• Title/Summary/Keyword: Autonomous Driving Functions

Search Result 62, Processing Time 0.023 seconds

Development of ISO 26262 based Requirements Analysis and Verification Method for Efficient Development of Vehicle Software

  • Kyoung Lak Choi;Min Joong Kim;Young Min Kim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.219-230
    • /
    • 2023
  • With the development of autonomous driving technology, as the use of software in vehicles increases, the complexity of the system increases and the difficulty of development increases. Developments that meet ISO 26262 must be carried out to reduce the malfunctions that may occur in vehicles where the system is becoming more complex. ISO 26262 for the functional safety of the vehicle industry proposes to consider functional safety from the design stage to all stages of development. Specifically at the software level, the requirements to be complied with during development and the requirements to be complied with during verification are defined. However, it is not clearly expressed about specific design methods or development methods, and it is necessary to supplement development guidelines. The importance of analysis and verification of requirements is increasing due to the development of technology and the increase of system complexity. The vehicle industry must carry out developments that meet functional safety requirements while carrying out various development activities. We propose a process that reflects the perspective of system engineering to meet the smooth application and developmentrequirements of ISO 26262. In addition, the safety analysis/verification FMEA processforthe safety of the proposed ISO 26262 function was conducted based on the FCAS (Forward Collision Avoidance Assist System) function applied to autonomous vehicles and the results were confirmed. In addition, the safety analysis/verification FMEA process for the safety of the proposed ISO 26262 function was conducted based on the FCAS (Forward Collision Avoidance Assist System) function applied to the advanced driver assistance system and the results were confirmed.

Pseudonym Management in Autonomous Driving Environment (자율주행환경에서 가명성 관리)

  • Hong, Jin Keun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.10
    • /
    • pp.29-35
    • /
    • 2017
  • In this paper, we describe certificate policy and characteristics in cooperation condition with Cooperative intelligent transport system and autonomous driving vehicle. Among the authentication functions of the vehicle, there is a pseudonym authentication function. This pseudonymity is provided for the purpose of protecting the privacy of information that identifies the vehicle driver, passenger or vehicle. Therefore, the purpose of the pseudonym certificate is to be used for reporting on BSM authentication or misbehavior. However, this pseudonym certificate is used in the OBE of the vehicle and does not have a cryptographic key. In this paper, we consider a method for managing a pseudonym authentication function, which is a key feature of the pseudonym certificate, such as location privacy protection, pseudonym function, disposition of linkage value or CRL, request shuffling processing by registry, butterfly key processing, The authentication policy and its characteristics are examined in detail. In connection with the management of pseudonymes of the vehicle, the attacker must record the BSM transmission and trace the driver or vehicle. In this respect, the results of this study are contributing.

A Study on Sensor Modeling for Virtual Testing of ADS Based on MIL Simulation (MIL 시뮬레이션 기반 ADS 기능 검증을 위한 환경 센서 모델링에 관한 연구)

  • Shin, Seong-Geun;Baek, Yun-Seok;Park, Jong-Ki;Lee, Hyuck-Kee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.6
    • /
    • pp.331-345
    • /
    • 2021
  • Virtual testing is considered a major requirement for the safety verification of autonomous driving functions. For virtual testing, both the autonomous vehicle and the driving environment should be modeled appropriately. In particular, a realistic modeling of the perception sensor system such as the one having a camera and radar is important. However, research on modeling to consistently generate realistic perception results is lacking. Therefore, this paper presents a sensor modeling method to provide realistic object detection results in a MILS (Model in the Loop Simulation) environment. First, the key parameters for modeling are defined, and the object detection characteristics of actual cameras and radar sensors are analyzed. Then, the detection characteristics of a sensor modeled in a simulation environment, based on the analysis results, are validated through a correlation coefficient analysis that considers an actual sensor.

A Study on Virtual Environment Platform for Autonomous Tower Crane (타워크레인 자율화를 위한 가상환경 플랫폼 개발에 관한 연구)

  • Kim, Myeongjun;Yoon, Inseok;Kim, Namkyoun;Park, Moonseo;Ahn, Changbum;Jung, Minhyuk
    • Korean Journal of Construction Engineering and Management
    • /
    • v.23 no.4
    • /
    • pp.3-14
    • /
    • 2022
  • Autonomous equipment requires a large amount of data from various environments. However, it takes a lot of time and cost for an experiment in a real construction sites, which are difficulties in data collection and processing. Therefore, this study aims to develop a virtual environment for autonomous tower cranes technology development and validation. The authors defined automation functions and operation conditions of tower cranes with three performance criteria: operational design domain, object and event detection and response, and minimum functional conditions. Afterward, this study developed a virtual environment for learning and validation for autonomous functions such as recognition, decision making, and control using the Unity game engine. Validation was conducted by construction industry experts with a fidelity which is the representative matrix for virtual environment assessment. Through the virtual environment platform developed in this study, it will be possible to reduce the cost and time for data collection and technology development. Also, it is also expected to contribute to autonomous driving for not only tower cranes but also other construction equipment.

Detecting Lane Departure Based on GIS Using DGPS (DGPS를 이용한 GIS기반의 차선 이탈 검지 연구)

  • Moon, Sang-Chan;Lee, Soon-Geul;Kim, Jae-Jun;Kim, Byoung-Soo
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.20 no.4
    • /
    • pp.16-24
    • /
    • 2012
  • This paper proposes a method utilizing Differential Global Position System (DGPS) with Real-Time Kinematic (RTK) and pre-built Geo-graphic Information System (GIS) to detect lane departure of a vehicle. The position of a vehicle measured by DGPS with RTK has 18 cm-level accuracy. The preconditioned GIS data giving accurate position information of the traffic lanes is used to set up coordinate system and to enable fast calculation of the relative position of the vehicle within the traffic lanes. This relative position can be used for safe driving by preventing the vehicle from departing lane carelessly. The proposed system can be a key component in functions such as vehicle guidance, driver alert and assistance, and the smart highway that eventually enables autonomous driving supporting system. Experimental results show the ability of the system to meet the accuracy and robustness to detect lane departure of a vehicle at high speed.

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

A Study on MEC Network Application Functions for Autonomous Driving (자율주행을 위한 MEC 적용 기능의 연구)

  • Kang-Hyun Nam
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.3
    • /
    • pp.427-432
    • /
    • 2023
  • In this study, MEC (: Multi-access Edge Computing) proposes a cloud service network configuration for various tests of autonomous vehicles to which V2X (: Vehicle to Everything) is applied in Wave, LTE, and 5G networks and MEC App (: Application) applied V2X service function test verification of two domains (operator (KT, SKT, LG U+), network type (Wave, LTE (including 3G), 5G)) in a specific region. In 4G networks of domestic operators (SKT, KT, LG U+ and Wave), MEC summarized the improvement effects through V2X function blocks and traffic offloading for the purpose of bringing independent network functions. And with a high level of QoS value in the V2X VNF of the 5G network, the traffic steering function scenario was demonstrated on the destination-specific traffic path.

Knowledge Distillation for Unsupervised Depth Estimation (비지도학습 기반의 뎁스 추정을 위한 지식 증류 기법)

  • Song, Jimin;Lee, Sang Jun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.17 no.4
    • /
    • pp.209-215
    • /
    • 2022
  • This paper proposes a novel approach for training an unsupervised depth estimation algorithm. The objective of unsupervised depth estimation is to estimate pixel-wise distances from camera without external supervision. While most previous works focus on model architectures, loss functions, and masking methods for considering dynamic objects, this paper focuses on the training framework to effectively use depth cue. The main loss function of unsupervised depth estimation algorithms is known as the photometric error. In this paper, we claim that direct depth cue is more effective than the photometric error. To obtain the direct depth cue, we adopt the technique of knowledge distillation which is a teacher-student learning framework. We train a teacher network based on a previous unsupervised method, and its depth predictions are utilized as pseudo labels. The pseudo labels are employed to train a student network. In experiments, our proposed algorithm shows a comparable performance with the state-of-the-art algorithm, and we demonstrate that our teacher-student framework is effective in the problem of unsupervised depth estimation.

Air Purification System Using Combined Wavelengths of Ultraviolet Light Sources (신경망을 이용한 BLE의 RSSI 예측 기법)

  • Youm, Sungkwan;Lee, Yujin;Shin, Kwang-Seong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.550-551
    • /
    • 2021
  • Positioning technology is performing important functions in augmented reality, smart factory, and autonomous driving. Among the positioning techniques, the positioning method using beacons has been considered a challenging task due to the deviation of the RSSI value. In this study, the position of a moving object is predicted by training a neural network that takes the RSSI value of the receiver as an input and the distance as the target value. To do this, the measured distance versus RSSI was collected.

  • PDF