Browse Publications Technical Papers 2019-01-0790
2019-04-02

Wireless Charging for EV/HEV with Prescriptive Analytics, Machine Learning, Cybersecurity and Blockchain 2019-01-0790

Due to the rapid development in technological aspect of the Autonomous Vehicles (AV), there is a considerable need for research in the field of efficient use of fuel and lowering of the emissions from vehicles without affecting the performance, safety, and reliability of the vehicles. Electric Vehicle (EV) with rechargeable battery can be proved a practical solution for the above problem. As there is a limited capacity of the rechargeable battery, there must be an efficient power control strategy to be maintained for the performance of the vehicle without compromising safety and reliability. Different optimization techniques along with Deterministic Dynamic Programming (DDP) approach is used for the power distribution and management control. The battery operated electric vehicle can be charged either by a conductive means (wired) or by the inductive means (wireless) with the help of the electromagnetic field. These Inductive and Wireless charging techniques are based on the principle of electromagnetic induction which can be implemented by defining three primary stages namely Coil design, Compensation topology and power converter needed for transfer of energy with the control mechanism. Different Coil structures are proposed for maximizing the magnetic flux thereby helps in transferring the energy effectively. Compensation topology is used for the tuning of the high-frequency AC ranging from a few KHz to MHz between the primary coil and Secondary coil. Different machine learning techniques are developed for optimization of the parameter like the State Of Charge (SoC) and State of Health (SoH), temperature, current based data obtained by pre-processing techniques and then ML technique and prescriptive analytics are applied. In order to provide the secure charging environment blockchain technology framework is proposed along with appropriate Cyber security algorithms where ever required.

SAE MOBILUS

Subscribers can view annotate, and download all of SAE's content. Learn More »

Access SAE MOBILUS »

Attention: This item is not yet published. Pre-Order to be notified, via email, when it becomes available.
Members save up to 40% off list price.
Login to see discount.
Special Offer: With TechSelect, you decide what SAE Technical Papers you need, when you need them, and how much you want to pay.
X