Glossary Items

V

  1. Vehicle-to-Everything (V2X) is the concept of vehicles communicating with their surroundings or elements of the traffic system around them through data exchange. It is a broad mode of communication that may entail more specific types of communication.
    V2X systems are mainly geared towards safety and can be programmed to become aware of their surroundings in order to help prevent accidents resulting from erroneous driving, collision, and erratic environments. In a conventional vehicle, V2X systems may relay information to the driver concerning weather changes, road and traffic incidents, and activities of vehicles at close vicitinitude. Similarly, in autonomous vehicles, V2X provides information deriving from systems beyond the vehicles existing system. _x000D_
  2. An energy management system where plug-in electric vehicles are able to communicate with a smart grid and help balance loads. Vehicle-to-grid (V2G) can be used with gridable vehicles, that is, plug-in electric vehicles (BEVs and PHEVs), with grid capacity.
    Vehicle-to-grid (V2G) describes a system in which plug-in electric vehicles, such as electric cars (BEVs) and plug-in hybrids (PHEVs), communicate with the power grid to sell demand response services by either returning electricity to the grid or by throttling their charging rate. Vehicle-to-grid can be used with gridable vehicles, that is, plug-in electric vehicles (BEVs and PHEVs), with grid capacity. Since at any given time 95 percent of cars are parked, the batteries in electric vehicles could be used to let electricity flow from the car to the electric distribution network and back. This represents a value to the utilities of up to $4,000 per year per car.
  3. The phrase unstructured data usually refers to information that doesn't reside in a traditional row-column database Information that either does not have a pre-defined data model or is not organized in a pre-defined manner (e.g., pictures or video).
    Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle crashes. The vision for V2I research is to enable safety applications designed to avoid or mitigate vehicle crashes, particularly for crash scenarios not addressed by V2V communications alone. Another important objective of the V2I research is national interoperability to support infrastructure and vehicle deployments.
  4. Vehicle-to-vehicle (V2V) is an automobile technology designed to allow automobiles to "talk" to each other. Using a region of the 5.9 GHz band, V2V systems allow vehicles to communicate with each other and with roadside stations.
    Using a region of the 5.9 GHz band, V2V systems allow vehicles to communicate with each other and with roadside stations. Networks of vehicles can help avoid congestion, find better routes, and aid law enforcement. V2V is currently in active development by General Motors, which demonstrated the system in 2006 using Cadillac vehicles. Other automakers working on V2V include Toyota, BMW, Daimler, Honda, Audi, Volvo and the Car-to-Car communication consortium.
  5. A MEMS concept referring to the detection of periodic acceleration and deceleration. Typical applications include structural health monitoring, acoustic event triggering, and seismic equipment.
    Typical applications include structural health monitoring, acoustic event triggering, and seismic equipment. A factory that installs vibration sensors on its motors and pumps would be able to detect a problem before something breaks and avoid a costly shutdown.
  6. A managed data service that transfers the monitoring and storage of video to the cloud. Video Surveillance as a Service (VCaaS) streamlines security operations by centralizing IT and requires no capital investment in servers but has heavy bandwidth requirements.
    VCaaS streamlines security operations by centralizing IT and requires no capital investment in servers but has heavy bandwidth requirements. Video Surveillance as a Service (VSaaS) takes video monitoring into the cloud. Sometimes referred to as hosted or managed video services, video from customer IP cameras or webcams is transmitted to the service provider’s secure cloud infrastructure.
  7. Virtual machine refers to an emulated computer system created using software. Virtual machines are based on computer architecture and provide the functions of a physical computer.
  8. The computer-generated simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way by a person using special electronic equipment.
    VR is an artificial environment that is created with software and presented to the user in such a way that the user accepts it as a real environment. Whereas augmented reality place virtual objects into a users view of the physical environment, virtual reality replaces the users view of the physical environment with a virtual environment, in which virtual content resides.
  9. A virtual sensor is a type of software that processes what a physical sensor otherwise would. It learns to interpret the relationships between the different variables and observes readings from different instruments.
    These sensors use data to gather information that would not be measurable by a single device. This way they can attain information that can’t be measured directly.
  10. Voice-as-User Interface (VUI) refers to the technology that entitles the human to interact with a system or computer through speech recognition to understand spoken commands and answer questions.
  11. Systematic examination of an information system or product to determine the adequacy of security measures, identify security deficiencies, provide data from which to predict the effectiveness of proposed security measures, and confirm the adequacy of such measures after implementation.
    A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system. Examples of systems for which vulnerability assessments are performed include, but are not limited to, information technology systems, energy supply systems, water supply systems, transportation systems, and communication systems. Such assessments may be conducted on behalf of a range of different organizations, from small businesses up to large regional infrastructures. Vulnerability from the perspective of disaster management means assessing the threats from potential hazards to the population and to infrastructure. It may be conducted in the political, social, economic or environmental fields.
test test