2020
DOI: 10.1007/s11432-019-2787-2
|View full text |Cite
|
Sign up to set email alerts
|

Future vehicles: learnable wheeled robots

Abstract: As one of the important signs of the third wave of artificial intelligence, wheeled robots not only inherit knowledge but also learn independently, which brings about to learnable wheeled robots that use a driving brain to achieve data-driven control and learning. Presently, most existing technologies for selfdriving vehicles can learn positively from the benchmark drivers to guarantee safe driving. However, in many unpredicted situations, such as rollover, human drivers often cause the behavior of irrational … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 24 publications
(8 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…In order to solve the threat to user privacy caused by low security of connected vehicles, the sensitive data privacy protection scheme of connected vehicles based on blockchain can improve the hiding rate of sensitive data, ensure the information security of intelligent vehicles, and better serve the architecture of Internet of vehicles [9]. As one of the essential signs of the third wave of artificial intelligence, wheeled robots not only inherit knowledge but also learn independently, which brings about to enable wheeled robots that use a driving brain to achieve data-driven control and learning [10]. In the process of learning and interaction of wheeled robots, the privacy protection of the generated data will face substantial challenges due to its large data volume and diverse structure, and the privacy computing field will be paid additional attention in the future [11].…”
Section: Privacy Protection Based On Privacy Computingmentioning
confidence: 99%
“…In order to solve the threat to user privacy caused by low security of connected vehicles, the sensitive data privacy protection scheme of connected vehicles based on blockchain can improve the hiding rate of sensitive data, ensure the information security of intelligent vehicles, and better serve the architecture of Internet of vehicles [9]. As one of the essential signs of the third wave of artificial intelligence, wheeled robots not only inherit knowledge but also learn independently, which brings about to enable wheeled robots that use a driving brain to achieve data-driven control and learning [10]. In the process of learning and interaction of wheeled robots, the privacy protection of the generated data will face substantial challenges due to its large data volume and diverse structure, and the privacy computing field will be paid additional attention in the future [11].…”
Section: Privacy Protection Based On Privacy Computingmentioning
confidence: 99%
“…Compared with the latest data, the experimental results of the benchmark dataset show that the northwest UCLA and MCAD datasets increased by 3% and 2%, respectively. These methods can be used in intelligent video surveillance, human-computer interaction, video retrieval and other applications [1,[144][145][146] . In 2021, Wang et al [147] proposed a recurrent neural network for spatiotemporal predictive learning (PredRNN) to learn sequential actions.…”
Section: Human Action Recognition Methodsmentioning
confidence: 99%
“…The development of human society in recent years is known as the "AI Era", in which the development of intelligent technology needs self-learning and selfcognition abilities [1] . The study of human action recognition and posture prediction enables machines to understand human behaviors and intentions and has been Nan Ma and Zhixuan Wu are with the Beijing Key Laboratory of Information Service Engineering, the College of Robotics, Beijing Union University, Beijing 100101, China.…”
Section: Introductionmentioning
confidence: 99%
“…There are now two approaches to dealing with it. The first is to fix first and then segment [3]; this way simplifies the entire problem in order to increase the fisheye image corection impact, decreasing the difficulty of design. For example, Yang [4] proposed an algorithm for improving the seherical projection model to enhance the edge correction capability, while Ma [5] proposed a correction algorithm based on a mapping adaptive convolution and isometric projection model to perform secondary correction of the projected image.…”
Section: Introductionmentioning
confidence: 99%