly driven by inter-regional differences, which contributed to over 70 percent of the total variance. The rising intra-regional disparity within the eastern region emerged as the predominant factor widening the national gap. These findings offer empirical evidence to support the refinement of new energy vehicle (NEV) policy frameworks and the promotion of balanced regional development. Full article
Show Figures

Figure 1

32 pages, 16650 KB  
Article
Hierarchical Structure-Based Wireless Active Balancing System for Power Batteries
by Jia Xie, Huipin Lin, Jifeng Qu, Luhong Shi, Zuhong Chen, Sheng Chen and Yong Zheng
Energies 2024, 17(18), 4602; https://doi.org/10.3390/en17184602 - 13 Sep 2024
Cited by 3 | Viewed by 1731
Abstract
This paper conducts an in-depth study of a wireless, hierarchical structure-based active balancing system for power batteries, aimed at addressing the rapid advancements in battery technology within the electric vehicle industry. The system is designed to enhance energy density and the reliability of [...] Read more.
This paper conducts an in-depth study of a wireless, hierarchical structure-based active balancing system for power batteries, aimed at addressing the rapid advancements in battery technology within the electric vehicle industry. The system is designed to enhance energy density and the reliability of the battery system, developing a balancing system capable of managing cells with significant disparities in characteristics, which is crucial for extending the lifespan of lithium-ion battery packs. The proposed system integrates wireless self-networking technology into the battery management system and adopts a more efficient active balancing approach, replacing traditional passive energy-consuming methods. In its design, inter-group balancing at the upper layer is achieved through a soft-switching LLC resonant converter, while intra-group balancing among individual cells at the lower layer is managed by an active balancing control IC and a bidirectional buck–boost converter. This configuration not only ensures precise control but also significantly enhances the speed and efficiency of balancing, effectively addressing the heat issues caused by energy dissipation. Key technologies involved include lithium-ion batteries, battery management systems, battery balancing systems, LLC resonant converters, and wireless self-networking technology. Tests have shown that this system not only reduces energy consumption but also significantly improves energy transfer efficiency and the overall balance of the battery pack, thereby extending battery life and optimizing vehicle performance, ensuring a safer and more reliable operation of electric vehicle battery systems. Full article
Show Figures

Figure 1

40 pages, 1958 KB  
Article
BeHarmony: Blockchain-Enabled Trustworthy Communication and Legitimate Decision Making in Multi-Party Internet of Vehicles Systems
by Guodong Jin, Linyi Xu, Zihan Zhou, Qi Shi, Zihao Li, Hao Xu and Yinuo Liu
Electronics 2024, 13(16), 3219; https://doi.org/10.3390/electronics13163219 - 14 Aug 2024
Viewed by 1758
Abstract
The rapid development of the Internet of Vehicles using centralized systems faces significant challenges, including reliability and security vulnerabilities and high latency. This paper introduces a blockchain-enabled authentication and communication network for scalable IoV to enhance security, reduce latency, and relieve the dependency [...] Read more.
The rapid development of the Internet of Vehicles using centralized systems faces significant challenges, including reliability and security vulnerabilities and high latency. This paper introduces a blockchain-enabled authentication and communication network for scalable IoV to enhance security, reduce latency, and relieve the dependency on centralized infrastructures. The network applies blockchain-enabled domain name services and mutual authentication for fault tolerance consensus, such as PBFT and RAFT, featuring a primary layer of road side units and edge servers for inter-vehicle communication and a sub-layer within each vehicle for intra-vehicle communication. The study evaluates various scenarios and assesses roadside unit availability based on random distribution along vehicle routes. This paper also discusses the legal issues involved in the proposed model, highlighting that the IoV system should be governed by a contract-based decentralized IoV system comprising both smart contracts and traditional contracts. This model offers a novel approach to developing a decentralized, secure, efficient, and ethical IoV ecosystem, advancing autonomous and reliable vehicular networks. Full article
(This article belongs to the Special Issue Signal Processing and AI Applications for Vehicles)
Show Figures

Figure 1

16 pages, 32811 KB  
Article
Stripe-Assisted Global Transformer and Spatial–Temporal Enhancement for Vehicle Re-Identification
by Yasong An, Xiaofei Zhang, Bodong Shi and Xiaojun Tan
Appl. Sci. 2024, 14(10), 3968; https://doi.org/10.3390/app14103968 - 7 May 2024
Cited by 1 | Viewed by 1395
Abstract
As a core technology in intelligent transportation systems, vehicle re-identification has attracted growing attention. Most existing methods use CNNs to extract global and local features from vehicle images and roughly integrate them for identifying vehicles, addressing intra-class similarity and inter-class difference. However, a [...] Read more.
As a core technology in intelligent transportation systems, vehicle re-identification has attracted growing attention. Most existing methods use CNNs to extract global and local features from vehicle images and roughly integrate them for identifying vehicles, addressing intra-class similarity and inter-class difference. However, a significant challenge arises from redundant information between global and local features and possible misalignment among local features, resulting in suboptimal efficiency when combined. To further improve vehicle re-identification, we propose a stripe-assisted global transformer (SaGT) method, which leverages a dual-branch network based on transformers to learn a discriminative whole representation for each vehicle image. Specifically, one branch exploits a standard transformer layer to extract a global feature, while the other branch employs a stripe feature module (SFM) to construct stripe-based features. To further facilitate the effective incorporation of local information into the learning process of the global feature, we introduce a novel stripe-assisted global loss (SaGL), which combines ID losses to optimize the model. Considering redundancy, we only use the global feature for inference, as we enhance the whole representation with stripe-specific details. Finally, we introduce a spatial-temporal probability (STPro) to provide a complementary metric for robust vehicle re-identification. Extensive and comprehensive evaluations on two public datasets validate the effectiveness and superiority of our proposed method. Full article
(This article belongs to the Section Transportation and Future Mobility)
Show Figures

Figure 1

21 pages, 23471 KB  
Article
Research on Key Technology of Ship Re-Identification Based on the USV-UAV Collaboration
by Wenhao Dou, Leiming Zhu, Yang Wang and Shubo Wang
Drones 2023, 7(9), 590; https://doi.org/10.3390/drones7090590 - 20 Sep 2023
Cited by 6 | Viewed by 3047
Abstract
Distinguishing ship identities is critical in ensuring the safety and supervision of the marine agriculture and transportation industry. In this paper, we present a comprehensive investigation and validation of the progression of ship re-identification technology within a cooperative framework predominantly governed by UAVs. [...] Read more.
Distinguishing ship identities is critical in ensuring the safety and supervision of the marine agriculture and transportation industry. In this paper, we present a comprehensive investigation and validation of the progression of ship re-identification technology within a cooperative framework predominantly governed by UAVs. Our research revolves around the creation of a ship ReID dataset, the creation of a ship ReID dataset, the development of a feature extraction network, ranking optimization, and the establishment of a ship identity re-identification system built upon the collaboration of unmanned surface vehicles (USVs) and unmanned aerial vehicles (UAVs). We introduce a ship ReID dataset named VesselID-700, comprising 56,069 images covering seven classes of typical ships. We also simulated the multi-angle acquisition state of UAVs to categorize the ship orientations within this dataset. To address the challenge of distinguishing between ships with small inter-class differences and large intra-class variations, we propose a fine-grained feature extraction network called FGFN. FGFN enhances the ResNet architecture with a self-attentive mechanism and generalized mean pooling. We also introduce a multi-task loss function that combines classification and triplet loss, incorporating hard sample mining. Ablation experiments on the VesselID-700 dataset demonstrate that the FGFN network achieves outstanding performance, with a Rank-1 accuracy of 89.78% and mAP of 65.72% at a state-of-the-art level. Generalization experiments on pedestrian and vehicle ReID datasets reveal that FGFN excels in recognizing other rigid body targets and diverse viewpoints. Furthermore, to further enhance the advantages of UAV-USV synergy in ship ReID performance, we propose a ranking optimization method based on the homologous fusion of multi-angle UAVs and heterologous fusion of USV-UAV collaborative architecture. This optimization leads to a significant 3% improvement in Rank-1 performance, accompanied by a 73% reduction in retrieval time cost. Full article
Show Figures

Figure 1

19 pages, 2791 KB  
Article
Secure Data Transfer Based on a Multi-Level Blockchain for Internet of Vehicles
by Hua Yi Lin
Sensors 2023, 23(5), 2664; https://doi.org/10.3390/s23052664 - 28 Feb 2023
Cited by 14 | Viewed by 2942
Abstract
Because of the decentralized trait of the blockchain and the Internet of vehicles, both are very suitable for the architecture of the other. This study proposes a multi-level blockchain framework to secure information security on the Internet of vehicles. The main motivation of [...] Read more.
Because of the decentralized trait of the blockchain and the Internet of vehicles, both are very suitable for the architecture of the other. This study proposes a multi-level blockchain framework to secure information security on the Internet of vehicles. The main motivation of this study is to propose a new transaction block and ensure the identity of traders and the non-repudiation of transactions through the elliptic curve digital signature algorithm ECDSA. The designed multi-level blockchain architecture distributes the operations within the intra_cluster blockchain and the inter_cluster blockchain to improve the efficiency of the entire block. On the cloud computing platform, we exploit the threshold key management protocol, and the system can recover the system key as long as the threshold partial key is collected. This avoids the occurrence of PKI single-point failure. Thus, the proposed architecture ensures the security of OBU-RSU-BS-VM. The proposed multi-level blockchain framework consists of a block, intra-cluster blockchain and inter-cluster blockchain. The roadside unit RSU is responsible for the communication of vehicles in the vicinity, similar to a cluster head on the Internet of vehicles. This study exploits RSU to manage the block, and the base station is responsible for managing the intra-cluster blockchain named intra_clusterBC, and the cloud server at the back end is responsible for the entire system blockchain named inter_clusterBC. Finally, RSU, base stations and cloud servers cooperatively construct the multi-level blockchain framework and improve the security and the efficiency of the operation of the blockchain. Overall, in order to protect the security of the transaction data of the blockchain, we propose a new transaction block structure and adopt the elliptic curve cryptographic signature ECDSA to ensure that the Merkle tree root value is not changed and also make sure the transaction identity and non-repudiation of transaction data. Finally, this study considers information security in a cloud environment, and therefore we propose a secret-sharing and secure-map-reducing architecture based on the identity confirmation scheme. The proposed scheme with decentralization is very suitable for distributed connected vehicles and can also improve the execution efficiency of the blockchain. Full article
(This article belongs to the Special Issue Security and Communication Networks)
Show Figures

Figure 1

18 pages, 3848 KB  
Article
Secure and Efficient Multicast-Enabled Handover Scheme Pertaining to Vehicular Ad Hoc Networks in PMIPv6
by Amit Kumar Goyal, Gaurav Agarwal, Arun Kumar Tripathi and Mangal Sain
Appl. Sci. 2023, 13(4), 2624; https://doi.org/10.3390/app13042624 - 17 Feb 2023
Viewed by 2027
Abstract
In VANET, mobility management and handover management are two of the most intriguing and challenging research topics. The existing mobility management infrastructures are unable to provide seamless secure mobility and handover management. It is very common in a vehicular network that when a [...] Read more.
In VANET, mobility management and handover management are two of the most intriguing and challenging research topics. The existing mobility management infrastructures are unable to provide seamless secure mobility and handover management. It is very common in a vehicular network that when a vehicle roams between two domains, its reachability status may be compromised. The main reason for this is the higher handover latency and packet loss during the handover process. In the last decade, IP-based mobility protocols have been proposed for interoperable handover management systems. There has been a great deal of interest in providing IP multicast to mobile nodes such as vehicles, and numerous strategies have been put forth thus far. This research article proposes an IP multicast-enabled handover architecture for VANET in PMIPv6. Adding the IP multicast facility to the authentication server allows handover management that is both intra-domain and inter-domain, which originally was not supported by PMIPv6. This makes it possible for the IP service of a vehicle to maintain a connection from any location, without changing the earlier application. Additionally, a secure architecture with authentication capabilities built on top of PMIPv6 is suggested for VANET to address the authentication problem. Finally, the article compares the performance of the proposed architecture with that of the ones currently in use by varying several factors, including the vehicle’s density, the setup costs required, and the unit transmission costs on wired and wireless links, and it shows that our proposed solution ensures the handover process with a minimal cost change. Full article
(This article belongs to the Special Issue Secure Integration of IoT & Digital Twins)
Show Figures

Figure 1

19 pages, 4618 KB  
Article
V-SOC4AS: A Vehicle-SOC for Improving Automotive Security
by Vita Santa Barletta, Danilo Caivano, Mirko De Vincentiis, Azzurra Ragone, Michele Scalera and Manuel Ángel Serrano Martín
Algorithms 2023, 16(2), 112; https://doi.org/10.3390/a16020112 - 14 Feb 2023
Cited by 31 | Viewed by 5806
Abstract
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using various protocols that, if not properly designed, may be vulnerable [...] Read more.
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using various protocols that, if not properly designed, may be vulnerable to local or remote attacks. The paper presents a vehicle-security operation center for improving automotive security (V-SOC4AS) to enhance the detection, response, and prevention of cyber-attacks in the automotive context. The goal is to monitor in real-time each subsystem of intra-vehicle communication, that is controller area network (CAN), local interconnect network (LIN), FlexRay, media oriented systems transport (MOST), and Ethernet. Therefore, to achieve this goal, security information and event management (SIEM) was used to monitor and detect malicious attacks in intra-vehicle and inter-vehicle communications: messages transmitted between vehicle ECUs; infotainment and telematics systems, which provide passengers with entertainment capabilities and information about the vehicle system; and vehicular ports, which allow vehicles to connect to diagnostic devices, upload content of various types. As a result, this allows the automation and improvement of threat detection and incident response processes. Furthermore, the V-SOC4AS allows the classification of the received message as malicious and non-malicious and acquisition of additional information about the type of attack. Thus, this reduces the detection time and provides more support for response activities. Experimental evaluation was conducted on two state-of-the-art attacks: denial of service (DoS) and fuzzing. An open-source dataset was used to simulate the vehicles. V-SOC4AS exploits security information and event management to analyze the packets sent by a vehicle using a rule-based mechanism. If the payload contains a CAN frame attack, it is notified to the SOC analysts. Full article
(This article belongs to the Section Evolutionary Algorithms and Machine Learning)
Show Figures

Figure 1

33 pages, 3375 KB  
Article
A Modular In-Vehicle C-ITS Architecture for Sensor Data Collection, Vehicular Communications and Cloud Connectivity
by David Rocha, Gil Teixeira, Emanuel Vieira, João Almeida and Joaquim Ferreira
Sensors 2023, 23(3), 1724; https://doi.org/10.3390/s23031724 - 3 Feb 2023
Cited by 24 | Viewed by 5868
Abstract
The growth of the automobile industry in recent decades and the overuse of personal vehicles have amplified problems directly related to road safety, such as the increase in traffic congestion and number of accidents, as well as the degradation of the quality of [...] Read more.
The growth of the automobile industry in recent decades and the overuse of personal vehicles have amplified problems directly related to road safety, such as the increase in traffic congestion and number of accidents, as well as the degradation of the quality of roads. At the same time, and with the contribution of climate change effects, dangerous weather events have become more common on road infrastructure. In this context, Cooperative Intelligent Transport Systems (C-ITS) and Internet of Things (IoT) solutions emerge to overcome the limitations of human and local sensory systems, through the collection and distribution of relevant data to Connected and Automated Vehicles (CAVs). In this paper, an intra- and inter-vehicle sensory data collection system is presented, starting with the acquisition of relevant data present on the Controller Area Network (CAN) bus, collected through the vehicle’s On-Board-Diagnostics II (OBD-II) port, as well as on an on-board smartphone device and possibly other additional sensors. Short-range communication technologies, such as Bluetooth Low Energy (BLE), Wi-Fi, and ITS-G5, are employed in conjunction with long-range cellular networks for data dissemination and remote cloud monitoring. The results of the experimental tests allow the analysis of the road environment, as well as the notification in near real-time of adverse road conditions to drivers. The developed data collection system reveals itself as a potentially valuable tool for improving road safety and to iterate on the current Road Weather Models (RWMs). Full article
(This article belongs to the Special Issue Sensor Networks for Vehicular Communications)
Show Figures

Figure 1

17 pages, 27507 KB  
Article
Analysis of Deep Convolutional Neural Network Models for the Fine-Grained Classification of Vehicles
by Danish ul Khairi, Ferheen Ayaz, Nagham Saeed, Kamran Ahsan and Syed Zeeshan Ali
Future Transp. 2023, 3(1), 133-149; https://doi.org/10.3390/futuretransp3010009 - 31 Jan 2023
Cited by 5 | Viewed by 3887
Abstract
Intelligent transportation systems (ITS) is a broad area that encompasses vehicle identification, classification, monitoring, surveillance, prediction, management, reduction of traffic jams, license plate recognition, etc. Machine learning has practical and significant applications in ITS. Intelligent transportation systems rely heavily on vehicle classification for [...] Read more.
Intelligent transportation systems (ITS) is a broad area that encompasses vehicle identification, classification, monitoring, surveillance, prediction, management, reduction of traffic jams, license plate recognition, etc. Machine learning has practical and significant applications in ITS. Intelligent transportation systems rely heavily on vehicle classification for traffic management and monitoring. This research uses convolutional neural networks to classify cars at fine-grained classifications (make and model). Numerous obstacles must be overcome in order to complete the task, the greatest of which are intra- and inter-class similarities between the manufacturer and model of vehicles, different lighting effects, the shape and size of the vehicle, shadows, camera view angle, background, vehicle speed, colour occlusion and environmental conditions. This paper studies various machine learning algorithms used for the fine-grained classification of vehicles and presents a comparative analysis in terms of accuracy and the size of the implemented deep convolutional neural network (DCNN). Specifically, four DCNN models, mobilenet-v2, inception-v3, vgg-19 and resnet-50, are evaluated with three datasets, BMW-10, Stanford Cars and PAKCars. The evaluation results show that mobileNet-v2 is the smallest model as it is not computationally intensive due to depthwise separable convolution. However, resnet-50 and vgg-19 outperform inception-v3 and mobilenet-v2 in terms of accuracy due to their complex structure. Full article
Show Figures

Figure 1

14 pages, 3992 KB  
Article
Vehicle Tracking Algorithm Based on Deep Learning in Roadside Perspective
by Guangsheng Han, Qiukun Jin, Hui Rong, Lisheng Jin and Libin Zhang
Sustainability 2023, 15(3), 1950; https://doi.org/10.3390/su15031950 - 19 Jan 2023
Cited by 3 | Viewed by 3009
Abstract
Traffic intelligence has become an important part of the development of various countries and the automobile industry. Roadside perception is an important part of the intelligent transportation system, which mainly realizes the effective perception of road environment information by using sensors installed on [...] Read more.
Traffic intelligence has become an important part of the development of various countries and the automobile industry. Roadside perception is an important part of the intelligent transportation system, which mainly realizes the effective perception of road environment information by using sensors installed on the roadside. Vehicles are the main road targets in most traffic scenes, so tracking a large number of vehicles is an important subject in the field of roadside perception. Considering the characteristics of vehicle-like rigid targets from the roadside view, a vehicle tracking algorithm based on deep learning was proposed. Firstly, we optimized a DLA-34 network and designed a block-N module, then the channel attention and spatial attention modules were added in the front of the network to improve the overall feature extraction ability and computing efficiency of the network. Next, the joint loss function was designed to improve the intra-class and inter-class discrimination ability of the tracking algorithm, which can better discriminate objects of similar appearance and the color of vehicles, alleviate the IDs problem and improve algorithm robustness and the real-time performance of the tracking algorithm. Finally, the experimental results showed that the method had a good tracking effect for the vehicle tracking task from the roadside perspective and could meet the practical application demands of complex traffic scenes. Full article
Show Figures

Figure 1

29 pages, 2107 KB  
Review
Security Issues and Solutions for Connected and Autonomous Vehicles in a Sustainable City: A Survey
by Zhendong Wang, Haoran Wei, Jianda Wang, Xiaoming Zeng and Yuchao Chang
Sustainability 2022, 14(19), 12409; https://doi.org/10.3390/su141912409 - 29 Sep 2022
Cited by 44 | Viewed by 10168
Abstract
Connected and Autonomous Vehicles (CAVs) combine technologies of autonomous vehicles (AVs) and connected vehicles (CVs) to develop quicker, more reliable, and safer traffic. Artificial Intelligence (AI)-based CAV solutions play significant roles in sustainable cities. The convergence imposes stringent security requirements for CAV safety [...] Read more.
Connected and Autonomous Vehicles (CAVs) combine technologies of autonomous vehicles (AVs) and connected vehicles (CVs) to develop quicker, more reliable, and safer traffic. Artificial Intelligence (AI)-based CAV solutions play significant roles in sustainable cities. The convergence imposes stringent security requirements for CAV safety and reliability. In practice, vehicles are developed with increased automation and connectivity. Increased automation increases the reliance on the sensor-based technologies and decreases the reliance on the driver; increased connectivity increases the exposures of vehicles’ vulnerability and increases the risk for an adversary to implement a cyber-attack. Much work has been dedicated to identifying the security vulnerabilities and recommending mitigation techniques associated with different sensors, controllers, and connection mechanisms, respectively. However, there is an absence of comprehensive and in-depth studies to identify how the cyber-attacks exploit the vehicles’ vulnerabilities to negatively impact the performance and operations of CAVs. In this survey, we set out to thoroughly review the security issues introduced by AV and CV technologies, analyze how the cyber-attacks impact the performance of CAVs, and summarize the solutions correspondingly. The impact of cyber-attacks on the performance of CAVs is elaborated from both viewpoints of intra-vehicle systems and inter-vehicle systems. We pointed out that securing the perception and operations of CAVs would be the top requirement to enable CAVs to be applied safely and reliably in practice. Additionally, we suggested to utilize cloud and new AI methods to defend against smart cyber-attacks on CAVs. Full article
(This article belongs to the Special Issue Artificial Intelligence Applications for Sustainable Urban Living)
Show Figures

Figure 1

11 pages, 2914 KB  
Article
Maintaining Effective Node Chain Connectivity in the Network with Transmission Power of Self-Arranged AdHoc Routing in Cluster Scenario
by Kiruthiga Devi Murugavel, Parthasarathy Ramadass, Rakesh Kumar Mahendran, Arfat Ahmad Khan, Mohd Anul Haq, Sultan Alharby and Ahmed Alhussen
Electronics 2022, 11(15), 2455; https://doi.org/10.3390/electronics11152455 - 6 Aug 2022
Cited by 9 | Viewed by 2245
Abstract
Mobile Ad hoc Networks (MANETs) are intended to work without a fixed framework and provide dependable interchanges to ground vehicles, boats, airplanes, or people and structure a self-mending process that will empower persistent correspondences in any event, when at least one of its [...] Read more.
Mobile Ad hoc Networks (MANETs) are intended to work without a fixed framework and provide dependable interchanges to ground vehicles, boats, airplanes, or people and structure a self-mending process that will empower persistent correspondences in any event, when at least one of its nodes are debilitated or briefly expelled from the system. Notwithstanding, MANETs demonstrate themselves to be progressively harder to create for enormous systems with hundreds or thousands more nodes than initially envisioned. In our proposed technique, the node switches its communication mode depending on the connectivity of the adjacent nodes. The transmission power of each node will be calculated with the help of two major scenarios i.e., tree scenario and zone scenario. The autonomous clustering of the nodes among the tree and the zone scenario will be channelized by a comparison of the transmission power (residual energy) among the nodes. The inter and the intra communication of the node is also discussed in the paper. The result will be carried out by the simulation work in various perspectives, such as checking the percentage level of malicious nodes, traffic density, transmission power, and the longevity of nodes. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

35 pages, 13595 KB  
Review
Trends in Vehicle Re-Identification Past, Present, and Future: A Comprehensive Review
by Zakria, Jianhua Deng, Yang Hao, Muhammad Saddam Khokhar, Rajesh Kumar, Jingye Cai, Jay Kumar and Muhammad Umar Aftab
Mathematics 2021, 9(24), 3162; https://doi.org/10.3390/math9243162 - 8 Dec 2021
Cited by 34 | Viewed by 9267
Abstract
Vehicle Re-identification (re-id) over surveillance camera network with non-overlapping field of view is an exciting and challenging task in intelligent transportation systems (ITS). Due to its versatile applicability in metropolitan cities, it gained significant attention. Vehicle re-id matches targeted vehicle over non-overlapping views [...] Read more.
Vehicle Re-identification (re-id) over surveillance camera network with non-overlapping field of view is an exciting and challenging task in intelligent transportation systems (ITS). Due to its versatile applicability in metropolitan cities, it gained significant attention. Vehicle re-id matches targeted vehicle over non-overlapping views in multiple camera network. However, it becomes more difficult due to inter-class similarity, intra-class variability, viewpoint changes, and spatio-temporal uncertainty. In order to draw a detailed picture of vehicle re-id research, this paper gives a comprehensive description of the various vehicle re-id technologies, applicability, datasets, and a brief comparison of different methodologies. Our paper specifically focuses on vision-based vehicle re-id approaches, including vehicle appearance, license plate, and spatio-temporal characteristics. In addition, we explore the main challenges as well as a variety of applications in different domains. Lastly, a detailed comparison of current state-of-the-art methods performances over VeRi-776 and VehicleID datasets is summarized with future directions. We aim to facilitate future research by reviewing the work being done on vehicle re-id till to date. Full article
Show Figures

Figure 1

22 pages, 100809 KB  
Article
Multi-Object Segmentation in Complex Urban Scenes from High-Resolution Remote Sensing Data
by Arnick Abdollahi, Biswajeet Pradhan, Nagesh Shukla, Subrata Chakraborty and Abdullah Alamri
Remote Sens. 2021, 13(18), 3710; https://doi.org/10.3390/rs13183710 - 16 Sep 2021
Cited by 49 | Viewed by 6505
Abstract
Terrestrial features extraction, such as roads and buildings from aerial images using an automatic system, has many usages in an extensive range of fields, including disaster management, change detection, land cover assessment, and urban planning. This task is commonly tough because of complex [...] Read more.
Terrestrial features extraction, such as roads and buildings from aerial images using an automatic system, has many usages in an extensive range of fields, including disaster management, change detection, land cover assessment, and urban planning. This task is commonly tough because of complex scenes, such as urban scenes, where buildings and road objects are surrounded by shadows, vehicles, trees, etc., which appear in heterogeneous forms with lower inter-class and higher intra-class contrasts. Moreover, such extraction is time-consuming and expensive to perform by human specialists manually. Deep convolutional models have displayed considerable performance for feature segmentation from remote sensing data in the recent years. However, for the large and continuous area of obstructions, most of these techniques still cannot detect road and building well. Hence, this work’s principal goal is to introduce two novel deep convolutional models based on UNet family for multi-object segmentation, such as roads and buildings from aerial imagery. We focused on buildings and road networks because these objects constitute a huge part of the urban areas. The presented models are called multi-level context gating UNet (MCG-UNet) and bi-directional ConvLSTM UNet model (BCL-UNet). The proposed methods have the same advantages as the UNet model, the mechanism of densely connected convolutions, bi-directional ConvLSTM, and squeeze and excitation module to produce the segmentation maps with a high resolution and maintain the boundary information even under complicated backgrounds. Additionally, we implemented a basic efficient loss function called boundary-aware loss (BAL) that allowed a network to concentrate on hard semantic segmentation regions, such as overlapping areas, small objects, sophisticated objects, and boundaries of objects, and produce high-quality segmentation maps. The presented networks were tested on the Massachusetts building and road datasets. The MCG-UNet improved the average F1 accuracy by 1.85%, and 1.19% and 6.67% and 5.11% compared with UNet and BCL-UNet for road and building extraction, respectively. Additionally, the presented MCG-UNet and BCL-UNet networks were compared with other state-of-the-art deep learning-based networks, and the results proved the superiority of the networks in multi-object segmentation tasks. Full article
(This article belongs to the Special Issue Deep Learning in Remote Sensing Application)
Show Figures

Graphical abstract

Back to TopTop