Open Access. Powered by Scholars. Published by Universities.®

Automotive Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Automotive Engineering

Enhancing Pedestrian-Autonomous Vehicle Safety In Low Visibility Scenarios: A Comprehensive Simulation Method, Zizheng Yan, Yang Liu, Hong Yang Apr 2023

Enhancing Pedestrian-Autonomous Vehicle Safety In Low Visibility Scenarios: A Comprehensive Simulation Method, Zizheng Yan, Yang Liu, Hong Yang

Modeling, Simulation and Visualization Student Capstone Conference

Self-driving cars raise safety concerns, particularly regarding pedestrian interactions. Current research lacks a systematic understanding of these interactions in diverse scenarios. Autonomous Vehicle (AV) performance can vary due to perception accuracy, algorithm reliability, and environmental dynamics. This study examines AV-pedestrian safety issues, focusing on low visibility conditions, using a co-simulation framework combining virtual reality and an autonomous driving simulator. 40 experiments were conducted, extracting surrogate safety measures (SSMs) from AV and pedestrian trajectories. The results indicate that low visibility can impair AV performance, increasing conflict risks for pedestrians. AV algorithms may require further enhancements and validations for consistent safety performance …


View Synthesis With Scene Recognition For Cross-View Image Localization, Uddom Lee, Peng Jiang, Hongyi Wu, Chunsheng Xin Jan 2023

View Synthesis With Scene Recognition For Cross-View Image Localization, Uddom Lee, Peng Jiang, Hongyi Wu, Chunsheng Xin

Electrical & Computer Engineering Faculty Publications

Image-based localization has been widely used for autonomous vehicles, robotics, augmented reality, etc., and this is carried out by matching a query image taken from a cell phone or vehicle dashcam to a large scale of geo-tagged reference images, such as satellite/aerial images or Google Street Views. However, the problem remains challenging due to the inconsistency between the query images and the large-scale reference datasets regarding various light and weather conditions. To tackle this issue, this work proposes a novel view synthesis framework equipped with deep generative models, which can merge the unique features from the outdated reference dataset with …


Cybersecurity And Digital Privacy Aspects Of V2x In The Ev Charging Structure, Umit Cali, Murat Kuzlu, Onur Elma, Osman Gazi Gucluturk, Ahmet Kilic, Ferhat Ozgur Catak Jan 2023

Cybersecurity And Digital Privacy Aspects Of V2x In The Ev Charging Structure, Umit Cali, Murat Kuzlu, Onur Elma, Osman Gazi Gucluturk, Ahmet Kilic, Ferhat Ozgur Catak

Engineering Technology Faculty Publications

With the advancement of green energy technology and rising public and political acceptance, electric vehicles (EVs) have grown in popularity. Electric motors, batteries, and charging systems are considered major components of EVs. The electric power infrastructure has been designed to accommodate the needs of EVs, with an emphasis on bidirectional power flow to facilitate power exchange. Furthermore, the communication infrastructure has been enhanced to enable cars to communicate and exchange information with one another, also known as Vehicle-to-Everything (V2X) technology. V2X is positioned to become a bigger and smarter system in the future of transportation, thanks to upcoming digital technologies …


A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood Dec 2022

A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood

Cybersecurity Undergraduate Research Showcase

While autonomous vehicles accounted for about 31.4 million vehicles on the road in 2019 (Placek). They have continued to flood the market and have a projected growth to 58 million in just 8 years from now (Placek) As well as a market cap in the billions of dollars. Even the comparatively new AV company Tesla has over 3 times the market cap value of the leading non AV brand Toyota (Market Cap) who are also working toward AVs as well, like their level 2 teammate driver assistance. Following Moore’s Law, as technology continues to improve, their social impact and ethical …


Ethical Concerns In Self-Driving Cars, Victoria Shand Dec 2022

Ethical Concerns In Self-Driving Cars, Victoria Shand

Cybersecurity Undergraduate Research Showcase

Automobiles have been in existence since 1672 and only went up from there. Self-driving cars are a fantastic piece of technology; they can self-park, laser ranger finder, and near vision; they can map the road in advance, understand road signs, and, in some cases, handle certain variables on the road.

When talking about any form of technology, the possibilities are endless technology is a continuously evolving idea. When discussing self-driving cars, they have some fantastic and encouraging benefits and ideas. Some ideas would be that vehicles could communicate with each other, we could eliminate the need for traffic lights, and …


Deeppose: Detecting Gps Spoofing Attack Via Deep Recurrent Neural Network, Peng Jiang, Hongyi Wu, Chunsheng Xin Jan 2022

Deeppose: Detecting Gps Spoofing Attack Via Deep Recurrent Neural Network, Peng Jiang, Hongyi Wu, Chunsheng Xin

Electrical & Computer Engineering Faculty Publications

The Global Positioning System (GPS) has become a foundation for most location-based services and navigation systems, such as autonomous vehicles, drones, ships, and wearable devices. However, it is a challenge to verify if the reported geographic locations are valid due to various GPS spoofing tools. Pervasive tools, such as Fake GPS, Lockito, and software-defined radio, enable ordinary users to hijack and report fake GPS coordinates and cheat the monitoring server without being detected. Furthermore, it is also a challenge to get accurate sensor readings on mobile devices because of the high noise level introduced by commercial motion sensors. To this …


Move: Mobile Observers Variants And Extensions, Ryan Florin Jul 2021

Move: Mobile Observers Variants And Extensions, Ryan Florin

Computer Science Theses & Dissertations

Traffic state estimation is a fundamental task of Intelligent Transportation Systems. Recent advances in sensor technology and emerging computer and vehicular communications paradigms have brought the task of estimating traffic state parameters in real-time within reach.

This has led to the main research question of this thesis: Can a vehicle accurately estimate traffic parameters using onboard resources shared through CV technology in a lightweight manner without utilizing centralized or roadside infrastructure?

In 1954 Wardrop and Charlesworth proposed the Moving Observer method to measure traffic parameters based on an observed number of vehicle passes. We start by proposing methods for detecting …


Ship Deck Segmentation In Engineering Document Using Generative Adversarial Networks, Mohammad Shahab Uddin, Raphael Pamie-George, Daron Wilkins, Andres Sousa Poza, Mustafa Canan, Samuel Kovacic, Jiang Li Jan 2021

Ship Deck Segmentation In Engineering Document Using Generative Adversarial Networks, Mohammad Shahab Uddin, Raphael Pamie-George, Daron Wilkins, Andres Sousa Poza, Mustafa Canan, Samuel Kovacic, Jiang Li

Engineering Management & Systems Engineering Faculty Publications

Generative adversarial networks (GANs) have become very popular in recent years. GANs have proved to be successful in different computer vision tasks including image-translation, image super-resolution etc. In this paper, we have used GAN models for ship deck segmentation. We have used 2D scanned raster images of ship decks provided by US Navy Military Sealift Command (MSC) to extract necessary information including ship walls, objects etc. Our segmentation results will be helpful to get vector and 3D image of a ship that can be later used for maintenance of the ship. We applied the trained models to engineering documents provided …


Towards Dynamic Vehicular Clouds, Aida Ghazizadeh Aug 2020

Towards Dynamic Vehicular Clouds, Aida Ghazizadeh

Computer Science Theses & Dissertations

Motivated by the success of the conventional cloud computing, Vehicular Clouds were introduced as a group of vehicles whose corporate computing, sensing, communication, and physical resources can be coordinated and dynamically allocated to authorized users. One of the attributes that set Vehicular Clouds apart from conventional clouds is resource volatility. As vehicles enter and leave the cloud, new computing resources become available while others depart, creating a volatile environment where the task of reasoning about fundamental performance metrics becomes very challenging. The goal of this thesis is to design an architecture and model for a dynamic Vehicular Cloud built on …


A Simulation-Based Layered Framework Framework For The Development Of Collaborative Autonomous Systems, Ioannis Sakiotis Jul 2016

A Simulation-Based Layered Framework Framework For The Development Of Collaborative Autonomous Systems, Ioannis Sakiotis

Computational Modeling & Simulation Engineering Theses & Dissertations

The purpose of this thesis is to introduce a simulation-based software framework that facilitates the development of collaborative autonomous systems. Significant commonalities exist in the design approaches of both collaborative and autonomous systems, mirroring the sense, plan, act paradigm, and mostly adopting layered architectures. Unfortunately, the development of such systems is intricate and requires low-level interfacing which significantly detracts from development time. Frameworks for the development of collaborative and autonomous systems have been developed but are not flexible and center on narrow ranges of applications and platforms. The proposed framework utilizes an expandable layered structure that allows developers to define …


Tdma Slot Reservation In Cluster-Based Vanets, Mohammad Salem Almalag Apr 2013

Tdma Slot Reservation In Cluster-Based Vanets, Mohammad Salem Almalag

Computer Science Theses & Dissertations

Vehicular Ad Hoc Networks (VANETs) are a form of Mobile Ad Hoc Networks (MANETs) in which vehicles on the road form the nodes of the network. VANETs provide several services to enhance the safety and comfort of drivers and passengers. These services can be obtained by the wireless exchange of information among the vehicles driving on the road. In particular, the transmission of two different types of messages, safety/update and non-safety messages.

The transmission of safety/update message aims to inform the nearby vehicles about the sender's current status and/or a detected dangerous situation. This type of transmission is designed to …


A Framework For Dynamic Traffic Monitoring Using Vehicular Ad-Hoc Networks, Mohammad Hadi Arbabi Jul 2011

A Framework For Dynamic Traffic Monitoring Using Vehicular Ad-Hoc Networks, Mohammad Hadi Arbabi

Computer Science Theses & Dissertations

Traffic management centers (TMCs) need high-quality data regarding the status of roadways for monitoring and delivering up-to-date traffic conditions to the traveling public. Currently this data is measured at static points on the roadway using technologies that have significant maintenance requirements. To obtain an accurate picture of traffic on any road section at any time requires a real-time probe of vehicles traveling in that section. We envision a near-term future where network communication devices are commonly included in new vehicles. These devices will allow vehicles to form vehicular networks allowing communication among themselves, other vehicles, and roadside units (RSUs) to …


Data Aggregation And Dissemination In Vehicular Ad-Hoc Networks, Khaled Ibrahim Apr 2011

Data Aggregation And Dissemination In Vehicular Ad-Hoc Networks, Khaled Ibrahim

Computer Science Theses & Dissertations

Vehicular Ad-Hoc Networks (VANETs) are a fast growing technology that many governments and automobile manufacturers are investing in to provide not only safer and more secure roads, but also informational and entertainment-based applications for drivers. The applications developed for VANETs can be classified into multiple categories (safety, informational, entertainment). Most VANET applications, regardless of their category, depend on having certain vehicular data(vehicular speed, X position and Y position) available. Although these applications appear to use the same vehicular data, the characteristics of this data (i.e., amount, accuracy, and update rate) will vary based on the application category. For …


Marine Buoy Detection Using Circular Hough Transform, Loc Tran, Justin Selfridge, Gene Hou, Jiang Li Jan 2011

Marine Buoy Detection Using Circular Hough Transform, Loc Tran, Justin Selfridge, Gene Hou, Jiang Li

Electrical & Computer Engineering Faculty Publications

A low cost method for buoy detection in maritime settings is presented using inexpensive digital cameras. In this method, the circular Hough transform is applied to an edge image to circular objects in the image. The center of these circles will signify the locations of each buoy. The known color information of the buoys is also used to enhance the performance by removing false detections. The algorithm is compared to an approach that locates buoys purely on color information. In order to validate the method, we test the approach synthetically and also with real images captured from a small surface …


Providing Location Security In Vehicular Ad Hoc Networks, Gongjun Yan Apr 2010

Providing Location Security In Vehicular Ad Hoc Networks, Gongjun Yan

Computer Science Theses & Dissertations

Location is fundamental information in Vehicular Ad-hoc Networks (VANETs). Almost all VANET applications rely on location information. Therefore it is of importance to ensure location information integrity, meaning that location information is original (from the generator), correct (not bogus or fabricated) and unmodified (value not changed). We present validation mechanisms to provide location integrity for VANETs. In the initial mechanism, we assume that all vehicles are equipped with a radar, a GPS receiver, and a transceiver. Since radar has a limited radar range and transceiver has a limited transmission range, we build network cells as a security unit as well …