[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,075)

Search Parameters:
Keywords = vehicular networks

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 4644 KiB  
Article
Sustainable Planning of Electric Vehicle Charging Stations: A Bi-Level Optimization Framework for Reducing Vehicular Emissions in Urban Road Networks
by Sania E. Seilabi, Mohammadhosein Pourgholamali, Mohammad Miralinaghi, Gonçalo Homem de Almeida Correia, Zongzhi Li and Samuel Labi
Sustainability 2025, 17(1), 1; https://doi.org/10.3390/su17010001 - 24 Dec 2024
Abstract
This paper proposes a decision-making framework for a multiple-period planning of electric vehicle (EV) charging station development. In this proposed framework, transportation planners seek to implement a phased provision of electric charging stations as well as repurposing gas stations at selected locations. The [...] Read more.
This paper proposes a decision-making framework for a multiple-period planning of electric vehicle (EV) charging station development. In this proposed framework, transportation planners seek to implement a phased provision of electric charging stations as well as repurposing gas stations at selected locations. The developed framework is presented as a bi-level optimization problem that determines the optimal electric charging network design while capturing the practical constraints and travelers’ decisions. The upper level minimizes overall vehicle CO emissions by selecting optimal charging stations and their capacities, while the lower-level models travelers’ choices of vehicle class (EV or conventional) and travel routes. A genetic algorithm is developed to solve this problem. The results of the numerical experiments describe the sensitive nature of EV market penetration rates in the urban traffic stream and overall vehicle CO emissions to EV charging station availability and capacity. The findings can assist transportation agencies in designing effective EV charging infrastructure by identifying optimal locations and capacities, as well as in creating policies to encourage EV use over time. This study supports broader efforts to reduce air pollution and promote sustainable transportation by promoting EV adoption in the long term. Full article
Show Figures

Figure 1

Figure 1
<p>The bi-level structure of the developed framework.</p>
Full article ">Figure 2
<p>Schematic Sioux Falls roadway network and candidate nodes for new electric charging station construction.</p>
Full article ">Figure 3
<p>Convergence of solution algorithm.</p>
Full article ">Figure 4
<p>Constructed electric charging stations under different budget scenarios. (<b>a</b>) Medium-budget scenario. (<b>b</b>) High-budget scenario. (<b>c</b>) Low-budget scenario.</p>
Full article ">Figure 5
<p>Emissions rates under the budget scenarios.</p>
Full article ">Figure 6
<p>EV market penetration rates under different construction budget levels.</p>
Full article ">Figure 7
<p>Constructed charging stations for each level of EV driving range. (<b>a</b>) Driving range: 12 miles. (<b>b</b>) Driving range: 15 miles. (<b>c</b>) Driving range: 25 miles.</p>
Full article ">Figure 8
<p>EV market penetration rates under different EV driving ranges.</p>
Full article ">Figure 9
<p>Emissions rates under different driving ranges.</p>
Full article ">Figure 10
<p>Average travel costs of travelers in Class 2 of ICVs under different electric charging station construction budgets.</p>
Full article ">
28 pages, 1588 KiB  
Article
Sybil Attack-Resistant Blockchain-Based Proof-of-Location Mechanism with Privacy Protection in VANET
by Narayan Khatri, Sihyung Lee and Seung Yeob Nam
Sensors 2024, 24(24), 8140; https://doi.org/10.3390/s24248140 - 20 Dec 2024
Viewed by 276
Abstract
In this paper, we propose a Proof-of-Location (PoL)-based location verification scheme for mitigating Sybil attacks in vehicular ad hoc networks (VANETs). For this purpose, we employ smart contracts for storing the location information of the vehicles. This smart contract is maintained by Road [...] Read more.
In this paper, we propose a Proof-of-Location (PoL)-based location verification scheme for mitigating Sybil attacks in vehicular ad hoc networks (VANETs). For this purpose, we employ smart contracts for storing the location information of the vehicles. This smart contract is maintained by Road Side Units (RSUs) and acts as a ground truth for verifying the position information of the neighboring vehicles. To avoid the storage of fake location information inside the smart contract, vehicles need to solve unique computational puzzles generated by the neighboring RSUs in a limited time frame whenever they need to report their location information. Assuming a vehicle has a single Central Processing Unit (CPU) and parallel processing is not allowed, it can solve a single computational puzzle in a given time period. With this approach, the vehicles with multiple fake identities are prevented from solving multiple puzzles at a time. In this way, we can mitigate a Sybil attack and avoid the storage of fake location information in a smart contract table. Furthermore, the RSUs maintain a dedicated blockchain for storing the location information of neighboring vehicles. They take part in mining for the purpose of storing the smart contract table in the blockchain. This scheme guarantees the privacy of the vehicles, which is achieved with the help of a PoL privacy preservation mechanism. The verifier can verify the locations of the vehicles without revealing their privacy. Experimental results show that the proposed mechanism is effective in mitigating Sybil attacks in VANET. According to the experiment results, our proposed scheme provides a lower fake location registration probability, i.e., lower than 10%, compared to other existing approaches. Full article
(This article belongs to the Special Issue AI-Based Security and Privacy for IoT Applications)
Show Figures

Figure 1

Figure 1
<p>The system framework of the proposed work.</p>
Full article ">Figure 2
<p>Flowchart describing the outline of the proposed PoL scheme.</p>
Full article ">Figure 3
<p>Message exchanges between vehicle, RSU, smart contract, and verifier.</p>
Full article ">Figure 4
<p>Distance traversed by a vehicle when the communication range of the RSU and the distance between the RSU and the road is given.</p>
Full article ">Figure 5
<p>Vehicle registration in the Ethereum test network.</p>
Full article ">Figure 6
<p>Remix IDE environment for VANET blockchain.</p>
Full article ">Figure 7
<p>Execution logs for vehicle registration.</p>
Full article ">Figure 8
<p>Transaction cost and Gas cost for smart contract functions.</p>
Full article ">Figure 9
<p>Map of Erlangen used for VANET traffic generation.</p>
Full article ">Figure 10
<p>Sampling probability vs. polling interval (sampling time = 1 s, D = number of leading zeros of the difficulty target).</p>
Full article ">Figure 11
<p>Sampling probability (polling interval = 30 s).</p>
Full article ">Figure 12
<p>Fake location registration probability comparison (polling interval = 30 s) [<a href="#B20-sensors-24-08140" class="html-bibr">20</a>].</p>
Full article ">Figure 13
<p>Malicious block insertion probability comparison [<a href="#B20-sensors-24-08140" class="html-bibr">20</a>].</p>
Full article ">Figure 14
<p>Event message propagation delay [<a href="#B17-sensors-24-08140" class="html-bibr">17</a>,<a href="#B19-sensors-24-08140" class="html-bibr">19</a>].</p>
Full article ">
20 pages, 308 KiB  
Article
Enhancing Autonomous Vehicle Safety with Blockchain Technology: Securing Vehicle Communication and AI Systems
by Stefan Iordache, Catalina Camelia Patilea and Ciprian Paduraru
Future Internet 2024, 16(12), 471; https://doi.org/10.3390/fi16120471 - 18 Dec 2024
Viewed by 306
Abstract
In recent years, the rapid development of autonomous vehicles (AVs) has brought new challenges in terms of data security, privacy, and communication integrity. Our research investigates the potential of blockchain technology to improve the security of AVs by securing vehicle communication systems. By [...] Read more.
In recent years, the rapid development of autonomous vehicles (AVs) has brought new challenges in terms of data security, privacy, and communication integrity. Our research investigates the potential of blockchain technology to improve the security of AVs by securing vehicle communication systems. By integrating blockchain with AI-based predictive algorithms, this approach aims to secure vehicle peer-to-peer communication, reduce traffic congestion, and improve safety for drivers and pedestrians. Blockchain’s decentralized ledger ensures the integrity of data exchange between vehicles and smart city infrastructure and mitigates the risks of cyberattacks such as data manipulation and identity forgery. This paper also examines recent advances in vehicular ad hoc networks (VANETs) and vehicular social networks (VSNs), and it demonstrates how the immutability and cryptographic security of the blockchain can strengthen AV systems. The proposed architecture not only protects user privacy but also decentralizes access to critical data needed for AI-driven decisions, ultimately promoting a safer and more reliable environment for autonomous vehicles. Full article
Show Figures

Figure 1

Figure 1
<p>Fog computing architecture with three layers: cloud layer (<b>top</b>) for centralized storage and large-scale processing; fog layer (<b>center</b>) for decentralized computation closer to data sources; and edge layer (<b>bottom</b>) for end devices like vehicles generating and collecting data.</p>
Full article ">Figure 2
<p>Types of denial-of-service (DoS) attacks in vehicular communication systems: (a) packet flooding, (b) V2V radio jamming, and (c) V2I radio jamming.</p>
Full article ">Figure 3
<p>Illustration of a Sybil attack in a vehicular network. A malicious vehicle (red car) creates multiple fake identities to inject false information into the network, misleading nearby vehicles and disrupting communication. Examples include spoofed hazard warnings, false location data, and network congestion, which compromise the safety and trustworthiness of vehicle-to-vehicle (V2V) communication.</p>
Full article ">
20 pages, 2546 KiB  
Article
Enhancing Vehicle Location Prediction Accuracy with Road-Aware Rectification for Multi-Access Edge Computing Applications
by Asif Mehmood, Afaq Muhammad, Faisal Mehmood and Wang-Cheol Song
Mathematics 2024, 12(24), 3980; https://doi.org/10.3390/math12243980 - 18 Dec 2024
Viewed by 283
Abstract
In future 6G networks, real-time and accurate vehicular data are key requirements for enhancing the data-driven multi-access edge computing (MEC) applications. Existing estimation techniques to forecast vehicle position aim to meet the real-time data needs but compromise accuracy due to a lack of [...] Read more.
In future 6G networks, real-time and accurate vehicular data are key requirements for enhancing the data-driven multi-access edge computing (MEC) applications. Existing estimation techniques to forecast vehicle position aim to meet the real-time data needs but compromise accuracy due to a lack of context awareness. While algorithms such as the Kalman filter improve estimation accuracy by considering certainty-grading and current-state estimate of measurements, they do not include the road context, which is vital for more accurate predictions. Unfortunately, current implementations of linear Kalman filters are not road-aware and struggle to predict a two-dimensional movement accurately. To this end, we propose a significant road-aware rectification-assisted prediction mechanism that enhances the modified Kalman filter predictions by incorporating road awareness. The parameters used for the Kalman filter include vehicle location, angle, speed, and time. In contrast, road-aware location rectification incorporates predicted location and lane shape, increasing the accuracy and precision of vehicle location predictions, reaching up to 99.9%. Performance is evaluated by comparing actual, predicted, and rectified vehicular traces at different speeds. The results demonstrate that the prediction error is approximately 0.005, while the proposed rectification process further reduces the error to 0.001, highlighting the effectiveness of the proposed approach. Overall, results support the idea of provisioning accurate, proactive, and real-time vehicular location data at the edge using a road-aware approach, thereby revolutionizing 6G vehicle location provisioning in MEC. Full article
Show Figures

Figure 1

Figure 1
<p>Proposed modified Kalman filter and its interworking. The process includes Step 0: initialization, Step 1: measurement (update), Step 2: state update (Kalman gain calculation), Step 3: prediction (updates in latitude and longitude), and Step 4: rectification (updates in latitude and longitude for enhanced accuracy). The black and white arrows indicate the sequence of steps in the process, while the yellow dashed lines represent the flow of vehicular and road data provision and movement.</p>
Full article ">Figure 2
<p>ERD of vTrachea-Store supporting road-awareness into the modified Kalman filter.</p>
Full article ">Figure 3
<p>Illustration highlighting the key differences between prediction and rectification.</p>
Full article ">Figure 4
<p>Comparison between predicted and rectified trajectories. The orange dashed frame highlights significant discrepancies in the predicted path and the corresponding corrections applied by the modified Kalman filter for improved accuracy.</p>
Full article ">
22 pages, 4303 KiB  
Article
Extending WSN Lifetime with Enhanced LEACH Protocol in Autonomous Vehicle Using Improved K-Means and Advanced Cluster Configuration Algorithms
by Cheolhee Yoon, Seongsoo Cho and Yeonwoo Lee
Appl. Sci. 2024, 14(24), 11720; https://doi.org/10.3390/app142411720 - 16 Dec 2024
Viewed by 333
Abstract
In this paper, we propose an enhanced clustering protocol that integrates an improved K-means with a Mobility-Aware Cluster Head-Election Scored (IK-MACHES) algorithm, designed for extending the lifetime and operational efficiency of Wireless Sensor Network (WSN) with mobility. Variety approaches applying Low Energy Adaptive [...] Read more.
In this paper, we propose an enhanced clustering protocol that integrates an improved K-means with a Mobility-Aware Cluster Head-Election Scored (IK-MACHES) algorithm, designed for extending the lifetime and operational efficiency of Wireless Sensor Network (WSN) with mobility. Variety approaches applying Low Energy Adaptive Clustering Hierarchy (LEACH) often struggle to manage optimal energy distribution due to their static clustering and limited cluster head (CH) selection criteria, primarily focusing on the proximity of residual energy or distance. Thus, this paper proposes an algorithm that takes into account both the residual energy of sensor nodes and the distance between the cluster’s central point to the base station (BS), which ultimately enhances the network’s lifetime. Additionally, our approach incorporates mobility considerations, enhancing the adaptability of the mobility environments, such as autonomous vehicular networks. Our proposed method first constructs the cluster’s configuration and then elects the CH applying an improved K-means clustering algorithm—one of the machine learning methods—integrated with a proposed IK-MACHES mechanism. Three CH scoring strategies in the proposed IK-MACHES protocol evaluate the residual energy of the nodes, their distance to the BS and the cluster central point, and relative node’s mobility. The simulation results demonstrate that the proposed approach improves performance in terms of the first node dead (FND) and 80% alive nodes metrics with mobility, compared to other LEACH protocols such as classical LEACH, LEACH-B, Improved-LEACH, LEACH with K-means, Particle Swarm Optimization (PSO), and LEACH-GK protocol, thereby enhancing network lifetime through optimal CH selection. Full article
Show Figures

Figure 1

Figure 1
<p>The formation for the cluster round in the LEACH protocol and the architecture of LEACH for the WSN.</p>
Full article ">Figure 2
<p>An illustration of the 200 <math display="inline"><semantics> <mrow> <msup> <mrow> <mi mathvariant="normal">m</mi> </mrow> <mrow> <mn>2</mn> </mrow> </msup> </mrow> </semantics></math> network area simulation setup with distributed sensor nodes, the CH, and the BS and the autonomous vehicle with a sensor node for each scenario; the BS location at (100 m, 300 m) for Scenario 1 and at (100 m, 100 m) for Scenario 2.</p>
Full article ">Figure 3
<p>Clustering results with distributed sensor nodes, CHs, and BS, after initial K-means clustering simulation for each scenario; BS location at (100 m, 300 m) for Scenario 1 and at (100 m, 100 m) for Scenario 2, respectively.</p>
Full article ">Figure 4
<p>Clustering and alive sensor nodes’ map for a BS located at (100 m, 300 m) scenario; showing the decline to 80, 50, and 20 active nodes at rounds 262, 569, and 1003, respectively.</p>
Full article ">Figure 5
<p>Clustering and alive sensor nodes’ map for a BS located at (100 m, 100 m) scenario; showing the decline to 80, 50, and 20 active nodes at rounds 1443, 1621, and 1702, respectively.</p>
Full article ">Figure 6
<p>Simulation result of network lifetime with alive nodes graph for each round with no mobility: (<b>a</b>) Scenario 1 (BS = 100 m, 300 m), (<b>b</b>) Scenario 2 (BS = 100 m, 100 m).</p>
Full article ">Figure 7
<p>The simulation result of the network lifetime with an alive node graph for each round, with a maximum mobility range of up to 10 m/round: (<b>a</b>) Scenario 1 (BS = 100 m, 300 m), (<b>b</b>) Scenario 2 (BS = 100 m, 100 m).</p>
Full article ">Figure 8
<p>Comparison of residual energy of nodes after 100 rounds, 500 rounds, and 1000 rounds for Scenario 1 (BS = 100 m, 300 m) with mobility: (<b>a</b>) no mobility and (<b>b</b>) maximum mobility range (10 m/round), depicting how energy sustainability varies by scenario.</p>
Full article ">Figure 9
<p>Comparison of residual energy of nodes after 100 rounds, 500 rounds, and 1000 rounds for Scenario 2 (BS = 100 m, 100 m) with mobility: (<b>a</b>) no mobility and (<b>b</b>) maximum mobility range (10 m/round), depicting how energy sustainability varies by scenario.</p>
Full article ">
13 pages, 548 KiB  
Article
Age of Information Analysis for Multi-Priority Queue and Non-Orthoganal Multiple Access (NOMA)-Enabled Cellular Vehicle-to-Everything in Internet of Vehicles
by Zheng Zhang, Qiong Wu, Pingyi Fan and Qiang Fan
Sensors 2024, 24(24), 7966; https://doi.org/10.3390/s24247966 - 13 Dec 2024
Viewed by 402
Abstract
With the development of Internet of Vehicles (IoV) technology, the need for real-time data processing and communication in vehicles is increasing. Traditional request-based methods face challenges in terms of latency and bandwidth limitations. Mode 4 in cellular vehicle-to-everything (C-V2X), also known as autonomous [...] Read more.
With the development of Internet of Vehicles (IoV) technology, the need for real-time data processing and communication in vehicles is increasing. Traditional request-based methods face challenges in terms of latency and bandwidth limitations. Mode 4 in cellular vehicle-to-everything (C-V2X), also known as autonomous resource selection, aims to address latency and overhead issues by dynamically selecting communication resources based on real-time conditions. However, semi-persistent scheduling (SPS), which relies on distributed sensing, may lead to a high number of collisions due to the lack of centralized coordination in resource allocation. On the other hand, non-orthogonal multiple access (NOMA) can alleviate the problem of reduced packet reception probability due to collisions. Age of Information (AoI) includes the time a message spends in both local waiting and transmission processes and thus is a comprehensive metric for reliability and latency performance. To address these issues, in C-V2X, the waiting process can be extended to the queuing process, influenced by packet generation rate and resource reservation interval (RRI), while the transmission process is mainly affected by transmission delay and success rate. In fact, a smaller selection window (SW) limits the number of available resources for vehicles, resulting in higher collisions when the number of vehicles is increasing rapidly. SW is generally equal to RRI, which not only affects the AoI part in the queuing process but also the AoI part in the transmission process. Therefore, this paper proposes an AoI estimation method based on multi-priority data type queues and considers the influence of NOMA on the AoI generated in both processes in C-V2X system under different RRI conditions. Our experiments show that using multiple priority queues can reduce the AoI of urgent messages in the queue, thereby providing better service about the urgent message in the whole vehicular network. Additionally, applying NOMA can further reduce the AoI of the messages received by the vehicle. Full article
Show Figures

Figure 1

Figure 1
<p>System model.</p>
Full article ">Figure 2
<p>AvgAoI in different queues.</p>
Full article ">Figure 3
<p>AvgAoI in queues.</p>
Full article ">Figure 4
<p><math display="inline"><semantics> <msub> <mi>N</mi> <mi>v</mi> </msub> </semantics></math> = 30.</p>
Full article ">Figure 5
<p><math display="inline"><semantics> <msub> <mi>N</mi> <mi>v</mi> </msub> </semantics></math> = 50.</p>
Full article ">
25 pages, 1778 KiB  
Article
Efficient User Pairing and Resource Optimization for NOMA-OMA Switching Enabled Dynamic Urban Vehicular Networks
by Aravindh Balaraman, Shigeo Shioda, Yonggang Kim, Yohan Kim and Taewoon Kim
Electronics 2024, 13(23), 4834; https://doi.org/10.3390/electronics13234834 - 7 Dec 2024
Viewed by 471
Abstract
Vehicular communication is revolutionizing transportation by enhancing passenger experience and improving safety through seamless message exchanges with nearby vehicles and roadside units (RSUs). To accommodate the growing number of vehicles in dense urban traffic with limited channel availability, non-orthogonal multiple access (NOMA) is [...] Read more.
Vehicular communication is revolutionizing transportation by enhancing passenger experience and improving safety through seamless message exchanges with nearby vehicles and roadside units (RSUs). To accommodate the growing number of vehicles in dense urban traffic with limited channel availability, non-orthogonal multiple access (NOMA) is a promising solution due to its ability to improve spectral efficiency by sharing channels among multiple users. However, to completely leverage NOMA on mobile vehicular networks, a chain of operations and resources must be optimized, including vehicle user (VU) and RSU association, channel assignment, and optimal power control. In contrast, traditional orthogonal multiple access (OMA) allocates separate channels to users, simplifying management but falling short in high-density environments. Additionally, enabling NOMA-OMA switching can further enhance the system performance while significantly increasing the complexity of the optimization task. In this study, we propose an optimized framework to jointly utilize the power domain NOMA in a vehicular network, where dynamic NOMA-OMA switching is enabled, by integrating the optimization of vehicle-to-RSU association, channel assignment, NOMA-OMA switching, and transmit power allocation into a single solution. To handle the complexity of these operations, we also propose simplified formulations that make the solution practical for real-time applications. The proposed framework reduces total power consumption by up to 27% compared to Util&LB/opt, improves fairness in user association by 18%, and operates efficiently with minimal computational overhead. These findings highlight the potential of the proposed framework to enhance communication performance in dynamic, densely populated urban environments. Full article
(This article belongs to the Special Issue Wireless Sensor Network: Latest Advances and Prospects)
Show Figures

Figure 1

Figure 1
<p>Assumed power domain NOMA system where a vehicular user receives downlink service from its associated roadside unit with dynamic NOMA-OMA switching and resource optimization.</p>
Full article ">Figure 2
<p>Flowchart of the proposed approach that consists of two phases to jointly optimize association, channel assignment, NOMA-OMA switching and transmit power allocation.</p>
Full article ">Figure 3
<p>An example urban intersection road scenario with five RSUs and twenty vehicle users denoted by black circles and red triangles, respectively.</p>
Full article ">Figure 4
<p>Mean total power consumption for a simple and stationary configuration with a single channel with respect to the number of VUs on the network.</p>
Full article ">Figure 5
<p>Mean association fairness performance for a simple, stationary configuration with a single channel with respect to the number of VUs on the network.</p>
Full article ">Figure 6
<p>Mean proportion of the NOMA channels for a simple, stationary configuration with a single channel with respect to the number of VUs on the network.</p>
Full article ">Figure 7
<p>Mean total power consumption for a complex, stationary configuration with twenty VUs and three channels.</p>
Full article ">Figure 8
<p>Mean association fairness performance for a complex, stationary configuration with twenty VUs and three channels.</p>
Full article ">Figure 9
<p>Mean proportion of the NOMA channels for a complex, stationary configuration with twenty VUs and three channels.</p>
Full article ">Figure 10
<p>Accumulated total power consumption for a long-term complex, mobile configuration with twenty VUs and three channels where each time step spans 100 ms.</p>
Full article ">Figure 11
<p>Comparison of the time taken to solve the considered problems with varying numbers of vehicular users on a single-channel stationary configuration.</p>
Full article ">Figure 12
<p>Comparison of the time taken to solve the considered problems with twenty users on a three-channel mobile and stationary configuration.</p>
Full article ">
17 pages, 11774 KiB  
Article
Hierarchical Federated Learning-Based Intrusion Detection for In-Vehicle Networks
by Muzun Althunayyan, Amir Javed, Omer Rana and Theodoros Spyridopoulos
Future Internet 2024, 16(12), 451; https://doi.org/10.3390/fi16120451 - 3 Dec 2024
Viewed by 496
Abstract
Intrusion detection systems (IDSs) are crucial for identifying cyberattacks on in-vehicle networks. To enhance IDS robustness and preserve user data privacy, researchers are increasingly adopting federated learning (FL). However, traditional FL-based IDSs depend on a single central aggregator, creating performance bottlenecks and introducing [...] Read more.
Intrusion detection systems (IDSs) are crucial for identifying cyberattacks on in-vehicle networks. To enhance IDS robustness and preserve user data privacy, researchers are increasingly adopting federated learning (FL). However, traditional FL-based IDSs depend on a single central aggregator, creating performance bottlenecks and introducing a single point of failure, thereby compromising robustness and scalability. To address these limitations, this paper proposes a Hierarchical Federated Learning (H-FL) framework to deploy and evaluate the performance of the IDS. The H-FL framework incorporates multiple edge aggregators alongside the central aggregator, mitigating single-point failure risks, improving scalability, and efficiently distributing computational load. We evaluate the proposed IDS using the H-FL framework on two car hacking datasets under realistic non-independent and identically distributed (non-IID) data scenarios. Experimental results demonstrate that deploying the IDS within an H-FL framework can enhance the F1-score by up to 10.63%, addressing the limitations of edge-FL in dataset diversity and attack coverage. Notably, H-FL improved the F1-score in 16 out of 24 evaluated scenarios. By enabling the IDS to learn from diverse data, driving conditions, and evolving threats, this approach substantially strengthens cybersecurity in modern vehicular systems. Full article
(This article belongs to the Special Issue IoT Security: Threat Detection, Analysis and Defense)
Show Figures

Figure 1

Figure 1
<p>Cloud-based FL and H-FL.</p>
Full article ">Figure 2
<p>Architecture of the proposed H-FL method.</p>
Full article ">Figure 3
<p>H-FL environment in Flower.</p>
Full article ">Figure 4
<p>Workflow of the proposed multistage in-vehicle IDS.</p>
Full article ">Figure 5
<p>Data partitioning.</p>
Full article ">Figure 6
<p>Horizontal CAN bus data.</p>
Full article ">Figure 7
<p>Dataset distribution based on Dirichlet <math display="inline"><semantics> <mrow> <mo>(</mo> <mi>μ</mi> <mo>)</mo> </mrow> </semantics></math> distribution.</p>
Full article ">Figure 8
<p>Average F1-score results non-IID levels across communication rounds for car hacking dataset [<a href="#B29-futureinternet-16-00451" class="html-bibr">29</a>].</p>
Full article ">Figure 9
<p>F1-score of ANN model for different non-IID levels across communication rounds.</p>
Full article ">Figure 10
<p>F1-score of our proposed multistage-IDS for different non-IID levels across communication rounds.</p>
Full article ">Figure 11
<p>Distributed loss across communication rounds.</p>
Full article ">Figure 12
<p>Average F1-score results non-IID levels across communication rounds for car hacking: Attack &amp; Defense Challenge 2020 dataset [<a href="#B26-futureinternet-16-00451" class="html-bibr">26</a>].</p>
Full article ">
28 pages, 4680 KiB  
Article
Scheduling a Fleet of Dynamic EV Chargers for Maximal Profile
by Shorooq Alaskar and Mohamed Younis
Energies 2024, 17(23), 6009; https://doi.org/10.3390/en17236009 - 29 Nov 2024
Viewed by 317
Abstract
The proliferation of electric vehicles (EVs) faces obstacles like range anxiety and inadequate charging infrastructure. To address these challenges, dynamic EV-to-EV charging technology has emerged. This innovative method enables one EV with surplus battery to charge another EV while both are in motion. [...] Read more.
The proliferation of electric vehicles (EVs) faces obstacles like range anxiety and inadequate charging infrastructure. To address these challenges, dynamic EV-to-EV charging technology has emerged. This innovative method enables one EV with surplus battery to charge another EV while both are in motion. This study focuses on efficiently pairing and routing energy suppliers (ESs) to meet energy requesters (ERs) and transfer energy via platooning. The key objective is to manage the ES fleet effectively, framed as a vehicle routing problem, to maximize profit by serving as many energy requests as possible. We formulate the problem as an integer programming model within a time-space network and propose a local search-based heuristic algorithm designed to efficiently handle large-scale networks. Numerical experiments conducted on Sioux Falls validate the efficacy of our approach, allowing for an assessment of algorithm performance under realistic large-scale conditions. The findings illustrate enhancements in ER travel time and energy overhead, alongside maximized profits for ESs. Full article
Show Figures

Figure 1

Figure 1
<p>Illustrating the rolling plan.</p>
Full article ">Figure 2
<p>Neighborhood movements: (<b>a</b>) Shift move, (<b>b</b>) Swap move, (<b>c</b>) Swap move for a supplier, (<b>d</b>) Insert-unassigned move.</p>
Full article ">Figure 3
<p>Comparison of (<b>a</b>) the average VKT and (<b>b</b>) travel time of V2V and CS-based charging.</p>
Full article ">Figure 4
<p>Average profit cost comparison.</p>
Full article ">Figure 5
<p>Average overhead cost comparison.</p>
Full article ">Figure 6
<p>Average profit cost comparison with a baseline approach of reference [<a href="#B48-energies-17-06009" class="html-bibr">48</a>].</p>
Full article ">Figure 7
<p>Average overhead cost comparison with a baseline approach of reference [<a href="#B48-energies-17-06009" class="html-bibr">48</a>].</p>
Full article ">Figure 8
<p>Average profit comparison considering different waiting factors.</p>
Full article ">Figure 9
<p>Average overhead cost comparison considering different waiting factors.</p>
Full article ">Figure 10
<p>Service rate comparison per ES.</p>
Full article ">Figure 11
<p>ES battery inventory analysis.</p>
Full article ">
25 pages, 7806 KiB  
Article
Transfer Reconstruction from High-Frequency to Low-Frequency Bridge Responses Under Vehicular Loading with a ResNet
by Xuzhao Lu, Chenxi Wei, Limin Sun, Ye Xia and Wei Zhang
Appl. Sci. 2024, 14(23), 10927; https://doi.org/10.3390/app142310927 - 25 Nov 2024
Viewed by 493
Abstract
The reconstruction of bridge responses has been a significant area of focus within the field of structural health monitoring. This process entails the cross-reconstruction of responses from various cross-sections to identify any anomalies at specific locations, which may indicate the presence of structural [...] Read more.
The reconstruction of bridge responses has been a significant area of focus within the field of structural health monitoring. This process entails the cross-reconstruction of responses from various cross-sections to identify any anomalies at specific locations, which may indicate the presence of structural defects. Traditional research has concentrated on simulating the relationships between different cross-sections for both high- and low-frequency components in isolation. However, this study introduces an innovative approach using a residual network (ResNet) to reconstruct high-frequency bridge responses under vehicular loading and demonstrates its applicability to low-frequency response reconstruction as well. The theoretical basis of this method is established through an analysis of the dynamics within a simplified vehicle-bridge-interaction (VBI) system. This analysis reveals that the transfer matrices for both high- and low-frequency components remain consistent across various loading conditions. Then, a data interception technique is introduced to separate high-frequency, low-frequency, and temperature-related components based on their spectral characteristics. The ResNet modeled the inter-sectional relationships of the high-frequency components and was then used to reconstruct the low-frequency responses under vehicular loading. The methodology was validated using a series of finite element models, confirming the uniformity of the transfer matrix between high- and low-frequency vibration components of the bridge. Field testing was also conducted to evaluate the practical effectiveness of the method. The proposed transfer–reconstruction method is expected to significantly reduce training dataset requirements compared with existing methods, thereby enhancing the efficiency of structural health monitoring systems. Full article
(This article belongs to the Special Issue Structural Health Monitoring in Bridges and Infrastructure)
Show Figures

Figure 1

Figure 1
<p>A simple VBI system [<a href="#B19-applsci-14-10927" class="html-bibr">19</a>].</p>
Full article ">Figure 2
<p>Three kinds of components in monitoring data.</p>
Full article ">Figure 3
<p>A typical band-pass filtered low-frequency time history of bridge strain: (<b>a</b>) time history; (<b>b</b>) zoomed time history (the data marked with the rectangle in (<b>a</b>) are zoomed in on (<b>b</b>)).</p>
Full article ">Figure 4
<p>An intercept method to separate temperature change-related and driving-force-induced structural responses: (<b>a</b>) moving window with 50% overlap; (<b>b</b>) STD of each window; (<b>c</b>) label and pick; (<b>d</b>) interpolate; (<b>e</b>) approximated temperature strain; (<b>f</b>) driving-force-related structural responses.</p>
Full article ">Figure 5
<p>Residual unit. [<a href="#B27-applsci-14-10927" class="html-bibr">27</a>].</p>
Full article ">Figure 6
<p>ResNet configuration.</p>
Full article ">Figure 7
<p>Flowchart of the whole algorithm.</p>
Full article ">Figure 8
<p>Finite element model of VBI system.</p>
Full article ">Figure 9
<p>Three observation points.</p>
Full article ">Figure 10
<p>Simulation result for bridge displacement at three observation points.</p>
Full article ">Figure 11
<p>Separated high−frequency and low-frequency bridge displacement at three observation points with the bandpass filter of 1 Hz: (<b>a</b>) high−frequency displacement; (<b>b</b>) low−frequency displacement.</p>
Full article ">Figure 12
<p>Comparison of low−frequency displacement at 5 m between reconstruction and FEM simulation.</p>
Full article ">Figure 13
<p>Comparison between reconstructed and simulated low−frequency responses in scenarios of lower stiffness and higher speed: (<b>a</b>) lower−stiffness scenario; (<b>b</b>) higher−speed scenario.</p>
Full article ">Figure 13 Cont.
<p>Comparison between reconstructed and simulated low−frequency responses in scenarios of lower stiffness and higher speed: (<b>a</b>) lower−stiffness scenario; (<b>b</b>) higher−speed scenario.</p>
Full article ">Figure 14
<p>Fuchang bridge and the SHM system: (<b>a</b>) target bridge; (<b>b</b>) cross-section; (<b>c</b>) layout and positions of strain gauges.</p>
Full article ">Figure 15
<p>Strain monitoring dataset for the three days (raw data, strain gauge 02-S01) The span of monitoring data for each day is 30 min).</p>
Full article ">Figure 16
<p>Another example of raw monitoring data from strain gauge 02−S01.</p>
Full article ">Figure 17
<p>Verification of synchronous vibration in different locations. (<b>a</b>–<b>c</b>): the high−frequency bridge responses at three sensors measured on 7 March; (<b>d</b>–<b>f</b>): high−frequency bridge responses at three sensors measured on 28 August; (<b>g</b>–<b>i</b>): high−frequency bridge responses at three sensors measured on 6 October. (<b>a</b>,<b>d</b>,<b>g</b>): strain time history; (<b>b</b>,<b>e</b>,<b>h</b>): zoomed strain time history; (<b>c</b>,<b>f</b>,<b>i</b>): frequency spectrum. Circle: first bridge frequency; rectangle: potential vehicle frequency).</p>
Full article ">Figure 18
<p>Reconstruction results from ResNet and true monitoring data. (Solid line: reconstruction result with ResNet; dashed line: true monitoring data).</p>
Full article ">Figure 19
<p>Frequency spectrums of high-frequency strain in reconstruction results and monitoring data: (<b>a</b>) reconstruction results; (<b>b</b>) measurement results.</p>
Full article ">Figure 20
<p>Comparison of amplitudes of the first (<b>a</b>) and second (<b>b</b>) natural frequencies between the reconstruction results (solid line) and the direct measurement data (dashed line): (<b>a</b>) first frequency; (<b>b</b>) second frequency.</p>
Full article ">Figure 21
<p>Comparison between reconstructed and measured low−frequency strain at 03−S02.</p>
Full article ">Figure 22
<p>Comparison between reconstructed and measured low−frequency strain at 03−S02 on the first day. (Solid line: reconstruction result; dashed line: measured strain).</p>
Full article ">Figure 23
<p>Comparison between the low−frequency strain reconstructed with LSTM and the measured strain at 03−S02.</p>
Full article ">Figure 24
<p>High−frequency strain time history at 03−S02.</p>
Full article ">
29 pages, 5030 KiB  
Article
The Design and Implementation of Kerberos-Blockchain Vehicular Ad-Hoc Networks Authentication Across Diverse Network Scenarios
by Maya Rahayu, Md. Biplob Hossain, Samsul Huda, Yuta Kodera, Md. Arshad Ali and Yasuyuki Nogami
Sensors 2024, 24(23), 7428; https://doi.org/10.3390/s24237428 - 21 Nov 2024
Viewed by 608
Abstract
Vehicular Ad-Hoc Networks (VANETs) play an essential role in the intelligent transportation era, furnishing users with essential roadway data to facilitate optimal route selection and mitigate the risk of accidents. However, the network exposure makes VANETs susceptible to cyber threats, making authentication crucial [...] Read more.
Vehicular Ad-Hoc Networks (VANETs) play an essential role in the intelligent transportation era, furnishing users with essential roadway data to facilitate optimal route selection and mitigate the risk of accidents. However, the network exposure makes VANETs susceptible to cyber threats, making authentication crucial for ensuring security and integrity. Therefore, joining entity verification is essential to ensure the integrity and security of communication in VANETs. However, to authenticate the entities, authentication time should be minimized to guarantee fast and secure authentication procedures. We propose an authentication system for VANETs using blockchain and Kerberos for storing authentication messages in a blockchain ledger accessible to Trusted Authentication Servers (TASs) and Roadside Units (RSUs). We evaluate the system in three diverse network scenarios: suburban, urban with 1 TAS, and urban with 2 TASs. The findings reveal that this proposal is applicable in diverse network scenarios to fulfill the network requirements, including authentication, handover, and end-to-end delay, considering an additional TAS for an increasing number of vehicles. The system is also practicable in storing the authentication message in blockchain considering the gas values and memory size for all scenarios. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>The vulnerability of VANET.</p>
Full article ">Figure 2
<p>Resume of initial authentication phase and handover process.</p>
Full article ">Figure 3
<p>Main parts of the Kerberos-blockchain VANETs system.</p>
Full article ">Figure 4
<p>Experiment case scenarios: (<b>a</b>) suburban, (<b>b</b>) urban with 1 TAS, and (<b>c</b>) urban with 2 TASs.</p>
Full article ">Figure 5
<p>Maps for the scenario of (<b>a</b>) suburban and (<b>b</b>) urban with 1 TAS and (<b>c</b>) urban with 2 TASs.</p>
Full article ">Figure 6
<p>Initial authentication phase.</p>
Full article ">Figure 7
<p>Handover signaling procedure.</p>
Full article ">Figure 8
<p>Off-chain and on-chain environment of the proposed system.</p>
Full article ">Figure 9
<p>Comparison of several delays of different scenarios.</p>
Full article ">Figure 10
<p>Signalling overhead.</p>
Full article ">Figure 11
<p>Number of vehicles vs. gas values.</p>
Full article ">Figure 12
<p>Memory size required for the block to store various authentication message.</p>
Full article ">
43 pages, 4383 KiB  
Review
Integrating UAVs and RISs in Future Wireless Networks: A Review and Tutorial on IoTs and Vehicular Communications
by Mohsen Eskandari and Andrey V. Savkin
Future Internet 2024, 16(12), 433; https://doi.org/10.3390/fi16120433 - 21 Nov 2024
Viewed by 850
Abstract
The rapid evolution of smart cities relies heavily on advancements in wireless communication systems and extensive IoT networks. This paper offers a comprehensive review of the critical role and future potential of integrating unmanned aerial vehicles (UAVs) and reconfigurable intelligent surfaces (RISs) to [...] Read more.
The rapid evolution of smart cities relies heavily on advancements in wireless communication systems and extensive IoT networks. This paper offers a comprehensive review of the critical role and future potential of integrating unmanned aerial vehicles (UAVs) and reconfigurable intelligent surfaces (RISs) to enhance Internet of Vehicles (IoV) systems within beyond-fifth-generation (B5G) and sixth-generation (6G) networks. We explore the combination of quasi-optical millimeter-wave (mmWave) signals with UAV-enabled, RIS-assisted networks and their applications in urban environments. This review covers essential areas such as channel modeling and position-aware beamforming in dynamic networks, including UAVs and IoVs. Moreover, we investigate UAV navigation and control, emphasizing the development of obstacle-free trajectory designs in dense urban areas while meeting kinodynamic and motion constraints. The emerging potential of RIS-equipped UAVs (RISeUAVs) is highlighted, along with their role in supporting IoVs and in mobile edge computing. Optimization techniques, including convex programming methods and machine learning, are explored to tackle complex challenges, with an emphasis on studying computational complexity and feasibility for real-time operations. Additionally, this review highlights the integrated localization and communication strategies to enhance UAV and autonomous ground vehicle operations. This tutorial-style overview offers insights into the technical challenges and innovative solutions of the next-generation wireless networks in smart cities, with a focus on vehicular communications. Finally, future research directions are outlined. Full article
Show Figures

Figure 1

Figure 1
<p>Organization of the paper based on the taxonomy of the UAV-enabled, RIS-assisted communication into quintuple studied and topics.</p>
Full article ">Figure 2
<p>Illustration of direct LoS path and multi-path.</p>
Full article ">Figure 3
<p>UAV-enabled, RIS-assisted communication: (<b>a</b>) RISeUAV with a UPA of the RIS aligned in the XY plane facing the ground; (<b>b</b>) UAV-BS as an active aerial (airborne) BS.</p>
Full article ">Figure 4
<p>Schematic of RISeUAV-assisted communication for channel modeling: (<b>a</b>) geometry of system in 3D coordinates; (<b>b</b>) UPA of the RIS in XY plane; <math display="inline"><semantics> <mrow> <msup> <mrow> <mi>v</mi> </mrow> <mrow> <mi>R</mi> <mi>U</mi> </mrow> </msup> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msup> <mrow> <mi>u</mi> </mrow> <mrow> <mi>R</mi> <mi>U</mi> </mrow> </msup> </mrow> </semantics></math> denote UAV’s horizontal and vertical linear velocities, respectively; <math display="inline"><semantics> <mrow> <msup> <mrow> <mi>ω</mi> </mrow> <mrow> <mi>R</mi> <mi>U</mi> </mrow> </msup> </mrow> </semantics></math> denotes the UAV’s horizontal rotational velocity and <math display="inline"><semantics> <mrow> <msup> <mrow> <mi>θ</mi> </mrow> <mrow> <mi>R</mi> <mi>U</mi> </mrow> </msup> </mrow> </semantics></math> denotes the UAV heading (angle) with respect to the X-axis. The UAV motion is studied in <a href="#sec4-futureinternet-16-00433" class="html-sec">Section 4</a>.</p>
Full article ">Figure 5
<p>Schematic of UAV-enabled, RIS-assisted wireless communication for intelligent vehicles (IVs) in IoVs with mMIMO BSs. Notice that, for the sake of illustration, the sizes of the mMIMO BS and RISeUAV are exaggerated compared with the distances.</p>
Full article ">Figure 6
<p>Aerial backhauling through the RISeUAV to UAV-BSs.</p>
Full article ">Figure 7
<p>The schematic of the actor-critic deep deterministic policy gradient DRL agent.</p>
Full article ">Figure 8
<p>The geometry of the SLAPS for RISeUAV.</p>
Full article ">
17 pages, 890 KiB  
Article
Optimal Task Offloading Strategy for Vehicular Networks in Mixed Coverage Scenarios
by Xuewen He, Yuhao Cen, Yinsheng Liao, Xin Chen and Chao Yang
Appl. Sci. 2024, 14(23), 10787; https://doi.org/10.3390/app142310787 - 21 Nov 2024
Viewed by 522
Abstract
With the rapidly escalating demand for high real-time performance and data throughput capabilities, the limitations of on-board computing resources have rendered traditional computing services inadequate to meet these burgeoning requirements. Vehicular edge computing offers a viable solution to this challenge, yet the roadside [...] Read more.
With the rapidly escalating demand for high real-time performance and data throughput capabilities, the limitations of on-board computing resources have rendered traditional computing services inadequate to meet these burgeoning requirements. Vehicular edge computing offers a viable solution to this challenge, yet the roadside units (RSUs) are prone to overloading in congested traffic conditions. In this paper, we introduce an optimal task offloading strategy under congested conditions, which is facilitated by a mixed coverage scenario with both 5G base stations and RSUs with the aim of enhancing the efficiency of computing resource utilization and reducing the task processing delay. This study employs long short-term memory networks to predict the loading status of base stations. Then, based on the prediction results, we propose an optimized task offloading strategy using the proximal policy optimization algorithm. The main constraint is that the data transmission rates of users should satisfy the quality of service. It effectively alleviates the overload issue of RSUs during congested conditions and improves service quality. The simulation results substantiate the effectiveness of the proposed strategy in reducing the task processing delay and enhancing the quality of service. Full article
Show Figures

Figure 1

Figure 1
<p>A scenario of mixed coverage of BSs and RSUs in urban road environments.</p>
Full article ">Figure 2
<p>PPO-Clip for task offloading strategy flow.</p>
Full article ">Figure 3
<p>BS load data of one week.</p>
Full article ">Figure 4
<p>Performance of LSTM.</p>
Full article ">Figure 5
<p>Average reward for different offloading strategies.</p>
Full article ">Figure 6
<p>Average offloading completion times (delay) for different offloading strategies.</p>
Full article ">Figure 7
<p>Average reward comparison of vehicle offloading strategies under different conditions.</p>
Full article ">Figure 8
<p>The performance of the trained model under different conditions.</p>
Full article ">
19 pages, 7130 KiB  
Review
Recent Trend of Rate-Splitting Multiple Access-Assisted Integrated Sensing and Communication Systems
by Sukbin Jang, Nahyun Kim, Gayeong Kim and Byungju Lee
Electronics 2024, 13(23), 4579; https://doi.org/10.3390/electronics13234579 - 21 Nov 2024
Viewed by 726
Abstract
In the next-generation communication systems, multiple access (MA) will play a crucial role in achieving high throughput to support future-oriented services. Recently, rate-splitting multiple access (RSMA) has received much attention from both academia and industry due to its ability to flexibly mitigate inter-user [...] Read more.
In the next-generation communication systems, multiple access (MA) will play a crucial role in achieving high throughput to support future-oriented services. Recently, rate-splitting multiple access (RSMA) has received much attention from both academia and industry due to its ability to flexibly mitigate inter-user interference in a broad range of interference regimes. Further, with the growing emphasis on spectrum resource utilization, integrated sensing and communication (ISAC) technology, which improves spectrum efficiency by merging communication and radar signals, is expected to be one of the key candidate technologies for the sixth-generation (6G) wireless networks. In this paper, we first investigate the evolution of existing MA techniques and basic principles of RSMA-assisted ISAC systems. Moreover, to make the future RSMA-assisted ISAC systems, we highlight prime technologies of 6G such as non-terrestrial networks (NTN), reconfigurable intelligent surfaces (RIS), millimeter wave (mmWave) and terahertz (THz) technologies, and vehicular-to-everything (V2X), along with the main technical challenges and potential benefits to pave the way for RSMA-assisted ISAC systems. Full article
(This article belongs to the Special Issue Multi-Scale Communications and Signal Processing)
Show Figures

Figure 1

Figure 1
<p>Evolution of mobile communication from 1G to 6G.</p>
Full article ">Figure 2
<p>Resource allocation for various MA technologies.</p>
Full article ">Figure 3
<p>RSMA tranceiver architecture.</p>
Full article ">Figure 4
<p>RSMA-assisted ISAC systems.</p>
Full article ">Figure 5
<p>RSMA-assisted LEO-ISAC systems.</p>
Full article ">Figure 6
<p>RSMA-assisted RIS-ISAC systems.</p>
Full article ">Figure 7
<p>RSMA-assisted ISAC systems with hybrid beamforming.</p>
Full article ">
22 pages, 1366 KiB  
Article
Mobility-Aware Task Offloading and Resource Allocation in UAV-Assisted Vehicular Edge Computing Networks
by Long Chen, Jiaqi Du and Xia Zhu
Drones 2024, 8(11), 696; https://doi.org/10.3390/drones8110696 - 20 Nov 2024
Viewed by 536
Abstract
The rapid development of the Internet of Vehicles (IoV) and intelligent transportation systems has led to increased demand for real-time data processing and computation in vehicular networks. To address these needs, this paper proposes a task offloading framework for UAV-assisted Vehicular Edge Computing [...] Read more.
The rapid development of the Internet of Vehicles (IoV) and intelligent transportation systems has led to increased demand for real-time data processing and computation in vehicular networks. To address these needs, this paper proposes a task offloading framework for UAV-assisted Vehicular Edge Computing (VEC) systems, which considers the high mobility of vehicles and the limited coverage and computational capacities of drones. We introduce the Mobility-Aware Vehicular Task Offloading (MAVTO) algorithm, designed to optimize task offloading decisions, manage resource allocation, and predict vehicle positions for seamless offloading. MAVTO leverages container-based virtualization for efficient computation, offering flexibility in resource allocation in multiple offload modes: direct, predictive, and hybrid. Extensive experiments using real-world vehicular data demonstrate that the MAVTO algorithm significantly outperforms other methods in terms of task completion success rate, especially under varying task data volumes and deadlines. Full article
(This article belongs to the Special Issue UAV-Assisted Intelligent Vehicular Networks 2nd Edition)
Show Figures

Figure 1

Figure 1
<p>Task offloading from bi-directions moving in UAV-assisted Vehicular Edge Computing.</p>
Full article ">Figure 2
<p>Direct offloading model.</p>
Full article ">Figure 3
<p>Prediction offloading model.</p>
Full article ">Figure 4
<p>Mixed offloading model.</p>
Full article ">Figure 5
<p>Example diagram for calculating the remaining travel distance of the vehicle.</p>
Full article ">Figure 6
<p>The performance of different task offloading sequences under a 95% Tukey HSD confidence interval.</p>
Full article ">Figure 7
<p>The performance of different task offloading strategies under a 95% Tukey HSD confidence interval.</p>
Full article ">Figure 8
<p>The performance of different resource allocation strategies under a 95% Tukey HSD confidence interval.</p>
Full article ">Figure 9
<p>Interaction plots of the compared algorithms for tests with different vehicle numbers and task data volume under 95.0% Tukey HSD confidence interval.</p>
Full article ">Figure 10
<p>Interaction plots of the compared algorithms for tests with different container numbers and task data volume intervals under 95.0% Tukey HSD confidence interval.</p>
Full article ">Figure 11
<p>Interaction plots of the compared algorithms for tests with different vehicle numbers and task deadlines under 95.0% Tukey HSD confidence interval.</p>
Full article ">
Back to TopTop