close menu
Bookswagon-24x7 online bookstore
close menu
My Account
29%
Autonomous Vehicles, Volume 1: Using Machine Intelligence

Autonomous Vehicles, Volume 1: Using Machine Intelligence

          
5
4
3
2
1

Available


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

AUTONOMOUS VEHICLES

Addressing the current challenges, approaches and applications relating to autonomous vehicles, this groundbreaking new volume presents the research and techniques in this growing area, using Internet of Things (IoT), Machine Learning (ML), Deep Learning, and Artificial Intelligence (AI).

This book provides and addresses the current challenges, approaches, and applications relating to autonomous vehicles, using Internet of Things (IoT), machine learning, deep learning, and Artificial Intelligence (AI) techniques. Several self-driving or autonomous (“driverless”) cars, trucks, and drones incorporate a variety of IoT devices and sensing technologies such as sensors, gyroscopes, cloud computing, and fog layer, allowing the vehicles to sense, process, and maintain massive amounts of data on traffic, routes, suitable times to travel, potholes, sharp turns, and robots for pipe inspection in the construction and mining industries.

Few books are available on the practical applications of unmanned aerial vehicles (UAVs) and autonomous vehicles from a multidisciplinary approach. Further, the available books only cover a few applications and designs in a very limited scope. This new, groundbreaking volume covers real-life applications, business modeling, issues, and solutions that the engineer or industry professional faces every day that can be transformed using intelligent systems design of autonomous systems. Whether for the student, veteran engineer, or another industry professional, this book, and its companion volume, are must-haves for any library.



Table of Contents:

Preface xiii

1 Anomalous Activity Detection Using Deep Learning Techniques in Autonomous Vehicles 1
Amit Juyal, Sachin Sharma and Priya Matta

1.1 Introduction 2

1.1.1 Organization of Chapter 2

1.2 Literature Review 3

1.3 Artificial Intelligence in Autonomous Vehicles 7

1.4 Technologies Inside Autonomous Vehicle 9

1.5 Major Tasks in Autonomous Vehicle Using AI 11

1.6 Benefits of Autonomous Vehicle 12

1.7 Applications of Autonomous Vehicle 13

1.8 Anomalous Activities and Their Categorization 13

1.9 Deep Learning Methods in Autonomous Vehicle 14

1.10 Working of Yolo 17

1.11 Proposed Methodology 18

1.12 Proposed Algorithms 20

1.13 Comparative Study and Discussion 21

1.14 Conclusion 23

References 23

2 Algorithms and Difficulties for Autonomous Cars Based on Artificial Intelligence 27
Sumit Dhariwal, Avani Sharma and Avinash Raipuria

2.1 Introduction 27

2.1.1 Algorithms for Machine Learning in Autonomous Driving 30

2.1.2 Regression Algorithms 30

2.1.3 Design Identification Systems (Classification) 31

2.1.4 Grouping Concept 31

2.1.5 Decision Matrix Algorithms 31

2.2 In Autonomous Cars, AI Algorithms are Applied 32

2.2.1 Algorithms for Route Planning and Control 32

2.2.2 Method for Detecting Items 32

2.2.3 Algorithmic Decision-Making 33

2.3 AI’s Challenges with Self-Driving Vehicles 33

2.3.1 Feedback in Real Time 33

2.3.2 Complexity of Computation 34

2.3.3 Black Box Behavior 34

2.3.4 Precision and Dependability 35

2.3.5 The Safeguarding 35

2.3.6 AI and Security 35

2.3.7 AI and Ethics 36

2.4 Conclusion 36

References 36

3 Trusted Multipath Routing for Internet of Vehicles against DDoS Assault Using Brink Controller in Road Awareness (tmrbc-iov) 39
Piyush Chouhan and Swapnil Jain

3.1 Introduction 40

3.2 Related Work 47

3.3 VANET Grouping Algorithm (VGA) 50

3.4 Extension of Trusted Multipath Distance Vector Routing (TMDR-Ext) 51

3.5 Conclusion 57

References 58

4 Technological Transformation of Middleware and Heuristic Approaches for Intelligent Transport System 61
Rajender Kumar, Ravinder Khanna and Surender Kumar

4.1 Introduction 61

4.2 Evolution of VANET 62

4.3 Middleware Approach 64

4.4 Heuristic Search 65

4.5 Reviews of Middleware Approaches 72

4.6 Reviews of Heuristic Approaches 75

4.7 Conclusion and Future Scope 78

References 79

5 Recent Advancements and Research Challenges in Design and Implementation of Autonomous Vehicles 83
Mohit Kumar and V. M. Manikandan

5.1 Introduction 84

5.1.1 History and Motivation 85

5.1.2 Present Scenario and Need for Autonomous Vehicles 85

5.1.3 Features of Autonomous Vehicles 86

5.1.4 Challenges Faced by Autonomous Vehicles 86

5.2 Modules/Major Components of Autonomous Vehicles 87

5.2.1 Levels of Autonomous Vehicles 87

5.2.2 Functional Components of An Autonomous Vehicle 89

5.2.3 Traffic Control System of Autonomous Vehicles 91

5.2.4 Safety Features Followed by Autonomous Vehicles 91

5.3 Testing and Analysis of An Autonomous Vehicle in a Virtual Prototyping Environment 94

5.4 Application Areas of Autonomous Vehicles 95

5.5 Artificial Intelligence (AI) Approaches for Autonomous Vehicles 97

5.5.1 Pedestrian Detection Algorithm (PDA) 97

5.5.2 Road Signs and Traffic Signal Detection 99

5.5.3 Lane Detection System 102

5.6 Challenges to Design Autonomous Vehicles 104

5.7 Conclusion 110

References 110

6 Review on Security Vulnerabilities and Defense Mechanism in Drone Technology 113
Chaitanya Singh and Deepika Chauhan

6.1 Introduction 113

6.2 Background 114

6.3 Security Threats in Drones 115

6.3.1 Electronics Attacks 115

6.3.1.1 GPS and Communication Jamming Attacks 116

6.3.1.2 GPS and Communication Spoofing Attacks 117

6.3.1.3 Eavesdropping 117

6.3.1.4 Electromagnetic Interference 120

6.3.1.5 Laser Attacks 120

6.3.2 Cyber-Attacks 120

6.3.2.1 Man-in-Middle Attacks 121

6.3.2.2 Black Hole and Grey Hole 121

6.3.2.3 False Node Injection 121

6.3.2.4 False Communication Data Injection 121

6.3.2.5 Firmware’s Manipulations 121

6.3.2.6 Sleep Deprivation 122

6.3.2.7 Malware Infection 122

6.3.2.8 Packet Sniffing 122

6.3.2.9 False Database Injection 122

6.3.2.10 Replay Attack 123

6.3.2.11 Network Isolations 123

6.3.2.12 Code Injection 123

6.3.3 Physical Attacks 123

6.3.3.1 Key Logger Attacks 123

6.3.3.2 Camera Spoofing 124

6.4 Defense Mechanism and Countermeasure Against Attacks 124

6.4.1 Defense Techniques for GPS Spoofing 124

6.4.2 Defense Technique for Man-in-Middle Attacks 124

6.4.3 Defense against Keylogger Attacks 127

6.4.4 Defense against Camera Spoofing Attacks 127

6.4.5 Defense against Buffer Overflow Attacks 128

6.4.6 Defense against Jamming Attack 128

6.5 Conclusion 128

References 128

7 Review of IoT-Based Smart City and Smart Homes Security Standards in Smart Cities and Home Automation 133
Dnyaneshwar Vitthal Kudande, Chaitanya Singh and Deepika Chauhan

7.1 Introduction 133

7.2 Overview and Motivation 134

7.3 Existing Research Work 136

7.4 Different Security Threats Identified in IoT-Used Smart Cities and Smart Homes 136

7.4.1 Security Threats at Sensor Layer 136

7.4.1.1 Eavesdropping Attacks 137

7.4.1.2 Node Capturing Attacks 138

7.4.1.3 Sleep Deprivation Attacks 138

7.4.1.4 Malicious Code Injection Attacks 138

7.4.2 Security Threats at Network Layer 138

7.4.2.1 Distributed Denial of Service (DDOS) Attack 139

7.4.2.2 Sniffing Attack 139

7.4.2.3 Routing Attack 139

7.4.2.4 Traffic Examination Attacks 140

7.4.3 Security Threats at Platform Layer 140

7.4.3.1 SQL Injection 140

7.4.3.2 Cloud Malware Injection 141

7.4.3.3 Storage Attacks 141

7.4.3.4 Side Channel Attacks 141

7.4.4 Security Threats at Application Layer 141

7.4.4.1 Sniffing Attack 141

7.4.4.2 Reprogram Attack 142

7.4.4.3 Data Theft 142

7.4.4.4 Malicious Script Attack 142

7.5 Security Solutions For IoT-Based Environment in Smart Cities and Smart Homes 142

7.5.1 Blockchain 142

7.5.2 Lightweight Cryptography 143

7.5.3 Biometrics 143

7.5.4 Machine Learning 143

7.6 Conclusion 144

References 144

8 Traffic Management for Smart City Using Deep Learning 149
Puja Gupta and Upendra Singh

8.1 Introduction 150

8.2 Literature Review 151

8.3 Proposed Method 154

8.4 Experimental Evaluation 155

8.4.1 Hardware and Software Configuration 155

8.4.2 About Dataset 156

8.4.3 Implementation 156

8.4.4 Result 157

8.5 Conclusion 158

References 158

9 Cyber Security and Threat Analysis in Autonomous Vehicles 161
Siddhant Dash and Chandrashekhar Azad

9.1 Introduction 162

9.2 Autonomous Vehicles 162

9.2.1 Autonomous vs. Automated 163

9.2.2 Significance of Autonomous Vehicles 163

9.2.3 Challenges in Autonomous Vehicles 164

9.2.4 Future Aspects 165

9.3 Related Works 165

9.4 Security Problems in Autonomous Vehicles 167

9.4.1 Different Attack Surfaces and Resulting Attacks 168

9.5 Possible Attacks in Autonomous Vehicles 170

9.5.1 Internal Network Attacks 170

9.5.2 External Attacks 173

9.6 Defence Strategies against Autonomous Vehicle Attacks 175

9.6.1 Against Internal Network Attacks 175

9.6.2 Against External Attack 176

9.7 Cyber Threat Analysis 177

9.8 Security and Safety Standards in AVs 178

9.9 Conclusion 179

References 179

10 Big Data Technologies in UAV’s Traffic Management System: Importance, Benefits, Challenges and Applications 181
Piyush Agarwal, Sachin Sharma and Priya Matta

10.1 Introduction 182

10.2 Literature Review 183

10.3 Overview of UAV’s Traffic Management System 185

10.4 Importance of Big Data Technologies and Algorithm 186

10.5 Benefits of Big Data Techniques in UTM 189

10.6 Challenges of Big Data Techniques in UTM 190

10.7 Applications of Big Data Techniques in UTM 192

10.8 Case Study and Future Aspects 198

10.9 Conclusion 199

References 199

11 Reliable Machine Learning-Based Detection for Cyber Security Attacks on Connected and Autonomous Vehicles 203
Ambika N.

11.1 Introduction 204

11.2 Literature Survey 207

11.3 Proposed Architecture 210

11.4 Experimental Results 211

11.5 Analysis of the Proposal 211

11.6 Conclusion 213

References 214

12 Multitask Learning for Security and Privacy in IoV (Internet of Vehicles) 217
Malik Mustafa, Ahmed Mateen Buttar, Guna Sekhar Sajja, Sanjeev Gour, Mohd Naved and P. William

12.1 Introduction 218

12.2 IoT Architecture 220

12.3 Taxonomy of Various Security Attacks in Internet of Things 221

12.3.1 Perception Layer Attacks 221

12.3.2 Network Layer Attacks 223

12.3.3 Application Layer Attacks 224

12.4 Machine Learning Algorithms for Security and Privacy in IoV 225

12.5 A Machine Learning-Based Learning Analytics Methodology for Security and Privacy in Internet of Vehicles 227

12.5.1 Methodology 227

12.5.2 Result Analysis 229

12.6 Conclusion 230

References 230

13 ML Techniques for Attack and Anomaly Detection in Internet of Things Networks 235
Vinod Mahor, Sadhna Bijrothiya, Rina Mishra and Romil Rawat

13.1 Introduction 236

13.2 Internet of Things 236

13.3 Cyber-Attack in IoT 239

13.4 IoT Attack Detection in ML Technics 244

13.5 Conclusion 249

References 249

14 Applying Nature-Inspired Algorithms for Threat Modeling in Autonomous Vehicles 253
Manas Kumar Yogi, Siva Satya Prasad Pennada, Sreeja Devisetti and Sri Siva Lakshmana Reddy Dwarampudi

14.1 Introduction 254

14.2 Related Work 263

14.3 Proposed Mechanism 265

14.4 Performance Results 268

14.5 Future Directions 270

14.6 Conclusion 273

References 273

15 The Smart City Based on AI and Infrastructure: A New Mobility Concepts and Realities 277
Vinod Mahor, Sadhna Bijrothiya, Rina Mishra, Romil Rawat and Alpesh Soni

15.1 Introduction 278

15.2 Research Method 280

15.3 Vehicles that are Both Networked and Autonomous 282

15.4 Personal Aerial Automobile Vehicles and Unmanned Aerial Automobile Vehicles 287

15.5 Mobile Connectivity as a Service 288

15.6 Major Role for Smart City Development with IoT and Industry 4.0 289

15.7 Conclusion 291

References 292

Index 297


Best Seller

| | See All

Product Details
  • ISBN-13: 9781119871958
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-Scrivener
  • Height: 250 mm
  • No of Pages: 320
  • Spine Width: 15 mm
  • Weight: 694 gr
  • ISBN-10: 1119871956
  • Publisher Date: 19 Dec 2022
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Sub Title: Using Machine Intelligence
  • Width: 150 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Be The First to Review
Autonomous Vehicles, Volume 1: Using Machine Intelligence
John Wiley & Sons Inc -
Autonomous Vehicles, Volume 1: Using Machine Intelligence
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Autonomous Vehicles, Volume 1: Using Machine Intelligence

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    | | See All


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA