• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 31
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 45
  • 16
  • 14
  • 14
  • 12
  • 12
  • 11
  • 10
  • 10
  • 9
  • 9
  • 8
  • 8
  • 8
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

A Compact Universal Antenna System for Automobiles

Che, Jiukun January 2020 (has links)
No description available.
32

Decentralized approach for IVI : Infrastructure-vehicle-information

Saleh, Abdallah January 2023 (has links)
With the growing number of vehicles on the road, improving traffic safety and efficiency has become a major challenge. One of the promising solutions is the implementation of Intelligent Transportation Systems (ITS), which utilizes communication technologies to facilitate real-time information sharing between vehicles and infrastructure. This research aims to contribute to the field of Intelligent Transportation Systems (ITS) improving traffic safety and efficiency achieving the Vision Zero goal. In this thesis, we focus on the performance analysis of two communication protocols used for two signal dissemination techniques for IVI (infrastructure-vehicle-information communication). Periodic, which sends signals at fixed intervals, and On-demand which sends signals upon request from road users. The results of our experiments showed that there are trade-offs between the periodic and on-demand approaches in V2I communications. The on-demand approach performs better in terms of PER (Packet error ratio), but it results in higher latency, even with low congestion. On the other hand, the periodic approach exhibits higher PDR (Packet delivery ratio) but suffers from inefficiencies due to the transmission of redundant messages resulting in higher PER. Our findings have implications for the scalability of V2I communications and can be translatable to other access technologies used in ITS.
33

Analysis of Using V2X DSRC Equipped Snowplows to Request Signal Preemption

Lau, Samantha Kathleen 04 August 2022 (has links)
Dedicated short-range communication (DSRC) systems, a form of vehicle-to-everything (V2X) systems, were placed on Utah Department of Transportation (UDOT) snowplows to request signal preemption. The study took place along five state routes in the Salt Lake City metropolitan area. Snowplows and intersections were equipped with the technology to communicate and process requests for signal preemption. Signal performance and vehicle performance analysis were performed to understand the impacts that snowplows requesting signal preemption had. Signal performance analysis was done to determine how snowplows with V2X systems using DSRC affected signals. Vehicle performance analysis was done to see if plowing and traffic efficiency and performance were improved, as well as evaluating safety implications of signal preemption. To perform the signal performance analysis, V2X data were collected to understand how often signal preemption was requested by snowplows, how often it was granted by signal controllers, and how long preemption requests affected signal controller timing. Snowplows requested preemption over 50 percent of the time they approached a signalized intersection. Of messages that requested signal preemption, over 80 percent were granted. On average, signal controllers are affected by preemption processing for less than 5 minutes. This shows that the system works as designed, is used often, and does not have adverse effects on signal controller. Data for vehicle performance analysis included analysis of snowplow speed data, general travel speed data, and crash data. These were collected to analyze the effects of snowplows requesting signal preemption on vehicle performance. The analysis showed that snowplow speeds are not changed due to the signal preemption system, but the number of times snowplows stopped was reduced. General travel speeds on equipped routes were more consistently closer to the speed limits than not equipped routes. Crash data showed a greater negative decrease on equipped routes than on not equipped routes. These findings showed minimal changes or impacts to vehicle performance, but anecdotal evidence from snowplow drivers indicates benefits from the system overall. There were various limitations in the analysis. Data granularity differed among datasets, making comparison between the different datasets difficult without reducing data integrity. Some datasets did not have much data, making statistical significance unclear. With these data limitations, conclusions were drawn, but do not fully describe all the potential benefits and impacts of snowplows with V2X systems that use DSRC to request signal preemption. Additional research is needed to better understand the impacts that snowplows requesting signal preemption has on different maintenance metrics, such as fuel usage and time spent plowing. It is also recommended that data used is explored for ways to improve the granularity.
34

Use of Connected Vehicle Technology for Improving Fuel Economy and Driveability of Autonomous Vehicles

Tamilarasan, Santhosh 08 July 2019 (has links)
No description available.
35

Feasibility Study of Vehicular Teleoperation over Cellular Network in Urban Scenario / Genomförbarhet studie av teleoperation av fordon via mobilnätverk i stadsscenario

Jin, Yifei January 2017 (has links)
With the continuous progress on autonomous vehicle and remote drivingtechniques, connection quality demands are changing compared withconventional quality of service. Vehicle to everything communication, asthe connectivity basis for these applications, has been built up on LongTerm Evolution basis, but due to various ethical and environmental issues,few implementations have been made in reality. Therefore simulation approachesare believed to provide valuable insights.To fully model an LTE vehicular network, in this work we first providea comparison study to select the preferable LTE simulator. Aimingto integrate communication nodes with mobility, a solution for simulationframework is developed based on a state-of-art comparison study on theexisting simulator frameworks. We then further develop the network simulator,and complement it with hybrid wireless channel modeling, channeland quality of service aware scheduler, and admission control strategies. Interms of instant optimization of the network, real-time access is emulatedfor external devices to communicate with the simulator. In this thesis,the evaluation of the framework performance considers two aspects: theperformance of the simulator in LTE V2X use case and the feasibility ofthe service, specifically, remote driving, under realistic network capacity.For our framework, the results indicate that it is feasible to realize remotedriving in an LTE urban scenario, but, as an example, we show that foran area of Kista, five vehicles could be hold by a base-station with guaranteedservice at most. / Med kontinuerliga framstegen p°a autonomt fordon och fj¨arrkontrollteknikf¨or¨andras kravet p°a anslutningskvalitet i j¨amf¨orelse med konventionell servicekvalitet.Fordon till allting (V2X) kommunikation, som anslutningsgrundf¨or dessa applikationer, har byggts upp p°a basis av Long TermEvolution (LTE) system, men p°a grund av olika etiska och milj¨om¨assigaproblem har f°a implementeringar gjorts i verkligheten. D¨arf¨or antas simuleringsmetoderge v¨ardefulla insikter.Att fullt ut modellera ett LTE-fordon n¨atverk, i det h¨ar arbetet ger vif¨orst en j¨amf¨orelsestudie f¨or att v¨alja den f¨oredragna LTE-simulatorn.I syfte att integrera kommunikationsnoder med r¨orlighet utvecklas enl¨osning f¨or ett simuleringsramverk baserat p°a en j¨amf¨orelsestudie p°a befintligasimulatorramar. Vi utvecklar sedan n¨atverkssimulatorn ytterligare,och kompletterar den med hybrid tr°adl¨os kanalmodellering, kanal ochservicekvalitetmedvetna schemal¨aggning och antagningskontrollstrategier.N¨ar det g¨aller direkt n¨atverksoptimering, emuleras realtidsanslutningav externa enheter f¨or att kommunicera med simulatorn. I denna avhandlingutv¨arderas ramverken i tv°a aspekter: simulatorns prestanda i LTEV2X-anv¨andningsomr°adet och genomf¨orbarheten av tj¨ansten, s¨arskilt fj¨arrk¨orning,under realistisk n¨atkapacitet. In v°ara ramverk visar resultaten att det ¨arm¨ojligt att realisera fj¨arrk¨orning i ett LTE-urbana scenario, men som exempelvisar vi att f¨or ett omr°ade i Kista skulle som mest fem fordon kunnask¨otas av en basstation med garanterad service.
36

The Impact of Cyberattacks on Safe and Efficient Operations of Connected and Autonomous Vehicles

McManus, Ian Patrick 01 September 2021 (has links)
The landscape of vehicular transportation is quickly shifting as emerging technologies continue to increase in intelligence and complexity. From the introduction of Intelligent Transportation Systems (ITS) to the quickly developing field of Connected and Autonomous Vehicles (CAVs), the transportation industry is experiencing a shift in focus. A move to more autonomous and intelligent transportation systems brings with it a promise of increased equity, efficiency, and safety. However, one aspect that is overlooked in this shift is cybersecurity. As intelligent systems and vehicles have been introduced, a large amount of research has been conducted showing vulnerabilities in them. With a new connected transportation system emerging, a multidisciplinary approach will be required to develop a cyber-resilient network. Ensuring protection against cyberattacks and developing a system that can handle their consequences is a key objective moving forward. The first step to developing this system is understanding how different cyberattacks can negatively impact the operations of the transportation system. This research aimed to quantify the safety and efficiency impacts of an attack on the transportation network. To do so, a simulation was developed using Veins software to model a network of intelligent intersections in an urban environment. Vehicles communicated with Road-Side Units (RSUs) to make intersection reservations – effectively simulating CAV vehicle network. Denial of Service (DoS) and Man in the Middle (MITM) attacks were simulated by dropping and delaying vehicle's intersection reservation requests, respectively. Attacks were modeled with varying degrees of severity by changing the number of infected RSUs in the system and their attack success rates. Data analysis showed that severe attacks, either from a DoS or MITM attack, can have significant impact on the transportation network's operations. The worst-case scenario for each introduced an over 20% increase in delay per vehicle. The simulation showed also that increasing the number of compromised RSUs directly related to decreased safety and operational efficiency. Successful attacks also produced a high level of variance in their impact. One other key finding was that a single compromised RSU had very limited impact on the transportation network. These findings highlight the importance of developing security and resilience in a connected vehicle environment. Building a network that can respond to an initial attack and prevent an attack's dissemination through the network is crucial in limiting the negative effects of the attack. If proper resilience planning is not implemented for the next generation of transportation, adversaries could cause great harm to safety and efficiency with relative ease. The next generation of vehicular transportation must be able to withstand cyberattacks to function. Understanding their impact is a key first step for engineers and planners on the long road to ensuring a secure transportation network. / Master of Science / The landscape of transportation is quickly shifting as transportation technologies continue to increase in intelligence and complexity. The transportation industry is shifting its focus to Connected and Autonomous Vehicles (CAVs). The move to more autonomous and intelligent transportation systems brings with it a promise of increased transportation equity, efficiency, and safety. However, one aspect that is often overlooked in this shift is cybersecurity. As intelligent systems and vehicles have been introduced, a large amount of research has been conducted showing cyber vulnerabilities in them. With a new connected transportation system emerging, a multidisciplinary approach will be required to prevent and handle attacks. Ensuring protection against cyberattacks is a key objective moving forward. The first step to developing this system is understanding how different cyberattacks can negatively impact the operations of the transportation system. This research aimed to measure the safety and efficiency impacts of an attack on the transportation network. To do so, a simulation was developed to model an intelligent urban road network. Vehicles made reservations at each intersection they passed – effectively simulating an autonomous vehicle network. Denial of Service (DoS) and Man in the Middle (MITM) attacks were simulated by dropping, and delaying vehicle's intersection reservation requests, respectively. These cyberattacks were modeled with varying degrees of severity to test the different impacts on the transportation network. Analysis showed that severe attacks can have significant impact on the transportation network's operations. The worst-case scenario for each attack introduced an over 20% increase in delay per vehicle. The simulation showed also that increasing the number of attacked intersections directly related to decreased safety and operational efficiency. Successful attacks also produced a high level of variance in their impact. One other key finding was that a single compromised RSU had very limited impact on the transportation network. These findings highlight the importance of developing security and resilience in a connected vehicle environment. Building a transportation network that can respond to an initial attack and prevent it from impacting the entire network is crucial in limiting the negative effects of the attack. If proper resilience planning is not implemented for CAVs, hackers could cause great harm to safety and efficiency with relative ease. The next generation of vehicular transportation must be able to withstand cyberattacks to function. Understanding their impact is a key first step for engineers and planners on the long road to ensuring a secure transportation network.
37

Stochastic Geometry for Vehicular Networks

Chetlur Ravi, Vishnu Vardhan 11 September 2020 (has links)
Vehicular communication networks are essential to the development of intelligent navigation systems and improvement of road safety. Unlike most terrestrial networks of today, vehicular networks are characterized by stringent reliability and latency requirements. In order to design efficient networks to meet these requirements, it is important to understand the system-level performance of vehicular networks. Stochastic geometry has recently emerged as a powerful tool for the modeling and analysis of wireless communication networks. However, the canonical spatial models such as the 2D Poisson point process (PPP) does not capture the peculiar spatial layout of vehicular networks, where the locations of vehicular nodes are restricted to roadways. Motivated by this, we consider a doubly stochastic spatial model that captures the spatial coupling between the vehicular nodes and the roads and analyze the performance of vehicular communication networks. We model the spatial layout of roads by a Poisson line process (PLP) and the locations of nodes on each line (road) by a 1D PPP, thereby forming a Cox process driven by a PLP or Poisson line Cox process (PLCP). In this dissertation, we develop the theory of the PLCP and apply it to study key performance metrics such as coverage probability and rate coverage for vehicular networks under different scenarios. First, we compute the signal-to-interference plus noise ratio (SINR)-based success probability of the typical communication link in a vehicular ad hoc network (VANET). Using this result, we also compute the area spectral efficiency (ASE) of the network. Our results show that the optimum transmission probability that maximizes the ASE of the network obtained for the Cox process differs significantly from that of the conventional 1D and 2D PPP models. Second, we calculate the signal-to-interference ratio (SIR)-based downlink coverage probability of the typical receiver in a vehicular network for the cellular network model in which each receiver node connects to its closest transmitting node in the network. The conditioning on the serving node imposes constraints on the spatial configuration of interfering nodes and also the underlying distribution of lines. We carefully handle these constraints using various fundamental distance properties of the PLCP and derive the exact expression for the coverage probability. Third, building further on the above mentioned works, we consider a more complex cellular vehicle-to-everything (C-V2X) communication network in which the vehicular nodes are served by roadside units (RSUs) as well as cellular macro base stations (MBSs). For this setup, we present the downlink coverage analysis of the typical receiver in the presence of shadowing effects. We address the technical challenges induced by the inclusion of shadowing effects by leveraging the asymptotic behavior of the Cox process. These results help us gain useful insights into the behavior of the networks as a function of key network parameters, such as the densities of the nodes and selection bias. Fourth, we characterize the load on the MBSs due to vehicular users, which is defined as the number of vehicular nodes that are served by the MBS. Since the limited network resources are shared by multiple users in the network, the load distribution is a key indicator of the demand of network resources. We first compute the distribution of the load on MBSs due to vehicular users in a single-tier vehicular network. Building on this, we characterize the load on both MBSs and RSUs in a heterogeneous C-V2X network. Using these results, we also compute the rate coverage of the typical receiver in the network. Fifth and last, we explore the applications of the PLCP that extend beyond vehicular communications. We derive the exact distribution of the shortest path distance between the typical point and its nearest neighbor in the sense of path distance in a Manhattan Poisson line Cox process (MPLCP), which is a special variant of the PLCP. The analytical framework developed in this work allows us to answer several important questions pertaining to transportation networks, urban planning, and personnel deployment. / Doctor of Philosophy / Vehicular communication networks are essential to the development of intelligent transportation systems (ITS) and improving road safety. As the in-vehicle sensors can assess only their immediate environment, vehicular nodes exchange information about critical events, such as accidents and sudden braking, with other vehicles, pedestrians, roadside infrastructure, and cellular base stations in order to make critical decisions in a timely manner. Considering the time-sensitive nature of this information, it is of paramount importance to design efficient communication networks that can support the exchange of this information with reliable and high-speed wireless links. Typically, prior to actual deployment, any design of a wireless network is subject to extensive analysis under various operational scenarios using computer simulations. However, it is not viable to rely entirely on simulations for the system design of highly complex systems, such as the vehicular networks. Hence, it is necessary to develop analytical methods that can complement simulators and also serve as a benchmark. One of the approaches that has gained popularity in the recent years for the modeling and analysis of large-scale wireless networks is the use of tools from stochastic geometry. In this approach, we endow the locations of wireless nodes with some distribution and analyze various aspects of the network by leveraging the properties of the distribution. Traditionally, wireless networks have been studied using simple spatial models in which the wireless nodes can lie anywhere on the domain of interest (often a 1D or a 2D plane). However, vehicular networks have a unique spatial geometry because the locations of vehicular nodes are restricted to roadways. Therefore, in order to model the locations of vehicular nodes in the network, we have to first model the underlying road systems. Further, we should also consider the randomness in the locations of vehicles on each road. So, we consider a doubly stochastic model called Poisson line Cox process (PLCP), in which the spatial layout of roads are modeled by random lines and the locations of vehicles on the roads are modeled by random set of points on these lines. As is usually the case in wireless networks, multiple vehicular nodes and roadside units (RSUs) operate at the same frequency due to the limited availability of radio frequency spectrum, which causes interference. Therefore, any receiver in the network obtains a signal that is a mixture of the desired signal from the intended transmitter and the interfering signals from the other transmitters. The ratio of the power of desired signal to the aggregate power of the interfering signals, which is called as the signal-to-interference ratio (SIR), depends on the locations of the transmitters with respect to the receiver. A receiver in the network is said to be in coverage if the SIR measured at the location of the receiver exceeds the required threshold to successfully decode the message. The probability of occurrence of this event is referred to as the coverage probability and it is one of the fundamental metrics that is used to characterize the performance of a wireless network. In our work, we have analytically characterized the coverage probability of the typical vehicular node in the network. This was the first work to present the coverage analysis of a vehicular network using the aforementioned doubly stochastic model. In addition to coverage probability, we have also explored other performance metrics such as data rate, which is the number of bits that can be successfully communicated per unit time, and spectral efficiency. Our analysis has revealed interesting trends in the coverage probability as a function of key system parameters such as the density of roads in a region (total length of roads per unit area), and the density of vehicles on the roads. We have shown that the vehicular nodes in areas with high density of roads have lower coverage than those in areas with sparsely distributed roads. On the other hand, the coverage probability of a vehicular node improves as the density of vehicles on the roads increases. Such insights are quite useful in the design and deployment of network infrastructure. While our research was primarily focused on communication networks, the utility of the spatial models considered in these works extends to other areas of engineering. For a special variant of the PLCP, we have derived the distribution of the shortest path distance between an arbitrary point and its nearest neighbor in the sense of path distance. The analytical framework developed in this work allows us to answer several important questions pertaining to infrastructure planning and personnel deployment.
38

Designing Multimodal Warning Signals for Cyclists of the Future

Nordmark, Anton January 2019 (has links)
Traffic is a complex environment in which many actors take part; several new technologies bring promises of reducing this complexity. However, cyclists—a particularly vulnerable road user group—have so far been somewhat put aside in these new developments, among them being Cooperative Intelligent Traffic Systems (C-ITS) and their aspects of human–computer interaction. This master’s thesis of industrial design engineering presents five multimodal collision warning signals for cyclists—future ones in these supposed C-ITS—using a novel application of bone conduction headphones (BCH) via sensations of both sound and touch. The thesis project was conducted as a complementary subset of the larger research project ‘V2Cyclist’ orchestrated by RISE Interactive. V2Cyclist set out to adapt the wireless V2X-protocol for cyclists by developing a physical prototype in the form of a bicycle helmet and corresponding human–computer interface. A significant part of the theoretical framework for this thesis was multiple resource theory: tasks in a different modality can be performed more effectively than in one already taxed attentively. Literature on human factors was also applied, particularly with regards to the perception of sound; evidence suggests that humans evolved a perceptual bias for threatening and ‘looming’ sounds that appear to encroach our peripersonal space; ethological findings point toward the association with low-frequency sounds to largeness. Sound design techniques usually applied to more artistic ends, such as synthesis and mixing, were repurposed for the novel, audiotactile context of this thesis. The thesis process was rooted in design thinking and consisted of four stages: context immersion, ideation, concept development, and lastly evaluation; converging and diverging the novel design space of using BCH in an audiotactile, i.e. bimodal way. The divergent approach generated a wide range of ideas. The later convergent approach did not result in one, definite design as further evaluation is required but also due to unknowns in terms of future hardware and network constraints. Given the plurality and diversity of cyclists, it may well follow that there is no optimal collision warning design in the singular. Hence, a range of five different solutions is presented. Each of the five multimodal collision warnings presents a different approach to conveying a sense of danger and urgency. Some warning signals are static in type, while others are more dynamic. Given the presumed rarity of collision warnings, multiple design techniques and rationales were applied separately, as well as in combination, to create different warning stimuli that signaled high urgency in an intuitive way. Namely, the use of: conventions in design and culture; explicitness in the form of speech; visceral appeal via threatening and animalistic timbres; dynamic and procedurally generated feedback; multimodal salience; crossmodal evocation of ‘roughness;’ size-sound symbolism to imply largeness; and innately activating characteristics of looming sounds. / Trafiken är en komplex miljö med många deltagare; diverse ny teknik gör anspråk på att underlätta denna komplexitet. Men, cyklister—en särskilt utsatt grupp av trafikanter—har hittills hamnat i skymundan för sådana utvecklingar. Vidare, aspekten av användbara gränssnitt för cyklister inom sådana uppkopplade och samverkande trafiksystem (C-ITS) har utforskats desto mindre. Det här examensarbetet inom Teknisk design presenterar fem multimodala kollisionsvarningar avsedda för cyklister—framtida sådana i dessa C-ITS—genom en ny och bimodal användning av benledande hörlurar via både ljud och vibrationer. Examensarbetet genomfördes i koppling till forskningsprojektet V2Cyclist, orkestrerat av RISE Interactive, vars projektmål var att anpassa det trådlösa kommunikationsprotokollet V2X för cyklister via en fysisk prototyp i form av en cykelhjälm och parallellt utveckla ett tillhörande användargränssnitt. En viktig del av det teoretiska ramverket för det här examensarbetet grundar sig på multiple resource theory: uppgifter kan utföras mer effektivt i en annan modalitet än i en som redan är belastad med uppmärksamhet. Mänskliga faktorer och teori om vår uppfattning användes; bevis pekar på att människor har evolutionärt utvecklat en bias för hotande ljud som upplevs inkräkta på vårt närmsta personliga revir; etologiska rön visar på en koppling mellan lågfrekventa ljud och ‘storhet.’ Tekniker inom ljuddesign vanligtvis använda till mer artistiska ändamål, såsom syntes och mixning, användes här till godo för att utforska den nya och bimodala designrymden. Processen för arbetet grundade sig i design thinking och bestod av fyra faser: kontextfördjupning, idégenerering, konceptutveckling, och utvärdering. En ny och tidigare outforskad designrymd beståendes av en bimodal, ljudtaktil användning av benledande hörlurar divergerades och konvergerades. Ett initialt utforskande angreppssätt gav upphov till en bred mängd av idéer. Ett senare renodlande angreppssätt gick, dock, inte hela vägen till endast en optimal lösning, då vidare utvärdering krävs men också på grund av okända teknologiska begränsningar. Dessutom, givet cyklisters stora mångfald, kan det möjligtvis följa att det inte finns någon enskild design av den optimala kollisionsvarningen. Ett spann på fem olika lösningar presenteras därmed. Fem koncept för multimodala kollisionsvarningar presenteras där varje variant uttrycker fara och kritiskhet på olika sätt. Vissa är statiska i typ, medan andra verkar mer kontinuerligt och dynamiskt. Det antogs att kollisionsvarningar sker sällan. Olika designtekniker och motiveringar har använts, ibland i kombination med varandra, för att skapa kollisionsvarningar vars avsikter omedelbart förstås: normer inom design och kultur gällande ljud; uttalad kommunikation i form av tal; anspråk på människors biologiska intuition via hotfulla och djurliknande klangfärger; dynamisk och procedurellt genererad feedback; multimodal effektfullhet; korsmodal känsla av grova texturer; size-sound symbolism för att antyda ‘storhet;’ samt de naturligt aktiverande egenskaperna hos looming sounds.
39

Designing and simulating a Car2X communication system using the example of an intelligent traffic sign

Shil, Manash 03 March 2015 (has links) (PDF)
The thesis with the title “Designing and simulating a Car2X communication system using the example of an intelligent traffic sign” has been done in Chemnitz University of Technology in the faculty of Computer Science. The purpose of this thesis is to define a layered architecture for Infrastructure to Vehicle (I2V) communication and the implementation of a sample intelligent traffic sign (variable speed limit) application for a Car2X communication system. The layered architecture of this thesis is defined based on three related projects. The application is implemented using the defined layered architecture. Considering the availability of hardware, the implementation is done using the network simulator OMNET++. To check the feasibility of the application three scenarios are created and integrated with the application. The evaluation is done based on the result log files of the simulation which show that the achieved results conform with the expected results, except some minor limitations.
40

Designing and simulating a Car2X communication system using the example of an intelligent traffic sign

Shil, Manash 03 March 2015 (has links)
The thesis with the title “Designing and simulating a Car2X communication system using the example of an intelligent traffic sign” has been done in Chemnitz University of Technology in the faculty of Computer Science. The purpose of this thesis is to define a layered architecture for Infrastructure to Vehicle (I2V) communication and the implementation of a sample intelligent traffic sign (variable speed limit) application for a Car2X communication system. The layered architecture of this thesis is defined based on three related projects. The application is implemented using the defined layered architecture. Considering the availability of hardware, the implementation is done using the network simulator OMNET++. To check the feasibility of the application three scenarios are created and integrated with the application. The evaluation is done based on the result log files of the simulation which show that the achieved results conform with the expected results, except some minor limitations.

Page generated in 0.0416 seconds