Multi-sensor Fusion-based Vehicle Localization

Multi-sensor Fusion-based Vehicle Localization
Author: Ge Guo
Publisher: SAE International
Total Pages: 20
Release: 2024-10-21
Genre: Technology & Engineering
ISBN: 1468608851

Multi-sensor fusion (MSF) is believed to be a promising tool for vehicular localization in urban environments. Due to the differences in principles and performance of various onboard vehicle sensors, MSF inevitably suffers from heterogeneous sources and vulnerability to cyber-attacks. Therefore, an essential requirement of MSF is the capability of providing a consumer-grade solution that operates in real-time, is accurate, and immune to abnormal conditions with guaranteed performance and quality of service for location-based applications. In other words, an MSF algorithm depends heavily on data synchronization, cost, an accurate process model, a prior knowledge of covariance matrices, integrity assessments, and security against cyber-attacks. Multi-sensor Fusion-based Vehicle Localization addresses trending technologies in MSF-based vehicle localization and outlines some insights into the unsettled issues and their potential solutions. The discussions and outlook are presented as a collection of key topics, including multi-sensor measurement data processing, sensory selection, filtering, integrity assessment, and cybersecurity. Click here to access the full SAE EDGETM Research Report portfolio. 9781468608854 9781468608861 https://doi.org/10.4271/EPR2024023

AI Embedded Assurance for Cyber Systems

AI Embedded Assurance for Cyber Systems
Author: Cliff Wang
Publisher: Springer Nature
Total Pages: 252
Release: 2024-01-13
Genre: Technology & Engineering
ISBN: 3031426371

The rapid growth and reliance on cyber systems have permeated our society, government, and military which is demonstrated in this book. The authors discuss how AI-powered cyber systems are designed to protect against cyber threats and ensure the security and reliability of digital systems using artificial intelligence (AI) technologies. As AI becomes more integrated into various aspects of our lives, the need for reliable and trustworthy AI systems becomes increasingly important. This book is an introduction to all of the above-mentioned areas in the context of AI Embedded Assurance for Cyber Systems. This book has three themes. First, the AI/ML for digital forensics theme focuses on developing AI and ML powered forensic tools, techniques, software, and hardware. Second, the AI/ML for cyber physical system theme describes that AI/ML plays an enabling role to boost the development of cyber physical systems (CPS), especially in strengthening the security and privacy of CPS. Third, the AI/ML for cyber analysis theme focuses on using AI/ML to analyze tons of data in a timely manner and identify many complex threat patterns. This book is designed for undergraduates, graduate students in computer science and researchers in an interdisciplinary area of cyber forensics and AI embedded security applications. It is also useful for practitioners who would like to adopt AIs to solve cyber security problems.

Deep Learning and Its Applications for Vehicle Networks

Deep Learning and Its Applications for Vehicle Networks
Author: Fei Hu
Publisher: CRC Press
Total Pages: 357
Release: 2023-05-12
Genre: Computers
ISBN: 100087723X

Deep Learning (DL) is an effective approach for AI-based vehicular networks and can deliver a powerful set of tools for such vehicular network dynamics. In various domains of vehicular networks, DL can be used for learning-based channel estimation, traffic flow prediction, vehicle trajectory prediction, location-prediction-based scheduling and routing, intelligent network congestion control mechanism, smart load balancing and vertical handoff control, intelligent network security strategies, virtual smart and efficient resource allocation and intelligent distributed resource allocation methods. This book is based on the work from world-famous experts on the application of DL for vehicle networks. It consists of the following five parts: (I) DL for vehicle safety and security: This part covers the use of DL algorithms for vehicle safety or security. (II) DL for effective vehicle communications: Vehicle networks consist of vehicle-to-vehicle and vehicle-to-roadside communications. This part covers how Intelligent vehicle networks require a flexible selection of the best path across all vehicles, adaptive sending rate control based on bandwidth availability and timely data downloads from a roadside base-station. (III) DL for vehicle control: The myriad operations that require intelligent control for each individual vehicle are discussed in this part. This also includes emission control, which is based on the road traffic situation, the charging pile load is predicted through DL andvehicle speed adjustments based on the camera-captured image analysis. (IV) DL for information management: This part covers some intelligent information collection and understanding. We can use DL for energy-saving vehicle trajectory control based on the road traffic situation and given destination information; we can also natural language processing based on DL algorithm for automatic internet of things (IoT) search during driving. (V) Other applications. This part introduces the use of DL models for other vehicle controls. Autonomous vehicles are becoming more and more popular in society. The DL and its variants will play greater roles in cognitive vehicle communications and control. Other machine learning models such as deep reinforcement learning will also facilitate intelligent vehicle behavior understanding and adjustment. This book will become a valuable reference to your understanding of this critical field.

Detection of Intrusions and Malware, and Vulnerability Assessment

Detection of Intrusions and Malware, and Vulnerability Assessment
Author: Daniel Gruss
Publisher: Springer Nature
Total Pages: 281
Release: 2023-06-09
Genre: Computers
ISBN: 3031355040

This book constitutes the proceedings of the 20th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2023, held in Hamburg, Germany, in July 2023. The 12 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 43 submissions. The papers are organized in thematical sections named: Side Channels Attacks; Security and Machine Learning; Cyber Physical System Security; Security Issues when Dealing with Users; Analysis of Vulnerable Code; Flow Integrity and Security.

Multisensor Data Fusion

Multisensor Data Fusion
Author: David Hall
Publisher: CRC Press
Total Pages: 564
Release: 2001-06-20
Genre: Technology & Engineering
ISBN: 1420038540

The emerging technology of multisensor data fusion has a wide range of applications, both in Department of Defense (DoD) areas and in the civilian arena. The techniques of multisensor data fusion draw from an equally broad range of disciplines, including artificial intelligence, pattern recognition, and statistical estimation. With the rapid evolut

Multi-Sensor Information Fusion

Multi-Sensor Information Fusion
Author: Xue-Bo Jin
Publisher: MDPI
Total Pages: 602
Release: 2020-03-23
Genre: Technology & Engineering
ISBN: 3039283022

This book includes papers from the section “Multisensor Information Fusion”, from Sensors between 2018 to 2019. It focuses on the latest research results of current multi-sensor fusion technologies and represents the latest research trends, including traditional information fusion technologies, estimation and filtering, and the latest research, artificial intelligence involving deep learning.

Industrial Wireless Sensor Networks

Industrial Wireless Sensor Networks
Author: V. Çağrı Güngör
Publisher: CRC Press
Total Pages: 406
Release: 2017-12-19
Genre: Computers
ISBN: 1466500522

The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent processing. In this regard, IWSNs play a vital role in creating more reliable, efficient, and productive industrial systems, thus improving companies’ competitiveness in the marketplace. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards examines the current state of the art in industrial wireless sensor networks and outlines future directions for research. What Are the Main Challenges in Developing IWSN Systems? Featuring contributions by researchers around the world, this book explores the software and hardware platforms, protocols, and standards that are needed to address the unique challenges posed by IWSN systems. It offers an in-depth review of emerging and already deployed IWSN applications and technologies, and outlines technical issues and design objectives. In particular, the book covers radio technologies, energy harvesting techniques, and network and resource management. It also discusses issues critical to industrial applications, such as latency, fault tolerance, synchronization, real-time constraints, network security, and cross-layer design. A chapter on standards highlights the need for specific wireless communication standards for industrial applications. A Starting Point for Further Research Delving into wireless sensor networks from an industrial perspective, this comprehensive work provides readers with a better understanding of the potential advantages and research challenges of IWSN applications. A contemporary reference for anyone working at the cutting edge of industrial automation, communication systems, and networks, it will inspire further exploration in this promising research area.

Distributed Detection and Data Fusion

Distributed Detection and Data Fusion
Author: Pramod K. Varshney
Publisher: Springer Science & Business Media
Total Pages: 286
Release: 2012-12-06
Genre: Technology & Engineering
ISBN: 1461219043

This book provides an introductory treatment of the fundamentals of decision-making in a distributed framework. Classical detection theory assumes that complete observations are available at a central processor for decision-making. More recently, many applications have been identified in which observations are processed in a distributed manner and decisions are made at the distributed processors, or processed data (compressed observations) are conveyed to a fusion center that makes the global decision. Conventional detection theory has been extended so that it can deal with such distributed detection problems. A unified treatment of recent advances in this new branch of statistical decision theory is presented. Distributed detection under different formulations and for a variety of detection network topologies is discussed. This material is not available in any other book and has appeared relatively recently in technical journals. The level of presentation is such that the hook can be used as a graduate-level textbook. Numerous examples are presented throughout the book. It is assumed that the reader has been exposed to detection theory. The book will also serve as a useful reference for practicing engineers and researchers. I have actively pursued research on distributed detection and data fusion over the last decade, which ultimately interested me in writing this book. Many individuals have played a key role in the completion of this book.