Browse Topic: Connectivity

Items (808)
Modern vehicles require sophisticated, secure communication systems to handle the growing complexity of automotive technology. As in-vehicle networks become more integrated with external wireless services, they face increasing cybersecurity vulnerabilities. This paper introduces a specialized Proxy based security architecture designed specifically for Internet Protocol (IP) based communication within vehicles. The framework utilizes proxy servers as security gatekeepers that mediate data exchanges between Electronic Control Units (ECUs) and outside networks. At its foundation, this architecture implements comprehensive traffic management capabilities including filtering, validation, and encryption to ensure only legitimate data traverses the vehicle's internal systems. By embedding proxies within the automotive middleware layer, the framework enables advanced protective measures such as intrusion detection systems, granular access controls, and protected over-the-air (OTA) update
M, ArvindPraneetha, Appana DurgaRemalli, Ravi Teja
With the rise of AI and other new digital technologies on the horizon, ACT Expo 2026 will be a crucial intersection for industry leaders to map out the route ahead. Since 2011, ACT Expo has served as a meeting point of technology and business discussions for the commercial vehicle industry. The 2026 show in Las Vegas (www.actexpo.com) is shaping up to be another important waypoint for the industry as it continues to grapple with new technologies, regulations and other significant challenges. This year's agenda program builds on ACT Expo's long-established emphasis on clean transportation and places an increased focus on the digital frontier, including AI, autonomy, connectivity and software-defined vehicles. Truck & Off-Highway Enginering interviewed Erik Neandross, president of the Clean Transportation Solutions group at TRC, about what topics are emerging as the main trends heading into 2026 and what he thinks will be some of the most important themes of the upcoming convention.
Wolfe, Matt
Innovation in energy storage and generation system will lead to multiple power train solutions across the vehicle categories in the Automative segment. With various options to the end consumer across different vehicle segments, the complexity associated with E/E Architecture and software engineering will be multi-fold both for the OEMs and Suppliers. Over the air updates shall become mandatory features to manage this complexity and to calibrate the vehicle features in line with changing trends and efficiency plus feature enhancements in post-market release scenarios. These upgrades are more common in digital clusters, in-vehicle entrainment and central digital cockpits. OEMs are introducing the vehicle platforms in multiple power train variants keeping comfort, instrument clusters and in-vehicle entertainment as core features across different power trains. A well-defined and managed comprehensive optimal test strategy and infrastructure will be critical to ensure seamless release of
Rajaram, SaravananVenkata, ParameswaranNaik, Venkatesh
This paper presents the design, simulation, and evaluation of a low-profile Multiple-Input Multiple-Output (MIMO) antenna configuration, optimized to meet the evolving demands of modernized wireless communication systems, incorporating LTE-Advanced (LTE-A) and emerging 5G Internet of Things (5G-IoT) applications. The antenna’s geometry relies on a novel design comprising staircase-shaped rectangular radiating patches with an integrated stub. This configuration is employed to improve impedance bandwidth and strengthen the isolation between antenna components, which are critical parameters in MIMO system performance. The antenna is fabricated on a Rogers RT/Duroid 5880 substrate, distinguished by its low dielectric loss and high-frequency stability. With a compact physical footprint of 96 × 96 mm2, the proposed design effectively serves the feature of integration into portable and space-constrained wireless devices. The antenna operates effectively across frequency range of 2.13 GHz to
Gupta, ParulPrasad, Anjay
Automotive Over-the-Air (OTA) software updating has become a cornerstone of the modern connected vehicle, enabling manufacturers to remotely deploy bug fixes, security patches, and new features. However, this convenience comes with significant cybersecurity challenges. This paper provides a detailed examination of automotive OTA update security and the software store (software Applications & services store) mechanisms. I discuss the current industry standards and regulations, notably ISO/SAE 21434 and the United Nations Economic Commission for Europe (UNECE) regulations UN R155 (cybersecurity) and UN R156 (software updates) and explain their relevance to secure OTA and software update management. I then explored the Uptane framework, an open and widely adopted architecture specifically designed to secure automotive OTA updates. Next, OTA-specific threat models are analyzed, detailing potential attack vectors and corresponding mitigation strategies. Real-world case studies are presented
Kurumbudel, Prashanth Ram
With the rapid advancement of connected vehicle technologies, infotainment Electronic Control Units (ECUs) have become central to user interaction and connectivity within modern vehicles. However, this enhanced functionality has introduced new vulnerabilities to cyberattacks. This paper explores the application of Artificial Intelligence (AI) in enhancing the cybersecurity framework of infotainment ECUs. The study introduces AI-powered modules for threat detection and response, presents an integrated architecture, and validates performance through simulation using MATLAB, CANoe, and NS-3. This approach addresses real-time intrusion detection, anomaly analysis, and voice command security. Key benefits include zero-day exploit resistance, scalability, and continuous protection via OTA updates. The paper references real-world automotive cyberattack cases such as OTA vulnerability patches, Connected Drive exploits, and Uconnect hack, emphasizing the critical need for AI-enabled proactive
More, ShwetaKulkarni, ShraddhaKumar, PriyanshuGhanwat, HemantJoshi, Vivek
Edge Artificial Intelligence (AI) is poised to usher in a new era of innovations in automotive and mobility. In concert with the transition towards software-defined vehicle (SDV) architectures, the application of in-vehicle edge AI has the potential to extend well beyond ADAS and AV. Applications such as adaptive energy management, real-time powertrain calibration, predictive diagnostics, and tailored user experiences. By moving AI model execution right into edge, i.e. the vehicle, automakers can significantly reduce data transmission and processing costs, ensure privacy of user data, and ensure timely decision-making, even when connectivity is limited. However, achieving such use of edge AI will require essential cloud and in-vehicle infrastructure, such as automotive-specific MLOps toolchains, along with the proper SDV infrastructure. Elements such as flexible compute environments, deterministic and high-speed networks, seamless access to vehicle-wide data and control functions. This
Khatri, SanjaySah, Mohamadali
With the increasing connectivity of modern vehicles, cybersecurity threats have become a critical concern. Intrusion Detection Systems (IDS) play a vital role in securing in-vehicle networks and embedded vehicle computers from malicious attacks. This presentation shares about an IDS framework designed specifically for POSIX-based operating systems used in vehicle computers, leveraging system-level monitoring, anomaly detection, and signature-based methods to identify potential security breaches. The proposed IDS integrates lightweight behavioral analysis to ensure minimal computational overhead while effectively detecting unauthorized access, privilege escalation, communication interface monitoring etc. By employing a combination of rule-based and OS datapoints, the system enhances threat detection accuracy without compromising real-time performance. Practical series deployments demonstrate the effectiveness of this approach in mitigating cyber threats in automotive environments
Shukla, SiddharthChatterjee lng, Avik
Electric mobility is no longer a distant vision, it is a global imperative in the journey of fight against the climate change and the urban pollution. Yet, despite of explosive growth in the electric vehicle adoptions, a major bottleneck remains which is efficient and convenient charging. The current reliance on physical plug in charging station creates inconvenient, time consuming experience and also faces significant technical and economic challenges those threaten to stall the smooth clean transportation revolution. Without innovation in how we recharge our vehicle the promise of electric mobility appears under threat which is undermined by less efficient, less compatible, and infrastructure hurdles. Wireless charging technology stand out as the game changing breakthrough poised to tackle these all critical problems head on. By enabling the effortless, cable-free charging system across the wide spectrum of electric vehicles, from the personal cars to the public transport fleets and
Jain, GauravPremlal, PPathak, RahulGore, Pandurang
The BioMap system represents a groundbreaking approach to collaborative mapping for autonomous vehicles, drawing inspiration from ant colony behavior and swarm intelligence. It implements a fully decentralized protocol where vehicles use virtual pheromone trails to mark areas of uncertainty, change, or importance, enabling efficient map consensus without centralized coordination. Key innovations include novel pheromone-based compression algorithms and bio-inspired consensus mechanisms that allow real-time adaptation to dynamic environments. In a simulated urban scenario (Town10HD), three vehicles achieved balanced load distribution (±1.8% variance) and comprehensive coverage of a 253.2m × 217.9m × 22.4m area. The final fused map contained 311 chunks with 72,785 particles and required only 10.4 MB of storage. Approximately 49.2% of map particles exceeded the pheromone significance threshold, indicating active importance marking, while no high-uncertainty regions remained. These results
Bhargav, Anirudh SSubbarao, Chitrashree
A more recent focus on driver comfort and the increasing demand for wide range of information availability make automotive Original Equipment Manufacturers (OEMs) provide advanced features such as Head Up Display (HUD) system. Even though HUD projects vital information onto the windshield/glass, its structural integration comes with significant vibration challenges, leading to display instability and haziness. This paper discusses the significant design parameters influencing the functional effectiveness of HUD system. The structure considered for analysis is the HUD assembly and its integration in vehicle. Cross Car Beam (CCB) turns out to be the critical component of the vehicle structure susceptible to road excitations. Although it’s mass dampens the vibrations inherently, due to the low mass of the HUD, relative oscillation between its projector, mirror, and either the windshield or display causes image distortion This paper investigates in detail the role of HUD structural
Vardhanan K, Aravindha VishnuNaidu, SudhakaraTitave, Uttam
The automotive industry is rapidly extending the capabilities of automated systems by incorporating connectivity and cooperation features that enable real-time information exchange between vehicles and road infrastructure. Within the Connected, Cooperative, and Automated Mobility (CCAM) framework, Vehicle-to-Vehicle (V2V) communication is expected to play a key role in improving road safety, traffic efficiency, and driving comfort. This work addresses a practical implementation of the standardized Manoeuvre Coordination Messages (MCMs), as defined in the ongoing ETSI standard (ETSI TS 103 561). The proposed approach is demonstrated through a cooperative cut-in use case in which two vehicles negotiate a lane change manoeuvre. In the considered scenario, the ego vehicle, driven by a Highway Pilot (HWP) system, receives the intention to cut-in from a neighbouring cooperative vehicle through an MCM. In response, the ego vehicle adapts its behaviour by decelerating to generate a safe
Leiva Ricart, GiselaDomingo Mateu, Bernat
Software-Defined Vehicles (SDVs) are changing the automotive landscape by separating hardware from software and enabling features like over-the-air updates, advanced control strategies, and real-time decision-making. To support this transformation, EV powertrain systems require high-performance computing (HPC) platforms capable of real-time control, data processing, and cross-domain communication. This paper introduces a fully SDV-compatible EV powertrain architecture designed with NXP S32G3 domain controller. This processor supports multiple core having lockstep. It is designed for zonal control and automotive functional safety. The proposed designed uses the automotive Ethernet as an alternate option for CAN based communication to fulfill the bandwidth and timing requirement of today’s SDV applications. Hence it allows gigabit data transfer, Time Sensitive Networking (TSN) and also provides low latency across SDV control domain. Through secure real time interface with the vehicle’s
Pawar, GaneshInamdar, Sumer DeepakKumar, MayankDeosarkar, PankajTayade, NikhilKanse, DattatrayChopade, Vipul
The modern vehicle is no longer a mechanical appliance—it has transformed into a software-defined cyber-physical system, integrating OTA updates, cloud-connected diagnostics, V2X services, and telematics-driven personalization. While this evolution promises unprecedented value in consumer experience and fleet operations, it also surfaces a dramatically expanded and evolving attack perimeter, especially across safety-critical ECUs and communication buses. Cyber vulnerabilities have shifted from isolated IT threats to real-time, embedded exploits. Controller area network (CAN), the backbone of vehicle bus systems, remains intrinsically insecure due to its lack of authentication and encryption, making it highly susceptible to message injection and denial-of-service by low-cost tools. Similarly, OEM implementations of BLE-based passive entry systems have proven vulnerable to replay and spoofing attacks with minimal hardware. In the Indian context, the transition to connected mobility is
Shah, RavindraAwasthi, Vibhu VaibhavKarle, Ujjwala
With the emergence of Software-Defined Vehicles (SDVs), more complex software and connectivity technologies are introduced to support new advanced use cases such as phone as a key, smart parking and vehicle management. However, complex software functionality and external connectivity also increase the attack surface of vehicles and its ecosystem. In this paper, we first perform a classification of recent automotive cybersecurity attacks. We further perform an analysis of these attacks and associated vulnerabilities considering the application of best practices of vulnerability management approaches including Common Vulnerability Scoring System (CVSS), Exploit Prediction Scoring System (EPSS), and Stakeholder-Specific Vulnerability Categorization (SSVC). CVSS is a standardized framework used to assign severity scores to known vulnerabilities and helps organizations prioritize vulnerability remediation based on severity. EPSS is a predictive model that estimates the probability of a
Oka, Dennis KengoVadamalu, Raja Sangili
Predictive maintenance is critical to improving reliability, safety and operational efficiency of connected vehicles. However, classic supervised learning methods for fault prediction rely heavily on large-scale labeled data of failures, which are difficult to obtain and maintain a manually built dataset of failure events in real automotives settings. In this paper, we present a novel self-supervised anomaly detection model that makes predictions on the faults without the need for labeled failures by using only the operational data when the systems or robots are healthy. The method relies on self-supervised pretext tasks, like masked signal reconstruction and future telemetry prediction, to extract nominal multi-sensor dynamics (i.e., temperature, pressure, current, vibration) while jointly minimizing the deviation between encoded/decoded signals and normal patterns in the latent space. A unsupervised anomaly detection model is then used to detect when the learned patterns are violated
Kumar, PankajDeole, KaushikHivarkar, Umesh
Software Defined Vehicles (SDV), Software Defined Networks (SDN), Software Defined (Power) Grids (SDG) are just a few examples of how the Software Defined Transformation is unfolding across many industries today (collectively being referred to as Software Defined X – SDX). This paper defines a maturity model for Software Defined Transformation and evaluates different industries including Automotive on their evolution so far. This cross-industry view of SDX helps in analyzing where SDV’s could be headed. A 2020 paper [1] lays out the complexity of the automotive software, with companies pursuing several directions in this transformation. The automotive industry has not yet reached a consensus on the direction it is taking on SDV. While companies like Tesla are already making software centric cars, traditional OEMs like General Motors, Toyota, Ford etc. are making huge investments and redefining their business models, tech stacks and operations to leverage the power of software. There is
Mathur, Akshay RajMisra, AmitMakam, Sandeep
The rapid adoption of connected vehicle technologies and advanced driver assistance systems (ADAS) necessitates robust security mechanisms capable of identifying and mitigating sophisticated cyber threats in real-time. Traditional signature-based intrusion detection systems (IDS) are often inadequate in addressing the dynamic and evolving nature of automotive cybersecurity threats, particularly in modern vehicle networks like Controller Area Network (CAN), CAN with Flexible Data-Rate (CAN-FD), and Automotive Ethernet. This research introduces a novel Real-time Intrusion Detection System utilizing advanced Machine Learning (ML) techniques designed specifically for automotive network environments. The proposed IDS framework employs supervised and unsupervised ML algorithms, including anomaly detection, behavioral analytics, and predictive threat modeling, to achieve high accuracy and rapid threat identification capabilities. Through extensive testing in simulated and actual vehicle
Chaudhary lng, VikashDesai, ManojChatterjee, Avik
In the development of the automotive electronic control unit (ECU), to keep performance at the desired level, what remains constant is to verify, evaluate, and validate electronic control units. Nowadays, Cars have multiple ECUs even in the range of fifty. Software is validated by a tester using a target ECU, Controller Area network (CAN) communication, and some Input/Output simulation techniques. Also, in some applications, a virtual environment is created for testing. In this paper, the method of Integration testing of Automotive Open System Architecture (AUTOSAR) modules is presented with AUTOSAR software specification as its input. This makes standard test cases as SWS remains the same for AUTOSAR standard release. It enables a platform to efficiently test all layers of AUTOSAR base software (BSW) modules after integration. For the demonstration, TriCore micro controller TC377TX from Infineon is used. Same controllers are usually used in the development of automotive ECUs for
Kelkar, RenuPatil, Vardhman
Over-the-Air (OTA) update technology has come forth as a transformative aider in the domain of automotive technology, allowing Original Equipment Manufacturers (OEMs) and Tier-1 suppliers of Electric vehicles (EVs) to frequently make software modifications, enhancements, and bug fixes that are essential to optimize the performance of powertrain components such as the motor controller unit (MCU), Battery Management System (BMS), and Vehicle Control Unit (VCU). This facilitates them to remotely supply updates to the vehicle firmware and software by giving inputs of calibration data without requiring physical access to the vehicle. However, as OTA updates have a direct impact on vehicle’s performance, safety and cybersecurity, a stringent validation methodology is of prime importance prior to deployment process. This paper explores the integration of Hardware-in-Loop (HIL) simulation into the OTA validation pipeline as a means to ensure reliability, safety, and functional correctness of
Khare, ShivaniKarle, UjjwalaSubramaniam, Anand
This paper presents a comprehensive technical review of the Software-Defined Vehicle (SDV), a paradigm that is fundamentally reshaping the automotive industry. We analyze the architectural evolution from distributed Electronic Control Units (ECUs) to centralized zonal compute platforms, examining the critical role of Service-Oriented Architectures (SOA), the AUTOSAR standard, and virtualization technologies in enabling this shift. A comparative analysis of leading High-Performance Computing (HPC) platforms, including NVIDIA DRIVE, Tesla FSD, and Qualcomm Snapdragon Ride, is conducted to evaluate the silicon foundation of the SDV. The paper further investigates key enabling technologies such as Over- the-Air (OTA) updates, Digital Twins, and the integration of Artificial Intelligence (AI) for applications ranging from predictive maintenance to software-defined battery management. We scrutinize the competing V2X communication standards (DSRC vs. C-V2X) and address the paramount
Ahmad, AqueelHemanth, KhimavathKumar, OmKumar, RajivHaregaonkar, Rushikesh Sambhaji
Ensuring the safety and functionality of sophisticated vehicle technologies has grown more difficult as the automotive industry quickly shifts to intelligent, electric, and connected mobility. Software-defined architectures, electric powertrains, and advanced driver assistance systems (ADAS) all require strong quality assurance (QA) frameworks that can handle the multi domain nature of contemporary vehicle platforms. In order to thoroughly assess the functionality and dependability of next generation automotive systems, this paper proposes an integrated QA methodology that blends conventional testing procedures with model-based validation, digital twin environments, and real-time system monitoring. The suggested framework, which includes hardware-in-the-loop (HIL), software-in-the-loop (SIL), and over-the-air (OTA) testing techniques, concentrates on end-to-end traceability from specifications to validation. Simulating intricate situations for ADAS, electric vehicle battery temperature
Komanduri, Arun SrinivasSrivastava, Anuj
The proliferation of connectivity features (V2X, OTA updates, diagnostics) in modern two-wheelers significantly expands the attack surface, demanding robust security measures. However, the anticipated arrival of quantum computers threatens to break widely deployed publickey cryptography (RSA, ECC), rendering current security protocols obsolete. This paper addresses the critical need for quantum-resistant security in the automotive domain, specifically focusing on the unique challenges of two-wheeler embedded systems. This work presents an original analytical and experimental evaluation of implementing selected Post-Quantum Cryptography (PQC) algorithms, primarily focusing on NIST PQC standardization candidates (e.g., lattice-based KEMs/signatures like Kyber/Dilithium), on microcontroller platforms representative of those used in two-wheeler Electronic Control Units (ECUs) - typically ARM Cortex-M series devices characterized by limited computational power, memory (RAM/ROM), and strict
Mishra, Abhigyan
There is rapidly increasing advancement in Connectivity, Autonomous, Subscription and Electrification features in vehicles which are being developed. These trends have resulted in an increase in attack surface and security risks on vehicles. To handle these growing risks, it has become important to include passive security systems such as Intrusion detection systems (IDS) which can detect successful or possible attempts of intrusion into vehicle systems compromising their security. In vehicles based on Zonal Architecture, two types of IDS can be implemented, Network based IDS (NIDS) and Host Based IDS (HIDS). The NIDS is implemented in Gateway Electronic Control Unit (ECU) and can monitor multiple networks connected to Gateway, whereas the HIDS usually monitors one single host ECU. Extensive research material is available on NIDS for CAN Networks. For example, the CAN Network in a vehicle is monitored for various abnormal behaviours such as increased busload and invalid signal values
E L, Nanda KumarMutagi, MeghaSonnad, PreetiSharma, Dhiraj
Modern cars have advanced significantly with the rapid growth of connectivity and communication technologies. In the wake of rising cyber attacks and enforcement of regulations, implementation of cybersecurity is imperative to safeguard vehicles. The cybersecurity controls such as secure boot, secure updates, and secure communication require cryptographic primitives (keys/certificates). These security features are largely dependent on robust Key Management System (KMS), as keys are the sensitive assets that must be protected throughout the lifecycle of vehicle. Several security critical applications like over-the-air and car-to-car interaction essentially needs robust KMS to protect the vehicle assets from expanding attack vectors. Traditionally KMS is established centrally in a backend server. The cloud based KMS is becoming complex due to increased number of keys/certificates required to provision in a vehicle. We propose a self-governing in-vehicle key management system for a
Goyal, YogendraSutar, SwapnilJaisingh, Sanjay
Commercial vehicles form the backbone of global supply chains. In India, the commercial vehicle (CV) industry is at a transformative crossroads, evolving from traditional hardware-centric models to advanced, software-defined architectures. Central to this shift are Software-Defined Vehicles (SDVs) and Automotive Software-as-a-Service (SaaS), catalysing a move toward intelligent, connected, and highly productive mobility solutions. With the Indian CV market surpassing $50 billion in 2024 and witnessing robust growth due to expanding e-commerce, infrastructure projects and regulatory evolution. Indian original equipment manufacturers (OEMs) are spearheading this revolution. This paper presents a comprehensive analysis of the technological enablers, monetization strategies, distinct challenges and opportunities encountered by Indian OEMs during their shift toward SDVs and automotive SaaS based business models. This research also examines the most important technical pillars underpinning
Saini, GouravJahagirdar, ShwetaKhandekar, Dhiraj Baburao
The automotive industry is continuously evolving at high pace to meet rising customer expectations, reliability, reduced maintenance, and most relevant, compliance with stringent emission norms. Traditionally, the analysis of vehicle emissions relies heavily on periodic inspections and manual checks. These conventional methods are often time-consuming, prone to human error, and lack the ability to provide real-time insights. Also, identifying failures due to non-manufacturing issues require meticulous physical inspections and historical data reviews, which are not always accurate or timely. Telematics or Connected cars technology being one of the major technological innovations in recent times revolutionizes these processes by enabling real-time data exchange between vehicles and external systems. The current study presents an innovative approach to utilizing telematics data for real-time monitoring of vehicle emissions and pinpointing Catalytic converter failures by analyzing vehicle
Dev, TriyambakPrasad, Kakaraparti AgamKalkur, VarunModak, SaikatAGARWAL, ShashankChandra, AnimeshPaul, VarshaGarg, AmitSundararaman, VenkataramanBose, Sushant
The rapid evolution of modern automotive systems—powered by advancements in autonomous driving and connected vehicle technologies— pose fundamental challenges to design and integration. A specific challenge of these highly interconnected, software-driven systems is in ensuring their safety while avoiding spiralling costs and development times. This challenge calls for a more structured and rigorous approach to safety assurance than traditional methods. Traditional safety cases tend to take a linear, justification-focused approach that mainly focuses on positive assertions —compliance to safety —while giving limited attention to potential weaknesses, or gaps in supporting evidence. This practice may lead to criticism that such arguments are “too positive,” portraying an overly biased or optimistic view of system safety without sufficiently acknowledging areas of unresolved risk. As a result, conventional approaches for developing a safety case may overlook complex interactions
Kumar, AmrendraBagalwadi, SaurabhMcMurran, Ross
Electric Vehicles (EV) are increasingly becoming more and more popular in the markets, especially in the commercial vehicle segments. Amidst this, the need to find new elegant methods to perform charging of EV battery becomes extremely crucial. In areas with high demand and limited power capacity, performing charging for multiple vehicles necessitates efficient usage of charging infrastructure, which can’t be guaranteed by the traditional charging methods. Sequential charging is a new state of art technique for managing the charging of multiple EV’s simultaneously connected to a single charging station. Rather than dividing the available power equally among all connected vehicles or charging them one at a time, this technique dynamically allocates power based on various factors such as charging priority, vehicle needs and available infrastructure capacity. Currently, sequential charging can only be implemented by a particular set of chargers that are interconnected via backend and
De, AbirBhattacharya, UllashParihar, Aakash
With the rapid development of automobile industrialization, the traffic environment is becoming increasingly complex, traffic congestion and road accidents are becoming critical, and the importance of Intelligent Transportation System (ITS) is increasingly prominent. In our research, for the problem of cooperative control of heterogeneous intelligent connected vehicle platoons under ITS considering communication delay. The proposed method integrates the nonlinear Intelligent Driver Model (IDM) and a spacing compensation mechanism, aiming to ensure that the platoon maintains structural stability in the presence of communication disturbances, while also enhancing the comfort and safety of following vehicles. Firstly, construct heterogeneous vehicle platoon system based on the third-order vehicle dynamics model, Predecessor-Leader-Following (PLF) communication topology, and the fixed time-distance strategy, while a nonlinear distributed controller integrating the IDM following behavior
Ye, XinKang, Zhongping
In low-light driving scenarios, in-vehicle camera images encounter technical challenges, including severe brightness degradation and short exposure times. Conventional driving image enhancement algorithms are susceptible to issues such as the loss of image features and significant color distortion. The proposed solution to this problem is a multi-scale attention fusion network (MAF-NET) for the enhancement of images captured during low-light driving conditions. The network’s structural design is uncomplicated. The model incorporates a meticulously designed multi-scale attention fusion module (MAFB), along with all essential components for network connectivity. The MAF is predicated on a heavy parameter residual feature block design and incorporates a multi-scale channel attention mechanism to capture richer global/local features. A substantial body of experimental evidence has demonstrated that, in comparison with prevailing algorithms, MAF-NET exhibits superior performance in low
Pan, DengChen, YuhanShi, YicuiLi, JieLi, Guofa
Heavy-haul railways are a critical component of China’s dedicated freight rail network, serving as the primary land transport channel for energy and resource intermodal transportation. Their safe operation and transportation is essential for ensuring the reliable delivery of energy and raw materials. Taking the Shuohuang Heavy-haul Railway as a case study, based on the hazards identified across its entire operational chain, an ontology model structured as "professional module–task–process–hazard–risk attribute–management object" is constructed in this paper. Based on this model, a knowledge graph for heavy-haul railway operational emergencies is established. The study analyzes the connectivity between different nodes (e.g., work processes and hazards) in the knowledge graph and their potential relationships with risk values. Using directed graph-based degree centrality analysis, a risk assessment method incorporating node centrality is proposed. Risk values are computed at both the
Fu, LiqiangRen, XiaolinRong, Lifan
Before Highway tunnel engineering is a complex system undergoing various evolutionary stages and characterized by multiple risk factors. The increasing interconnection and coupling of these risk factors can lead to operational accidents or disruptive events. These coupling effects pose significant challenges for project managers in effectively managing highway tunnel systems. Traditional risk-centered analysis approaches, which focus on post-event effects and causes while paying less attention to the coupling effects among risk factors, inadequately address these challenges. To fill this gap, this study examined the resilience evolution mechanism from all life cycle perspective and proposed a multi-factor and multi-stage resilience analysis framework. This integrated framework integrates the Natural Killing (N-K) model and the Interpretive Structural Model (ISM) to analyze coupling utility and implement decoupling control of resilience factors. The N-K model measures the coupling
Wang, ChunyuAn, Jingru
This study estimates the automated detection costs for rural road pavement conditions in 32 provinces across China using conventional and lightweight equipment, respectively. Assuming full automated detection coverage, the detection costs for rural roads in Changji Hui Autonomous Prefecture and its subordinate counties are calculated to analyze the development path of automated rural road condition detection. The results show that the average detection cost using lightweight equipment is generally lower than that using conventional equipment. Based on national average detection costs, employing lightweight equipment for automated rural road detection in Changji Prefecture could reduce fiscal expenditure by approximately CNY 770,000. It is recommended that Changji Prefecture, in promoting rural road informatization, enhance the application of lightweight automated road condition detection equipment, expand the sharing and utilization of automated detection data, and strengthen the use
Yang, YutingZhang, MengWang, YajieLi, BingXu, Yongji
As the importance of railway networks in regional transportation and economic development continues to grow, identifying critical risk nodes and assessing network vulnerability is crucial for enhancing the stability and resilience of railway systems. This study focuses on the railway network of Shandong Province, constructing a topological model to systematically analyze the structural characteristics of the network, with a particular emphasis on key nodes. To identify these critical risk nodes, four modified weighted indicators were employed, combined with the mean-square deviation TOPSIS method to quantify node importance. The analysis identified Jinan, Linyi, and Yantai as key risk nodes, as they consistently ranked high across multiple indicators. Further vulnerability analysis reveals that the failure of these critical nodes would lead to significant declines in network efficiency and connectivity, with particularly high vulnerability observed when nodes with high weighted
Xu, ChangHan, WenFan, HongxianDai, Hongna
The traditional hydraulic braking system with vacuum booster technology is very mature, but it is not suitable for use in electric vehicles due to the lack of a vacuum source. The brake system by wire is an innovative electronic controlled braking technology, and the Electro-Hydraulic Brake is currently the most widely used brake system by wire in electric vehicles. The classification, structure, working principle, and advantages of Electro-Hydraulic Brake as a braking system for electric automobiles and intelligent connected vehicles are studied. The structure, working principle, advantages and disadvantages of Pump-Electro - Hydraulic Brake and Integrated Electro-Hydraulic Brake are compared and analyzed.
Song, JiantongZhu, ChunhongRen, Xiaolong
This study proposes an urban rail transit network resilience assessment method based on dynamic passenger flow, which quantifies the overall system performance from the structural and functional dimensions. At the structural level, the relative size of the largest pass subgraph is introduced to measure the network integrity, and the average node degree is used to evaluate the network connectivity; At the functional level, the passenger travel efficiency ratio is used to measure the operation efficiency of the supply side, and the proportion of unaffected passengers is used to evaluate the service support capability of the demand side. The weight of each index is determined by entropy weight method, and then the comprehensive performance evaluation model of rail transit system is constructed. Taking Nanjing Metro as an example, the empirical study shows that the performance change trend reflected by the introduction of dynamic passenger flow is significantly different from the
Wang, JunhangShao, JiayuYang, HaofanZhang, Ning
For a company focused on selling components to make physical connections in vehicles, TE Connectivity is more than ready for future growth in software-defined vehicles (SDVs) and the corresponding rise in vehicles with zonal architectures. Ruediger Ostermann, vice president and chief technology officer for Global Automotive at TE Connectivity, said TE agrees with industry estimates that the number of cars with a zonal architecture will rise from around 2% in 2023 to between 35-40% in the mid-2030s.
Blanco, Sebastian
When identifying the content of this report, one of the goals was that it supports a nationally interoperable method for connected vehicles (CVs) to make traffic signal priority and/or preemption (TSPP) requests of connected intersections (CIs) that support priority and/or preemption services. Given that, this report specifies the over-the-air (OTA) interface between CVs and CIs to support TSPP applications using updated revisions of the SAE J2735 Signal Request Message (SRM) and Signal Status Message (SSM) and the use of a Wireless Access in Vehicular Environments (WAVE) Service Advertisement (WSA) to advertise support for TSPP at a CI. Included are a concept of operations, requirements, design, and message structure definitions developed using a detailed systems engineering process.
Connected Transportation Interoperability Committee
Tool management remains a persistent challenge in manufacturing, where misplaced or poorly calibrated tools such as torque guns and screwdrivers cause downtime, quality defects, and compliance risks. The Internet of Things (IoT) is transforming tool management from manual entries in spreadsheets and logs to real-time, data-driven solutions that enhance operational efficiency. With ongoing advancements in IoT architecture, a range of cost-effective tracking approaches is now available, including Ultra-Wideband (UWB), Bluetooth Low Energy (BLE), Wi-Fi, RFID, and LoRaWAN. This paper evaluates these technologies, comparing their trade-offs in accuracy, scalability, and cost for tool-management scenarios such as high-precision station tracking, zonal monitoring, and wide-area yard visibility. Unlike prior work that focuses on asset tracking in general, this study provides an ROI-driven, scenario-based comparison and offers recommendations for selecting appropriate technologies based on
Patel, Shravani Prashant
The synergistic adoption of automated driving technologies and the electrification of the vehicle power train offers the possibility of proposing new and innovative solutions for public transportation systems. In particular, an interesting solution is represented by modular systems in which multiple autonomous vehicles/transportation modules can be aggregated to form reconfigurable compositions according to desired transportation demand. In this work, a configurable connection between vehicles is adopted, as convoying ensures the possibility of power sharing between vehicles, allowing coordinated power management throughout the composition. Connected vehicles can also share power between batteries for battery recharge that is performed using a custom solution from a tram-like catenary. In this work, the authors design a demonstrator to investigate the feasibility of the proposed solution. Once designed, the proposed system has been assembled and tested at the ENEA Casaccia Research
Alessandrini, AdrianoBerzi, LorenzoFabbri, MarcoFranci, MichaelGulino, Michelangelo SantoPugi, LucaOrtenzi, FernandoVitiello, Francesco
Devin Brock TE Connectivity
Taking Dongguan Naval Battle Museum as a typical case, this study uses space syntax to conduct an in-depth structural analysis of space, study the topological relationship and connectivity pattern inside the exhibition building, and provide valuable insights for the spatial organization of the exhibition building. In addition, the study also explores the crowd evacuation aspect. Based on the understanding of spatial structure through space syntax, this study found that: (1) Dongguan Naval Battle Museum should use variables such as selectivity, global integration, harmonic mean depth, visual connectivity, first-order moment index, visual integration, and pedestrian flow simulation as much as possible to improve the environmental quality and help people evacuate smoothly. (2) The exhibition hall should guide arrival and evacuation in space with the highest or second highest values of variables such as connectivity, intensity, controllability, and pedestrian flow simulation. (3) Space No
Tang, QiangSong, JunxinChen, YileZheng, LiangLi, Xiaoye
Based on the similarity analysis of Intelligent Connected Vehicles (ICVs), a distributed V2X hardware-in-the-loop test system for ICVs is designed, including the PanoSim autonomous driving simulation engine, GNSS simulator, V2X simulator, and management and cooperative control software. The system integrates the major technologies of distributed interaction, including operation management, time synchronization, coordinate conversion, and data preprocessing, and realizes the spatial and temporal consistency of each simulation node. 89 V2X first-stage application scenarios (e.g., FCW, RLVW) and 5 V2X second-stage application scenarios (e.g., CLC) use case experimental results have proved the reliability of the system. The FCW use case experiment results show that its simulation results pass with high confidence. The study emphasizes the value of the system in reducing development costs, improving safety, and accelerating the deployment of V2X applications, while identifying future
Gao, TianfangZhang, XingHuiChen, LiangHuang, ZhichenNi, Dong
The adhesion condition of the road surface is an important factor in the driving decision-making, and the lower the adhesion coefficient of the road, the greater the risk of safety. In order to study the development and progress in the research of the substances, a comparative analysis of Chinese and foreign references was carried out. The sensitive factors to the adhesion coefficient and influence of adhesion condition on driving were summarized. Then two main strategies to avoid a collision were presented, including longitudinal braking and lateral lane change. A detailed description of three methods used in automotive decision-making processes was offered, including rule-based method, supervised learning method, and reinforcement learning method, each characterized with certain attributes. Topics in the field of driving decision-making considering adhesion condition for intelligent connected vehicles were pointed out and future-oriented research formulations were provided. These
Wang, HongHou, De-Zao
Items per page:
1 – 50 of 808