• Title/Summary/Keyword: Self-driving cars

검색결과 67건 처리시간 0.022초

자율주행 자동차 기술개발 동향 (Technological Development Trends for Self-driving Cars)

  • 김민준;장종욱
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2017년도 춘계학술대회
    • /
    • pp.246-248
    • /
    • 2017
  • 자율주행자동차는 자동차 스스로 주변 환경을 인식하여 위험을 판단하고 주행경로를 계획하여 운전자 주행조작을 최소화하며 스스로 안전주행이 가능한 인간 친화형 자동차를 말한다. 자율주행자동차가 필요한 이유는 한정된 도로 상에서의 교통체증을 감소와 탄소 저감을 목적으로 시작되었다. 이러한 관련 자율주행자동차 사업 추진은 자동차 업체의 기존 사업 유지 및 확대와 ICT 기업의 신규사업 창출과 진입효과를 기대 할 수 있다. 관련 인증기관은 자율주행자동차에 대한 법적과 제도적 기반 마련이 시급하다. 그럼으로써 소비자에게 새로운 서비스가 제공될 수 있을 것이다. 따라서 본 논문에서는 자율주행자동차에 대한 기술개발 동향을 소개한다.

  • PDF

제4차 산업혁명 시대의 자율주행자동차 상용화를 위한 안정적 법적 기반을 위한 법정책적 연구 - 자율주행자동차 특별법 제정(안)을 중심으로 - (The Propose a Legislation Bill to Apply Autonomous Cars and the Study for Status of Legal and Political Issues)

  • 강선준;원유형;김민지
    • 기술혁신학회지
    • /
    • 제21권1호
    • /
    • pp.151-200
    • /
    • 2018
  • 2016년 다보스포럼에서 클라우드 슈밥이 언급한 '제4차 산업혁명'은 우리의 삶을 획기적으로 바꾸고 있으며, 그 정점에 자율주행자동차가 이 시대의 화두로 떠오르고 있다. 그러나 우리나라에서 자율주행자동차가 성공적으로 도입 및 정착되기까지는 아직 극복해야 할 과제들이 많이 있다. 특히 '인간' 중심의 법제도를 '인공지능'이 포함된 법제도로 패러다임을 변화해야 할 것이다. 자율주행자동차 시대의 안정적 운용을 위해서는 사람중심의 입법체계에 대한 획기적인 변화가 필요하다. 즉, 자율주행자동차를 운행하는 운행주체가 누구인지(무엇인지)와 일반도로에서 일반 자동차와 운행이 가능한지 여부, 교통사고 발생 시 민형사상 책임 문제, 자율주행자동차 관련 보험 문제, 개인정보수집과 이용에 관한 문제, 제3자에 의한 오남용 문제 등을 종합적이고 포괄적으로 검토해야 한다. 본 연구에서는 도로교통 관련 국내 법률, 해외 법제현황, 자율주행자동차 관련 법적 쟁점 등을 검토하여 입법론적 관점에서 자율주행자동차 운행 시 발생하는 제반 법적 문제 해결을 위한 별도의 법안 신설을 제안하며 그 법안에 대한 내용을 제시하였다.

자율주행 자동차를 위한 주차 위치 제어 알고리즘 (Parking Location Control Algorithm for Self-Driving Cars)

  • 샤로즈 타리크;박희민
    • 정보과학회 컴퓨팅의 실제 논문지
    • /
    • 제22권12호
    • /
    • pp.654-662
    • /
    • 2016
  • 본 논문에서는 가까운 미래에 접하게 될 무인 자율 주행 차량의 주차장에서의 주차 방법과 알고리즘에 대해 살펴보았다. 가장 가까운 주차 장소는 어디이며 어떤 경로를 통해 그 위치로 이동할 것인가 등이 자율주행 차량의 주차를 위한 정보일 것이다. 자율주행 차량의 주차에 적합한 주차장의 구조와 형태를 알아내는 것도 중요한 문제점이 될 것이다. 본 논문에서는 주차장을 그래프로 모델링한 후 중앙제어 시스템을 통해 각 자율주행 차량이 근접한 주차장소로 이동할 수 있도록 안내하는 초기 해결 방법을 제시한다. 몇 가지 구조의 주차장을 모델링한 실험을 통해 본 논문에서 제안한 초기 해결방법이 자율주행차량 주차에 효과적인 안내 시스템이 될 수 있음을 확인하였다.

도시 환경에서의 이미지 분할 모델 대상 적대적 물리 공격 기법 (Adversarial Wall: Physical Adversarial Attack on Cityscape Pretrained Segmentation Model)

  • 수랸토 나우팔;라라사티 하라스타 타티마;김용수;김호원
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2022년도 추계학술발표대회
    • /
    • pp.402-404
    • /
    • 2022
  • Recent research has shown that deep learning models are vulnerable to adversarial attacks not only in the digital but also in the physical domain. This becomes very critical for applications that have a very high safety concern, such as self-driving cars. In this study, we propose a physical adversarial attack technique for one of the common tasks in self-driving cars, namely segmentation of the urban scene. Our method can create a texture on a wall so that it can be misclassified as a road. The demonstration of the technique on a state-of-the-art cityscape pretrained model shows a fairly high success rate, which should raise awareness of more potential attacks in self-driving cars.

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • 제9권1호
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • 제9권1호
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

자율주행차의 대중화와 제조물하자에 관한 중재가능성 (Popularization of Autonomous Vehicles and Arbitrability of Defects in Manufacturing Products)

  • 김은빈;하충룡;김응규
    • 한국중재학회지:중재연구
    • /
    • 제31권4호
    • /
    • pp.119-136
    • /
    • 2021
  • Due to the restriction of movement caused by the Corona epidemic and the expansion of the "big face" through human distance, the "unmanned system" based on artificial intelligence and the Internet of Things has been widely used in modern life. "Self-driving," one of the transportation systems based on artificial technology, has taken the initiative in the transportation system as the spread of Corona has begun. Self-driving technology eliminates unnecessary contact and saves time and manpower, which can significantly impact current and future transportation. Accidents may occur, however, due to the performance of self-driving technology during transportation albeit the U.S. allows ordinary people to drive automatically through experimental operations, and the product liability law will resolve the dispute. Self-driving has become popular in the U.S. after the experimental stage, and in the event of a self-driving accident, product liability should be applied to protect drivers from complicated self-driving disputes. The purpose of this paper is to investigate whether disputes caused by defects in ordinary cars can be resolved through arbitration through U.S. precedents and to investigate whether disputes caused by defects in autonomous cars can be arbitrated.

Localization of Mobile Users with the Improved Kalman Filter Algorithm using Smart Traffic Lights in Self-driving Environments

  • Jung, Ju-Ho;Song, Jung-Eun;Ahn, Jun-Ho
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권5호
    • /
    • pp.67-72
    • /
    • 2019
  • The self-driving cars identify appropriate navigation paths and obstacles to arrive at their destinations without human control. The autonomous cars are capable of sensing driving environments to improve driver and pedestrian safety by sharing with neighbor traffic infrastructure. In this paper, we have focused on pedestrian protection and have designed an improved localization algorithm to track mobile users on roads by interacting with smart traffic lights in vehicle environments. We developed smart traffic lights with the RSSI sensor and built the proposed method by improving the Kalman filter algorithm to localize mobile users accurately. We successfully evaluated the proposed algorithm to improve the mobile user localization with deployed five smart traffic lights.

교통약자 유형별 공유형 자율주행 자동차의 이동경로에 대한 기초연구 (A Basic Study on the Route of Shared Self-driving Cars by Type of Transportation Disability person)

  • 김선주;김건욱;장원준;정원웅;민현기
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제31권3호
    • /
    • pp.47-65
    • /
    • 2022
  • Purpose With the recent development of Big Data and Artificial Intelligence technology, self-driving technology has developed into three stages (partial self-driving) or four stages (conditional self-driving), it is expected to bring a new paradigm to transportation in the city. Although many researchers are researching related technologies, there is no research on self-driving for disabled persons. In this study, the basic research was conducted based on the assumption that the shared self-driving car used by the disabled person is similar to the special transportation currently driving. Design In this study, data analysis and machine learning techniques were utilized to analyze the mobility patterns of disabled persons by type and to search for leading factors affecting the traffic volume of special transportation. Findings The study found that external physical disorders and developmental disorders often visit general welfare centers, internal organ disorders often visit general hospitals, and the elderly and mental disorders have various destinations. In addition, machine learning analysis showed that the main transportation routes for the disabled person use arterial roads and auxiliary arterial roads and that the ratio of building usage-related variables affecting the use of special transportation for a disabled person is high. In addition, the distance to the subway and bus stops was also mentioned as a meaningful variable. Based on these analysis results, it is expected that the necessary infrastructure for shared self-driving cars for disability person traffic will be used as meaningful research data in the future.

자율주행 환경의 전자기 해석을 위한 상용 및 자체 시뮬레이터 개발 동향 (Commercial and In-house Simulator Development Trend for Electromagnetic Analysis of Autonomous Driving Environments)

  • 박우빈;김문성;이우찬
    • 디지털산업정보학회논문지
    • /
    • 제17권4호
    • /
    • pp.31-42
    • /
    • 2021
  • In the modern era, radio wave analysis is necessary for various fields of engineering, and interpretation of this is also indispensable. Self-driving cars need multiple different electronic components, and thus accurate and fast electromagnetic simulator for this kind of complex radio environment is required for self-driving simulations. Accordingly, the demand for self-driving simulators as well as existing electromagnetic analysis software has increased. This paper briefly describes the characteristics of numerical analysis techniques for electromagnetic analysis, self-driving simulation software, and conventional electromagnetic simulation software and also summarizes the characteristics of each software. Finally, the verification of the result from in-house code compared to HFSS is demonstrated.