Ran Wang, Hui Wang, Kun Zhu, Changyan Yi, P. Wang, D. Niyato
{"title":"Mobile Charging Services for the Internet of Electric Vehicles: Concepts, Scenarios, and Challenges","authors":"Ran Wang, Hui Wang, Kun Zhu, Changyan Yi, P. Wang, D. Niyato","doi":"10.1109/MVT.2023.3289302","DOIUrl":"https://doi.org/10.1109/MVT.2023.3289302","url":null,"abstract":"Electric vehicles (EVs) are one important enabler for the evolution of sustainable transportation sector. However, one major barrier to the widespread adoption of EVs is their limited battery capacity and the excessive time required to fully charge depleted batteries. Although techniques such as charging with a rapid charger and battery swapping may partially alleviate such concerns, the corresponding high capital investment may not be profitable for areas with low EV adoption rates. Moreover, the diversified charging demands of randomly distributed EVs, both spatially and temporally, restrict high-quality services from current fixed charging stations (FCSs). To resolve such challenges, mobile charging services (MCSs) have been investigated as a supplemental charging method for EVs, wherein energy replenishment is provided by mobile charging vehicles (MCVs). Under the framework of the Internet of EVs (IoEV), this article describes the concept of MCSs and investigates their charging merits under some distinct charging scenarios, e.g., real-time response service and emergency rescue service. A case study concerning real-time response services is investigated to illustrate the influence of MCSs on the current charging system. Simulation results demonstrate the ability of MCSs to improve the quality of charging service by reducing the average service time and service acceptance ratio. Finally, technical challenges, future research issues, and possible methodologies regarding the MCSs for EVs are discussed.","PeriodicalId":55004,"journal":{"name":"IEEE Vehicular Technology Magazine","volume":"18 1","pages":"110-119"},"PeriodicalIF":8.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49343185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shuyan Hu, Xinnan Yuan, Wei Ni, Xin Wang, A. Jamalipour
{"title":"Visual Camouflage and Online Trajectory Planning for Unmanned Aerial Vehicle-Based Disguised Video Surveillance: Recent Advances and a Case Study","authors":"Shuyan Hu, Xinnan Yuan, Wei Ni, Xin Wang, A. Jamalipour","doi":"10.1109/MVT.2023.3263329","DOIUrl":"https://doi.org/10.1109/MVT.2023.3263329","url":null,"abstract":"The applications of unmanned aerial vehicle (UAV)-enabled visual monitoring span the areas of public security, nature resilience, and disaster rescue. Covertness can play an indispensable role in applications demanding UAVs to be unnoticeable by targets, e.g., tailing and interception and police surveillance. This article discusses the types and technical challenges of visual camouflage for UAV-based surveillance. A particular interest is given to an agile disguising method, which adopts both distance keeping and elevation changing and confuses the target by constantly changing its relative position in the target’s view. The path design of the UAV monitor is nonstraightforward under this disguising approach due to nonconvex disguise objectives, UAV propulsion power, and control dynamics. A new control framework is presented to plan and refine the trajectory of the UAV monitor online. The framework employs model predictive control (MPC) to decompose the control decisions between slots, mitigating the impact of the inaccurate prediction of the target’s path and allowing the planned trajectory to be refined online. Simulations validate the merits of the new framework over the benchmark approach with no camouflage and demonstrate the different performances of fixed-wing and rotary-wing UAVs on a covert video surveillance mission.","PeriodicalId":55004,"journal":{"name":"IEEE Vehicular Technology Magazine","volume":"18 1","pages":"48-57"},"PeriodicalIF":8.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49071763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rafael Molina-Masegosa, S. Avedisov, M. Sepulcre, Y. Farid, J. Gozálvez, O. Altintas
{"title":"V2X Communications for Maneuver Coordination in Connected Automated Driving: Message Generation Rules","authors":"Rafael Molina-Masegosa, S. Avedisov, M. Sepulcre, Y. Farid, J. Gozálvez, O. Altintas","doi":"10.1109/MVT.2023.3284562","DOIUrl":"https://doi.org/10.1109/MVT.2023.3284562","url":null,"abstract":"Connected automated vehicles (CAVs) can use vehicle-to-everything (V2X) communications to exchange their driving intentions and coordinate their maneuvers. Message generation rules are necessary to decide when and how maneuver coordination messages (MCMs) should be generated. The design of these generation rules must consider the critical nature of maneuver coordination and the limited bandwidth available for V2X communications. This study proposes the first two sets of V2X message generation rules for maneuver coordination between CAVs. The Risk proposal increases the rate at which vehicles generate MCMs when vehicles detect a potential safety risk. With the Tracking Trajectories proposal, vehicles generate a new maneuver coordination message when they significantly modify their planned trajectory. For both proposals, the messages include the planned and possible desired trajectories of the ego vehicle. The evaluation shows that the proposed generation rules efficiently support maneuver coordination and offer a balance between more frequent updates of the driving intentions of CAVs and lower coordination time and better control of the V2X communications channel load. This study also reveals that congestion control protocols can significantly impact maneuver coordination.","PeriodicalId":55004,"journal":{"name":"IEEE Vehicular Technology Magazine","volume":"18 1","pages":"91-100"},"PeriodicalIF":8.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44623300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Get Published in the IEEE Open Journal of Vehicular Technology","authors":"","doi":"10.1109/mvt.2023.3279737","DOIUrl":"https://doi.org/10.1109/mvt.2023.3279737","url":null,"abstract":"","PeriodicalId":55004,"journal":{"name":"IEEE Vehicular Technology Magazine","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135348407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TechRxiv: Share Your Preprint Research With the World!","authors":"","doi":"10.1109/mvt.2023.3305725","DOIUrl":"https://doi.org/10.1109/mvt.2023.3305725","url":null,"abstract":"","PeriodicalId":55004,"journal":{"name":"IEEE Vehicular Technology Magazine","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135348405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}