scholarly journals Bridging the Gap between SUMO & Kuksa: Using A Traffic Simulator for Testing Cloud-based Connected Vehicle Services

10.29007/9kkv ◽  
2019 ◽  
Author(s):  
Philipp Heisig ◽  
Sven Erik Jeroschewski ◽  
Johannes Kristan ◽  
Robert Höttger ◽  
Ahmad Banijamali ◽  
...  

The emerging usage of connected vehicles promises new business models and a high level of innovation, but also poses new challenges for the automotive domain and in particular for the connectivity dimension, i. e. the connection between vehicles and cloud environments including the architecture of such systems. Among other challenges, IoT Cloud platforms and their services have to scale with the number of vehicles on the road to provide functionality in a reliable way, especially when dealing with safety-related functions. Testing the scalability, functionality, and availability of IoT Cloud platform architectures for connected vehicles requires data from real world scenarios instead of hypothetical data sets to ensure both the proper functionality of distinct connected vehicle services and that the architecture scales with a varying number of vehicles. However, the closed and proprietary nature of current connected vehicle solutions aggravate the availability of both vehicle data and test environments to evaluate different architectures and cloud solutions. Thus, this paper introduces an approach for connecting the Eclipse SUMO traffic simulation with the open source connected vehicle ecosystem Eclipse Kuksa. More precisely, Eclipse SUMO is used to simulate traffic scenarios including microscopic properties like the position or emission. The generated data of each vehicle is then be sent to the message gateway of the Kuksa IoT Cloud platform and delegated to an according example service that consumes the data. In this way, not only the scalability of connected vehicle IoT architectures can be tested based on real world scenarios, but also the functionality of cloud services can be ensured by providing context-specific automotive data that goes beyond rudimentary or fake data-sets.

Author(s):  
Yun Zhou ◽  
Raj Bridgelall

GPS loggers and cameras aboard connected vehicles can produce vast amounts of data. Analysts can mine such data to decipher patterns in vehicle trajectories and driver–vehicle interactions. Ability to process such large-scale data in real time can inform strategies to reduce crashes, improve traffic flow, enhance system operational efficiencies, and reduce environmental impacts. However, connected vehicle technologies are in the very early phases of deployment. Therefore, related datasets are extremely scarce, and the utility of such emerging datasets is largely unknown. This paper provides a comprehensive review of studies that used large-scale connected vehicle data from the United States Department of Transportation Connected Vehicle Safety Pilot Model Deployment program. It is the first and only such dataset available to the public. The data contains real-world information about the operation of connected vehicles that organizations are testing. The paper provides a summary of the available datasets and their organization, and the overall structure and other characteristics of the data captured during pilot deployments. Usage of the data is then classified into three categories: driving pattern identification, development of surrogate safety measures, and improvements in the operation of signalized intersections. Finally, some limitations experienced with the existing datasets are identified.


2021 ◽  
Vol 13 (18) ◽  
pp. 3713
Author(s):  
Jie Liu ◽  
Xin Cao ◽  
Pingchuan Zhang ◽  
Xueli Xu ◽  
Yangyang Liu ◽  
...  

As an essential step in the restoration of Terracotta Warriors, the results of fragments classification will directly affect the performance of fragments matching and splicing. However, most of the existing methods are based on traditional technology and have low accuracy in classification. A practical and effective classification method for fragments is an urgent need. In this case, an attention-based multi-scale neural network named AMS-Net is proposed to extract significant geometric and semantic features. AMS-Net is a hierarchical structure consisting of a multi-scale set abstraction block (MS-BLOCK) and a fully connected (FC) layer. MS-BLOCK consists of a local-global layer (LGLayer) and an improved multi-layer perceptron (IMLP). With a multi-scale strategy, LGLayer can parallel extract the local and global features from different scales. IMLP can concatenate the high-level and low-level features for classification tasks. Extensive experiments on the public data set (ModelNet40/10) and the real-world Terracotta Warrior fragments data set are conducted. The accuracy results with normal can achieve 93.52% and 96.22%, respectively. For real-world data sets, the accuracy is best among the existing methods. The robustness and effectiveness of the performance on the task of 3D point cloud classification are also investigated. It proves that the proposed end-to-end learning network is more effective and suitable for the classification of the Terracotta Warrior fragments.


Author(s):  
Nataliya Ryvak ◽  
Anna Kernytska

In this paper, digital technologies development was analyzed as the basis for the so-called “fourth industrial revolution” with the potential for the qualitative transformation of the Ukrainian economy based on EU countries’ experience. Industry 4.0 is a new control chain over the entire chain of creating value throughout the product lifecycle. When developing an economic policy, it is important to pay attention to Industry 4.0. It increases productivity, produces new, better, and individualized products, and implements new business models based on “undermining” innovations. A comparative analysis of national initiatives I4.0 with their characteristics according to the main dimensions, including funding, focus, direction, was conducted. Particular attention was paid to considering deterrents to the successful implementation and enforcement of the I4.0 initiative in European countries. The factors of successful implementation of I4.0 initiatives in the EU countries were analyzed. Drawing on the analysis of the European experience of digital transformations in industry and national economies in general, the necessity of critical focus of such transformations in Ukraine was highlighted, and the need for state support of industrial transformation was substantiated. The emphasis was placed on the cooperation development between stakeholders within the implementation of Industry 4.0 – it is necessary to create national and regional 4.0 platforms, following the example of EU countries, which would bring together government institutions, businesses, and academics. The successful positioning of the Ukrainian modern industrial complex on the world markets depends on the high level of the interconnected system providing factors that characterize its development process. Considering the influence of a list of inhibiting factors on implementing the country’s industry accelerated development, a set of measures needed to transform Ukraine’s industry based on European experience was substantiated.


Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 507
Author(s):  
Piotr Białczak ◽  
Wojciech Mazurczyk

Malicious software utilizes HTTP protocol for communication purposes, creating network traffic that is hard to identify as it blends into the traffic generated by benign applications. To this aim, fingerprinting tools have been developed to help track and identify such traffic by providing a short representation of malicious HTTP requests. However, currently existing tools do not analyze all information included in the HTTP message or analyze it insufficiently. To address these issues, we propose Hfinger, a novel malware HTTP request fingerprinting tool. It extracts information from the parts of the request such as URI, protocol information, headers, and payload, providing a concise request representation that preserves the extracted information in a form interpretable by a human analyst. For the developed solution, we have performed an extensive experimental evaluation using real-world data sets and we also compared Hfinger with the most related and popular existing tools such as FATT, Mercury, and p0f. The conducted effectiveness analysis reveals that on average only 1.85% of requests fingerprinted by Hfinger collide between malware families, what is 8–34 times lower than existing tools. Moreover, unlike these tools, in default mode, Hfinger does not introduce collisions between malware and benign applications and achieves it by increasing the number of fingerprints by at most 3 times. As a result, Hfinger can effectively track and hunt malware by providing more unique fingerprints than other standard tools.


Author(s):  
Gaby Joe Hannoun ◽  
Pamela Murray-Tuite ◽  
Kevin Heaslip ◽  
Thidapat Chantem

This paper introduces a semi-automated system that facilitates emergency response vehicle (ERV) movement through a transportation link by providing instructions to downstream non-ERVs. The proposed system adapts to information from non-ERVs that are nearby and downstream of the ERV. As the ERV passes stopped non-ERVs, new non-ERVs are considered. The proposed system sequentially executes integer linear programs (ILPs) on transportation link segments with information transferred between optimizations to ensure ERV movement continuity. This paper extends a previously developed mathematical program that was limited to a single short segment. The new approach limits runtime overhead without sacrificing effectiveness and is more suitable to dynamic systems. It also accommodates partial market penetration of connected vehicles using a heuristic reservation approach, making the proposed system beneficial in the short-term future. The proposed system can also assign the ERV to a specific lateral position at the end of the link, a useful capability when next entering an intersection. Experiments were conducted to develop recommendations to reduce computation times without compromising efficiency. When compared with the current practice of moving to the nearest edge, the system reduces ERV travel time an average of 3.26 s per 0.1 mi and decreases vehicle interactions.


Author(s):  
Martyna Daria Swiatczak

AbstractThis study assesses the extent to which the two main Configurational Comparative Methods (CCMs), i.e. Qualitative Comparative Analysis (QCA) and Coincidence Analysis (CNA), produce different models. It further explains how this non-identity is due to the different algorithms upon which both methods are based, namely QCA’s Quine–McCluskey algorithm and the CNA algorithm. I offer an overview of the fundamental differences between QCA and CNA and demonstrate both underlying algorithms on three data sets of ascending proximity to real-world data. Subsequent simulation studies in scenarios of varying sample sizes and degrees of noise in the data show high overall ratios of non-identity between the QCA parsimonious solution and the CNA atomic solution for varying analytical choices, i.e. different consistency and coverage threshold values and ways to derive QCA’s parsimonious solution. Clarity on the contrasts between the two methods is supposed to enable scholars to make more informed decisions on their methodological approaches, enhance their understanding of what is happening behind the results generated by the software packages, and better navigate the interpretation of results. Clarity on the non-identity between the underlying algorithms and their consequences for the results is supposed to provide a basis for a methodological discussion about which method and which variants thereof are more successful in deriving which search target.


Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3864
Author(s):  
Tarek Ghoul ◽  
Tarek Sayed

Speed advisories are used on highways to inform vehicles of upcoming changes in traffic conditions and apply a variable speed limit to reduce traffic conflicts and delays. This study applies a similar concept to intersections with respect to connected vehicles to provide dynamic speed advisories in real-time that guide vehicles towards an optimum speed. Real-time safety evaluation models for signalized intersections that depend on dynamic traffic parameters such as traffic volume and shock wave characteristics were used for this purpose. The proposed algorithm incorporates a rule-based approach alongside a Deep Deterministic Policy Gradient reinforcement learning technique (DDPG) to assign ideal speeds for connected vehicles at intersections and improve safety. The system was tested on two intersections using real-world data and yielded an average reduction in traffic conflicts ranging from 9% to 23%. Further analysis was performed to show that the algorithm yields tangible results even at lower market penetration rates (MPR). The algorithm was tested on the same intersection with different traffic volume conditions as well as on another intersection with different physical constraints and characteristics. The proposed algorithm provides a low-cost approach that is not computationally intensive and works towards optimizing for safety by reducing rear-end traffic conflicts.


2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Shan Fang ◽  
Lan Yang ◽  
Tianqi Wang ◽  
Shoucai Jing

Traffic lights force vehicles to stop frequently at signalized intersections, which leads to excessive fuel consumption, higher emissions, and travel delays. To address these issues, this study develops a trajectory planning method for mixed vehicles at signalized intersections. First, we use the intelligent driver car-following model to analyze the string stability of traffic flow upstream of the intersection. Second, we propose a mixed-vehicle trajectory planning method based on a trigonometric model that considers prefixed traffic signals. The proposed method employs the proportional-integral-derivative (PID) model controller to simulate the trajectory when connected vehicles (equipped with internet access) follow the optimal advisory speed. Essentially, only connected vehicle trajectories need to be controlled because normal vehicles simply follow the connected vehicles according to the Intelligent Driver Model (IDM). The IDM model aims to minimize traffic oscillation and ensure that all vehicles pass the signalized intersection without stopping. The results of a MATLAB simulation indicate that the proposed method can reduce fuel consumption and NOx, HC, CO2, and CO concentrations by 17%, 22.8%, 17.8%, 17%, and 16.9% respectively when the connected vehicle market penetration is 50 percent.


2016 ◽  
Vol 12 (2) ◽  
pp. 126-149 ◽  
Author(s):  
Masoud Mansoury ◽  
Mehdi Shajari

Purpose This paper aims to improve the recommendations performance for cold-start users and controversial items. Collaborative filtering (CF) generates recommendations on the basis of similarity between users. It uses the opinions of similar users to generate the recommendation for an active user. As a similarity model or a neighbor selection function is the key element for effectiveness of CF, many variations of CF are proposed. However, these methods are not very effective, especially for users who provide few ratings (i.e. cold-start users). Design/methodology/approach A new user similarity model is proposed that focuses on improving recommendations performance for cold-start users and controversial items. To show the validity of the authors’ similarity model, they conducted some experiments and showed the effectiveness of this model in calculating similarity values between users even when only few ratings are available. In addition, the authors applied their user similarity model to a recommender system and analyzed its results. Findings Experiments on two real-world data sets are implemented and compared with some other CF techniques. The results show that the authors’ approach outperforms previous CF techniques in coverage metric while preserves accuracy for cold-start users and controversial items. Originality/value In the proposed approach, the conditions in which CF is unable to generate accurate recommendations are addressed. These conditions affect CF performance adversely, especially in the cold-start users’ condition. The authors show that their similarity model overcomes CF weaknesses effectively and improve its performance even in the cold users’ condition.


Sign in / Sign up

Export Citation Format

Share Document