2021
DOI: 10.1109/tvt.2021.3066409
|View full text |Cite
|
Sign up to set email alerts
|

See-Through a Vehicle: Augmenting Road Safety Information Using Visual Perception and Camera Communication in Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…Nevertheless, in this case, the optical camera visible light communication technology has been used to signal distracted pedestrians using their mobile phones that they are approaching a red traffic light signal. A different attempt at using the VLC technology in detecting hidden obstacles is found in [ 54 ]. In this work, potentially dangerous situations, such as a pedestrian crossing the street, are identified using an on-vehicle camera system.…”
Section: Discussion About the Importance Of This Work Differences Fro...mentioning
confidence: 99%
“…Nevertheless, in this case, the optical camera visible light communication technology has been used to signal distracted pedestrians using their mobile phones that they are approaching a red traffic light signal. A different attempt at using the VLC technology in detecting hidden obstacles is found in [ 54 ]. In this work, potentially dangerous situations, such as a pedestrian crossing the street, are identified using an on-vehicle camera system.…”
Section: Discussion About the Importance Of This Work Differences Fro...mentioning
confidence: 99%
“…Because if it is not clearly indicated that the information is effectively protected, tampered with or lost, etc., then the user's high-level requirements for system security cannot be met. Information security refers to the security of data when the computer is in use, that is, the network system will not maintain normal operation due to human factors [4][5]. Its security design is to protect computer application software, so as to ensure that user data is not subject to malicious attacks, loss and disclosure [6].…”
Section: Information Security and Assessment Methodsmentioning
confidence: 99%
“…GA is a search algorithm that mimics the process of natural selection to find the optimal solution to a problem. It starts with a set of random solutions and iteratively improves them by applying genetic operations such as selection, crossover, and mutation ( 31 ). PSO is a swarm-based optimization technique simulating the social behavior of a group of individuals to determine the optimal solution ( 32 ).…”
Section: Literature Reviewmentioning
confidence: 99%