• Title/Summary/Keyword: Cooperative Collision Avoidance

Search Result 17, Processing Time 0.022 seconds

COLLECTIVE BEHAVIORS OF SECOND-ORDER NONLINEAR CONSENSUS MODELS WITH A BONDING FORCE

  • Hyunjin Ahn;Junhyeok Byeon;Seung-Yeal Ha;Jaeyoung Yoon
    • Journal of the Korean Mathematical Society
    • /
    • v.61 no.3
    • /
    • pp.565-602
    • /
    • 2024
  • We study the collective behaviors of two second-order nonlinear consensus models with a bonding force, namely the Kuramoto model and the Cucker-Smale model with inter-particle bonding force. The proposed models contain feedback control terms which induce collision avoidance and emergent consensus dynamics in a suitable framework. Through the cooperative interplays between feedback controls, initial state configuration tends to an ordered configuration asymptotically under suitable frameworks which are formulated in terms of system parameters and initial configurations. For a two-particle system on the real line, we show that the relative state tends to the preassigned value asymptotically, and we also provide several numerical examples to analyze the possible nonlinear dynamics of the proposed models, and compare them with analytical results.

Game-Theoretic Analysis of Selfish Secondary Users in Cognitive Radio Networks

  • Kahsay, Halefom;Jembre, Yalew Zelalem;Choi, Young-June
    • Journal of Communications and Networks
    • /
    • v.17 no.4
    • /
    • pp.440-448
    • /
    • 2015
  • In this paper, we study the problem of selfish behavior of secondary users (SUs) based on cognitive radio (CR) with the presence of primary users (PUs). SUs are assumed to contend on a channel using the carrier sense multiple access with collision avoidance (CSMA/CA) and PUs do not consider transmission of SUs, where CSMA/CA protocols rely on the random deference of packets. SUs are vulnerable to selfish attacks by which selfish users could pick short random deference to obtain a larger share of the available bandwidth at the expense of other SUs. In this paper, game theory is used to study the systematic cheating of SUs in the presence of PUs in multichannel CR networks. We study two cases: A single cheater and multiple cheaters acting without any restraint. We identify the Pareto-optimal point of operation of a network with multiple cheaters and also derive the Nash equilibrium of the network. We use cooperative game theory to drive the Pareto optimality of selfish SUs without interfering with the activity of PUs. We show the influence of the activity of PUs in the equilibrium of the whole network.

Random Backoff Scheme of Emergency Warning Message for Vehicle-to-Vehicle Communications (차량 간 통신에서 충돌을 완화하기 위한 랜덤 백오프 방안)

  • Byun, Jae-Uk;Kwon, Sung-Oh
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3B
    • /
    • pp.165-173
    • /
    • 2012
  • In this paper, we propose a random backoff scheme for Emergency Warning Messages (EWMs) in the vehicle-to-vehicle environment. The EWMs are disseminated from a vehicle that detects an emergency situation to other vehicles in a multi-hop fashion. Since the vehicle-to-vehicle communication based on IEEE 802.11 adapts CSMA/CA, the density of vehicles increase the probability of collisions between transmissions. Moreover, in the presence of background traffic, the EWM should have a higher priority than that of other messages in neighboring vehicles. To that end, we propose the Distant-Dependent Adaptive Backoff (DDAB) scheme, which set a different contention window for random backoff depending on the distance from the sender to the receiver. In the case when a vehicle is expected to located in the outskirts of the communication boundary, the proposed scheme makes the contention window size small in order to compete the background traffic transmission. Otherwise the contention window is set to a large number to reduce the collision possibility among the EWM transmissions. Via simulations, we show that the proposed scheme performs better than the previous schemes for EWM.

Evaluation of Accident Prevention Performance of Vision and Radar Sensor for Major Accident Scenarios in Intersection (교차로 주요 사고 시나리오에 대한 비전 센서와 레이더 센서의 사고 예방성능 평가)

  • Kim, Yeeun;Tak, Sehyun;Kim, Jeongyun;Yeo, Hwasoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.5
    • /
    • pp.96-108
    • /
    • 2017
  • The current collision warning and avoidance system(CWAS) is one of the representative Advanced Driver Assistance Systems (ADAS) that significantly contributes to improve the safety performance of a vehicle and mitigate the severity of an accident. However, current CWAS mainly have focused on preventing a forward collision in an uninterrupted flow, and the prevention performance near intersections and other various types of accident scenarios are not extensively studied. In this paper, the safety performance of Vision-Sensor (VS) and Radar-Sensor(RS) - based collision warning systems are evaluated near an intersection area with the data from Naturalistic Driving Study(NDS) of Second Strategic Highway Research Program(SHRP2). Based on the VS and RS data, we newly derived sixteen vehicle-to-vehicle accident scenarios near an intersection. Then, we evaluated the detection performance of VS and RS within the derived scenarios. The results showed that VS and RS can prevent an accident in limited situations due to their restrained field-of-view. With an accident prevention rate of 0.7, VS and RS can prevent an accident in five and four scenarios, respectively. For an efficient accident prevention, a different system that can detect vehicles'movement with longer range than VS and RS is required as well as an algorithm that can predict the future movement of other vehicles. In order to further improve the safety performance of CWAS near intersection areas, a communication-based collision warning system such as integration algorithm of data from infrastructure and in-vehicle sensor shall be developed.

A Study of Hazard Analysis and Monitoring Concepts of Autonomous Vehicles Based on V2V Communication System at Non-signalized Intersections (비신호 교차로 상황에서 V2V 기반 자율주행차의 위험성 분석 및 모니터링 컨셉 연구)

  • Baek, Yun-soek;Shin, Seong-geun;Ahn, Dae-ryong;Lee, Hyuck-kee;Moon, Byoung-joon;Kim, Sung-sub;Cho, Seong-woo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.6
    • /
    • pp.222-234
    • /
    • 2020
  • Autonomous vehicles are equipped with a wide rage of sensors such as GPS, RADAR, LIDAR, camera, IMU, etc. and are driven by recognizing and judging various transportation systems at intersections in the city. The accident ratio of the intersection of the autonomous vehicles is 88% of all accidents due to the limitation of prediction and judgment of an area outside the sensing distance. Not only research on non-signalized intersection collision avoidance strategies through V2V and V2I is underway, but also research on safe intersection driving in failure situations is underway, but verification and fragments through simple intersection scenarios Only typical V2V failures are presented. In this paper, we analyzed the architecture of the V2V module, analyzed the causal factors for each V2V module, and defined the failure mode. We presented intersection scenarios for various road conditions and traffic volumes. we used the ISO-26262 Part3 Process and performed HARA (Hazard Analysis and Risk Assessment) to analyze the risk of autonomous vehicle based on the simulation. We presented ASIL, which is the result of risk analysis, proposed a monitoring concept for each component of the V2V module, and presented monitoring coverage.

Self Generable Conditionally Anonymous Authentication System for VANET (VANET를 위한 차량자체생성 조건부익명 인증시스템)

  • Kim, Sang-Jin;Lim, Ji-Hwan;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.105-114
    • /
    • 2009
  • Messages exchanged among vehicles must be authenticated in order to provide collision avoidance and cooperative driving services in VANET. However, digitally signing the messages can violate the privacy of users. Therefore, we require authentication systems that can provide conditional anonymity. Recently, Zhang et al. proposed conditionally anonymous authentication system for VANET using tamper-resistant hardware. In their system, vehicles can generate identity-based public keys by themselves and use them to sign messages. Moreover, they use batch verification to effectively verify signed messages. In this paper, we provide amelioration to Zhang et al.'s system in the following respects. First, we use a more efficient probabilistic signature scheme. Second, unlike Zhang et al., we use a security proven batch verification scheme. We also provide effective solutions for key revocation and anonymity revocation problems.

Collision Avoidance Path Control of Multi-AGV Using Multi-Agent Reinforcement Learning (다중 에이전트 강화학습을 이용한 다중 AGV의 충돌 회피 경로 제어)

  • Choi, Ho-Bin;Kim, Ju-Bong;Han, Youn-Hee;Oh, Se-Won;Kim, Kwi-Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.281-288
    • /
    • 2022
  • AGVs are often used in industrial applications to transport heavy materials around a large industrial building, such as factories or warehouses. In particular, in fulfillment centers their usefulness is maximized for automation. To increase productivity in warehouses such as fulfillment centers, sophisticated path planning of AGVs is required. We propose a scheme that can be applied to QMIX, a popular cooperative MARL algorithm. The performance was measured with three metrics in several fulfillment center layouts, and the results are presented through comparison with the performance of the existing QMIX. Additionally, we visualize the transport paths of trained AGVs for a visible analysis of the behavior patterns of the AGVs as heat maps.