2022
DOI: 10.1109/tits.2021.3091321
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Objective Optimization for Resource Allocation in Vehicular Cloud Computing Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 77 publications
(30 citation statements)
references
References 34 publications
0
28
0
1
Order By: Relevance
“…The weight coefficient α of vx1 and vx2 is calculated by each wheel speed credibility, as shown in Eq. (10). Because when only a single wheel is stable, the algorithm can still output an accurate result, the range of f1 is [0.5,1].…”
Section: Principle Of Reference Speed Estimationmentioning
confidence: 99%
See 1 more Smart Citation
“…The weight coefficient α of vx1 and vx2 is calculated by each wheel speed credibility, as shown in Eq. (10). Because when only a single wheel is stable, the algorithm can still output an accurate result, the range of f1 is [0.5,1].…”
Section: Principle Of Reference Speed Estimationmentioning
confidence: 99%
“…In addition, the new electric drive [5] or X-by-wire platform has the characteristics of faster response and more accurate execution [6], which also puts forward higher requirements for vehicle state identification algorithm. Estimation based on traditional single sensor information cannot meet the above requirements, so it is necessary to use information fusion technology [7,8] to obtain more detailed and accurate conclusions from multi-source information of the single vehicle and even from internet of vehicles [9,10].…”
Section: Introductionmentioning
confidence: 99%
“…Xie et al [14] proposed a cloud scheduling algorithm driven by dynamic basic paths, which computes the dynamic essential path of the prescheduling task nodes based on the actual computation cost and communication cost of task node in the scheduling process. References [15][16][17] describe how to implement intrusion prevention and optimization on the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…To enable users to access service nodes in a timely manner and quickly meet user requirements, service content is distributed to appropriate access sites. In general, the access site close to the user is preferred to be processed in time by reducing transmission distance, and tasks are going to be executed in multiaccess edge computing (MEC) servers [4]. MEC refers to process-ing, analyzing, and storing data closer to where it is generated to enable rapid, near real-time analysis and response, which can alleviate the backhaul link pressure with the traditional network architecture.…”
Section: Introductionmentioning
confidence: 99%