Refine Your Search

Topic

Author

Affiliation

Search Results

Magazine

Momentum: February 2015

2015-02-02
Taking on the Valeo Innovation Challenge Two Canadian teams-the University of Ottawa and the University of Waterloo-finished in the top 3 among about 1,000 other universities from around the world in this challenge devoted to spurring innovative ideas for transportation. Colorado State University designs fuel-cell plug-in hybrid system Competing in the EcoCAR2 competition using a Chevrolet Malibu, the Colorado State team designed a system that features a 15-kW polymer electrolyte membrane fuel cell system, an 18.9-kW•h/177-kW lithium-ion battery, and a 145-kW motor. Cal State Fullerton combines art and engineering Team's submission on its Formula SAE car won first place in the second annual Generation Auto video contest organized in part by SAE International. Collaborative research project leads to potentially swarming VTOL UAVs The AVIGLE VTOL (vertical takeoff and landing) unmanned aerial vehicle was developed via collaboration by a variety of entities for a variety of applications.
Technical Paper

UAS Behaviour and Consistency Monitoring System for Countering Cyber Security Threats

2014-09-16
2014-01-2131
Upon their arrival, Unmanned Autonomous Systems (UAS) brought with them many benefits for those involved in a military campaign. They can use such systems to reconnoiter dangerous areas, provide 24-hr aerial security surveillance for force protection purposes or even attack enemy targets all the while avoiding friendly human losses in the process. Unfortunately, these platforms also carry the inherent risk of being built on innately vulnerable cybernetic systems. From software which can be tampered with to either steal data, damage or even outright steal the aircraft, to the data networks used for communications which can be jammed or even eavesdropped on to gain access to sensible information. All this has the potential to turn the benefits of UAS into liabilities and although the last decade has seen great advances in the development of protection and countermeasures against the described threats and beyond the risk still endures.
Standard

Implementation Guide for Data Management

2014-07-01
WIP
GEIAHB859A
The federal government and industry have moved to concurrent acquisition and development processes using integrated process teams (IPTs). These processes are supported by timely, accurate, cross functional access to data within an integrated data environment (IDE) enabled by advances in information technology (IT). Since the advent of acquisition reform in 1994, Data Management (DM) practices have evolved from being directed by a prescriptive set of standards and procedures to use of the guidance in a principles-based standard -- ANSI/EIA 859.

GEIA Handbook 859 provides implementation guidance for ANSI/EIA 859, with discussions of applications of the standard's principles, tools, examples, and case studies. Handbook 859 is organized according to the lifecycle of data management and covers activities from the pre-RFP stage through records disposition.

Technical Paper

Securing Connected Vehicles End to End

2014-04-01
2014-01-0300
As vehicles become increasingly connected with the external world, they face a growing range of security vulnerabilities. Researchers, hobbyists, and hackers have compromised security keys used by vehicles' electronic control units (ECUs), modified ECU software, and hacked wireless transmissions from vehicle key fobs and tire monitoring sensors. Malware can infect vehicles through Internet connectivity, onboard diagnostic interfaces, devices tethered wirelessly or physically to the vehicle, malware-infected aftermarket devices or spare parts, and onboard Wi-Fi hotspot. Once vehicles are interconnected, compromised vehicles can also be used to attack the connected transportation system and other vehicles. Securing connected vehicles impose a range of unique new challenges. This paper describes some of these unique challenges and presents an end-to-end cloud-assisted connected vehicle security framework that can address these challenges.
Magazine

Momentum: March 2014

2014-03-01
The future for electric and hybrid vehicles in India Technical and political challenges alike have held back the electric and hybrid market, but there are signs of hope. Flex-fuel snowmobile challenge results in improved efficiency and lower emissions Noise and exhaust emissions of recreational snowmobiles have come under increased scrutiny by the U.S. federal government. Students from Kettering University take on the design challenges of meeting or exceeding such regulations. Actuator dynamics in a dual clutch transmission The emergence of tougher environmental and fuel efficient legislations have triggered exploration and advance toward new and better vehicle transmission technologies.
Video

Advancing Aircraft Cyber Security - Potential New Architectures and Technologies

2012-03-16
Cyber security in the aviation industry, especially in relation to onboard aircraft systems, presents unique challenges in its implementation and management. The cyber threat model is constantly evolving and will continually present new and different challenges to the aircraft operator in responding to new cyber threats without either invoking a lengthy software update and re-certification process or limiting aircraft-to-ground communications to the threatened system or systems. This presentation discusses a number of system architectural options and developing technologies that could be considered to enhance the aircraft cyber protection and defensive capabilities of onboard systems as well as to minimize the effort associated with certification/re-certification. Some of these limit the aircraft?s vulnerabilities or in cyber terms, its ?threat surface?.
Technical Paper

Communication Requirements for Plug-In Electric Vehicles

2011-04-12
2011-01-0866
This paper is the second in the series of documents designed to record the progress of a series of SAE documents - SAE J2836™, J2847, J2931, & J2953 - within the Plug-In Electric Vehicle (PEV) Communication Task Force. This follows the initial paper number 2010-01-0837, and continues with the test and modeling of the various PLC types for utility programs described in J2836/1™ & J2847/1. This also extends the communication to an off-board charger, described in J2836/2™ & J2847/2 and includes reverse energy flow described in J2836/3™ and J2847/3. The initial versions of J2836/1™ and J2847/1 were published early 2010. J2847/1 has now been re-opened to include updates from comments from the National Institute of Standards Technology (NIST) Smart Grid Interoperability Panel (SGIP), Smart Grid Architectural Committee (SGAC) and Cyber Security Working Group committee (SCWG).
Magazine

Aerospace Engineering & Manufacturing 2010-06-23

2010-06-23
Fast-track propulsion testing Whether it is compressor refinement or complete test programs for next-generation aircraft, the level of propulsion system development in Europe seems to be ever-increasing.
Standard

Vendor Component Program Data File Interface for OEM Assembly Operations

2010-05-03
HISTORICAL
J2286_201005
This interface document SAE J2286 revises the requirements for file formats as were originally described in SAE J1924. This document describes Interface 1 (I/F 1) in SAE J2461. This document does not imply the use of a specific hardware interface, but may be used with other hardware interfaces such as SAE J1939, ISO 15765 or ISO 14229. The requirements of SAE J2286 supersede the requirements defined by SAE J1924.
Magazine

SAE Off-Highway Engineering 2009-10-01

2009-10-01
Heavy-duty issues Top industry insiders provide their perspectives on critical issues such as sustainability, workforce development, and future growth at this year's Commercial Vehicle Engineering Congress and Exhibition. Autonomouse vehicles go off-highway Advances in sensors, CPUs, and software help in the druve to eliminate drivers. Power and precision Hydraulic motors and actuators evolve along two paths, both relying on advanced controls.
Book

Enterprise Information Security and Privacy

2009-01-01
Here’s a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. This authoritative resource helps you understand what really needs to be done to protect sensitive data and systems and how to comply with the burgeoning roster of data protection laws and regulations. The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security environment. You gain insight into the latest security and privacy trends, learn how to determine and mitigate risks, and discover the specific dangers and responses regarding the most critical sectors of a modern economy.
Standard

COMMERCIAL AIRCRAFT INFORMATION SECURITY CONCEPTS OF OPERATION AND PROCESS FRAMEWORK

2005-12-20
CURRENT
ARINC811
The purpose of this document is to facilitate an understanding of aircraft information security and to develop aircraft information security operational concepts. This common understanding is important since a number of subcommittees and working groups within the aeronautical industry are considering aircraft information security. This document also provides an aircraft information security process framework relating to airline operational needs that, when implemented by an airline and its suppliers, will enable the safe and secure dispatch of the aircraft in a timely manner. This framework facilitates development of cost-effective aircraft information security and provides a common language for understanding security needs.
Standard

E/E Data Link Security

2005-06-27
HISTORICAL
J2186_200506
This SAE Recommended Practice establishes a uniform practice for protecting vehicle components from "unauthorized" access through a vehicle data link connector (DLC). The document defines a security system for motor vehicle and tool manufacturers. It will provide flexibility to tailor systems to the security needs of the vehicle manufacturer. The vehicle modules addressed are those that are capable of having solid state memory contents accessed or altered through the data link connector. Improper memory content alteration could potentially damage the electronics or other vehicle modules; risk the vehicle compliance to government legislated requirements; or risk the vehicle manufacturer's security interests. This document does not imply that other security measures are not required nor possible.
Book

Energy in the 21st Century (2nd Edition)

2004-01-01
This book, in its second edition, examines the energy sources that play a vital role in society today, as well as those that may be the primary energy sources of tomorrow. From our reliance on fossil fuels to the quest for energy independence, and the environmental issues that follow each decision, this book delves into the most prominent energy issues of our time. Armed with this information, the reader can think critically about the direction they want this world to take. Contents: Brief History of Energy Consumption Fossil Energy - Coal Fossil Energy - Oil and Gas Peak Oil Nuclear Energy Renewable Energy - Solar Energy Renewable Energy - Wind Energy Renewable Energy - Energy from Water Renewable Energy - Bioenergy and Synfuels Energy Carrier, Energy Storage and Hybrid Energy Systems Electricity Generation and Distribution Energy Economics Future Issues - Geopolitics of Energy Future Issues - Energy Forecasts
Standard

VENDOR COMPONENT PROGRAM DATA FILE INTERFACE FOR OEM ASSEMBLY OPERATIONS

1997-02-01
HISTORICAL
J2286_199702
This interface document SAE J2286 revises the requirements for file formats as described in SAE J1924. This document describes Interface 1 (I/F 1) in SAE J2214. This document does not imply the use of a specific hardware interface, but may be used with other hardware interfaces such as SAE J1939. The requirements of SAE J2286 supersede the requirements defined by SAE J1924.
Standard

EXPANDED DIAGNOSTIC PROTOCOL FOR OBD II SCAN TOOLS

1995-12-01
HISTORICAL
J2205_199512
This SAE Recommended Practice defines the Expanded Diagnostic Protocol (EDP), the requirements for the SAE J1978 OBD II Scan Tool for supporting the EDP protocol, and associated requirements for diagnosis and service information to be provided by motor vehicle manufacturers. Appendix A includes worked examples of the use of the protocol.
Standard

EXPANDED DIAGNOSTIC PROTOCOL FOR OBD II SCAN TOOLS

1994-06-01
HISTORICAL
J2205_199406
This SAE Recommended Practice defines the Expanded Diagnostic Protocol (EDP), the requirements for the SAE J1978 OBD II Scan Tool for supporting the EDP protocol, and associated requirements for diagnosis and service information to be provided by motor vehicle manufacturers. Appendix A includes worked examples of the use of the protocol.
X