2020
DOI: 10.1109/tvt.2020.3021411
|View full text |Cite
|
Sign up to set email alerts
|

Machine-Learning-Based Hazardous Spot Detection Framework by Mobile Sensing and Opportunistic Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…Watanabe et al [23] identify dangerous road spots using ML on mobile sensing and V2V networking. Their approach employs ML techniques and the Viterbi algorithm.…”
Section: Featuresmentioning
confidence: 99%
See 1 more Smart Citation
“…Watanabe et al [23] identify dangerous road spots using ML on mobile sensing and V2V networking. Their approach employs ML techniques and the Viterbi algorithm.…”
Section: Featuresmentioning
confidence: 99%
“…[18] Low-cost driver profiling ML algorithm investigation Simulation limitations, data validation Lee, J. [19] Assessing driving behaviors Utilization of sensor data Small trial, context validation needed C. C. Chang [20] Collision avoidance using dynamics Real-time object detection Single camera setup, broader validation Moses and Parvathi [21] ML-based traffic flow prediction ML process, stages breakdown Limited to US data, no new methodology Lyu et al [22] Improved collision alerts Novel model, simulation validation Specific scenario, broader context needed Watanabe et al [23] Identifying dangerous roadplaces Sensory data, ML application Real-world validation, generalization Silva et al [24] Various ML methods for collision Prediction overview, evaluation Data precision, lack of real-time data AbouElassad et al [25] Framework for analyzing behavior…”
Section: Algorithms Accuracy Measurementmentioning
confidence: 99%
“…The most recent review of current technologies and open communication difficulties focused on 5G data transmission between BSs and V2X, as well as challenges of RBS attacks on Internet of Things (IoT) security [21,22]. We report on security issues for V2X scenarios, and synthetic data generation, and delineate the various RBS schemes in the 5G environment [23][24][25][26].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Current research on opportunistic networks has mainly focused on the improvement of routing algorithms. Traditional opportunistic network routing algorithms mostly only consider the topological relationship of nodes (link prediction based on existing nodes and their connection attributes) but do not consider the social relationship between people in real social networks [7,15]. Therefore, it is challenging to effectively use the traditional socialist network in real social networks.…”
Section: Introductionmentioning
confidence: 99%