Published 08-11-2023
Keywords
- AI technologies
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
How to Cite
Abstract
Most perception, cognition, and execution functions in the AD software stack are deeply relying on the AI algorithms. Generally, AD algorithms can be divided into two main groups; data-driven or non-data-driven algorithms. The first group consists of finite state machines (FSMs), rule-based systems, dynamic programming and game theory [1]. The FSMs are the simplest algorithms among these ones, and consisting state representation of the world and constructed developmental tree are the most valuable powerful points in this approach. In the last data-driven group, AD algorithms can be categorized into three main categories. The first one has fully dependent on data and deep learning or machine learning applies these kind of algorithms and effective on making most valuable driving-related decision [2].
Downloads
References
- Vemoori, Vamsi. "Transformative Impact of Advanced Driver-Assistance Systems (ADAS) on Modern Mobility: Leveraging Sensor Fusion for Enhanced Perception, Decision-Making, and Cybersecurity in Autonomous Vehicles." Journal of AI-Assisted Scientific Discovery 3.2 (2023): 17-61.
- Ponnusamy, Sivakumar, and Dinesh Eswararaj. "Navigating the Modernization of Legacy Applications and Data: Effective Strategies and Best Practices." Asian Journal of Research in Computer Science 16.4 (2023): 239-256.
- Pulimamidi, Rahul. "Emerging Technological Trends for Enhancing Healthcare Access in Remote Areas." Journal of Science & Technology 2.4 (2021): 53-62.
- Tillu, Ravish, Muthukrishnan Muthusubramanian, and Vathsala Periyasamy. "From Data to Compliance: The Role of AI/ML in Optimizing Regulatory Reporting Processes." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2.3 (2023): 381-391.
- Keerthika, R., and Ms SS Abinayaa, eds. Algorithms of Intelligence: Exploring the World of Machine Learning. Inkbound Publishers, 2022.
- K. Joel Prabhod, “ASSESSING THE ROLE OF MACHINE LEARNING AND COMPUTER VISION IN IMAGE PROCESSING,” International Journal of Innovative Research in Technology, vol. 8, no. 3, pp. 195–199, Aug. 2021, [Online]. Available: https://ijirt.org/Article?manuscript=152346
- Tatineni, Sumanth. "Applying DevOps Practices for Quality and Reliability Improvement in Cloud-Based Systems." Technix international journal for engineering research (TIJER)10.11 (2023): 374-380.
- Perumalsamy, Jegatheeswari, Chandrashekar Althati, and Lavanya Shanmugam. "Advanced AI and Machine Learning Techniques for Predictive Analytics in Annuity Products: Enhancing Risk Assessment and Pricing Accuracy." Journal of Artificial Intelligence Research 2.2 (2022): 51-82.
- Venkatasubbu, Selvakumar, Jegatheeswari Perumalsamy, and Subhan Baba Mohammed. "Machine Learning Models for Life Insurance Risk Assessment: Techniques, Applications, and Case Studies." Journal of Artificial Intelligence Research and Applications 3.2 (2023): 423-449.
- Makka, A. K. A. “Administering SAP S/4 HANA in Advanced Cloud Services: Ensuring High Performance and Data Security”. Cybersecurity and Network Defense Research, vol. 2, no. 1, May 2022, pp. 23-56, https://thesciencebrigade.com/cndr/article/view/285.
- Mohammed, Subhan Baba, Bhavani Krothapalli, and Chandrashekar Althat. "Advanced Techniques for Storage Optimization in Resource-Constrained Systems Using AI and Machine Learning." Journal of Science & Technology 4.1 (2023): 89-125.
- Krothapalli, Bhavani, Lavanya Shanmugam, and Subhan Baba Mohammed. "Machine Learning Algorithms for Efficient Storage Management in Resource-Limited Systems: Techniques and Applications." Journal of Artificial Intelligence Research and Applications 3.1 (2023): 406-442.
- Devan, Munivel, Chandrashekar Althati, and Jegatheeswari Perumalsamy. "Real-Time Data Analytics for Fraud Detection in Investment Banking Using AI and Machine Learning: Techniques and Case Studies." Cybersecurity and Network Defense Research 3.1 (2023): 25-56.
- Althati, Chandrashekar, Jegatheeswari Perumalsamy, and Bhargav Kumar Konidena. "Enhancing Life Insurance Risk Models with AI: Predictive Analytics, Data Integration, and Real-World Applications." Journal of Artificial Intelligence Research and Applications 3.2 (2023): 448-486.
- Pakalapati, Naveen, Bhargav Kumar Konidena, and Ikram Ahamed Mohamed. "Unlocking the Power of AI/ML in DevSecOps: Strategies and Best Practices." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2.2 (2023): 176-188.
- Katari, Monish, Musarath Jahan Karamthulla, and Munivel Devan. "Enhancing Data Security in Autonomous Vehicle Communication Networks." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2.3 (2023): 496-521.
- Krishnamoorthy, Gowrisankar, and Sai Mani Krishna Sistla. "Exploring Machine Learning Intrusion Detection: Addressing Security and Privacy Challenges in IoT-A Comprehensive Review." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2.2 (2023): 114-125.
- Reddy, Sai Ganesh, et al. "Harnessing the Power of Generative Artificial Intelligence for Dynamic Content Personalization in Customer Relationship Management Systems: A Data-Driven Framework for Optimizing Customer Engagement and Experience." Journal of AI-Assisted Scientific Discovery 3.2 (2023): 379-395.
- Modhugu, Venugopal Reddy, and Sivakumar Ponnusamy. "Comparative Analysis of Machine Learning Algorithms for Liver Disease Prediction: SVM, Logistic Regression, and Decision Tree." Asian Journal of Research in Computer Science 17.6 (2024): 188-201.
- Prabhod, Kummaragunta Joel. "Advanced Machine Learning Techniques for Predictive Maintenance in Industrial IoT: Integrating Generative AI and Deep Learning for Real-Time Monitoring." Journal of AI-Assisted Scientific Discovery 1.1 (2021): 1-29.
- Tatineni, Sumanth, and Karthik Allam. "Implementing AI-Enhanced Continuous Testing in DevOps Pipelines: Strategies for Automated Test Generation, Execution, and Analysis." Blockchain Technology and Distributed Systems 2.1 (2022): 46-81.
- Sadhu, Ashok Kumar Reddy, and Amith Kumar Reddy. "A Comparative Analysis of Lightweight Cryptographic Protocols for Enhanced Communication Security in Resource-Constrained Internet of Things (IoT) Environments." African Journal of Artificial Intelligence and Sustainable Development 2.2 (2022): 121-142.