• Title/Summary/Keyword: Connected-car

Search Result 156, Processing Time 0.024 seconds

Implementation of Communication to Flexibly Configure the Number of Railway Cars (철도차량 수를 유연하게 구성할 수 있는 통신시스템 구현)

  • Yeon, Jun Sang;Yang, Oh
    • Journal of the Semiconductor & Display Technology
    • /
    • v.15 no.4
    • /
    • pp.61-66
    • /
    • 2016
  • This paper presents the implementation for a network structure of railway cars using a point to point communication. Most of network's representative specifications for a train are the FIP (Field Bus), MVB (Multifunction Vehicle Bus), CAN and WTB (Wire Train Bus) which is used by ALSOM, SIEMENS and BOMBADIER as major in this field. These networks in a physical layer use a multi-drop method, connected from $1^{st}$ car to $n^{th}$ car of a train through a cable without any extra services such as an electric part, amplifier. However waveforms which is passed through a long cable in the multi-drop are distorted by a capacitance or resistance of the cable or environments. Also since using a cable connected directly from $1^{st}$ car to $n^{th}$ car, if over two trains make double head, it isn't easy to distinguish ID for each railway cars. So by using the point to point network per each car, it is able to reduce a distortion. Also since reducing distortion, this communication speed can be been higher and transmit and receive any packets more stably. Using proposed token in a packet, this can make ID per each railway car automatically. Finally experimental results show the good performance and effectiveness of the proposed method.

Convergence Study on the Method and Effectiveness of Mirror Linking Smartphones to Automobiles (자동차 모니터를 이용한 스마트폰 미러링크 방법 및 효용성에 관한 융복합 연구)

  • Kang, Hee-Ra
    • Journal of Digital Convergence
    • /
    • v.14 no.4
    • /
    • pp.379-385
    • /
    • 2016
  • IT companies are increasingly taking interest in the automobile industry as a major industry of the future. Companies specializing in information technology, such as Google, Apple and Samsung, are actively taking part in the automobile industry and are conducting various research on connected cars. At this point in time, this study aims on understanding the concept of connected cars and the concept of mirror linking, which is one of the many methods in connecting cars. In this transitional period of connected cars, the purpose of this study is to present the method of mirror linking iPhones and to discover how this could be used in connected cars. By turning a normal car into a connected car, simply with a smartphone in hand, the ideas presented in this study will serve as an opportunity for many current automobile owners to experience the functions of connected cars of the future without shouldering additional expenses.

A Study on safety against a fire of charging cable for mobile phone for vehicle (자동차용 모바일 폰 충전 케이블의 발화 안전성에 관한 연구)

  • Kwon, Jin-Wook;Choi, Kyu-Sik;Hwang, Myung-Whan
    • Journal of the Korea Safety Management & Science
    • /
    • v.20 no.3
    • /
    • pp.21-26
    • /
    • 2018
  • This paper describes result of a study on safety against a fire of charging cable for mobile phone for vehicle. Combustion on the USB cable in the car was happened while driving. Gas coming from the burning USB cable could be a reason which can make a secondary car accident since the driver also can be embarrassed while driving. In order to prevent a secondary car accident connected on the road, to research a reason why USB cable can emit gas and be burned in charging. We did simulation test with abnormal fault condition for the electronic component on the board in the USB cable. So we get the result from abnormal fault condition simulation test, for instance, shorted test for output terminal of 8 pin switch, shorted test for chip resistor after thermal aging in the condition $25^{\circ}C$, 93 % RH during 48 hours. To analysis the result of all test, Combustion on the USB cable was not the 8 pin but other electrical component such as a chip resistor. Therefore we guess that the reason for USB cable combustion in charging in a car was not 8 pin and a LED but another defective component.

Analysis of Intelligent Vehicle Control Methods for CIM at Non-signalized Intersections (비 신호 교차로에서 CIM을 위한 지능형 차량 제어기법 분석)

  • Joo, Hyunjin;Lim, Yujin
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.33-40
    • /
    • 2018
  • There are lots of literature about connected car system from industry and academia. The connected car is a smart car integrated with IT technology that is connected to people, vehicles and traffic management systems. It is important to V2I (vehicle to infrastructure) communication which is the connection between the vehicle and the infrastructure. CIM (cooperative intersection management) is a device to manage the communication between vehicle and infrastructure. In this paper, we analyze two intelligent vehicle control methods using CIM at non-signalized intersections. In the first method, a vehicle to pass through intersection needs to reserve a resource of intersection. In the second method, trajectory patterns on pre-planned vehicles are classified to pass through intersection. We analyze case studies of two methods to be implemented by DP(dynamic programming) and ACO(ant colony optimization) algorithms. The methods can be reasonably improved by placing importance on vehicles or controlling speeds of vehicles.

Realtime Object Region Detection Robust to Vehicle Headlight (차량의 헤드라이트에 강인한 실시간 객체 영역 검출)

  • Yeon, Sungho;Kim, Jaemin
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.138-148
    • /
    • 2015
  • Object detection methods based on background learning are widely used in video surveillance. However, when a car runs with headlights on, these methods are likely to detect the car region and the area illuminated by the headlights as one connected change region. This paper describes a method of separating the car region from the area illuminated by the headlights. First, we detect change regions with a background learning method, and extract blobs, connected components in the detected change region. If a blob is larger than the maximum object size, we extract candidate object regions from the blob by clustering the intensity histogram of the frame difference between the mean of background images and an input image. Finally, we compute the similarity between the mean of background images and the input image within each candidate region and select a candidate region with weak similarity as an object region.

Blockchain Technology and Network Structure for Real-time Intelligence Transport System (실시간 지능형 교통 시스템에 적합한 블록체인 기술 및 네트워크 구조)

  • Kim, Moonseong;Na, Eunchan;Lee, Janghoon;Lee, Woochan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.17-26
    • /
    • 2018
  • Connected car plays an important role on Intelligent Transport System (ITS). ITS is able to secure drivers' convenience and safety, however, the overall system can be threatened by hacking attempt. Blockchain is one strong candidate of the remedy to promote the security of the ITS network. However, there will be many challenges to adopt previously proposed blockchain technologies to ITS. This work presents a new ITS structure based on blockchain technology. Proposed scheme includes three major layers. The first layer is central manager which is initiated once to register a certain connected car. The third layer is RSU (Road Side Unit) layer which exploits PoS (Proof of Stake) for consortium blockchains and retains real-time information. In addition, this layer performs block expiration based on timers to maintain manageable block length. In the second layer, the generated blocks of the third layer without expiration are housed as private blockchains. We finally demonstrate possible merits of newly proposed scheme.

The Design and Implementation of IoT based Remote Control System for Active Connected Cars (능동형 커넥티드 카를 위한 IoT기반 원격제어 시스템의 설계 및 구현)

  • Lee, Yun-Seop;Jang, Mun-Seok;Choi, Sang-Bang
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.22 no.6
    • /
    • pp.703-709
    • /
    • 2019
  • This paper proposes a monitoring and remote control system, an essential part of In Vehicle Infotainment (IVI) and Human Vehicle Interface (HVI) to provide safety and convenience to a driver. The system utilizes Bluetooth for a short range communication and utilizes WCDMA for a long range communication to enhance efficiency. In this paper, an integrated controller, which integrates a CAN communication module, a Bluetooth communication module, a WCDMA communication module, is designed to control a car. Also, a remote server for managing data is designed to provide real-time monitoring and remote control for a user via smart devices. Experiment results show that all the proposed remote control, driving log, real-time monitoring, and diagnostics functions are working properly. With the proposed system, a driver can drive safely by monitoring and inspecting a car before driving via smart devices, and control conveniently by controlling a car remotely.

The Strategic Positioning of Platform Providers and Automotive Manufacturers in the Forthcoming Smart-car Market (스마트카 산업에서 플랫폼사업자와 완성차업체의 전략적 포지셔닝 분석)

  • Hyun, Jae Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.10
    • /
    • pp.274-280
    • /
    • 2017
  • The smart-car industry has emerged as the important variable that will decide the future industrial contour of the automotive industry, together with commercialization of electronic vehicles, connected cars, infotainment, telematics, and the autonomous/self-driving car. This study analyzes the strategic position of platform companies and car manufacturers that would determine the future of the smart-car market. The findings of this study show that despite the entry barriers in industrial factors, such as economies of scale, the industrial infrastructure, and global production networks, and technical factors like exclusive head-sector information, car manufacturers may be deprived of their industrial leadership by platform companies with map and user data, big data capabilities, and user interface experience if they lag behind ICT innovation. This insight is based on the emerging importance of software and platforms, and the simplification of car structures, proven by the successful commercialization of electronic vehicles. This study complements existing studies mainly focused on technical aspects of the smart-car industry by examining the strategic dimensions of platform companies and their approach to the future smart-car market by comparing them with existing car manufacturing multinationals.

Development of CAN network intrusion detection algorithm to prevent external hacking (외부 해킹 방지를 위한 CAN 네트워크 침입 검출 알고리즘 개발)

  • Kim, Hyun-Hee;Shin, Eun Hye;Lee, Kyung-Chang;Hwang, Yeong-Yeun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.2
    • /
    • pp.177-186
    • /
    • 2017
  • With the latest developments in ICT(Information Communication Technology) technology, research on Intelligent Car, Connected Car that support autonomous driving or services is actively underway. It is true that the number of inputs linked to external connections is likely to be exposed to a malicious intrusion. I studied possible security issues that may occur within the Connected Car. A variety of security issues may arise in the use of CAN, the most typical internal network of vehicles. The data can be encrypted by encrypting the entire data within the CAN network system to resolve the security issues, but can be time-consuming and time-consuming, and can cause the authentication process to be carried out in the event of a certification procedure. To resolve this problem, CAN network system can be used to authenticate nodes in the network to perform a unique authentication of nodes using nodes in the network to authenticate nodes in the nodes and By encoding the ID, identifying the identity of the data, changing the identity of the ID and decryption algorithm, and identifying the cipher and certification techniques of the external invader, the encryption and authentication techniques could be detected by detecting and verifying the external intruder. Add a monitoring node to the CAN network to resolve this. Share a unique ID that can be authenticated using the server that performs the initial certification of nodes within the network and encrypt IDs to secure data. By detecting external invaders, designing encryption and authentication techniques was designed to detect external intrusion and certification techniques, enabling them to detect external intrusions.