-
公开(公告)号:US20220114028A1
公开(公告)日:2022-04-14
申请号:US17556567
申请日:2021-12-20
申请人: Yang Peng , Florian Geissler , Michael Paulitsch
发明人: Yang Peng , Florian Geissler , Michael Paulitsch
摘要: Disclosed herein are systems and methods for dynamically distributing a safety, awareness task. The systems and methods may include receiving hardware resources data associated with a plurality of remote computing systems. A plurality of safety assurance profiles may be received. Each of the plurality of safety assurance profiles may be associated with a respective service. A safety assurance task may be dynamically assigned to one of the plurality of remote computing systems based on the hardware resources data and one of the plurality of safety assurance profiles.
-
公开(公告)号:US20210107518A1
公开(公告)日:2021-04-15
申请号:US17129770
申请日:2020-12-21
申请人: Florian Geissler , Rafael Rosales , Neslihan Kose Cihangir , Ralf Graefe , Syed Qutub , Andrea Baldovin , Yang Peng , Michael Paulitsch
发明人: Florian Geissler , Rafael Rosales , Neslihan Kose Cihangir , Ralf Graefe , Syed Qutub , Andrea Baldovin , Yang Peng , Michael Paulitsch
摘要: Disclosure herein are systems and methods for deploying an autonomous vehicle during an idle time. As disclosed herein, a request for a mobility service may be received. The request may include constraints for usage of the autonomous vehicle. An optimal mobility service strategy may be determined based on the constraints. The optimal mobility service strategy may be selected from a plurality of mobility service strategies. A notification may be transmitted to a user device. The notification may include details of the optimal mobility service strategy.
-
公开(公告)号:US20210110170A1
公开(公告)日:2021-04-15
申请号:US17131161
申请日:2020-12-22
申请人: Florian Geissler , Ralf Graefe , Michael Paulitsch , Yang Peng , Rafael Rosales
发明人: Florian Geissler , Ralf Graefe , Michael Paulitsch , Yang Peng , Rafael Rosales
摘要: Described herein is a high confidence ground truth information service executing on a network of edge computing devices. A variety of participating devices obtain high confidence ground truth information relating to objects in a local environment. This information is communicated to the ground truth information service, where it may be verified and aggregated with similar information before being communicated as part of an acquired ground truth dataset to one or more subscribing devices. The subscribing devices use the ground truth information, as included in the ground truth dataset, to both validate and improve their supervised learning systems.
-
公开(公告)号:US20210112388A1
公开(公告)日:2021-04-15
申请号:US17131712
申请日:2020-12-22
IPC分类号: H04W4/40 , H04W24/08 , G08G1/0968 , G01C21/34
摘要: Disclosed embodiments prioritize gaps in V2X coverage and then selectively route traffic based on the prioritized gaps. Some embodiments combine historical vehicle presence along a route with predicted prospective vehicle traffic along the route to generate a map of regions that have a high confidence of a need for V2X coverage. This high confidence map is compared to a historical V2X coverage in those regions. From this comparison, a set of high priority V2X gaps is identified. Vehicles are then selectively routed either around or into the gaps.
-
公开(公告)号:US20210112417A1
公开(公告)日:2021-04-15
申请号:US17130631
申请日:2020-12-22
申请人: Florian Geissler , S M Iftekharul Alam , Yaser M. Fouad , Michael Paulitsch , Rafael Rosales , Kathiravetpillai Sivanesan , Kuilin Clark Chen
发明人: Florian Geissler , S M Iftekharul Alam , Yaser M. Fouad , Michael Paulitsch , Rafael Rosales , Kathiravetpillai Sivanesan , Kuilin Clark Chen
IPC分类号: H04W12/104 , H04W12/00 , H04W4/40
摘要: V2X trusted agents provide technical solutions for technical problems facing falsely reported locations of connected vehicles within V2X systems. These trusted agents (e.g., trusted members) may be used to detect an abrupt physical attenuation of a wireless signal and determine whether the attenuation was caused by signal occlusion caused by the presence of an untrusted vehicle or other untrusted object. When the untrusted vehicle is sending a message received by trusted agents, these temporary occlusions allow trusted members to collaboratively estimate the positions of untrusted vehicles in the shared network, and to detect misbehavior by associating the untrusted vehicle with reported positions. Trusted agents may also be used to pinpoint specific mobile targets. Information about one or more untrusted vehicles may be aggregated and distributed as a service.
-
公开(公告)号:US20190132709A1
公开(公告)日:2019-05-02
申请号:US16234260
申请日:2018-12-27
申请人: Ralf Graefe , Florian Geissler , Rainer Makowitz
发明人: Ralf Graefe , Florian Geissler , Rainer Makowitz
摘要: Systems, methods, and computer-readable media are provided for wireless sensor networks (WSNs), including vehicle-based WSNs. A road side unit (RSU) includes one or more fixed sensors covering different sectors of a designated coverage area. The RSU uses the sensors to capture sensor data that is representative of objects in the coverage area, tracks objects (e.g., vehicles) in the coverage area, and determines regions in the coverage area that are not adequately covered by the sensors (e.g., “perception gaps”). When the RSU identifies an object that is in or at a perception gap, then the RSU sends a request to that object for sensor data captured by the object's on-board sensors. The RSU obtains the sensor data from the object, and uses the obtained sensor data to complement the knowledge that the RSU (i.e., “filling the peception gaps”). Other embodiments are disclosed and/or claimed.
-
公开(公告)号:US20210397858A1
公开(公告)日:2021-12-23
申请号:US17462472
申请日:2021-08-31
申请人: Cornelius Buerkle , Fabian Oboril , Frederik Pasch , Yin Wei Liew , Say Chuan Tan , Chien Chern Yew , Ralf Graefe , Florian Geissler , Ignacio J. Alvarez
发明人: Cornelius Buerkle , Fabian Oboril , Frederik Pasch , Yin Wei Liew , Say Chuan Tan , Chien Chern Yew , Ralf Graefe , Florian Geissler , Ignacio J. Alvarez
摘要: Disclosed herein are systems and methods for detecting and mitigating inappropriate behavior. The systems and methods may include receiving data. Using the data a harassment score and/or classification for a behavior may be determined. Using the harassment score and/or classification, a determination may be made as to when the harassment score and/or classification for the behavior exceeds a threshold. When the threshold is exceeded, a protection system and/or action engine may be activated to mitigate the inappropriate behavior.
-
-
-
-
-
-