SlideShare a Scribd company logo
ADVANCED VEHICLE TELEMATICS
SYSTEM MODEL
Guided by :- Dr. Dileep P N
Presented by :- Dhaniklal K C
Department of Mechanical Engineering, TKMCE
13/3/2018
2
CONTENTS
• Introduction to telematics.
• Evolution of vehicular telematics.
• Advanced telematics system.
• New lifestyle delivery.
• Machine Learning.
• Vehicle predictive maintenance.
• Optimized UBI.
• Telematic fingerprint.
• Advantages.
• Disadvantages.
• Conclusion.
• Reference.
3/3/2018
Ever thought
about future
cars?!
“Telematics”
3
Branch of information technology
which deals with the long-distance
transmission of computerized
information
3/3/2018
TELEMATICS IN AUTOMOBILES
During 90’s During 2010’s
•Satellite Navigation
•Vehicle Tracking
•Multimedia
•Internet
•Mobile Data
•Wireless vehicle safety
communications
•Emergency warning system for
vehicles
•Usage based Insurance
•Vehicle user guidance
•Vehicle diagnostics
etc.,.
43/3/2018
ADVANCED INTEGRATED FUTURE
VEHICLE TELEMATICS SYSTEM MODEL
Features:
•Provides a real time risk of any failure or service requirement
in a vehicle in depth.
•UBI (User Based Insurance)
•Driving behavior detections and Telematic Fingerprint.
•Application of machine learning
53/3/2018
6
HIGH LEVEL MODEL
ECUSENSORS ACTUATORS
COMPUTING UNIT
PREPROCESSOR
PREPROCESSORCloud Computing
units/Cloud servers
DATA CENTERS
DISTRIBUTION CENTERS,SERVICE CENTERS
INDUSTRIES AND SERVICE SECTORS
On Board Vehicle
Devices
3/3/2018
7
LIFESTYLE DELIVERY
3/3/2018
83/3/2018
9
VEHICLE PREDICTIVE MAINTENANCE
 Predictive Maintenance : Employs monitoring and prediction modelling to determine
the condition of the machine and to predict what is likely to fail and when it is going to
happen.
 On Board Data : Signals from sensors and ECUs, that are communicated through
CAN network . They are sent repeatedly with a specified frequency.
 Off Board Data : Data from off Board data centers .Most corporates like VOLVO
Group have accumulated large amounts of data over years in Off Board databases.
 LVD : Logged Vehicle Data.
 VSR : Vehicle Service Records.
3/3/2018
10
Applying ‘Machine Learning’
LVD and VSR databases are combined ,preprocessed and data mined for patterns linked to
different components of vehicles by Supervised approach.
Vehicle Date Mileage LVD1 LVD2 ... Time to Failure Label
A-12345 2010-06-01 1030023 100 35 ... 125 Normal
A-12345 2010-08-15 1123001 101 25 ... 50 Normal
A-87654 2010-04-20 9040223 120 29 ... 110 Normal
A-87654 2010-01-21 9110223 121 26 ... 21 Faulty
A-34567 2010-11-05 1330033 90 23 ... >301 Normal
A-34567 2011-03-11 1390033 121 26 ... >175 Normal
Learning from historical data :
Algorithms: KNN, Random Forest learning algorithm.
Software: R
Model of training set
3/3/2018
11
OPTIMIZED USER BASED INSURANCE
• Huge amount of data that needs to be analyzed is the major challenge.
• TensorFlow machine learning framework has been used by AXA on the Google
Cloud Machine Learning Engine for predicting "large-loss" car accidents involving its
clients
• Identify which drivers are at higher risk for cases of large loss
• By using deep learning (neural network), 78% accuracy in predictions has been
obtained.
3/3/2018
12
Neural Network Model
Features :
 About 70 values including:
• Age range of the driver
• Region of the driver's address
• Annual insurance premium
range
• Age range of the car
 Three hidden layers, with a
ReLu as the activation
function
3/3/2018
13
DRIVER BEHAVIOUR DETECTION AND TELEMATIC
FINGERPRINT
• Identification of which trip was driven by whom.
3/3/2018
14
GPS Data:
• Preprocessing the data
• Driving Vocabulary - made of “Driving Slides”
• Each trip –combination of “Driving Behaviors” made
of “Driving Slides” –Using Gensim Library
KAGGLE COMPETITION
200 Trips,2736 Drivers
5.92 GB GPS Data
Training Data Preparation :
3/3/2018
15
Approach:
• Transpose all trips into the new Driving Behaviours Space.
• Take one by one each trip from a selected Driver
• Build a prediction model trained with all other trips in the
dataset:
Trues if they belong to the selected Driver
Falses if they do not belong to this Driver
• Predict with the trained model, the belonging of the selected Trip
to the Driver
3/3/2018
16
ADVANTAGES
 Increased Personalization and interactivity
 Easier to use
 Emphasis on infotainment
 More local information
 Safer vehicles
 More sophisticated insurance
3/3/2018
17
DISADVANTAGES
 Criminal gangs intent on:
• Stealing Personally Identifiable Information
(e.g. Credit Card numbers)
• Deploying “ransomware”
 Rise of car hackers
 Lack of privacy
 Unemployment
3/3/2018
18
CONCLUSION
The futuristic telematics model is a highly optimized, safer and
intelligent approach.
More optimization and development of mathematical models can
be taken up with the advancements in data science and machine learning.
The importance of data and its implementations are going to be the
most important entities of the future.
3/3/2018
19
REFERENCE
 “Automobile Driver Fingerprinting,Miro Enev, Alex Takakuwa, Karl Kosher
Proceedings on Privacy Enhancing Technologies ; 2016 (1):34–51
 “Advanced Integrated Future Vehicle Telematics System Concept Modeling”
Ashmika Agarwal and Vinay Yadav; Agarwal et al., Global J Technol Optim 2017,8:2
 “An Intelligent Data Processing Engine for Spatial Data Management in Vehicular
Telematics System” Animesh Tripathy, Subhalaxmi Das, Prashanta Kumar Patra 2009
International Conference on Advances in Computing, Control, and
Telecommunication Technologies
 "Predicting the Need for Vehicle Compressor Repairs Using Maintenance Records
and Logged Vehicle Data" submitted to Engineering Applications of Artificial
Intelligence,2014. R. Prytz, S Nowaczyk, T Rögnvaldsson, S Byttner.
3/3/2018
20
THANK YOU
3/3/2018

More Related Content

Similar to Advanced Telematics System Model

A Perspective of a Connected and Autonomous Transportation System
A Perspective of a Connected and Autonomous Transportation SystemA Perspective of a Connected and Autonomous Transportation System
A Perspective of a Connected and Autonomous Transportation System
Center for Transportation Research - UT Austin
 
IRJET- Smart Vehicle with Crash Detection and Emergency Vehicle Dispatch with...
IRJET- Smart Vehicle with Crash Detection and Emergency Vehicle Dispatch with...IRJET- Smart Vehicle with Crash Detection and Emergency Vehicle Dispatch with...
IRJET- Smart Vehicle with Crash Detection and Emergency Vehicle Dispatch with...
IRJET Journal
 
Module 3 Intelligent Transport Systems.pptx
Module 3 Intelligent Transport Systems.pptxModule 3 Intelligent Transport Systems.pptx
Module 3 Intelligent Transport Systems.pptx
SilasChaudhari
 
AICAS Automotive Insurance
AICAS Automotive InsuranceAICAS Automotive Insurance
AICAS Automotive Insurance
Norbert Steinhauser
 
Connected Car Security
Connected Car SecurityConnected Car Security
Connected Car Security
Suresh Mandava
 
ACCIDENT DETECTION USING BiLSTM
ACCIDENT DETECTION USING BiLSTMACCIDENT DETECTION USING BiLSTM
ACCIDENT DETECTION USING BiLSTM
IRJET Journal
 
User-Driven Cloud Transportation System for Smart Driving
User-Driven Cloud Transportation System for Smart DrivingUser-Driven Cloud Transportation System for Smart Driving
User-Driven Cloud Transportation System for Smart Driving
amg93
 
Collision Communication System
Collision Communication SystemCollision Communication System
Collision Communication System
Sachin Mehta
 
Smart Safety for Commercial Vehicles (ENG)
Smart Safety for Commercial Vehicles (ENG)Smart Safety for Commercial Vehicles (ENG)
Smart Safety for Commercial Vehicles (ENG)
Artur Filipowicz
 
Trends_Automotives.pptx
Trends_Automotives.pptxTrends_Automotives.pptx
Trends_Automotives.pptx
Elakiya28
 
IRJET- Toll Collection Automation
IRJET-  	  Toll Collection AutomationIRJET-  	  Toll Collection Automation
IRJET- Toll Collection Automation
IRJET Journal
 
Project Presentation 1 Template Car Black Box
Project Presentation 1 Template Car Black BoxProject Presentation 1 Template Car Black Box
Project Presentation 1 Template Car Black Box
PoojaBan
 
IRJET- Automative Impregnable Driving System
IRJET-  	  Automative Impregnable Driving SystemIRJET-  	  Automative Impregnable Driving System
IRJET- Automative Impregnable Driving System
IRJET Journal
 
Personalized Driver Alerting System using object detection
Personalized Driver Alerting System using object detectionPersonalized Driver Alerting System using object detection
Personalized Driver Alerting System using object detection
IRJET Journal
 
Inteligent transport system
Inteligent transport systemInteligent transport system
Inteligent transport system
Bhavik A Shah
 
Algorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous CarsAlgorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous Cars
Association of Scientists, Developers and Faculties
 
Smart vehicle management by using sensors and an IoT based black box
Smart vehicle management by using sensors and an IoT based  black boxSmart vehicle management by using sensors and an IoT based  black box
Smart vehicle management by using sensors and an IoT based black box
International Journal of Reconfigurable and Embedded Systems
 
Google's Driverless Car
Google's Driverless CarGoogle's Driverless Car
Google's Driverless Car
aishu nischala
 
Autonomous Vehicles: Technologies, Economics, and Opportunities
Autonomous Vehicles: Technologies, Economics, and OpportunitiesAutonomous Vehicles: Technologies, Economics, and Opportunities
Autonomous Vehicles: Technologies, Economics, and Opportunities
Jeffrey Funk
 
Wily final2
Wily final2Wily final2
Wily final2walkthis
 

Similar to Advanced Telematics System Model (20)

A Perspective of a Connected and Autonomous Transportation System
A Perspective of a Connected and Autonomous Transportation SystemA Perspective of a Connected and Autonomous Transportation System
A Perspective of a Connected and Autonomous Transportation System
 
IRJET- Smart Vehicle with Crash Detection and Emergency Vehicle Dispatch with...
IRJET- Smart Vehicle with Crash Detection and Emergency Vehicle Dispatch with...IRJET- Smart Vehicle with Crash Detection and Emergency Vehicle Dispatch with...
IRJET- Smart Vehicle with Crash Detection and Emergency Vehicle Dispatch with...
 
Module 3 Intelligent Transport Systems.pptx
Module 3 Intelligent Transport Systems.pptxModule 3 Intelligent Transport Systems.pptx
Module 3 Intelligent Transport Systems.pptx
 
AICAS Automotive Insurance
AICAS Automotive InsuranceAICAS Automotive Insurance
AICAS Automotive Insurance
 
Connected Car Security
Connected Car SecurityConnected Car Security
Connected Car Security
 
ACCIDENT DETECTION USING BiLSTM
ACCIDENT DETECTION USING BiLSTMACCIDENT DETECTION USING BiLSTM
ACCIDENT DETECTION USING BiLSTM
 
User-Driven Cloud Transportation System for Smart Driving
User-Driven Cloud Transportation System for Smart DrivingUser-Driven Cloud Transportation System for Smart Driving
User-Driven Cloud Transportation System for Smart Driving
 
Collision Communication System
Collision Communication SystemCollision Communication System
Collision Communication System
 
Smart Safety for Commercial Vehicles (ENG)
Smart Safety for Commercial Vehicles (ENG)Smart Safety for Commercial Vehicles (ENG)
Smart Safety for Commercial Vehicles (ENG)
 
Trends_Automotives.pptx
Trends_Automotives.pptxTrends_Automotives.pptx
Trends_Automotives.pptx
 
IRJET- Toll Collection Automation
IRJET-  	  Toll Collection AutomationIRJET-  	  Toll Collection Automation
IRJET- Toll Collection Automation
 
Project Presentation 1 Template Car Black Box
Project Presentation 1 Template Car Black BoxProject Presentation 1 Template Car Black Box
Project Presentation 1 Template Car Black Box
 
IRJET- Automative Impregnable Driving System
IRJET-  	  Automative Impregnable Driving SystemIRJET-  	  Automative Impregnable Driving System
IRJET- Automative Impregnable Driving System
 
Personalized Driver Alerting System using object detection
Personalized Driver Alerting System using object detectionPersonalized Driver Alerting System using object detection
Personalized Driver Alerting System using object detection
 
Inteligent transport system
Inteligent transport systemInteligent transport system
Inteligent transport system
 
Algorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous CarsAlgorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous Cars
 
Smart vehicle management by using sensors and an IoT based black box
Smart vehicle management by using sensors and an IoT based  black boxSmart vehicle management by using sensors and an IoT based  black box
Smart vehicle management by using sensors and an IoT based black box
 
Google's Driverless Car
Google's Driverless CarGoogle's Driverless Car
Google's Driverless Car
 
Autonomous Vehicles: Technologies, Economics, and Opportunities
Autonomous Vehicles: Technologies, Economics, and OpportunitiesAutonomous Vehicles: Technologies, Economics, and Opportunities
Autonomous Vehicles: Technologies, Economics, and Opportunities
 
Wily final2
Wily final2Wily final2
Wily final2
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Advanced Telematics System Model

  • 1. ADVANCED VEHICLE TELEMATICS SYSTEM MODEL Guided by :- Dr. Dileep P N Presented by :- Dhaniklal K C Department of Mechanical Engineering, TKMCE 13/3/2018
  • 2. 2 CONTENTS • Introduction to telematics. • Evolution of vehicular telematics. • Advanced telematics system. • New lifestyle delivery. • Machine Learning. • Vehicle predictive maintenance. • Optimized UBI. • Telematic fingerprint. • Advantages. • Disadvantages. • Conclusion. • Reference. 3/3/2018
  • 3. Ever thought about future cars?! “Telematics” 3 Branch of information technology which deals with the long-distance transmission of computerized information 3/3/2018
  • 4. TELEMATICS IN AUTOMOBILES During 90’s During 2010’s •Satellite Navigation •Vehicle Tracking •Multimedia •Internet •Mobile Data •Wireless vehicle safety communications •Emergency warning system for vehicles •Usage based Insurance •Vehicle user guidance •Vehicle diagnostics etc.,. 43/3/2018
  • 5. ADVANCED INTEGRATED FUTURE VEHICLE TELEMATICS SYSTEM MODEL Features: •Provides a real time risk of any failure or service requirement in a vehicle in depth. •UBI (User Based Insurance) •Driving behavior detections and Telematic Fingerprint. •Application of machine learning 53/3/2018
  • 6. 6 HIGH LEVEL MODEL ECUSENSORS ACTUATORS COMPUTING UNIT PREPROCESSOR PREPROCESSORCloud Computing units/Cloud servers DATA CENTERS DISTRIBUTION CENTERS,SERVICE CENTERS INDUSTRIES AND SERVICE SECTORS On Board Vehicle Devices 3/3/2018
  • 9. 9 VEHICLE PREDICTIVE MAINTENANCE  Predictive Maintenance : Employs monitoring and prediction modelling to determine the condition of the machine and to predict what is likely to fail and when it is going to happen.  On Board Data : Signals from sensors and ECUs, that are communicated through CAN network . They are sent repeatedly with a specified frequency.  Off Board Data : Data from off Board data centers .Most corporates like VOLVO Group have accumulated large amounts of data over years in Off Board databases.  LVD : Logged Vehicle Data.  VSR : Vehicle Service Records. 3/3/2018
  • 10. 10 Applying ‘Machine Learning’ LVD and VSR databases are combined ,preprocessed and data mined for patterns linked to different components of vehicles by Supervised approach. Vehicle Date Mileage LVD1 LVD2 ... Time to Failure Label A-12345 2010-06-01 1030023 100 35 ... 125 Normal A-12345 2010-08-15 1123001 101 25 ... 50 Normal A-87654 2010-04-20 9040223 120 29 ... 110 Normal A-87654 2010-01-21 9110223 121 26 ... 21 Faulty A-34567 2010-11-05 1330033 90 23 ... >301 Normal A-34567 2011-03-11 1390033 121 26 ... >175 Normal Learning from historical data : Algorithms: KNN, Random Forest learning algorithm. Software: R Model of training set 3/3/2018
  • 11. 11 OPTIMIZED USER BASED INSURANCE • Huge amount of data that needs to be analyzed is the major challenge. • TensorFlow machine learning framework has been used by AXA on the Google Cloud Machine Learning Engine for predicting "large-loss" car accidents involving its clients • Identify which drivers are at higher risk for cases of large loss • By using deep learning (neural network), 78% accuracy in predictions has been obtained. 3/3/2018
  • 12. 12 Neural Network Model Features :  About 70 values including: • Age range of the driver • Region of the driver's address • Annual insurance premium range • Age range of the car  Three hidden layers, with a ReLu as the activation function 3/3/2018
  • 13. 13 DRIVER BEHAVIOUR DETECTION AND TELEMATIC FINGERPRINT • Identification of which trip was driven by whom. 3/3/2018
  • 14. 14 GPS Data: • Preprocessing the data • Driving Vocabulary - made of “Driving Slides” • Each trip –combination of “Driving Behaviors” made of “Driving Slides” –Using Gensim Library KAGGLE COMPETITION 200 Trips,2736 Drivers 5.92 GB GPS Data Training Data Preparation : 3/3/2018
  • 15. 15 Approach: • Transpose all trips into the new Driving Behaviours Space. • Take one by one each trip from a selected Driver • Build a prediction model trained with all other trips in the dataset: Trues if they belong to the selected Driver Falses if they do not belong to this Driver • Predict with the trained model, the belonging of the selected Trip to the Driver 3/3/2018
  • 16. 16 ADVANTAGES  Increased Personalization and interactivity  Easier to use  Emphasis on infotainment  More local information  Safer vehicles  More sophisticated insurance 3/3/2018
  • 17. 17 DISADVANTAGES  Criminal gangs intent on: • Stealing Personally Identifiable Information (e.g. Credit Card numbers) • Deploying “ransomware”  Rise of car hackers  Lack of privacy  Unemployment 3/3/2018
  • 18. 18 CONCLUSION The futuristic telematics model is a highly optimized, safer and intelligent approach. More optimization and development of mathematical models can be taken up with the advancements in data science and machine learning. The importance of data and its implementations are going to be the most important entities of the future. 3/3/2018
  • 19. 19 REFERENCE  “Automobile Driver Fingerprinting,Miro Enev, Alex Takakuwa, Karl Kosher Proceedings on Privacy Enhancing Technologies ; 2016 (1):34–51  “Advanced Integrated Future Vehicle Telematics System Concept Modeling” Ashmika Agarwal and Vinay Yadav; Agarwal et al., Global J Technol Optim 2017,8:2  “An Intelligent Data Processing Engine for Spatial Data Management in Vehicular Telematics System” Animesh Tripathy, Subhalaxmi Das, Prashanta Kumar Patra 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies  "Predicting the Need for Vehicle Compressor Repairs Using Maintenance Records and Logged Vehicle Data" submitted to Engineering Applications of Artificial Intelligence,2014. R. Prytz, S Nowaczyk, T Rögnvaldsson, S Byttner. 3/3/2018