Browse Topic: Telecommunications

Items (4,328)
It is becoming increasingly common for bicyclists to record their rides using specialized bicycle computers and watches, the majority of which save the data they collect using the Flexible and Interoperable Data Transfer (.fit) Protocol. The contents of .fit files are stored in binary and thus not readily accessible to users, so the purpose of this paper is to demonstrate the differences induced by several common methods of analyzing .fit files. We used a Garmin Edge 830 bicycle computer with and without a wireless wheel speed sensor to record naturalistic ride data at 1 Hz. The .fit files were downloaded directly from the computer, uploaded to the chosen test platforms - Strava, Garmin Connect, and GoldenCheetah - and then exported to .gpx, .tcx and .csv formats. Those same .fit files were also parsed directly to .csv using the Garmin FIT Software Developer Kit (SDK) FitCSVTool utility. The data in those .csv files (henceforth referred to as “SDK data”) were then either directly
Sweet, DavidBretting, Gerald
SAE J1939 is a CAN-based standard used for connecting various ECUs together within a vehicle. There are also some related protocols sharing many of the features of SAE J1939 across other industries including ISO11783, RVC and NMEA 2000. The standard has enabled the easy integration of electronic devices into a vehicle. However, as with all CAN-based protocols, several vulnerabilities to cyberattacks have been identified and are discussed in this paper. Many are at the CAN-level, whilst others are in common with those protocols from the SAE J1939 family of protocols. This paper reviews the known vulnerabilities that have been identified with the SAE J1939 protocol at CAN and J1939-levels, along with proposed mitigation strategies that can be implemented in software. At the CAN-level, the weaknesses include ways to spoof the network by exploiting parts of the protocol. Denial of Service is also possible at the CAN-level. At the SAE J1939-level, weaknesses include Denial of Service type
Quigley, Christopher
The added connectivity and transmission of personal and payment information in electric vehicle (EV) charging technology creates larger attack surfaces and incentives for malicious hackers to act. As EV charging stations are a major and direct user interface in the charging infrastructure, ensuring cybersecurity of the personal and private data transmitted to and from chargers is a key component to the overall security. Researchers at Southwest Research Institute® (SwRI®) evaluated the security of direct current fast charging (DCFC) EV supply equipment (EVSE). Identified vulnerabilities included values such as the MAC addresses of both the EV and EVSE, either sent in plaintext or encrypted with a known algorithm. These values allowed for reprogramming of non-volatile memory of power-line communication (PLC) devices as well as the EV’s parameter information block (PIB). Discovering these values allowed the researchers to access the IPv6 layer on the connection between the EV and EVSE
Kozan, Katherine
In Automobile manufacturing, maintaining the Quality of parts supplied by vendor is crucial & challenging. This paper introduces a digital tool designed to monitor trends for critical parameters of these parts in real-time. Utilizing Statistical Process Control (SPC) graphs, the tool continuously tracks Quality trend for critical parts and process parameters, predicting potential issues for proactive improvements even before parts are supplied. The tool integrates data from all Supplier partners across value chain into a single ecosystem, providing a comprehensive view of their performance and the parts they supply. Suppliers input data into a digital application, which is then analyzed in the cloud using SPC techniques to generate potential alerts for improvement. These alerts are automatically sent to both Suppliers and relevant personnel at the OEM, enabling proactive measures to address any Quality deviations. 100% data is visualized in an integrated dashboard which acts as a
Sahoo, PriyabrataGarg, IshanRawat, SudhanshuNarula, RahulGupta, AnkitBindra, RiteshRao, Akkinapalli VNGarg, Vipin
With the rapid development of intelligent connected vehicles, their open and interconnected communication characteristics necessitate the use of in-vehicle Ethernet with high bandwidth, real-time performance, and reliability. DDS is expected to become the middleware of choice for in-vehicle Ethernet communication. The Data Distribution Service (DDS), provided by the Object Management Group (OMG), is an efficient message middleware based on the publish/subscribe model. It offers high real-time performance, flexibility, reliability, and scalability, showing great potential in service-oriented in-vehicle Ethernet communication. The performance of DDS directly impacts the stable operation of vehicle systems, making accurate evaluation of DDS performance in automotive systems crucial for optimizing system design. This paper proposes a latency decomposition method based on DDS middleware, aiming to break down the overall end-to-end latency into specific delays at each processing stage
Yu, YanhuaLuo, FengRen, YiHou, Yongping
Driving safely through urban intersections is quite challenging for self-driving vehicles due to complicated road geometries and the highly dynamic maneuvers of oncoming traffic, which can cause a high risk of collisions. Traditional onboard sensors like cameras, radar, and lidar give limited visibility in this environment. To overcome these limitations, this paper explores implementing a collision avoidance system at urban intersections utilizing vehicle-to-everything (V2X) communication. The system leverages V2X map data to identify warning zones and uses vehicle-to-vehicle (V2V) communication to estimate the maneuver types and paths of approaching vehicles. The system assesses collision risk by calculating the intersection points of predicted paths for the ego vehicle and oncoming traffic. Depending on the level of collision risk, the system generates a collision warning signal to the driver or activates emergency braking when necessary to prevent accidents. We implement the system
Park, Seo-WookSuresh, RaynierAiluri, Anusha
This paper describes a novel invention which is an Intrusion Detection System based on fingerprints of the CAN bus analogue features. Clusters of CAN message analogue signatures can be associated with each ECU on the network. During a learning mode of operation, fingerprints can be learnt with the prior knowledge of which CAN identifier should be transmitted by each ECU. During normal operation, if the fingerprint of analogue features of a particular CAN identifier does not match the one that was learnt then there is a strong possibility that this particular CAN identifier’s message is symptomatic of a problem. It could be that the message has been sent by either an intruder ECU or an existing ECU has been hacked to send the message. In this case an intruder can be defined as a device that has been added to the CAN bus OR a device that has been hacked/manipulated to send CAN messages that it was not designed to (i.e. could be originally transmitted by another device). It could also be
Quigley, ChristopherCharles, David
Connected and automated vehicle (CAV) technology is a rapidly growing area of research as more automakers strive towards safer and greener roads through its adoption. The addition of sensor suites and vehicle-to-everything (V2X) connectivity gives CAVs an edge on predicting lead vehicle and connected intersection states, allowing them to adjust trajectory and make more fuel-efficient decisions. Optimizing the energy consumption of longitudinal control strategies is a key area of research in the CAV field as a mechanism to reduce the overall energy consumption of vehicles on the road. One such CAV feature is autonomous intersection navigation (AIN) with eco-approach and departure through signalized intersections using vehicle-to-infrastructure (V2I) connectivity. Much existing work on AIN has been tested using model-in-loop (MIL) simulation due to being safer and more accessible than on-vehicle options. To fully validate the functionality and performance of the feature, additional
Hamilton, KaylaMisra, PriyashrabaOrd, DavidGoberville, NickCrain, TrevorMarwadi, Shreekant
Onboard sensing and Vehicle-to-Everything (V2X) connectivity enhance a vehicle's situational awareness beyond direct line-of-sight scenarios. A team led by Southwest Research Institute (SwRI) demonstrated 20% energy savings by leveraging these information streams on a 2017 Prius Prime as part of the first phase of the ARPA-E-funded NEXTCAR program. Combining this technology with automation can improve vehicle safety and enhance energy efficiency further. In the second phase, SwRI demonstrated 30% energy savings over the baseline. This paper summarizes the efforts to achieve 30% savings on a 2021 Honda Clarity PHEV. The vehicle was outfitted with the SwRI Ranger automated driving suite for perception and localization. Model-based control schemes with selective interrupt and control (SIC) were used to override stock vehicle controls and actuate the accelerator, brake, and electric power steering system, enabling drive-by-wire and steer-by-wire functionalities. Key algorithms contributing
Bhagdikar, PiyushGankov, StanislavSarlashkar, JayantHotz, ScottRajakumar Deshpande, ShreshtaRengarajan, SankarAdsule, KartikDrallmeier, JosephD'Souza, DanielAlden, JoshuaBhattacharjya, Shuvodeep
Vehicle-to-Infrastructure (V2I) cooperation has emerged as a fundamental technology to overcome the limitations of the individual ego-vehicle perception. Onboard perception is limited by the lack of information for understanding the environment, the lack of anticipation, the drop of performance due to occlusions and the physical limitations of embedded sensors. The perception of V2I in a cooperative manner improves the perception range of the ego vehicle by receiving information from the infrastructure that has another point of view, mounted with sensors, such as camera and LiDAR. This technical paper presents a perception pipeline developed for the infrastructure based on images with multiple viewpoints. It is designed to be scalable and has five main components: the image acquisition for the modification of camera settings and to get the pixel data, the object detection for fast and accurate detection of four wheels, two wheels and pedestrians, the data fusion module for robust
Picard, QuentinMorice, MaloFadili, MaryemPechberti, Steve
Platooning occurs when vehicles travel closely together to benefit from multi-vehicle movement, increased road capacity, and reduced fuel consumption. This study focused on reducing energy consumption under different driving scenarios and road conditions. To quantify the energy consumption, we first consider dynamic events that can affect driving, such as braking and sudden acceleration. In our experiments, we focused on modeling and analyzing the power consumption of autonomous platoons in a simulated environment, the main goal of which was to develop a clear understanding of the different driving and road factors influencing power consumption and to highlight key parameters. The key elements that influence the energy consumption can be identified by simulating multiple driving scenarios under different road conditions. The initial findings from the simulations suggest that by efficiently utilizing the inter-vehicle distances and keeping the vehicle movements concurrent, the power
Khalid, Muhammad ZaeemAzim, AkramulRahman, Taufiq
Topology reasoning plays a crucial role in understanding complex driving scenarios and facilitating downstream planning, yet the process of perception is inevitably affected by weather, traffic obstacles and worn lane markings on road surface. Combine pre-produced High-definition maps (HDMaps), and other type of map information to the perception network can effectively enhance perception robustness, but this on-line fused information often requires a real-time connection to website servers. We are exploring the possibility to compress the information of offline maps into a network model and integrate it with the existing perception model. We designed a topology prediction module based on graph attention neural network and an information fusion module based on ensemble learning. The module, which was pre-trained on offline high-precision map data, when used online, inputs the structured road element information output by the existing perception module to output the road topology, and
Kuang, QuanyuRui, ZhangZhang, SongYixuan, Gao
Over recent years, BorgWarner has intensified its efforts to explore and leverage trending technologies such as Artificial Intelligence (AI) and Machine Learning (ML) to enhance products and processes. This includes digital twin technology, which has potential use cases for system behavior analysis, product optimization and predictive maintenance. This paper outlines the development process of a digital twin for a commercial vehicle battery, which serves as a demonstrator and learning platform for this technology. In order to assess the feasibility as well as hard- and software requirements, a cloud-based digital twin demonstrator was developed, integrating vehicle telemetry data with physics-based battery electric and thermal models, and an aging prediction algorithm. The key components are an Internet of Things (IoT) gateway, simulation models, data processing and ingestion pipelines, a machine learning algorithm for anomaly detection, and visualizations of telemetry and simulation
Bongards, AnitaLiu, XiaobingBeemer, MariaGajowski, DanielRama, NeerajShah, KeyaFallahdizcheh, Amirhossein
This study presents a control co-design method that utilizes a bi-level optimization framework for parallel electric-hydraulic hybrid powertrains, specifically targeting heavy-duty vehicles like class 8 semi-trailer trucks. The primary objective is to minimize battery energy consumption, particularly under high torque demand at low speed, thereby extending both battery lifespan and vehicle driving range. The proposed method formulates a bi-level optimization problem to ensure global optimality in hydraulic energy storage sizing and the development of a high-level energy management strategy. Two nested loops are used: the outer loop applies a Genetic Algorithm (GA) to optimize key design parameters such as accumulator volume and pre-charged pressure, while the inner loop leverages Dynamic Programming (DP) to optimize the energy control strategy in an open-loop format without predefined structural constraints. Both loops use a single objective function, i.e. battery energy consumption
Taaghi, AmirhosseinYoon, Yongsoon
The increasing complexity of software-defined vehicles (SDVs) necessitates robust and secure communication protocols to protect against cyber threats. This paper explores the utilization of Generative Adversarial Networks (GANs) to enhance the security of communication protocols in SDVs. GANs, consisting of a generator and a discriminator network, are employed to create and evaluate secure communication sequences, ensuring that unauthorized access and potential attacks are effectively mitigated. In this study, we develop a GAN-based framework that generates secure communication protocols tailored for the dynamic environment of SDVs. The generator is trained to produce communication sequences that are indistinguishable from authentic, secure sequences, while the discriminator is tasked with identifying any anomalies or potential vulnerabilities. By iteratively improving both networks, the framework learns to produce highly secure and resilient communication protocols. The performance of
Namburi, Venkata Lakshmi
To alleviate the problem of reduced traffic efficiency caused by the mixed flow of heterogeneous vehicles, including autonomous and human-driven vehicles, this article proposes a vehicle-to-vehicle collaborative control strategy for a dedicated lane in a connected and automated vehicle system. First, the dedicated lane’s operating efficiency and formation performance are described. Then, the characteristics of connected vehicle formations are determined, and a control strategy for heterogeneous vehicle formations was developed. Subsequently, an interactive strategy was established for queueing under the coordination of connected human-driven and autonomous vehicles, and the queue formation, merging, and splitting processes are divided according to the cooperative interaction strategy. Finally, the proposed lane management and formation strategies are verified using the SUMO+Veins simulation software. The simulation results show that the dedicated lane for connected vehicles can
Zhang, XiqiaoCui, LeqiYang, LonghaiWang, Gang
Real-time traffic event information is essential for various applications, including travel service improvement, vehicle map updating, and road management decision optimization. With the rapid advancement of Internet, text published from network platforms has become a crucial data source for urban road traffic events due to its strong real-time performance and wide space-time coverage and low acquisition cost. Due to the complexity of massive, multi-source web text and the diversity of spatial scenes in traffic events, current methods are insufficient for accurately and comprehensively extracting and geographizing traffic events in a multi-dimensional, fine-grained manner, resulting in this information cannot be fully and efficiently utilized. Therefore, in this study, we proposed a “data preparation - event extraction - event geographization” framework focused on traffic events, integrating geospatial information to achieve efficient text extraction and spatial representation. First
Hu, ChenyuWu, HangbinWei, ChaoxuChen, QianqianYue, HanHuang, WeiLiu, ChunFu, TingWang, Junhua
With the development and maturity of new generation digital technologies such as artificial intelligence, Internet of Things, and 5G mobile communication, their integration with physical products is becoming increasingly seamless. Automobiles serve as a prime example in this regard. In recent years, automated vehicle (AV) technologies have emerged as a prominent focal point, witnessing an escalating acceptance in the market and a growing number of self-driving vehicles on the roads, existing roads are primarily designed for traditional human-driven vehicles (HVs). Due to the differences in perception between automated systems and human drivers, it is essential to assess AVs' feasibility to current road infrastructure. This paper analyzes the safety and comfort of automated vehicles equipped with adaptive cruise control systems (ACC-AVs) on longitudinal road profiles from the perspective of vehicle dynamics. Firstly, a co-simulation platform integrating PreScan, CarSim, and Simulink
Li, ZezhouCai, MingmaoGu, TianqiYu, Bin
The Defense Advanced Research Projects Agency (DARPA) pioneered satellites, the internet, drones, and human-computer interfaces. Now that work is enabling the next round of revolutionary technologies, including artificial intelligence (AI), edge and cloud computing, and the Internet of Military Things (IoMT) for a wide variety of Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) applications. Laptops and tablets are beneficiaries of yesterday's DARPA breakthroughs as well as enablers of today's and tomorrow's innovations. For example, ruggedized mobile PCs provide powerful new tools for asymmetric warfare by giving soldiers anytime, anywhere access to biometric information such as fingerprints and facial recognition. That information enables them to quickly determine whether a person in street clothes at a checkpoint is a civilian or combatant. This application also highlights the fundamental role of edge computing and the cloud for
Introducing connectivity and collaboration promises to address some of the safety challenges for automated vehicles (AVs), especially in scenarios where occlusions and rule-violating road users pose safety risks and challenges in reconciling performance and safety. This requires establishing new collaborative systems with connected vehicles, off-board perception systems, and a communication network. However, adding connectivity and information sharing not only requires infrastructure investments but also an improved understanding of the design space, the involved trade-offs and new failure modes. We set out to improve the understanding of the relationships between the constituents of a collaborative system to investigate design parameters influencing safety properties and their performance trade-offs. To this end we propose a methodology comprising models, analysis methods, and a software tool for design space exploration regarding the potential for safety enhancements and requirements
Fornaro, GianfilippoTörngren, MartinGaspar Sánchez, José Manuel
There are dead-end roads in the road network, and many of them have the function of indicating specific target clues, which is of great significance in the fields of military, urban construction, and disaster relief and rescue. However, many of the important cut-offs are in mountainous or wilderness areas, and surveying them is difficult and costly. The research objective of this project is to extract the breakpoints in the road network using high-resolution Google satellite imagery, so as to provide clues and indications for the subsequent relevant work. Firstly, the image is corrected and pre-processed to highlight road edge information.Then the phase grouping method is improved by setting a double-angle threshold, filtering the edge operator to reduce the calculation error of the gradient angle, and the road network is extracted by the improved phase grouping method. And finally screens out the dead-end road points with the eight-neighbourhood method, and marks them on the
Liu, RuohanHaoping, QiJingjie, KangYanyan, WuFeifei, Li
This work aims to design an ecological driving strategy for connected and automated vehicles (CAVs) at an isolated signalized intersection in a mixed traffic flow of CAVs and human-driven vehicles (HVs). Actually, from existing experiments and theories, we can obtain that stochasticity of HVs plays a nontrivial role in traffic flow, including the drivers’ driving personality style and the interaction between HV and CAV. To consider the uncertainty of HVs, we propose driver acceptance to describe the interaction between HV and CAV with the increase of CAV market penetration rate (MPR). Then, to estimate the arrival time of CAV accurately, we propose an improved LWR method integrating the vehicle to V2X data and detector data. The problem is formulated as a multi-objective optimization model and solved by NSGA-II. Our study indicates that multi-objective performance benefits depend on inflow rate, the MPR, and the drivers’ acceptance towards CAVs. The results show that traffic efficiency
Wang, XiaoliangMa, ShufangYu, QinSong, WenPeng, HongruiHu, Yiming
This study investigates the application of integrated positioning based on SINS (Strapdown Inertial Navigation System) and GNSS (Global Navigation Satellite System) for highway vehicle navigation. While GNSS offers high-precision outdoor positioning, it is susceptible to signal obstructions, whereas SINS enables autonomous positioning without external signals but accumulates drift errors over time. To enhance positioning accuracy, this study employs three nonlinear filters—Extended Kalman Filter (EKF), Unscented Kalman Filter (UKF), and Cubature Kalman Filter (CKF)—for multi-source data fusion. Experimental results demonstrate that EKF, UKF, and CKF achieve faster convergence, higher stability, and smoother error curves when handling nonlinear problems. Through simulation experiments and field measurements, the strengths of each algorithm are validated across different metrics and directions. Considering sensor limitations and implementation complexity, EKF outperforms other algorithms
Zhang, HongbinWen, ChengjuLiu, ZheLin, Chen
The transition from manual to autonomous driving introduces new safety challenges, with road obstacles emerging as a prominent threat to driving safety. However, existing research primarily focuses on vehicle-to-vehicle risk assessment, often overlooking the significant risks posed by static or dynamic road obstacles. In this context, developing a system capable of real-time monitoring of road conditions, accurately identifying obstacle positions and characteristics, and assessing their associated risk levels is crucial. To address these gaps, this study proposes a comprehensive process for rapid obstacle identification and risk quantification, composed of three main components: road obstacle event detection and feature extraction, risk quantification and level assessment, and output of warning information and countermeasures. First, a rapid detection method suited for highway scenarios is proposed based on the YOLOv5 model, enabling fast detection and classification of obstacles in
Chen, TingtingChen, LeileiYu, WenluChen, Daoxie
This paper presents a novel variable speed limit control strategy based on an Improved METANET model aimed at addressing traffic congestion in the bottleneck areas of expressways while considering the impact of an intelligent connected environment. Traffic flow simulation software was employed to compare the outcomes of the traditional variable speed limit model with those derived from the proposed strategy. The results indicated that under three scenarios—main road, ramp, and lane closure—with a 100% penetration rate of intelligent connected vehicles, the average delay for vehicles utilizing the new model decreased by 9.37%, 11.11%, and 7.22%, respectively. This study offers an innovative approach to highway variable speed limits under an intelligent connected environment.
Qi, TianchengQu, XinhuiGu, HaiyanSang, ZhemingNing, Fangyue
Since the rapid development of the shipping and port industries in the second half of the twentieth century, the introduction of container technology has transformed cargo management systems, while simultaneously increasing the vulnerability of global shipping networks to natural disasters and international conflicts. To address this challenge, the study leverages AIS data sourced from the Vessel Traffic Data website to extract ship stop trajectories and construct a shipping network. The constructed network exhibits small-world characteristics, with most port nodes having low degree values, while a few ports possess extremely high degree values. Furthermore, the study improved the PageRank algorithm to assess the importance of port nodes and introduced reliability theory and risk assessment theory to analyze the failure risks of port nodes, providing new methods and perspectives for analyzing the reliability of the shipping network.
Li, DingCheng, ChengZhao, XingxiLi, Zengshuang
Automotive industries focus on driver safety leading to raising improvements and advancements in Advanced Driver Assistance Systems (ADAS) to avoid collisions and provide safety and comfort to the drivers. This paper proposes a novel approach toward Driver health and fatigue monitoring systems that uses cabin cameras and biometric sensors communicating continuously with vehicle telematics systems to enhance real-time monitoring and predictive intervention. The data from the camera and biometric sensors is sent to the machine learning algorithm (LSBoost) which processes the data and if anything is wrong concerning the driver's behavior then immediately it communicates with vehicle telematics and sends information to the emergency services. This approach enhances driver safety and reduces accidents caused due to health-related driver impairment. This system comprises several sensors and fusion algorithms are applied between different sensors like cabin camera and biometric sensors, all
Bhargav, Matavalam
Intelligent vehicles can utilize a variety of sensors, computing, and control technologies to autonomously perceive the environment and make decisions to achieve safe, efficient, and automated driving. If the speed planning of intelligent vehicles ignores the vehicle dynamics state, it leads to unreasonable planning speed and is not conducive to improving the accuracy of trajectory tracking control. Meanwhile, trajectory tracking usually does not consider the road and speed information beyond the prediction horizon, resulting in poor tracking precision that is not conducive to improving driving comfort. To solve these problems, this study proposes a new longitudinal speed planning method based on variable universe fuzzy rules and designs the piecewise preview model predictive control (PPMPC) to realize the vehicle trajectory tracking. First, the three-degrees-of-freedom vehicle dynamics model and trajectory tracking model are established and verified. Then, the variable universe fuzzy
Zhang, JieTeng, ShipengGao, JianjieZhou, XingxingZhou, Junchao
Adaptive cruise control (ACC) systems have increasingly become more robust in adapting to the motion of the preceding vehicle and providing safety and comfort to the driver. But conventional ACC hangs with a concern for rear-end safety in the presence of traffic or aggressive car maneuvers. It often leads to getting dangerously close to the vehicle behind in scenarios where there is less space and time for the rear vehicle to adjust. This research article develops an ACC approach that considers the rear vehicle in addition to the front vehicle, thereby ensuring safety with the rear vehicle without compromising the safety of the front vehicle. Two novel methodologies are devised to enhance the ACC system. The first approach involves utilizing fuzzy logic to associate the inputs with the throttle and brake based on the inference rules within a fuzzy logic controller overseeing both vehicles. The other utilizes a cascaded model predictive control (MPC) system framework that integrates a
Sharma, VishrutSengupta, SomnathGhosh, Susenjit
In the automotive industry, the zonal architecture is a design approach that organizes a vehicle’s electronic and communication systems into specific zones. These zones group components based on their function and physical location, enabling more efficient integration and simplified communication between the vehicle’s various systems. An important aspect of this architecture is the implementation of the Controller Area Network (CAN) protocol. CAN is a serial communication protocol developed specifically for automotive applications, allowing various electronic devices within a vehicle, such as sensors, actuators, and Electronic Control Units (ECUs), to communicate with each other quickly and reliably, sharing information essential for the vehicle’s operation. However, due to its limitations, there is a need for more efficient protocols like Automotive Ethernet and Controller Area Network Flexible (CAN FD), which allow for higher transmission rates and larger data packets. To centralize
Santos, Felipe CarvalhoSilva, Antônio LucasPaterlini, BrunoPedroso, Henrique GomesAlves, Joyce MartinsMilani, Pedro Henrique PiresKlepa, Rogério Bonette
In response to the escalating demand for high-performance, miniaturized, and integrated radio frequency (RF) systems, this research explores the application of the Zynq UltraScale+ RFSoC XCZU47DR chip in the realm of integrated RF transceiver technology. An 8-channel, 4.8Gsps multi-channel distributed collaborative spectrum sensing architecture has been designed, incorporating lightweight IQ neural network, which comprises a convolutional layer, three Bottleneck Units (BNU), a Global Average Pooling (GAP) layer, and a Fully Connected (FC) layer. Notably, each BNU encapsulates one or two inverted bottleneck residual blocks that integrate the concepts of inverted residual blocks and linear bottlenecks. The parameter counts and computational complexity associated with the convolution operation are significantly reduced to merely 11.89% of those required by traditional networks. The performance metrics of the hardware circuit were validated through a constructed test system. Within a 2GHz
Chen, WangjieYang, JianZhu, WeiqiangShi, SonghuaZhou, MingyuFan, Zhenhong
Modern vehicles are increasingly integrating electronic control units (ECUs), enhancing their intelligence but also amplifying potential security threats. Vehicle network security testing is crucial for ensuring the safety of passengers and vehicles. ECUs communicate via the in-vehicle network, adhering to the Controller Area Network (CAN) bus protocol. Due to its exposed interfaces, lack of data encryption, and absence of identity authentication, the CAN network is susceptible to exploitation by attackers. Fuzz testing is a critical technique for uncovering vulnerabilities in CAN network. However, existing fuzz testing methods primarily generate message randomly, lacking learning from the data, which results in numerous ineffective test cases, affecting the efficiency of fuzz testing. To improve the effectiveness and specificity of testing, understanding of the CAN message format is essential. However, the communication matrix of CAN messages is proprietary to the Original Equipment
Shen, LinXiu, JiapengZhang, ZhuopengYang, Zhengqiu
This study delves into the application of the fireworks algorithm (FWA) based on swarm intelligence decision in multi-device resource scheduling. By simulating the process of fireworks explosion, this algorithm efficiently searches for global optimal solutions, demonstrating good stability and optimization performance. In comparison to traditional heuristic algorithms, FWA shows advantages such as simplicity, local coverage, and robustness when addressing multi-device resource scheduling issues. Through experimental validation and result analysis, we conclude that the resource optimization model based on FWA exhibits significant superiority in multi-device resource scheduling, enabling faster identification of global optimal solutions and maintaining consistent optimization outcomes. Moreover, FWA displays high robustness and is applicable to various types of resource scheduling problems, particularly excelling in multi-device collaborative scenarios. In summary, this research presents
Chen, WangjieLi, WenlongZhu, WeiqiangShi, SonghuaZhou, MingyuFan, Zhenhong
Cooperative perception has attracted wide attention given its capability to leverage shared information across connected automated vehicles (CAVs) and smart infrastructure to address the occlusion and sensing range limitation issues. To date, existing research is mainly focused on prototyping cooperative perception using only one type of sensor such as LiDAR and camera. In such cases, the performance of cooperative perception is constrained by individual sensor limitations. To exploit the multi-modality of sensors to further improve distant object detection accuracy, in this paper, we propose a unified multi-modal multi-agent cooperative perception framework that integrates camera and LiDAR data to enhance perception performance in intelligent transportation systems. By leveraging the complementary strengths of LiDAR and camera sensors, our framework utilizes the geometry information from LiDAR and the semantic information from cameras to achieve an accurate cooperative perception
Meng, ZonglinXia, XinZheng, ZhaoliangGao, LetianLiu, WeiZhu, JiaqiMa, Jiaqi
This SAE Technical Information Report (TIR) establishes the instructions for the documents required for the variety of potential functions for PEV communications, energy transfer options, interoperability, and security. This includes the history, current status, and future plans for migrating through these documents created in the Hybrid Communication and Interoperability Task Force, based on functional objective (e.g., [1] If I want to do V2G with an off-board inverter, what documents and items within them do I need, [2] What do we intend for V3 of SAE J2953, …).
Hybrid - EV Committee
In an era where automotive technology is rapidly advancing towards autonomy and connectivity, the significance of Ethernet in ensuring automotive cybersecurity cannot be overstated. As vehicles increasingly rely on high-speed communication networks like Ethernet, the seamless exchange of information between various vehicle components becomes paramount. This paper introduces a pioneering approach to fortifying automotive security through the development of an Ethernet-Based Intrusion Detection System (IDS) tailored for zonal architecture. Ethernet serves as the backbone for critical automotive applications such as advanced driver-assistance systems (ADAS), infotainment systems, and vehicle-to-everything (V2X) communication, necessitating high-bandwidth communication channels to support real-time data transmission. Additionally, the transition from traditional domain-based architectures to zonal architectures underscores Ethernet's role in facilitating efficient communication between
Appajosyula, kalyanSaiVitalVamsi
The Battery Management System (BMS) plays a vital role in managing the energy present in the high voltage battery pack of electric vehicles. The wired battery management system is commonly used in automotive applications. The known difficulties with the wired battery management system includes the intricate wiring harness, wiring failures, system scalability and high implementation costs. To mitigate the above challenges, the wireless battery management system is proposed. Several wireless protocols, including BLE, Zigbee, and 2.4GHz proprietary protocol, are being examined for wireless BMS. However, there are technical difficulties with these protocols to be applied in the battery pack environment. This research paper looks at the Ultra-Wide Band (UWB) communication protocol for wireless BMS, considering UWB’s efficiency low latency and robust Radio Frequency (RF) performance. The UWB protocol is used to communicate between the Cell Supervisory Circuit (CSC) and the Battery Management
Dannana, Arun KumarSubbiah Subbulakshmi, NallaperumalChandirasekaran, RamachandranBeemarajan, Mutharasu
The off-highway industry witnesses a vast growth in integrating new technologies such as advance driver assistance systems (ADAS/ADS) and connectivity to the vehicles. This is primarily due to the need for providing a safe operational domain for the operators and other people. Having a full perception of the vehicle’s surrounding can be challenging due to the unstructured nature of the field of operation. This research proposes a novel collective perception system that utilizes a C-V2X Roadside Unit (RSU)-based object detection system as well as an onboard perception system. The vehicle uses the input from both systems to maneuver the operational field safely. This article also explored implementing a software-defined vehicle (SDV) architecture on an off-highway vehicle aiming to consolidate the ADAS system hardware and enable over-the-air (OTA) software update capability. Test results showed that FEV’s collective perception system was able to provide the necessary nearby and non-line
Feiguel, MatthieuObando, DavidAlzubi, HamzehAlRousan, QusayTasky, Thomas
Hypersonic platforms provide a challenge for flight test campaigns due to the application's flight profiles and environments. The hypersonic environment is generally classified as any speed above Mach 5, although there are finer distinctions, such as “high hypersonic” (between Mach 10 to 25) and “reentry” (above Mach 25). Hypersonic speeds are accompanied, in general, by a small shock standoff distance. As the Mach number increases, the entropy layer of the air around the platform changes rapidly, and there are accompanying vortical flows. Also, a significant amount of aerodynamic heating causes the air around the platform to disassociate and ionize. From a flight test perspective, this matters because the plasma and the ionization interfere with the radio frequency (RF) channels. This interference reduces the telemetry links' reliability and backup techniques must be employed to guarantee the reception of acquired data. Additionally, the flight test instrumentation (FTI) package needs
Deliberate RF jamming of drones has become one of the most common battlefield tactics in Ukraine. But what is jamming, how does it work and how can it be countered by unmanned aerial vehicles (UAVs) in the field? Radio frequency (RF) jamming of drones involves deliberate interference with the radio signals used for communication between drones and their operators.
The future of wireless technology - from charging devices to boosting communication signals - relies on the antennas that transmit electromagnetic waves becoming increasingly versatile, durable and easy to manufacture. Researchers at Drexel University and the University of British Columbia believe kirigami, the ancient Japanese art of cutting and folding paper to create intricate three-dimensional designs, could provide a model for manufacturing the next generation of antennas. Recently published in the journal Nature Communications, research from the Drexel-UBC team showed how kirigami - a variation of origami - can transform a single sheet of acetate coated with conductive MXene ink into a flexible 3D microwave antenna whose transmission frequency can be adjusted simply by pulling or squeezing to slightly shift its shape.
Honda has long been at the cutting edge of mobility and tech, with everything from the Asimo robot of 20 years ago to plans for reusable rockets to launch lightweight satellites into orbit. During a Tech Day event in early October in Tochigi, Japan, the Japanese automaker announced further details of its upcoming Honda 0 architecture (Honda calls it “Honda Zero” but writes it with the number), its first in-house electric platform designed from the ground up. Honda also discussed some of the advanced manufacturing techniques it's pioneering to reach its core design and technology tenants.
Bassett, Abigail
Virtualization features such as digital twins and virtual patching can accelerate development and make commercial vehicles more agile and secure. There is one sure-fire way to secure commercial vehicles from cyber-attacks. “You just remove the connectivity,” quipped Brandon Barry, CEO of Block Harbor Cybersecurity and the moderator of a panel session on “cybersecurity of virtual machines” at the SAE COMVEC 2024 conference in Schaumburg, Illinois. Obviously, that train has left the station - commercial vehicles of all types, including trains, are only becoming more automated and connected, which increases the risks for cyber-attacks. “We have very connected vehicles, so attacks can be posed not just through powertrain solutions but also through telemetry, infotainment systems connected to different applications and services, and also through cloud platforms,” said Trisha Chatterjee, current product support and data specialist for fuel cell and hydrogen technology at Accelera by Cummins.
Gehm, Ryan
Automotive electrical and electronics manufacturer MTA attended IAA Transportation for the first time, demonstrating its new range of wireless communication technologies for the truck industry. Earlier this year, the company acquired Calearo Antenne S.p.A, a company with a long history of producing antennas, amplifiers and cables. MTA global sales director Davide Bonelli explained to Truck & Off-Highway Engineering how that acquisition complements its business. “From a more strategic point of view, we see the world of antennas as complementary to what MTA does,” he said. “Often MTA products have an antenna as an interface, so this is one reason why we have done the deal. There are also a lot of synergies from an engineering standpoint. Historically, MTA is a company that uses many mechanical parts - plastics, metals - which we are very strong with so we can share them. And there are also some competences from Calearo Antenne that can be transferred to us.”
Kendall, John
Items per page:
1 – 50 of 4328