Refine Your Search


Search Results


9th AVL International Commercial Powertrain Conference (2017)

Organized in cooperation with SAE International, AVL’s International Commercial Powertrain Conference- ICPC, happens every two years. It is the premier forum for truck, agricultural and construction equipment manufacturers to discuss powertrain technology challenges and solutions across their industries. This event offers a unique opportunity for engineers to address the synergy effects and distinctive characteristics of commercial vehicles, agricultural tractors and non-road vehicles, and industrial machinery. In 2017, the 9th ICPC focused on alternative powertrain technologies and innovations improving operating efficiency. These proceedings focus on: • Future challenges for engines and emissions • Smart Technologies Changing Farming • Cyber Physical Systems in Agriculture Business • OEM View of the Future of the Construction Machinery Industry • Powertrain Developments • CO2 Reduction • CVT Transmission Platform Technology • Autonomous and Connected Trucks
Technical Paper

Application of Suspend Mode to Automotive ECUs

To achieve high robustness and quality, automotive ECUs must initialize from low-power states as quickly as possible. However, microprocessor and memory advances have failed to keep pace with software image size growth in complex ECUs such as in Infotainment and Telematics. Loading the boot image from non-volatile storage to RAM and initializing the software can take a very long time to show the first screen and result in sluggish performance for a significant time thereafter which both degrade customer perceived quality. Designers of mobile devices such as portable phones, laptops, and tablets address this problem using Suspend mode whereby the main processor and peripheral devices are powered down during periods of inactivity, but memory contents are preserved by a small “self-refresh” current. When the device is turned back “on”, fully initialized memory content allows the system to initialize nearly instantaneously.

Automotive Engineering: April 7, 2015

GM's CTO driving new paths to technology leadership 'We're making actual production commitments regarding our advanced-technology strategy, rather than just talking about it,' says GM's CTO Jon Lauckner. 'We're absolutely going to be among the leaders, if not the leader, in these areas.' Aluminum prepares for its next big leap Ford's F-Series blockbuster was just the beginning. New micromills now in pilot phase aim to bring vastly stronger and more formable light-alloy materials at higher capacity, says Alcoa's Mike Murphy. Slick solutions for friction reduction From new lubricants to 'smart' oil pumps and clever bearing technologies, engine designers are attacking every potential source of spin losses and internal friction in the quest for more mechanical work out of less fuel. Next-gen NSX: a twin-turbo, multi-material Ferrari-fighter The production NSX made its much-awaited global debut at NAIAS in January.

Automotive Engineering: February 3, 2016

Baking in protection With vehicles joining the Internet of Things, connectivity is making cybersecurity a must-have obligation for automotive engineers, from initial designs through end-of-life.

Automotive Engineering: October 6, 2015

2016 Malibu sheds 300 lb, adds new hybrid system More wheelbase, style, fuel economy, and comfort aim to move GM's volume midsize sedan from the sidelines to the fast lane. Lighter, more powerful 2016 Honda Pilot The third-generation SUV gets a sleek new look and plenty of slick technology for enhanced performance and safety. 2016 Mazda MX-5 stays true to its roots Mazda engineers give the industry a lesson in getting more from less. 2016 Land Rover Discovery Sport spearheads more efficient Land Rovers JLR's space-efficient, flexible SUV moves to JLR's new Ingenium modular engines. Audi chooses high technology, cautious design evolution for new A4 In addition to lighter weight and significant improvements in efficiency, the new car employs plenty of technology and driver support.

Autonomous Vehicle Engineering: July 2019

Editorial The consolidation plot thickens The Navigator As the world turns to C-V2X, Europe picks WiFi Complexity of Autonomous-Systems Simulation, Validation Soars to the Clouds Scalable, cloud-based architectures are gaining greater acceptance for simulating and testing the myriad development aspects of automated driving. Connectivity Solutions for AVs The promises of fully connected autonomous vehicles are great, but so are the challenges. What M&E Can Teach the AV Industry About Data Media & entertainment offers important learnings on data retention, management, scalability and security. The Rodney Dangerfield of Automated-Driving Sensors Radar and lidar get all the attention, but Inertial Measurement Units are the backbone of sensor fusion. Suppliers are scrambling to make IMUs more accurate-and much less expensive. The Sense-itive Side of Autonomous Vehicles BASF is exploring how specific materials-and even paint colors and finishes-can improve the capabilities of AV sensors.
Technical Paper

Buckendale Lecture Series: Transformational Technologies Reshaping Transportation—A Government Perspective

Transportation departments are under-going a dramatic transformation, shifting from organizations focused primarily on building roads to a focus on mobility for all users. The transformation is the result of rapidly advancing autonomous vehicle technology and personal telecommunication technology. These technologies provide the opportunity to dramatically improve safety, mobility, and economic opportunity for society and industry. Future generations of engineers and other transportation professionals have the opportunity to be part of that societal change. This paper will focus on the technologies state DOT’s and the private sector are researching, developing, and deploying to promote the future of mobility and improved efficiency for commercial trucking through advancements in truck platooning, self-driving long-haul trucking, and automated last mile distribution networks.
Technical Paper

CAN Crypto FPGA Chip to Secure Data Transmitted Through CAN FD Bus Using AES-128 and SHA-1 Algorithms with A Symmetric Key

Robert Bosch GmBH proposed in 2012 a new version of communication protocol named as Controller area network with Flexible Data-Rate (CANFD), that supports data frames up to 64 bytes compared to 8 bytes of CAN. With limited data frame size of CAN message, and it is impossible to be encrypted and secured. With this new feature of CAN FD, we propose a hardware design - CAN crypto FPGA chip to secure data transmitted through CAN FD bus by using AES-128 and SHA-1 algorithms with a symmetric key. AES-128 algorithm will provide confidentiality of CAN message and SHA-1 algorithm with a symmetric key (HMAC) will provide integrity and authentication of CAN message. The design has been modeled and verified by using Verilog HDL – a hardware description language, and implemented successfully into Xilinx FPGA chip by using simulation tool ISE (Xilinx).
Technical Paper

Case Study for Defining Security Goals and Requirements for Automotive Security Parts Using Threat Modeling

Several external networks like telematics, and SOTA and many in-vehicle networks by gateways and domain controllers have been increasingly introduced. However, these trends may potentially make many critical data opened, attacked and modified by hackers. These days, vehicle security has been significantly required as these vehicle security threats are related to the human life like drivers and pedestrians. Threat modeling is process of secure software development lifecycle which is developed by Microsoft. It is a systematic approach for analyzing the potential threat in software and identifying the security risk associated with software. Through threat modeling, security risk is be mitigated and eliminated. In vehicle software System, one of vulnerability can affect critical problem about safety. An approach from experience and hacking cases is not enough for analyzing the potential threat and preparing new hacking attack.

Commercial Aviation Cyber Security: Current State and Essential Reading

In the next decade, commercial aviation will see Next Generation ATM (NextGEN), Single European Skies ATM Research (SESAR), and others utilizing Internet- based air-to-ground communication links for advanced “air traffic control” (ATC) communications. Commercial Aviation Cyber Security: Current State and Essential Reading highlights some of the major issues the industry must confront if the vision of a new, advanced air traffic management is to come to fruition. This will require standardization work to identify key components with built-in cyber security that will guide prototype testing, functionality, and prioritizing implementation efforts to solve the roadblocks to global interoperability. The ten technical papers selected for Commercial Aviation Cyber Security: Current State and Essential Reading span the last decade’s work in commercial aviation cyber security, and aircraft cyber technologies.

Connected aircraft technologies benefit airframe and original equipment manufacturers, operators, and travelers

Connected aircraft means more than just in-flight movies, free texting, and Facebook posting with friends while in flight. In fact, the connected aircraft revolutionizes airline operations, dramatically improving fleet management, flight safety, passenger experience, maintenance, flight operations, aircraft turnaround time, and costs. For aircraft operators, connectivity presents a new set of operational benefits that were previously unavailable.
Journal Article

Cybersecurity Considerations for Heavy Vehicle Event Data Recorders

Abstract Trust in the digital data from heavy vehicle event data recorders (HVEDRs) is paramount to using the data in legal contests. Ensuring the trust in the HVEDR data requires an examination of the ways the digital information can be attacked, both purposefully and inadvertently. The goal or objective of an attack on HVEDR data will be to have the data omitted in a case. To this end, we developed an attack tree and establish a model for violating the trust needed for HVEDR data. The attack tree provides context for mitigations and also for functional requirements. A trust model is introduced as well as a discussion on what constitutes forensically sound data. The main contribution of this article is an attack tree-based model of both malicious and accidental events contributing to compromised event data recorder (EDR) data. A comprehensive list of mitigations for HVEDR systems results from this analysis.

Data Acquisition from Light-Duty Vehicles Using OBD and CAN

Modern vehicles have multiple electronic control units (ECU) to control various subsystems such as the engine, brakes, steering, air conditioning, and infotainment. These ECUs are networked together to share information directly with each other. This in-vehicle network provides a data opportunity for improved maintenance, fleet management, warranty and legal issues, reliability, and accident reconstruction. Data Acquisition from Light-Duty Vehicles Using OBD and CAN is a guide for the reader on how to acquire and correctly interpret data from the in-vehicle network of light-duty (LD) vehicles. The reader will learn how to determine what data is available on the vehicle's network, acquire messages and convert them to scaled engineering parameters, apply more than 25 applicable standards, and understand 15 important test modes.

Digital Communications for Plug-in Electric Vehicles

This SAE Information Report SAE J2931 establishes the requirements for digital communication between Plug-In Electric Vehicles (PEV), the Electric Vehicle Supply Equipment (EVSE) and the utility or service provider, Energy Services Interface (ESI), Advanced Metering Infrastructure (AMI) and Home Area Network (HAN). This is the third version of this document and completes the effort that specifies the digital communication protocol stack between Plug-in Electric Vehicles (PEV) and the Electric Vehicle Supply Equipment (EVSE). The purpose of the stack outlined in Figure 1 and defined by Layers 3 to 6 of the OSI Reference Model (Figure 1) is to use the functions of Layers 1 and 2 specified in SAE J2931/4 and export the functionalities to Layer 7 as specified in SAE J2847/2 (as of August 1, 2012, revision) and SAE J2847/1 (targeting revision at the end of 2012).

Europe’s blockchain-based Smart E-Mobility Challenge will conclude this May in Germany

TIoTA, an open software consortium of over 50 members organized to support the creation of a secure, scalable, interoperable, and trusted IoT ecosystem, began the E-Mobility Challenge to link IoT devices with consumers and stakeholder companies such as operators and service, communication, and payment providers within the preexisting European electric vehicle ecosystem.