In the existing research on automatic parking system, because the actual vehicle steering constraints and initial pose conditions are ignored, which affects the actual vehicle tracking reference path effect, this paper proposes a path planning algorithm based on B-spline curve. Firstly, the movement process of the vehicle is studied, and the Kinematics model of the vehicle is established. Secondly, based on the B-spline curve theory, the nonlinear constrained parallel parking path optimization function is established, and the vehicle Kinematics constraints are analyzed. Finally, the rationality of the planned path was verified through joint simulation using Simulink and CarSim.
This paper elaborated the cybersecurity problems brought by new technology to intelligent and connected vehicles, summarized the development status of quantum communication technology as well as the technology standards and regulations of automotive cybersecurity developed by leading automotive industrial counties and international organizations such as UN/WP.29 and ISO/TC22. Discussed the application value of quantum communication technology to empower intelligent and connected vehicle with cybersecurity protection, and analyzed the application advantages and limitations of quantum communication technology and common key technology. The feasibility of the application of quantum communication technology in the field of intelligent and connected vehicle cybersecurity is demonstrated through typical cases, suggestions on the development of intelligent and connected vehicle cybersecurity in the new stage are also given.
Autonomous driving technology has developed rapidly in recent years and is expected to take the lead in commercial application in closed parks such as ports. Compared with traditional schemes, unmanned container vehicles will become the main direction of intelligent port transformation in the future due to their advantages in cost, late maintenance and facility transformation. At present, Xiamen Port, Tianjin Port and other large ports have carried out hundreds of unmanned collection card demonstration operation. The establishment of a unified test specification is conducive to the security of port unattended collection card operation and the healthy and orderly development of the industry. This paper studies and proposes typical test cases of unmanned collection card in the actual port environment, hoping to provide reference for the industry to carry out unmanned collection card testing.
At present, autonomous vehicles equipped with night vision systems have been widely used, which can provide drivers with visual aids and collision warning at night or in low light conditions, so as to reduce the probability of accidents. In this paper, the image quality evaluation indicators and test methods of automotive infrared night vision camera have been studied. According to the characteristics of infrared night vision camera, NETD, MRTD, MTF and identification distance have been proposed as the evaluation indicators, the test methods and procedures have been given. A prototype was selected for verification test. The experimental results were accurate, objective and reproducible, which could be used as the test and evaluation method for automotive infrared night vision camera.
Automotive connection function is an important part of the Intelligent and Connected Vehicle (ICV) industry and an important support for the realization of automated driving. This paper summarizes the automotive connection function technology standards and regulations and compares and analyzes the typical connection function application scenarios related to driving safety developed by leading automotive industrial counties and international organizations. Combined with correlation between technology and typical working conditions, in terms of technology maturity, technology cost, product market plan, etc., use statistical analysis, get the result of priority ranking of automotive connection function application scenarios related to driving safety. Based on the research, proposes suggestions for standard system construction.
The cybersecurity of electric vehcles(EVs) charging process has attracted more and more attention. In this paper, through the risk assessment of charging system under charging scenario, we clarify the cybersecurity risks of charging system of EVs, and propose systematic protection measures in multiple dimensions for the main cybersecurity risks in charging process. Further, we conduct experimental verification of EVs charging system based on the cybersecurity protection strategy designed in this paper, and prove the cybersecurity protection strategy can protect EVs charging system security from hardware cybersecurity, software cybersecurity, data cybersecurity and communication cybersecurity.
This paper puts forward the method and process of road test for vehicles with the autonomous driving function from the perspective of the third-party testing organization. In view of the operational design domain (ODD) of the autopilot function and the road environment element library, the corresponding test roads are selected. At the same time, taking the synchronous data acquisition equipment as the test system, a true-value system equipped with traffic environment detection and dynamic data recording of the vehicle is installed on the tested vehicle to carry out the real vehicle road test. A safety driving model based on the driver’s response and vehicle dynamics is proposed in different scenarios, which is used as the evaluation model of autonomous driving behaviors to verify the safety of the automatic driving function of the vehicles. The test method is provided for the actual road test of the automatic driving function.
With the swift development of intelligent driving, the state of the art of synchronous perception is widely used in many industrial domains even while there has out-of-sequence measurement problems due to the existence of unsynchronized measurements, different frequencies, or background noises which would be potential barrier of further development of this technique. This paper presents a novel algorithm including the process of effectiveness validation and dual-thread particle filter (DTPF). Compared with the current state of the art, the process of effectiveness validation can efficiently reduce the computational load of dealing with OOSM, and the DTPF could bring about high efficiency, real time, and nonlinear. In the simulation portion of this paper, a two-dimensional target tracking example is given. The numerical results demonstrate that the tracking performance of our algorithm is quite precise while the computation cost is significantly reduced.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.