Browse Topic: Telecommunications

Items (4,473)
SAE J1939-75 defines the set of data parameters (SPs) and messages (PGs) for information predominantly associated with monitoring and control generators and driven equipment in electric power generation and industrial applications. The data parameters (SPs) and messages (PGs) previously published within this document are published in SAE J1939DA. Applications using the SAE J1939-75 document must refer to SAE J1939DA for the SAE J1939 parameters and messages for monitoring and controlling the power units, e.g., engines and turbines, that power the generators and driven industrial equipment.
Truck and Bus Control and Communications Network Committee
This top-level document provides a general overview of the SAE J1939 network and describes the subordinate document structure. This document includes definitions of terms and abbreviations which are used among the various SAE J1939 subordinate documents.
Truck and Bus Control and Communications Network Committee
This SAE Recommended Practice defines a method for implementing a bidirectional, serial communications link over the vehicle power supply line among modules containing microcomputers. This document defines those parameters of the serial link that relate primarily to hardware and software compatibility such as interface requirements, system protocol, and message format that pertain to Power Line Communications (PLC) between Tractors and Trailers. This document defines a method of activating the trailer ABS Indicator Lamp that is located in the tractor.
Truck and Bus Control and Communications Network Committee
This standard specifies the system requirements for an on-board vehicle-to-vehicle (V2V) safety communications system for light vehicles1, including standards profiles, functional requirements, and performance requirements. The system is capable of transmitting and receiving the SAE J2735-defined basic safety message (BSM) [1] over a dedicated short range communications (DSRC) wireless communications link as defined in the Institute of Electrical and Electronics Engineers (IEEE) 1609 suite and IEEE 802.11 standards [2] to [6].
V2X Core Technical Committee
The evolution of wireless communications and the miniaturization of electrical circuits have fundamentally reshaped our lives and the digital landscape. However, as we push toward higher-frequency communications in an increasingly connected world, engineers face growing challenges from multipath propagation — a phenomenon where the same radio signal reaches receiving antennas through multiple routes, usually with time delays and altered amplitudes. Multipath interference leads to many reliability issues, ranging from “ghosting” in television broadcasts to signal fading in wireless communications.
A new Microelectromechanical system (MEMS) grating modulator has been developed, offering significant advancements in optical efficiency and scalability for communication systems. By integrating a tunable sinusoidal grating with broadside-constrained continuous ribbons, a large-scale aperture of 30 × 30 mm is achieved and supports high-speed modulation up to 250 kHz.
The paper presents the design and implementation of an AI-enabled smart timer-based power control and energy monitoring solution for household appliances. The proposed system integrates real-time sensing of electrical device parameters with cloud artificial intelligence for predictive analytics and automatic control. Continuous measurement of voltage, current and power consumption of the connected appliances are performed for analysis of the usage patterns. The appliance operation is completely automated by choosing between the best option which is the user-defined schedule or the load shifted schedule recommended by AI. The AI recommendation depends on peak demand of the day and the current load requirement thereby aiding approximate smoothening of daily load curve and improving load factor. The data collected is transmitted to the cloud for real-time and historical data collection, for prediction of consumption patterns, anomaly detection, and clustering appliances according to their
D, AnithaD, SuchitraJain, UtsavMaity, SouvikDinda, Atish
Modern vehicles require sophisticated, secure communication systems to handle the growing complexity of automotive technology. As in-vehicle networks become more integrated with external wireless services, they face increasing cybersecurity vulnerabilities. This paper introduces a specialized Proxy based security architecture designed specifically for Internet Protocol (IP) based communication within vehicles. The framework utilizes proxy servers as security gatekeepers that mediate data exchanges between Electronic Control Units (ECUs) and outside networks. At its foundation, this architecture implements comprehensive traffic management capabilities including filtering, validation, and encryption to ensure only legitimate data traverses the vehicle's internal systems. By embedding proxies within the automotive middleware layer, the framework enables advanced protective measures such as intrusion detection systems, granular access controls, and protected over-the-air (OTA) update
M, ArvindPraneetha, Appana DurgaRemalli, Ravi Teja
This study presents the design and implementation of an advanced IoT-enabled, cloud-integrated smart parking system, engineered to address the critical challenges of urban parking management and next-generation mobility. The proposed architecture utilizes a distributed network of ultrasonic and infrared occupancy sensors, each interfaced with a NodeMCU ESP8266 microcontroller, to enable precise, real-time monitoring of individual parking spaces. Sensor data is transmitted via secure MQTT protocol to a centralized cloud platform (AWS IoT Core), where it is aggregated, timestamped, and stored in a NoSQL database for scalable, low-latency access. A key innovation of this system is the integration of artificial intelligence (AI)-based space optimization algorithms, leveraging historical occupancy patterns and predictive analytics (using LSTM neural networks) to dynamically allocate parking spaces and forecast demand. The cloud platform exposes RESTful APIs, facilitating seamless
Deepan Kumar, SadhasivamS, BalakrishnanDhayaneethi, SivajiBoobalan, SaravananAbdul Rahim, Mohamed ArshadS, ManikandanR, JamunaL, Rishi Kannan
This document provides vehicle-level data collection, data analysis, and data verification procedures that may be used to verify that an instrument under test (IUT) satisfies the vehicle-level requirements specified in SAE J3161/1. For the purposes of this report, “vehicle-level requirements” primarily consist of those requirements which can be verified external to the vehicle. The IUT for these procedures is a configured LTE-V2X vehicle-to-vehicle (V2V) device as defined in SAE J3161/1 and is installed on a vehicle of class 2, 3, 4, or 5. While the IUT is conceptually separated from the vehicle it is installed on, the tests outlined in this document are primarily vehicle level, so the terms “vehicle” and “IUT” can generally be considered interchangeable. Additionally, non-vehicle-level complementary tests, not included in this document, are required to verify that the entire set of requirements specified in SAE J3161/1 is satisfied. This document also includes a Traceability Matrix to
C-V2X Technical Committee
This SAE Aerospace Recommended Practice (ARP) defines lightning strike zones and provides guidelines for locating them on particular aircraft, together with examples. The zone definitions and location guidelines described herein are applicable to Parts 23, 25, 27, and 29 aircraft. The zone location guidelines and examples are representative of in-flight lightning exposures.
AE-2 Lightning Committee
RF and fiber have long co-existed within modern military and aerospace systems, with each medium dedicated to separate, mission-critical roles. Increasingly, however, system designers are turning to RF-over-fiber (RFoF) architectures to bridge the gap between over-the-air RF interfaces and the long, interference-resistant transport advantages of fiber. When it comes to over-the-air communications uses like tactical radio or satellite communications terminals, radio frequency (RF) is still the dominant signal format. RF is also commonly used at the front end of radar and electronic warfare, supporting search, tracking, fire control radar, missile seekers, jammers and electronic support measures.
NASA's Space Communications and Navigation (SCaN) Program and the Johns Hopkins Applied Physics Laboratory in Laurel, Maryland, have successfully tested wideband technology that allows spacecraft to communicate with both government and commercial networks for the first time. Launched July 23, 2025, aboard a SpaceX Falcon 9 rideshare mission, the Polylingual Experimental Terminal (PExT) is demonstrating multilingual wideband terminal technology. Hosted on a satellite from York Space Systems, PExT enhances a spacecraft's communications subsystem, enabling mission controllers to track and exchange data more efficiently across a broad range of networks and frequencies.
As vehicles transform into complex cyber-physical systems within Intelligent Transportation Systems (ITS), automotive cybersecurity has become a foundational pillar in securing safe, reliable, and trustworthy transportation. This paper examines cybersecurity challenges in connected and autonomous vehicles (CAVs), focusing on Vehicle-to-Everything (V2X) communications technologies, including Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), and Vehicle-to-Pedestrian (V2P), and critical systems like electronic control units (ECUs), battery management units (BMUs), and sensor fusion modules. Key vulnerabilities, such as remote hacking, denial-of-service (DoS) attacks, malware injection, and data breaches, threaten vehicle functionality, passenger safety, and privacy. Key protection mechanisms, including encryption, intrusion detection systems (IDS), cryptographic protocols, secure over-the-air (OTA) updates, and Advanced Artificial Intelligence (AI) and Machine Learning (ML
Kumar, OmKumar, RajivSankar M, GopiHaregaonkar, Rushikesh Sambhaji
The automotive industry is continuously evolving at high pace to meet rising customer expectations, reliability, reduced maintenance, and most relevant, compliance with stringent emission norms. Traditionally, the analysis of vehicle emissions relies heavily on periodic inspections and manual checks. These conventional methods are often time-consuming, prone to human error, and lack the ability to provide real-time insights. Also, identifying failures due to non-manufacturing issues require meticulous physical inspections and historical data reviews, which are not always accurate or timely. Telematics or Connected cars technology being one of the major technological innovations in recent times revolutionizes these processes by enabling real-time data exchange between vehicles and external systems. The current study presents an innovative approach to utilizing telematics data for real-time monitoring of vehicle emissions and pinpointing Catalytic converter failures by analyzing vehicle
Dev, TriyambakPrasad, Kakaraparti AgamKalkur, VarunModak, SaikatAGARWAL, ShashankChandra, AnimeshPaul, VarshaGarg, AmitSundararaman, VenkataramanBose, Sushant
The increasing adoption of electric vehicles (EVs) has raised the importance of secure communication between EVs and Electric Vehicle Supply Equipment (EVSE). As EV infrastructure rapidly evolves, cybersecurity threats targeting the vehicle-charger interface pose major risks to user safety, data integrity, and operational continuity. This paper presents an overview of existing EV-EVSE communication standards and explores their associated vulnerabilities. We identify potential cyber threats, including man-in-the-middle attacks, replay attacks, and protocol spoofing, that could compromise the security of EV charging systems. The study proposes an enhanced cybersecurity framework incorporating session authentication, and anomaly detection techniques to fortify EV-EVSE communication. The proposed mitigation strategies aim to ensure secure, reliable, and resilient charging infrastructure essential for the widespread adoption of electric mobility.
Uthaman, SreekumarPatil, Urmila
State Transport Units (STUs) are increasingly using electric buses (EVs) as a result of India's quick shift to sustainable mobility. Although there are many operational and environmental benefits to this development, like lower fuel prices, fewer greenhouse gas emissions, and quieter urban transportation, there are also serious cybersecurity dangers. The attack surface for potential cyber threats is expanded by the integration of connected technologies, such as cloud-based fleet management, real-time monitoring, and vehicle telematics. Although these systems make fleet operations smarter and more efficient, they are intrinsically susceptible to remote manipulation, data breaches, and unwanted access. This study looks on cybersecurity flaws unique to connected passenger electric vehicles (EVs) that run on India's public transit system. Electric vehicle supply equipment (EVSE), telematics control units (TCUs), over-the-air (OTA) update systems, and in-car networks (such as the Controller
Mokhare, Devendra Ashok
The exponential growth of connected and autonomous vehicles has significantly escalated cybersecurity threats, compelling automotive Original Equipment Manufacturers (OEMs) to adopt robust and structured Cybersecurity Incident Response (CSIR) capabilities. Current automotive cybersecurity regulations, such as AIS 189 in India and UNECE WP.29 globally, mandate precise frameworks for proactive threat detection, timely response, and comprehensive incident documentation. This research presents an innovative, comprehensive CSIR framework specifically tailored to integrate seamlessly into OEM cybersecurity management processes. Leveraging a combination of real-time monitoring systems, structured threat categorization methodologies, and integrated escalation and communication protocols, the proposed CSIR framework ensures efficient incident handling aligned with stringent regulatory compliance. The framework encompasses advanced methodologies including Vehicle Security Operations Center (VSOC
Chaudhary lng, VikashDesai, ManojChatterjee, AvikChatterjee lng, Avik
As electric trucks become more central to modern logistics, the need for smarter, more adaptive route planning is growing rapidly. This paper presents a key navigation feature for analyzing and recalibrating such optimized routes in real time. Integrating map features into the navigation mode improves user experience by offering real-time navigation and dynamic route adjustments based on traffic updates, road closures, vehicle coordinates and deviation in expected energy consumption. This study compares the performance of Server sent events (SSE), web sockets, and Application programming interface (API) polling methodologies, focusing on metrics such as data transmission efficiency, latency, resource utilization, scalability, and reliability. Our results demonstrate the advantages and limitations of each method, providing insights into their suitability for real-time route optimization in electric truck logistics. The results highlight the potential of SSE in achieving efficient and
Bhandari, MehulKaur, PrabhjotDadoo, VishalMahendrakar, ShrinidhiRamanaiah, Rachala
The proliferation of wireless charging technology in electric vehicles (EVs) introduces novel cybersecurity challenges that require comprehensive threat analysis and resilient design strategies. This paper presents a proactive framework for assessing and mitigating cybersecurity risks in wireless charger Electronic Control Units (ECUs), addressing the unique vulnerabilities inherent in electromagnetic power transfer systems. Through systematic threat modeling, vulnerability assessment, and the development of defense-in-depth strategies, this research establishes design principles for creating robust wireless charging ecosystems resistant to cyber threats. The proposed framework integrates hardware security modules, encrypted communication protocols, and adaptive threat detection mechanisms to ensure operational integrity while maintaining charging efficiency. Experimental validation demonstrates the effectiveness of the proposed security measures in preventing unauthorized access, data
Uthaman, SreekumarMulay, Abhijit BGadekar, Pundlik
Electric vehicle (EV) transmissions play a vital role in powering EVs by channeling energy from the electric motor to the wheels. Recently, the focus has shifted to multi-speed transmissions in the EV sector due to their potential to improve efficiency and performance. By utilizing various gear ratios, these transmissions enable the motor to function within its most efficient range across different speeds. Most of these transmissions need electric control unit (ECU) with software for optimal functionality and smoother gear shifting. These controllers incorporate controller area network (CAN) communication protocol to operate along with other ECUs. Thus validation of these transmissions is a challenge as they are clutch less, motor has to be controlled for speed matching and have electro mechanical systems replacing conventional systems for operation. This paper proposes a methodology to validate multispeed EV transmissions on a test bench. The validation setup consists of electric
Thambala, PrashanthPatel, HiralSoor, Debasis
This paper presents the design, simulation, and evaluation of a low-profile Multiple-Input Multiple-Output (MIMO) antenna configuration, optimized to meet the evolving demands of modernized wireless communication systems, incorporating LTE-Advanced (LTE-A) and emerging 5G Internet of Things (5G-IoT) applications. The antenna’s geometry relies on a novel design comprising staircase-shaped rectangular radiating patches with an integrated stub. This configuration is employed to improve impedance bandwidth and strengthen the isolation between antenna components, which are critical parameters in MIMO system performance. The antenna is fabricated on a Rogers RT/Duroid 5880 substrate, distinguished by its low dielectric loss and high-frequency stability. With a compact physical footprint of 96 × 96 mm2, the proposed design effectively serves the feature of integration into portable and space-constrained wireless devices. The antenna operates effectively across frequency range of 2.13 GHz to
Gupta, ParulPrasad, Anjay
Items per page:
1 – 50 of 4473