摘要:
Disclosed herein are systems and methods for dynamically distributing a safety, awareness task. The systems and methods may include receiving hardware resources data associated with a plurality of remote computing systems. A plurality of safety assurance profiles may be received. Each of the plurality of safety assurance profiles may be associated with a respective service. A safety assurance task may be dynamically assigned to one of the plurality of remote computing systems based on the hardware resources data and one of the plurality of safety assurance profiles.
摘要:
Described herein is a high confidence ground truth information service executing on a network of edge computing devices. A variety of participating devices obtain high confidence ground truth information relating to objects in a local environment. This information is communicated to the ground truth information service, where it may be verified and aggregated with similar information before being communicated as part of an acquired ground truth dataset to one or more subscribing devices. The subscribing devices use the ground truth information, as included in the ground truth dataset, to both validate and improve their supervised learning systems.
摘要:
Disclosure herein are systems and methods for deploying an autonomous vehicle during an idle time. As disclosed herein, a request for a mobility service may be received. The request may include constraints for usage of the autonomous vehicle. An optimal mobility service strategy may be determined based on the constraints. The optimal mobility service strategy may be selected from a plurality of mobility service strategies. A notification may be transmitted to a user device. The notification may include details of the optimal mobility service strategy.
摘要:
Disclosed embodiments prioritize gaps in V2X coverage and then selectively route traffic based on the prioritized gaps. Some embodiments combine historical vehicle presence along a route with predicted prospective vehicle traffic along the route to generate a map of regions that have a high confidence of a need for V2X coverage. This high confidence map is compared to a historical V2X coverage in those regions. From this comparison, a set of high priority V2X gaps is identified. Vehicles are then selectively routed either around or into the gaps.
摘要:
V2X trusted agents provide technical solutions for technical problems facing falsely reported locations of connected vehicles within V2X systems. These trusted agents (e.g., trusted members) may be used to detect an abrupt physical attenuation of a wireless signal and determine whether the attenuation was caused by signal occlusion caused by the presence of an untrusted vehicle or other untrusted object. When the untrusted vehicle is sending a message received by trusted agents, these temporary occlusions allow trusted members to collaboratively estimate the positions of untrusted vehicles in the shared network, and to detect misbehavior by associating the untrusted vehicle with reported positions. Trusted agents may also be used to pinpoint specific mobile targets. Information about one or more untrusted vehicles may be aggregated and distributed as a service.
摘要:
A computer system includes at least two COTS processor cores and an evaluating device connected to the at least two COTS processor cores for evaluating output signals output by means of the at least two COTS processor cores. The evaluating device includes a comparator for pair-wise comparison of the respective generated output signals with each other. The comparator also outputs a comparison signal corresponding to the respective comparison of the output signals.
摘要:
The goal of the present invention is to improve the useful data efficiency and reliability in the use of commercially available ETHERNET controllers, in a distributed real time computer system, by a number of node computers communicating via one or more communication channels by means of TT ETHERNET messages. To achieve this goal, a distinction is made between the node computer send time (KNSZPKT) and the network send time (NWSZPKT) of a message. The KNSZPKT must wait for the NWSZPKT, so that under all circumstances, the start of the message has arrived in the TT star coupler at the NWSZPKT, interpreted by the clock in the TT star coupler. The TT star coupler is modified, so that a message arriving from a node computer is delayed in an intelligent port of the TT star coupler until the NWSZPKT can send it precisely at the NWSZPKT into the TT network.
摘要:
In one embodiment, a system comprises a plurality of nodes that are communicatively coupled to one another. Each of the plurality of nodes, in the absence of any faults, is communicatively coupled to at least a first neighbor node and a first neighbor's neighbor node and a second neighbor node and a second neighbor's neighbor node. When at least a first clique and a second clique exist within the plurality of nodes and a first node included in the first clique successfully receives a synchronization message associated with the second clique from the first neighbor node of the first node and the first neighbor's neighbor node of the first node, the first node does the following. The first node defects to the second clique and synchronizes to the synchronization message. The first node also communicates a join message to at least the second neighbor node of the first node and the second neighbor's neighbor node of the first node. The join message indicates that the second neighbor node and the second neighbor's neighbor node should defect to the second clique and listen for a subsequent synchronization message from the second clique to which the second neighbor node and the second neighbor's neighbor node should synchronize.
摘要:
In one embodiment, a node comprises an interface to communicatively couple the node to a channel. The channel communicatively couples the node to a first neighbor node and a first neighbor's neighbor node in a first direction. When the node relays relayed data along the channel, the node compares data received from the first neighbor node with data received from the first neighbor's neighbor node. The relayed data comprises: at least one of: the data received from the first neighbor node and the data received from the first neighbor's neighbor node; and information indicative of the results of the comparison.
摘要:
A special node is used in a distributed time-triggered cluster. The special node comprises protocol functionality to establish a time base to use in communicating with a plurality of end nodes and to source timing-related frames to the plurality of end nodes in accordance with the distributed time-triggered communication protocol. The protocol functionality establishes the time base without regard to any timing-related frame sourced from any of the plurality of end nodes. In one embodiment, the protocol functionality of the special node is implemented in a low complexity manner. In one embodiment, the cluster comprises a star topology and the special node performs at least one of semantic filtering and rate enforcement. In another embodiment, the cluster comprises a bus or peer-to-peer topology and each end node is coupled to the communication channel using a low-complexity special local bus guardian.