

Instant online reading.
Don't wait for delivery!
Autonomous Vehicles, Volume 2
Smart Vehicles for Communication
By: Romil Rawat (Editor), Purvee Bhardwaj (Editor), Upinder Kaur (Editor), Shrikant Telang (Editor), Mukesh Chouhan (Editor)
Hardcover | 12 December 2022 | Edition Number 1
At a Glance
352 Pages
23.5 x 15.5 x 2.3
Hardcover
RRP $323.95
$224.50
31%OFF
or 4 interest-free payments of $56.13 with
orAims to ship in 7 to 10 business days
The companion to Autonomous Vehicles Volume 1: Using Machine Intelligence, this second volume in the two-volume set covers intelligent techniques utilized for designing, controlling, and managing vehicular systems based on advanced algorithms of computing like machine learning, artificial intelligence, data analytics, and Internet of Things (IoT) with prediction approaches to avoid accidental damages, security threats, and theft.
Besides communicating with other vehicles, self-driving cars connected to a 5G network will also be able to communicate with different infrastructure elements that make up our roads and other transportation and communication systems. Similarly, an unmanned aerial vehicle (UAV), an aircraft without any human pilot, crew, or passengers on board, can operate under remote control by a human operator, as a remotely-piloted aircraft (RPA), or with various degrees of autonomy. These include autopilot assistance and fully autonomous aircraft that have no provision for human intervention. Transportation is a necessary, but often painful process. With fully autonomous driving, passengers will be freed to accomplish their own goals, turning the dead hours of driving into fruitful hours of learning, working, engaging, and relaxing. Similarly, UAVs can perform functions that human-operated aircraft cannot, whether because of the environment or high-risk situations.
The purpose of the book is to present the needs, designs, and applications of autonomous vehicles. The topics covered range from mechanical engineering to computer science engineering, both areas playing vital roles in programming, managing, generating alerts, and GPS position, artificial intelligence-based prediction of path and events, as well as other high-tech tools, are covered in this book, as well. Whether for the student, veteran engineer, or another industry professional, this book, and its companion volume, are must-haves for any library.
Preface xiii
1 A Best Fit Strategic Approach for Sample Selections of a Carrier to Minimizing Quantization Error 1
Virendra P. Nikam and Shital S. Dhande
1.1 Introduction 1
1.1.1 Cryptography 2
1.1.2 Steganography 3
1.1.3 Watermarking 3
1.2 Background History 5
1.3 Literature Survey 6
1.4 Proposed Methodology 8
1.4.1 Carrier Selection 8
1.4.2 Carrier Classification 8
1.4.3 Searching Best Fit Sample from Class 9
1.4.4 Updating Result Carrier with Newly Found Best-Fit Sample 10
1.5 Result Analysis 13
1.6 Conclusion 15
1.7 Future Scope 17
References 17
2 A Dual-Polarized Antenna With Circular Parasitic Element for Autonomous Vehicle 19
Manish Varun Yadav and Sudeep Baudha
2.1 Introduction 19
2.2 Autonomous-Vehicle Antenna Design and Principle 21
2.3 Simulated Parameter Study 24
2.4 Simulated Results 25
2.5 Conclusion 30
References 30
3 A Smart Vehicle Antenna for Defence and Satellite Communication 33
Manish Varun Yadav, Swati Varun Yadav, Sudeep Baudha and Ashish Chittora
3.1 Introduction 34
3.2 Design Principle and Structure 35
3.3 Stages of Development 37
3.4 Simulated Parameter Study 38
3.5 Simulated and Measured Results 40
3.6 Conclusion 42
References 44
4 Visual Place Recognition for Simultaneous Localization and Mapping 47
Konstantinos A. Tsintotas, Loukas Bampis and Antonios Gasteratos
4.1 Introduction 47
4.2 The Structure for a Visual Place Recognition System 49
4.2.1 Image Processing 50
4.2.1.1 Global Descriptor Extraction 50
4.2.1.2 Local Descriptors Extraction 51
4.2.2 Map 52
4.2.2.1 Single Image-Based 53
4.2.2.2 Sequence of Images-Based 54
4.2.3 Belief Generator 54
4.2.3.1 Pixel-Wise Similarity 55
4.2.3.2 Euclidean or Cosine Distance 56
4.2.3.3 Vote Density 56
4.2.3.4 Temporal Consistency 57
4.2.3.5 Geometrical Verification 57
4.3 Evaluation 58
4.3.1 Ground Truth 58
4.3.2 Datasets 59
4.3.3 Evaluation Metrics 60
4.4 Paradigms 61
4.4.1 Sequence of Images-Based Visual Word Histograms 61
4.4.2 Dynamic Sequence Segmentation 64
4.4.3 Hierarchical Mapping Through an Incremental Visual Vocabulary 66
4.4.4 Bag of Tracked Words for Incremental Visual Place Recognition 67
4.5 Experimental Results 69
4.6 Future Trends and Conclusion 70
References 71
5 Trust Verification Class (TVCRO) Based Communication for Enhanced of QoS in VANET Environment 81
Akanksha Vyas, Nayan Bhale Amar, Pratiksha Aurangabadkar and Yukti Vyas
5.1 Introduction 82
5.2 Related Work 84
5.3 Theoretical Framework 86
5.4 TVCRO Procedure 90
5.5 Simulation Setup 95
5.6 Results and Discussion 97
5.7 Conclusion 99
References 100
6 Effective Congestion Control Mechanism for Smart Vehicles Using Edge Computing in VANET 105
Poorva Shukla, Sunita Varma and Ravindra Petel
6.1 Introduction 106
6.2 Related Study 109
6.3 Proposed Algorithm 116
6.4 Conclusion 118
Appendix 118
References 119
7 Longitudinally Variant 4W4D Robot Slipagge-Based Path Tracking Control 123
Edgar A. Martinez-Garcia, Roman Lavrenov and Evgeni Magid
7.1 Introduction 124
7.2 Related Work 125
7.3 Vehicle Physical Model 127
7.4 4W4D Z-Turn Control Law 132
7.5 Sensing Models 137
7.6 Path-Tracking Control 139
7.7 Conclusion 145
Acknowledgement 146
References 146
8 Intelligent Autonomous Electric Car 151
Vijay L. Hallappanavar, Chetan M. Bulla and Mahantesh N. Birje
8.1 Introduction 151
8.2 Related Work 154
8.3 Intelligent Autonomous System 155
8.3.1 Object Detection 156
8.3.1.1 Object Detection Using IR Sensor 157
8.3.2 Automatic Cooling 158
8.3.3 Speed Control While Raining 159
8.3.4 Automatic Charging 160
8.3.5 Hardware Requirement 162
8.3.6 Software Requirements 165
8.4 Results 165
8.4.1 Object Detection and Tracking 165
8.4.2 Automatic Cooling 166
8.4.3 Speed Control While Raining 167
8.4.4 Automatic Charging 167
8.5 Conclusions 167
References 168
9 Cluster Optimization Using Metaheuristic JAYA Algorithm for Secure VANETs 173
Gurjot Kaur, Deepti Kakkar and Davinder Singh
9.1 Introduction 174
9.1.1 VANET Architecture 176
9.1.2 VANET Topology 176
9.1.3 Challenges in VANETs 179
9.1.4 Security Issues in VANETs 180
9.1.5 Organization of Chapter 183
9.2 Literature Review 183
9.2.1 Available Security Solutions for VANETs 183
9.2.2 On Trust-Based Security Models 184
9.2.3 Gaps in Existing Trust Model-Based Security Solutions 187
9.2.4 On Clustering in VANETs Using Metaheuristic Techniques 188
9.3 Proposed Work 191
9.3.1 Overview 191
9.3.2 Assumptions 191
9.3.3 Constraints 192
9.3.4 Proposed Methodology 192
9.4 Conclusion 200
References 200
10 Analysis of Domestic Cars in India for Middle-Income Group Using TOPSIS 207
Vibha Aggarwal, Kulwant Singh, Sandeep Gupta, Shipra Bansal, Priyanka Baghla and Navjot Kaur
10.1 Introduction 208
10.2 Methodology 209
10.3 Result and Discussion 214
10.4 Conclusion 214
References 214
11 A Secure Data Authentication-Based Aerial Intelligent Relay Road Side Unit (AIR-RSU) Framework for Intelligent Transportation System Applications 217
A. Samson Arun Raj, M. Roshni Thanka, G. Jaspher Wilisie Kathrine and Yogesh Palanichamy
11.1 Introduction 218
11.1.1 The Need for Data Authentication 218
11.1.2 The Objective of the Proposed Model 219
11.2 Related Works 219
11.3 Application Scenario of The Working Model 222
11.4 Working Process 224
11.4.1 Network Measurement Subsystem 225
11.4.2 Data Authentication Subsystem 227
11.4.3 Service Classification Subsystem 227
11.5 Experimental Process 230
11.6 Conclusion and Future Works 234
References 235
12 Evaluation of Vulnerabilities in IoT-Based Intelligent Agriculture Systems 237
Khongdet Phasinam and Thanwamas Kassanuk
12.1 Introduction 238
12.1.1 Precision Agriculture 238
12.1.2 Internet of Things and Machine Learning for Smart Agriculture and Related Security Concerns 238
12.2 Building Blocks of Internet of Things 241
12.2.1 Sensors 242
12.2.2 Control Unit 244
12.2.3 Communication Module 245
12.3 Literature Survey 247
12.4 Security Issues 249
12.4.1 Heterogeneous Devices and Communication 250
12.4.2 Integrating Physical Devices 250
12.4.3 Constrained Devices 250
12.4.4 Large Scale 250
12.4.5 Privacy 250
12.5 Attacks and Vulnerabilities in Internet of Things Related to Agriculture Field 251
12.6 Conclusion 254
References 255
13 Q Learning Algorithm for Network Resource Management in Vehicular Communication Network 259
Vartika Agarwal and Sachin Sharma
13.1 Introduction 259
13.2 Literature Review 261
13.3 Overview of Network Resource Management in Vehicular Communication Networks 263
13.4 Reinforcement Learning Techniques for Network Resource Management 264
13.5 Applications of Q Learning 266
13.6 Comparative Study and Result Analysis 268
13.7 Impact of Q-Learning 271
13.8 Conclusion 271
References 272
14 Reliable Transportation Solution for Urban Planning: VANET 275
Harshit Srivastava and Deepti Kakkar
14.1 Introduction 276
14.1.1 VANET Architecture 276
14.1.2 VANET Characteristics 278
14.1.3 VANET Standards 278
14.1.4 VANET Communication 279
14.1.5 Implementation of Optimisation Algorithm for VANETs 279
14.2 Cryptography 282
14.2.1 Salient Features of Cryptography 282
14.2.2 Classification of Cryptography (as shown in Figure 14.2) 283
14.3 Common Security Attacks 283
14.4 Gaps in Present Cryptography 284
14.5 Lightweight Cryptography 285
14.5.1 Vital Security Aspects in Lightweight Cryptography 286
14.5.2 Advantages of Lightweight Protocols 287
14.5.3 Objectives of Lightweight Protocols are Classified as 288
14.5.4 Lightweight Cryptography Algorithms 289
14.5.5 Software and Hardware Implementation 290
14.5.5.1 Hardware Lightweight Cryptography 290
14.5.5.2 Software Lightweight Cryptography 291
14.5.6 Division of Lightweight Cryptography 291
14.5.6.1 Symmetric Key Algorithm 292
14.5.6.2 Asymmetric Key 297
14.6 Conclusion 299
14.7 Future Work 300
References 300
15 Implementation of Veco-Taxis in Turbulent Environment for Gas Source Localization 303
Kumar Gaurav
15.1 Introduction 303
15.2 Literature Survey 304
15.3 Methodology 307
15.4 Results and Discussions 310
15.5 Conclusions 314
References 315
16 A Technique for Monitoring Cyber-Attacks on Self-Driving Automobiles-Based VANET 317
Vinod Mahor, Sadhna Bijrothiya, Rina Mishra and Romil Rawat
16.1 Introduction 318
16.2 Related Work 319
16.3 Examining the Proposed Framework 320
16.4 Conclusion 331
References 331
About the Editors 335
Index 337
ISBN: 9781394152254
ISBN-10: 1394152256
Published: 12th December 2022
Format: Hardcover
Language: English
Number of Pages: 352
Audience: Professional and Scholarly
Publisher: John Wiley & Sons Inc (US)
Country of Publication: GB
Edition Number: 1
Dimensions (cm): 23.5 x 15.5 x 2.3
Weight (kg): 0.64
Shipping
Standard Shipping | Express Shipping | |
---|---|---|
Metro postcodes: | $9.99 | $14.95 |
Regional postcodes: | $9.99 | $14.95 |
Rural postcodes: | $9.99 | $14.95 |
How to return your order
At Booktopia, we offer hassle-free returns in accordance with our returns policy. If you wish to return an item, please get in touch with Booktopia Customer Care.
Additional postage charges may be applicable.
Defective items
If there is a problem with any of the items received for your order then the Booktopia Customer Care team is ready to assist you.
For more info please visit our Help Centre.
You Can Find This Book In

SNAFU: The Definitive Guide to History's Greatest Screwups
the hilarious new book from The Office and Hangover comedian
Paperback
RRP $34.99
$27.25
OFF

The Tinpot Navy
The extraordinary exploits and unsung heroes of Australia's fledgling navy during the Great War
Paperback
RRP $34.99
$28.50
OFF

SIGNED COPY
RRP $36.99
$25.90
OFF

Trails to Freedom
The True Story of the Medieval Trails Used by Anzac POWs to Escape Italy in 1943-1944
Paperback
RRP $34.99
$28.50
OFF

The Fourth Turning
An American Prophecy: What the Cycles of History Tell Us About America's Next Rendezvous with Destiny
Paperback
RRP $34.99
$28.50
OFF