Cellular Vehicle-to-Everything (C-V2X)

(Author) (Author)
& 5 more
Out of Stock. Usually despatches within 2 weeks.
4.9/5.0
21,000+ Reviews
Bookshop.org has the highest-rated customer service of any bookstore in the world

Description

This book focuses on cellular Vehicle-to-Everything (C-V2X), currently the most promising wireless communication technology for Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), Vehicle-to-Pedestrian (V2P), Vehicle-to-Network (V2N) and Vehicle-to-Cloud (V2C) communications. Because of its low latency and high reliability, C-V2X has become an essential enabling technology for Intelligent Transportation Systems (ITSs) and autonomous driving.

This book begins by introducing readers to the research background and status quo of global development. Then, after analyzing the performance requirements of various V2X applications, the system architecture and technical standards are presented. The two evolving stages of C-V2X, i.e., LTE-V2X and NR-V2X, are introduced in detail. In addition, related technologies such as mobile edge computing, network slicing and high-precision positioning, C-V2X security, C-V2X spectrum requirements and planning, and industrial development andapplications are introduced. In closing, the book discusses future applications of and technical challenges for C-V2X.

This book is the first monograph dedicated to C-V2X, offering experts, researchers and engineers from the areas of IT/CT, intelligent transportation, intelligent and connected vehicles (ICVs) an in-depth understanding of C-V2X technology and standards, while also outlining related interdisciplinary research. The book can also be used as a reference resource for both undergraduate and graduate studies.


Product Details

Price
£159.99
Publisher
Springer Verlag, Singapore
Publish Date
Language
English
Type
Hardback
EAN/UPC
9789811951299
BIC Categories:

Earn By Promoting Books

Earn money by sharing your favourite books through our Affiliate programme.

Become an Affiliate
We use cookies and similar methods to recognize visitors and remember their preferences. We also use them to help detect unauthorized access or activity that violate our terms of service, as well as to analyze site traffic and performance for our own site improvement efforts. To learn more about these methods, including how to disable them view our Cookie Policy.