Computational Intelligence for Predictive Analytics in IoT-connected Autonomous Vehicle Networks
Keywords:
Computational intelligence, research, Autonomous vehicle networksAbstract
The fleet of vehicles on our roads is expected to incorporate more and more smart and emphasized capabilities. Road accidents are a significant societal problem leading to the loss of human lives, pain, wealth loss, harm, and financial liabilities. Their vehicles should be independent, open-curious, tolerant, and successful and respect traffic regulations. They can recognize their driving capabilities and quickly suspend and restart them. In traffic, the vehicles must have 'social abilities' and collaborate together and with traffic challenges. Smart energies and energy-effective vehicles are demanded by regulations. Consumers gain added benefits with new automotive user interfaces, multimedia, and infotainment activities like business models, documentation of legitimate evidence, etc. To satisfy these demands, sensors together with dynamic processing on board are sharp, including the real sense by artificial perception, forecast, and normal action control loop, the Architectural Perception instance. The current situation is a prototype. The predictive study within the automotive environment on the future event is most of them. It applies interdisciplinary techniques from data mining, data science, complexity theory, control systems, engineering, software engineering, quality risk management, verification and validation, human-computer interaction, safety, dependability, security, and ethics. Pedestrian-vehicle incident and external road system environmental understanding events are difficult. For instance, while driving at a fast pace in very close proximity to different users, they pose unique challenges in terms of, e.g., dynamic vehicle control. Medical networking and smartness will analyze essential vehicle data, search for suitable behavioral action, and apply the methods. Large datasets derived from automotive AI operate together to predict the events. To take alternatives, the car interface has to properly communicate that they are able to execute efficiently. Frameworks can plan good control oxidations. Diving and accelerative actions and can also accomplish reasons and constraints.
Downloads
References
C. Liu, F. Wu, and H. Hu, "A survey of data mining techniques for malware detection using static features," in Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012, pp. 1817-1824.
Vemori, Vamsi. "Human-in-the-Loop Moral Decision-Making Frameworks for Situationally Aware Multi-Modal Autonomous Vehicle Networks: An Accessibility-Focused Approach." Journal of Computational Intelligence and Robotics 2.1 (2022): 54-87.
Vemori, Vamsi. "Human-in-the-Loop Moral Decision-Making Frameworks for Situationally Aware Multi-Modal Autonomous Vehicle Networks: An Accessibility-Focused Approach." Journal of Computational Intelligence and Robotics 2.1 (2022): 54-87.
K. J. M. Moran, R. Byres, and E. Von Solms, "The three faces of IoT security," in Computers & Security, vol. 69, pp. 35-51, 2017.
Tatineni, Sumanth. "Federated Learning for Privacy-Preserving Data Analysis: Applications and Challenges." International Journal of Computer Engineering and Technology 9.6 (2018).
M. M. Hassan, E. Hossain, M. M. A. Hashem, M. A. Almogren, and A. G. Yaqoob, "Network traffic classification in Internet of Things (IoT) based on deep learning approach," in Future Generation Computer Systems, vol. 82, pp. 315-323, 2018.
Tatineni, Sumanth. "Ethical Considerations in AI and Data Science: Bias, Fairness, and Accountability." International Journal of Information Technology and Management Information Systems (IJITMIS) 10.1 (2019): 11-21.
Vemori, Vamsi. "Towards a Driverless Future: A Multi-Pronged Approach to Enabling Widespread Adoption of Autonomous Vehicles-Infrastructure Development, Regulatory Frameworks, and Public Acceptance Strategies." Blockchain Technology and Distributed Systems 2.2 (2022): 35-59.
Tatineni, Sumanth. "Blockchain and Data Science Integration for Secure and Transparent Data Sharing." International Journal of Advanced Research in Engineering and Technology (IJARET) 10.3 (2019): 470-480.
R. Roman, J. Lopez, and M. Mambo, "Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges," in Future Generation Computer Systems, vol. 78, pp. 680-698, 2018.
S. Chauhan and B. Choudhury, "Security issues in cloud computing: A comprehensive study," in International Journal of Computer Applications, vol. 47, no. 10, pp. 1-6, 2012.
Tatineni, Sumanth. "Recommendation Systems for Personalized Learning: A Data-Driven Approach in Education." Journal of Computer Engineering and Technology (JCET) 4.2 (2020).
J. P. Anderson, "Computer security threat monitoring and surveillance," in Technical Report, James P Anderson Co., Fort Washington, PA, USA, 1980.
Tatineni, Sumanth. "An Integrated Approach to Predictive Maintenance Using IoT and Machine Learning in Manufacturing." International Journal of Electrical Engineering and Technology (IJEET) 11.8 (2020).
K. D. Bowers, "The need for a strategic approach to cloud computing," in Computer, vol. 44, no. 3, pp. 22-24, 2011.
S. E. I. Group, "Security in the Internet of Things," in Technical Report, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA, 2016.
Tatineni, Sumanth. "Exploring the Challenges and Prospects in Data Science and Information Professions." International Journal of Management (IJM) 12.2 (2021): 1009-1014.
T. Duc, P. Jun, and P. Hoon, "Secure data communication in IoT applications using software-defined networking," in Wireless Communications and Mobile Computing, vol. 2018, Article ID 8713834, 12 pages, 2018.
Tatineni, Sumanth. "INTEGRATING AI, BLOCKCHAIN AND CLOUD TECHNOLOGIES FOR DATA MANAGEMENT IN HEALTHCARE." Journal of Computer Engineering and Technology (JCET) 5.01 (2022).
K. M. Dantu, S. K. Garg, and M. K. Gupta, "Security issues in healthcare applications using wireless medical sensor networks: A survey," in IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 55-67, 2014.