2023
DOI: 10.3390/rs15082165
|View full text |Cite
|
Sign up to set email alerts
|

Compression of GNSS Data with the Aim of Speeding up Communication to Autonomous Vehicles

Abstract: Autonomous vehicles contain many sensors, enabling them to drive by themselves. Autonomous vehicles need to communicate with other vehicles (V2V) wirelessly and with infrastructures (V2I) like satellites with diverse connections as well, to implement safety, reliability, and efficiency. Information transfer from remote communication appliances is a critical task and should be accomplished quickly, in real time and with maximum reliability. A message that arrives late, arrives with errors, or does not arrive at… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…Compression algorithms in the IoV. Compression and decompression algorithms [49,50] are usually a set of deterministic algorithms and are publicly available. Data with low-security requirements can be transmitted directly or after compression, which greatly reduces the communication bandwidth requirements.…”
Section: Methodsmentioning
confidence: 99%
“…Compression algorithms in the IoV. Compression and decompression algorithms [49,50] are usually a set of deterministic algorithms and are publicly available. Data with low-security requirements can be transmitted directly or after compression, which greatly reduces the communication bandwidth requirements.…”
Section: Methodsmentioning
confidence: 99%
“…Our proposed work is a generic solution for carrying out a variety of data spatial transformations in digital logic. The proposed accelerator enables real-time computing, omitting the need for a communication bandwidth saving mechanisms as in [12] and enabling the fully digital implementation of such use cases as real-time image rectification and registration, digital zoom, lens distortion correction and compression [14]. Additionally, in this work, we formalise the logic behind parallel data access, which enables 16-point bicubic interpolation and improves over other related work: [11,12].…”
Section: Related Workmentioning
confidence: 99%
“…A model is created from the legitimate traffic (i.e., network traffic without attacks) and it is used in a subsequent step to detect anomalies, which may correspond to a potential attack. A similar pre-processing step is used in the automotive domain for similar problems as in [14] to improve the reliability of the data flow. A sliding window approach can be more time-efficient than approaches where each single CAN-bus message is analyzed but a potential weakness is found in the lower discriminating power as discussed in [15][16][17], where entropy measures are used as features.…”
Section: Related Workmentioning
confidence: 99%