Results 51 to 60 of about 10,018 (196)
A cybersecurity risk analysis framework for systems with artificial intelligence components
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho +3 more
wiley +1 more source
Effect of Multi-Frequency Beam Alignment on Non-Line-of-Site Vehicle to Infrastructure Communication using CI Model (CI-NLOS-V2I) [PDF]
Investigation of the effect of beam alignment for milimeter wave (mmWave) transmission in the case of Vehicle-to-Infrastructure communication (V2I) is carried out. The investigation covered varying transmission-reception (TX-RX) distances. The effect of carrier frequency variation using different antenna angles and gains is also analyzed.
openaire +1 more source
RSU‐Assisted Resource Map Sharing to Enhance Reliability in 5G NR V2X Mode 2
Wireless blind spots (WBS) cause persistent collisions in 5G new radio vehicle‐to‐everything Mode 2 sensing‐based semi‐persistent scheduling due to hidden terminals and half‐duplex sensing. We propose roadside unit‐assisted resource map sharing service (RMSS) that shares an occupancy bitmap via PC5 or bitmap+RC via Uu for delay‐compensated ...
Seung‐Jae Yu, Cheol Mun
wiley +1 more source
Recently, vehicle to everything (V2X) communications have drawn a significant amount of attention. Emerging V2X applications demand the efficient utilization of heterogeneous access technologies, such as long-term evolution (LTE), Wi-Fi, and dedicated ...
Wei Huang +5 more
doaj +1 more source
An Efficient Cluster Based Resource Management Scheme and its Performance Analysis for V2X Networks
As the demand for VANETs data transmission continues to increase, the defined cellular band becomes a bottleneck to meet the demands for all vehicle-to-everything (V2X) users.
Fakhar Abbas +3 more
doaj +1 more source
A real‐time embedded perception pipeline tailored for ITS and AVs, with a focus on soft deadline adherence and timing‐aware deployment. We deploy a post‐training quantized YOLOv8n model on an NVIDIA Jetson Orin Nano using a ROS 2‐based architecture and stereo input from a ZED 2i camera.
Saranya M, Archana N, Rishi Koushik G
wiley +1 more source
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley +1 more source
Flexible Authentication in Vehicular Ad hoc Networks
A Vehicular Ad-Hoc Network (VANET) is a form of Mobile ad-hoc network, to provide communications among nearby vehicles and between vehicles and nearby fixed roadside equipment. The key operation in VANETs is the broadcast of messages.
Caballero-Gil, C. +3 more
core +1 more source
This work proposes COANET (crayfish optimization algorithm‐based route optimization for IoV Networks), which is an innovative bio‐inspired framework based on the crayfish optimization algorithm. COANET's core utilized the crayfish behaviours of foraging, competition and summer resort to allow the dynamic balancing of exploration and exploitation during
Ghassan Husnain +5 more
wiley +1 more source
VANET Applications: Hot Use Cases [PDF]
Current challenges of car manufacturers are to make roads safe, to achieve free flowing traffic with few congestions, and to reduce pollution by an effective fuel use.
Denis, Richard +4 more
core +3 more sources

