Results 31 to 40 of about 13,416 (198)

A Practical Implementation of Quantum-Derived Keys for Secure Vehicle-to-Infrastructure Communications

open access: yesVehicles, 2023
We provide a practical implementation of a free space optical quantum key distribution (FSO-QKD) system within a vehicle-to-infrastructure (V2I) application developed under the Innovate UK AirQKD project.
Daniel S. Fowler   +2 more
doaj   +1 more source

Design and Implementation of HD Mapping, Vehicle Control, and V2I Communication for Robo-Taxi Services

open access: yesSensors, 2022
This paper presents our autonomous driving (AD) software stack, developed to complete the main mission of the contest we entered. The main mission can be simply described as a robo-taxi service on public roads, to transport passengers to their ...
Jun Yong Yoon   +2 more
doaj   +1 more source

SDN-Based Survivability Analysis for V2I Communications

open access: yesSensors, 2020
In vehicle-to-infrastructure (V2I) communications, various failures in the dynamic movement pose serious link interruptions. To study the continuous service quality for the V2I network when this issue happens, this paper proposes a survivability analysis
Li Jin, Guoan Zhang, Hao Zhu, Wei Duan
doaj   +1 more source

Vehicle-to-Infrastructure-Based Traffic Signal Optimization for Isolated Intersection

open access: yesSustainability, 2023
Traffic signal control is critical for traffic efficiency optimization but is usually constrained by traffic detection methods. The emerging V2I (Vehicle to Infrastructure) technology is capable of providing rich information for traffic detection, thus ...
Yingjun Qiao   +4 more
semanticscholar   +1 more source

Vehicle to Infrastructure-Based LiDAR Localization Method for Autonomous Vehicles

open access: yesElectronics, 2023
The localization of autonomous vehicles using light detection and ranging (LiDAR) sensors relies on high-definition (HD) maps, which are essential for accurate positioning.
Myeong-jun Kim, Ohsung Kwon, Jungha Kim
semanticscholar   +1 more source

On the achievable throughput of cooperative vehicular networks [PDF]

open access: yes, 2016
© 2016 IEEE. Due to the time-varying channel conditions and dynamic topology of vehicular networks attributable to the high mobility of vehicles, data dissemination in vehicular networks, especially for content of large-size, is challenging.
Chen, J, Li, C, Mao, G, Zafar, A
core   +1 more source

Geo-Based Resource Allocation for Joint Clustered V2I and V2V Communications in Cellular Networks

open access: yesIEEE Access, 2023
Cellular vehicle-to-everything (C-V2X) communications have gained traction as they can improve safe driving, efficiency, and convenience. However, mobility and the rising number of vehicles make the efficiency of resource allocation (RA) schemes more ...
Jaafar Sadiq Alrubaye   +1 more
doaj   +1 more source

Mitigating the Impact of Blockages in Millimeter-Wave Vehicular Networks Through Vehicular Relays

open access: yesIEEE Open Journal of Intelligent Transportation Systems, 2021
With the high data rates and ultra-low latency it provides, millimeter-wave (mmWave) communications will be a key enabler for future vehicular networks. However, due to high penetration losses and high mobility, mmWave links experience frequent blockages.
Caglar Tunc, Shivendra S. Panwar
doaj   +1 more source

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks [PDF]

open access: yes, 2019
Connected and automated vehicles will enable advanced traffic safety and efficiency applications thanks to the dynamic exchange of information between vehicles, and between vehicles and infrastructure nodes.
Gozalvez, Javier, Sepulcre, Miguel
core   +2 more sources

Cybersecurity Attacks in Vehicle-to-Infrastructure (V2I) Applications and their Prevention

open access: yes, 2017
A connected vehicle (CV) environment is composed of a diverse data collection, data communication and dissemination, and computing infrastructure systems that are vulnerable to the same cyberattacks as all traditional computing environments. Cyberattacks can jeopardize the expected safety, mobility, energy, and environmental benefits from connected ...
Islam, Mhafuzul   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy