Academic literature on the topic 'Controller Area Network (Computer network)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Controller Area Network (Computer network).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Controller Area Network (Computer network)"

1

Hu, Liang, Jiejun Hu, Tao Fu, Jiyang Bao, and Feng Wang. "Asymmetric network information cache based on mobile traffic in software-defined network." Advances in Mechanical Engineering 11, no. 1 (January 2019): 168781401881989. http://dx.doi.org/10.1177/1687814018819894.

Full text
Abstract:
Software-defined network is an encouraging research area that realizes updates throughout an entire network, and a wireless network is ubiquitous in an up-to-date world. The combination of these techniques, which is referred to as a wireless software-defined network, has been a significant development in numerous testbeds. The extensive use of distributed controllers that achieved elastic extension and are fault tolerant in large-scale wireless networks is hopeful. Despite their profits, they generate significant overhead in synchronizing network information. Thus, power-hungry wireless software-defined network devices limit the usage of distributed controllers in wireless networks. The patterns of storing network information have a crucial effect on controller performances, as they determine the probability of processing requests based on local data. To address this problem, we identify a better pattern for controllers to retain proper network information to balance costs in terms of both synchronous traffic and response time. We analyze the characteristics of distributed controllers and propose an overhead model of a distributed controller in a wireless software-defined network. Based on this model, we design an asymmetric network information cache to make trade-offs among different controller architectures. The asymmetric network information cache measures real-time network traffic and computes the traffic among sub-networks controlled by controller nodes. Then, the controller asymmetrically caches suitable network data to substantially busier nodes. The experimental results indicate that the asymmetric network information cache achieves a trade-off between synchronous traffic and the average response time.
APA, Harvard, Vancouver, ISO, and other styles
2

Leen, G., and D. Heffernan. "Time-triggered controller area network." Computing & Control Engineering Journal 12, no. 6 (December 1, 2001): 245–56. http://dx.doi.org/10.1049/cce:20010601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Makka, Shanthi, and B. B. Sagar. "Communication of Two Controller Area Network Segments through Wireless Sensor Network." International Journal of Security and Its Applications 13, no. 4 (December 31, 2019): 1–12. http://dx.doi.org/10.33832/ijsia.2019.13.4.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Çenesİz, Nilüfer, and Murat Esin. "Controller area network (CAN) for computer integrated manufacturing systems." Journal of Intelligent Manufacturing 15, no. 4 (August 2004): 481–89. http://dx.doi.org/10.1023/b:jims.0000034111.77918.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Farsi, M., M. Barbosa, and K. Ratcliff. "An overview of Controller Area Network." Computing & Control Engineering Journal 10, no. 3 (June 1, 1999): 113–20. http://dx.doi.org/10.1049/cce:19990304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pedreiras, P., and L. Almeida. "EDF message scheduling on controller area network." Computing & Control Engineering Journal 13, no. 4 (August 1, 2002): 163–70. http://dx.doi.org/10.1049/cce:20020402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Izuchi, Takuya, Munetoshi Hotta, Takeo Oomichi, Shigeo Seki, and Junji Koyama. "Development of Network Plug-in Actuator." Journal of Robotics and Mechatronics 19, no. 2 (April 20, 2007): 232–42. http://dx.doi.org/10.20965/jrm.2007.p0232.

Full text
Abstract:
We propose an intelligent connector (ICN) that uses a network plug-in actuator (NPA) or an intelligent connector (ICN) to reduce the number of signal and power cables and integrates an AC servomotor and motor drive with serial signal wires using a controller area Network (CAN). The ICN connects the NPA and a controller such as a personal computer and connects different networks such as the Ethernet, CAN, IEEE1394, or USB. We developed an NPA series from 5 W to 750 W and verified their functions. We also evaluated the ICN performance using the NPA. This system was installed on an “econovehicle” and its effectiveness was successfully demonstrated.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhao, Zi-An, Yu Sun, Dawei Li, Jian Cui, Zhenyu Guan, and Jianwei Liu. "A Scalable Security Protocol for Intravehicular Controller Area Network." Security and Communication Networks 2021 (December 31, 2021): 1–13. http://dx.doi.org/10.1155/2021/2314520.

Full text
Abstract:
Intravehicular communication relies on controller area network (CAN) protocol to deliver messages and instructions among different electronic control units (ECU). Unfortunately, inherent defects in CAN include the absence of confidentiality and integrity mechanism, enabling adversaries to launch attacks from wired or wireless interfaces. Although various CAN cryptographic protocols have been proposed for entity authentication and secure communication, the redundancy in the key establishment phase weakens their availability in large-scale CAN. In this paper, we propose a scalable security protocol suite for intravehicular networks and reduce the communication costs significantly. A new type of attack, suspension attack, is identified for the existing protocols and mitigated in our protocol by leveraging a global counter scheme. We formally verify the security properties of the proposed protocol suite through the AVISPA tool. The simulation results indicate that the communication and computation efficiency are improved in our protocol.
APA, Harvard, Vancouver, ISO, and other styles
9

UMEHARA, Daisuke, and Takeyuki SHISHIDO. "Controller Area Network and Its Reduced Wiring Technology." IEICE Transactions on Communications E102.B, no. 7 (July 1, 2019): 1248–62. http://dx.doi.org/10.1587/transcom.2018ani0004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Obaida, Tameem Hameed, and Hanan Abbas Salman. "A novel method to find the best path in SDN using firefly algorithm." Journal of Intelligent Systems 31, no. 1 (January 1, 2022): 902–14. http://dx.doi.org/10.1515/jisys-2022-0063.

Full text
Abstract:
Abstract Over the previous three decades, the area of computer networks has progressed significantly, from traditional static networks to dynamically designed architecture. The primary purpose of software-defined networking (SDN) is to create an open, programmable network. Conventional network devices, such as routers and switches, may make routing decisions and forward packets; however, SDN divides these components into the Data plane and the Control plane by splitting distinct features away. As a result, switches can only forward packets and cannot make routing decisions; the controller makes routing decisions. OpenFlow is the communication interface between the switches and the controller. It is a protocol that allows the controller to identify the network packet’s path across the switches. This project uses the SDN environment to implement the firefly optimization algorithm to determine the shortest path between two nodes in a network. The firefly optimization algorithm was implemented using Ryu control. The results reveal that using the firefly optimization algorithm improves the selected short path between the source and destination.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Controller Area Network (Computer network)"

1

Lambert, Aric Brian. "A controller area network simulation application program for Microsoft Windows." Virtual Press, 1995. http://liblink.bsu.edu/uhtbin/catkey/958782.

Full text
Abstract:
My thesis is to design a Controlled Area Network (CAN) simulator For Microsoft Windows. In a modern world we deal with complex mechanical systems that require special electronic control to guarantee ultimate safety and efficiency. These electronic control systems are responsible for monitoring subsystems within the mechanical systems. A good example of this is the motor vehicles that are being driven on the road today. These vehicles have been designed with increased safety and efficiency, such as electronic controlled anti lock breaks, fuel injection, and power control steering. To run all of these components, the car needs a very well designed protocol to be able to control series of messages being passed from one subsystem to another. To determine which message being passed has higher priority than any other messages. To deal with such circumstances, the Controlled Area Network (CAN) was designed. The purpose of the CAN simulator is to gather statistical information concerning the arbitration, message transfer, error detection, error signaling, and retransmision. The CAN simulating model will consist of one to sixty nodes. Each node is considered as a subsystem for the CAN simulator. The subsystems will be characterized as the breaks, engine, transmission, or any part of a car which needs to be connected to the CAN system. Each node will send one to ten messages through the CAN system. The CAN system will take the messages from the nodes and place them into an Arrival queue. Each node will have its own Arrival queue, and no nodes can have two messages on the bus at the same time. The messages will be sorted in the queues in the order of the time needed to be released onto the bus. There will be an internal clock that will monitor the time for when the messages are needed to be placed onto the bus. If there is a situation where two messages need to be sent at the same time, the arbitrator will determine the priority of the messages to be placed onto the bus. Once the message is on the bus, it will go to a transfer queue. Periodically, there will be an error signal sent with the message that will be detected by the error detection, and it will be required that the message to be retransmitted. At critical points on the simulation, statistical information will be gathered for an analyzation. Some examples of information to be analyzed are 1) verification of the simulation performance on a single node with a single message, 2) network load which is a rate of a utilized bus time to the total bus time, 3) network throughput which is a total number of messages that are transmitted per second, and 4) average response time which will be the average time taken by all messages to gain bus access.PLATFORM DESCRIPTIONThe computer to be used in this project will be an Intel Pentum 100 with 16 megs RAM, two 853 megabyte harddrive, and a 17 inch super VGA monitor. The user interface will be windows 3.1 application. The compiling language to be used will be Microsoft Visual C++.
Department of Computer Science
APA, Harvard, Vancouver, ISO, and other styles
2

Emani, Krishna Chaitanya Suryavenkata. "Application of hybrid ARQ to controller area networks." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.mst.edu/thesis/pdf/Krishna_C_Emani_09007dcc804e7970.pdf.

Full text
Abstract:
Thesis (M.S.)--University of Missouri--Rolla, 2007.
Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed April 21, 2008) Includes bibliographical references (p. 48).
APA, Harvard, Vancouver, ISO, and other styles
3

Ünal, İlker Kutlu Akif. "CAN (Control Area Network) üzerinden PIC programlama /." Isparta: SDÜ Fen Bilimleri Enstitüsü, 2006. http://tez.sdu.edu.tr/Tezler/TF00988.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ren, Fei. "Performance improvements of automobile communication protocols in electromagnetic interference environments." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.mst.edu/thesis/pdf/Ren_09007dcc80487aed.pdf.

Full text
Abstract:
Thesis (M.S.)--University of Missouri--Rolla, 2007.
Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed March 27, 2008) Includes bibliographical references (p. 55-56).
APA, Harvard, Vancouver, ISO, and other styles
5

Keskin, Ugur. "Time-triggered Controller Area Network (ttcan) Communication Scheduling: A Systematic Approach." Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/12609877/index.pdf.

Full text
Abstract:
Time-Triggered Controller Area Network (TTCAN) is a hybrid communication paradigm with combining both time-triggered and event-triggered traffic scheduling. Different from the standard Controller Area Network (CAN), communication in TTCAN is performed according to a pre-computed, fixed (during system run) schedule that is called as TTCAN System Matrix. Thus, communication performance of TTCAN network is directly related to structure of the system matrix, which makes the design of system matrix a crucial process. The study in this thesis consists of the extended work on the development of a systematic approach for system matrix construction. Methods for periodic message scheduling and an approach for aperiodic message scheduling are proposed with the aim of constructing a feasible system matrix, combining three important aspects: message properties, protocol constraints and system performance requirements in terms of designated performance metrics. Also, system matrix design, analyses and performance evaluation are performed on example message sets with the help of two developed software tools.
APA, Harvard, Vancouver, ISO, and other styles
6

Appel, Matt Andrew. "Security Control Mechanism for Safety Critical Functions Operating on Automotive Controller Area Network." The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1587645195243586.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Theron, Pieter. "Distributed control system network for an electrostatic roll separator." Thesis, Stellenbosch : University of Stellenbosch, 2006. http://hdl.handle.net/10019.1/2709.

Full text
Abstract:
Thesis (MScEng (Electrical and Electronic Engineering))--University of Stellenbosch, 2006.
The distributed control system network involves analog data acquisition nodes interconnected through CAN and USB protocol interfaces to form a network. The network is designed to be generically applicable to various control problems. This network of controllers was specifically utilised on a scaled-down electrostatic roll separator plant used in the mineral processing industry. A SISO and a MIMO regulator was designed to demonstrate the regulation of plant parameters. The MIMO regulator was employed in a scheme that optimises the plant yield automatically. Analog data acquisition nodes were designed and built especially for the purposes of this project. These nodes were installed on the electrostatic roll separator plant. PC based application software was written so that plant ID experiments could be performed. SISO and MIMO regulators along with a yield optimising scheme was designed and implemented in the application software. Both SISO and MIMO regulators successfully regulated plant outputs. The nonconducting mineral product grade was regulated by the SISO regulator. The non-conducting mineral product grade and conductor mineral mass flow was regulated by the MIMO regulator. The yield optimiser successfully employed the MIMO regulator to optimise the plant yield automatically.
APA, Harvard, Vancouver, ISO, and other styles
8

Ford, Walter Davis Gravagne Ian A. "Development and implementation of real-time distributed network with the CAN protocol." Waco, Tex. : Baylor University, 2005. http://hdl.handle.net/2104/2999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Civelek, Utku. "A Software Tool For Vehicle Calibration, Diagnosis And Test Viacontroller Area Network." Master's thesis, METU, 2012. http://etd.lib.metu.edu.tr/upload/12614836/index.pdf.

Full text
Abstract:
Controller Area Networks (CAN&rsquo
s) in vehicles need highly sophisticated software tools to be designed and tested in development and production phases. These tools consume a lot of computer resources and usually have complex user interfaces. Therefore, they are not feasible for vehicle service stations where low-performance computers are used and the workers not very familiar with software are employed. In this thesis, we develop a measurement, calibration, test and diagnosis program -diaCAN- that is suitable for service stations. diaCAN can transmit and receive messages over 3 CAN bus channels. It can display and plot the data received from the bus, import network message and Electronic Control Unit (ECU) configurations, and record bus traffic with standard file formats. Moreover, diaCAN can calibrate ECU values, acquire fault records and test vehicle components with CAN Calibration Protocol functions. All of these capabilities are verified and evaluated on a test bed with real CAN bus and ECUs.
APA, Harvard, Vancouver, ISO, and other styles
10

Musetha, Rendani D. "The design of CAN nodes for minimising cables on the SUNSAT's TCMD system." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/49793.

Full text
Abstract:
Thesis (MScEng)--Stellenbosch University, 2003.
ENGLISH ABSTRACT: The aim of this thesis is to investigate a design of a microcontroller based embedded system that will be used to minimise cable harness on the SUNSAT micro-satellite. The system is called CAN node. The CAN node(s) implements CAN (Controller Area Network) serial bus architecture protocol. The protocol is implemented on the two nodes to transport data from the TCMD tot he 0 ther trays 0 f SUNSAT. CAN node( s) design proj ect focuses on the TCMD tray, because it is the central point for data communication in SUNSAT and it acts as the eyes and hands of the satellite's operator. As a result most of the communication cables are located at this tray. The two nodes are called TX-node and RX-nodes. The TX-node is used to collect data from the TCMD tray and transmits them serially to RX-node. The RX-nodes receives the TCMD data from TX-node and transmits these data to their respective nodes. In application RX-nodes need to be ten, but only one is used for testing purpose. The design had its shortcomings, of which they are discussed in this thesis. The recommendations of an ideal system are also given to elaborate how the system should behave in the real situation. Despite its shortcomings, the CAN node(s) project has successfully proven that cable harness on the TCMD tray of SUNSAT can be minimised by using CAN technology.
AFRIKAANSE OPSOMMING: Die doel van hierdie tesis is om die ontwerp van 'n mikro-beheerder gebaseerde stelsel wat die SUNSA T mikro-satelliet kabel harnas sal verklein, te ondersoek. Die stelsel word die CAN nodus genoem. Die CAN nodus implementeer die CAN (Controller Area Network) bus argitektuur protokol. Die protokol is op twee nodusse geïmplementeer om data vanaf die TCMD na ander laaie van SUNSAT te voer. Die CAN nodus ontwerp fokus op die TCMD laai, want dit is die sentrale punt vir data kommunikasie in SUNSA T en dit tree soos die oog en hande van die satelliet operateur op. As 'n gevolg, is die meeste van die kommunikasie kabels in hierdie laai. Die twee nodusse is genoem TXnodus en RX-nodus. TX-nodus word gebruik om die data van die TCMD af te kollekteer en dan versprei hulle tot hulle onderskeie nodusse. In die toepaslik moet daar tien RX-nodusse wees, maar net een is gebruik terwille van die toets. Die ontwerp het sy eie tekortkomings, wat in hierdie tesis bespreek word. Die rekommendasie van 'n ideale stelsel is ook gemaak om te bewys hoe die stelsel dit in 'n ware situasie moet gedra. Ongeag die tekortkomings daarvan, het die CAN-nodus projek suksesvol bewys dat die kabel harnas in die TCMD laai van SUNSAT kan verminder word deur die gebruik van die CAN tegnologie.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Controller Area Network (Computer network)"

1

Natale, Marco Di. Understanding and using the controller area network communication protocol: Theory and practice. New York: Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Engineers, Society of Automotive, ed. IDB-C data bus: Report on studies for a) Modeling, simulation, and signal analysis, b) EMC/EMI measurements and testing. Warrendale, Pa: Society of Automotive Engineers, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Paret, Dominique. Multiplexed networks for embedded systems: CAN, LIN, flexray, safe-by-wire... Chichester, UK: Wiley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1965-, Jahn Tom, Mescher Peter, Neto Paulo, and International Business Machines Corporation. International Technical Support Organization, eds. SAN Volume Controller V4.3.0 advanced copy services. 2nd ed. [Poughkeepse, NY]: IBM, International Technical Support Organization, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Implementing the IBM system storage SAN volume controller V4.3. 7th ed. [United States?]: IBM, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

David, Hutchison. Local area network architectures. Wokingham, England: Addison-Wesley, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Onvural, Raif O. Local Area Network Interconnection. Boston, MA: Springer US, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

P, Slone John, ed. Local area network handbook. 6th ed. Boca Raton, Fla: Auerbach, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

J, Stang David. Network security. 6th ed. Washington, DC: International Computer Security Association, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Local area network reference. New York: McGraw-Hill Book Co., 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Controller Area Network (Computer network)"

1

Kim, Dong-Seong, and Hoa Tran-Dang. "Communication Using Controller Area Network Protocol." In Computer Communications and Networks, 31–41. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04927-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ivkovic, Nikola, Dario Kresic, Kai-Steffen Hielscher, and Reinhard German. "Verifying Worst Case Delays in Controller Area Network." In Lecture Notes in Computer Science, 91–105. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28540-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shweta, S. Ashtekar, D. Patil Mukesh, and B. Nade Jagdish. "Implementation of Controller Area Network (CAN) Bus (Building Automation)." In Communications in Computer and Information Science, 507–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18440-6_64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Coelho, Maria Anabela. "An analysis of performance of CAN (Controller Area Network) Fieldbus." In Advanced Computer Systems, 207–20. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4419-8530-9_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hridoy, Syed Akib Anwar, and Mohammad Zulkernine. "LaaCan: A Lightweight Authentication Architecture for Vehicle Controller Area Network." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 215–34. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63095-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Azmi, Atiya, Nadia Ishaque, Ammar Abbas, and Safeeullah Soomro. "VCAN-Controller Area Network Based Human Vital Sign Data Transmission Protocol." In Advances in Computer Science, Environment, Ecoinformatics, and Education, 290–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23321-0_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sharmin, Shaila, Hafizah Mansor, Andi Fitriah Abdul Kadir, and Normaziah A. Aziz. "Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network." In Communications in Computer and Information Science, 131–44. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0468-4_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tan, Xiangtian, Chen Zhang, Bo Li, Binbin Ge, and Chen Liu. "Anomaly Detection System of Controller Area Network (CAN) Bus Based on Time Series Prediction." In Lecture Notes in Computer Science, 318–28. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97774-0_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lokman, Siti-Farhana, Abu Talib Othman, Muhamad Husaini Abu Bakar, and Shahrulniza Musa. "The Impact of Different Feature Scaling Methods on Intrusion Detection for in-Vehicle Controller Area Network (CAN)." In Communications in Computer and Information Science, 195–205. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2693-0_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Weik, Martin H. "network controller." In Computer Science and Communications Dictionary, 1085. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12221.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Controller Area Network (Computer network)"

1

Makhlouf, Abdalla, Elsayed Ragab, Bassam Abdelwahab, Ahmed Qotb, Mohamed Alaaeldin, Aiman Mousa, and Mostafa Yacoub. "Design of Low-Cost Mini Controller Area Network." In ASME 2022 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/detc2022-91261.

Full text
Abstract:
Abstract Recently, the development of automotive embedded networks with different communication protocols has drawn the attention of many researchers. Especially, the development of separate onboard add-on systems that communicate with the vehicle network for the aim of enhancing comfort, safety or performance. The current article presents a simplified method for the design of a mini Controller Area Network (CAN) that accomplishes a sample task. The simple network uses the commonly used standard CAN protocol although it’s easily reconfigurable to deal with the extended CAN protocol. The network functionality was chosen to be as simple as transferring data between three CAN nodes, each holding a signal containing a switch status. After stating the network system requirements, the network topology and components list were identified. The circuit design of each node as well as the network design are presented and simulated. The network is built and tested experimentally. The proposed design method enables the use of low cost components that are available in the market. The nodes control programs are reconfigurable to match the target research vehicle network configurations. The proposed design method provides a handy tool for researchers that require utilizing a CAN protocol communication circuit that gathers information from any vehicle platform.
APA, Harvard, Vancouver, ISO, and other styles
2

Pesé, Mert D., Jay W. Schauer, Junhui Li, and Kang G. Shin. "S2-CAN: Sufficiently Secure Controller Area Network." In ACSAC '21: Annual Computer Security Applications Conference. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3485832.3485883.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ng, Wei Lun, Chee Kyun Ng, Nor Kamariah Noordin, Fakhrul Zaman Rokhani, and Borhanuddin Mohd Ali. "Home appliances controller using wireless controller area network (WCAN) system." In 2010 International Conference on Computer and Communication Engineering (ICCCE). IEEE, 2010. http://dx.doi.org/10.1109/iccce.2010.5556759.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dahalan, Amira Sarayati Ahmad, Abdul Rashid Husain, Mohd Badril Nor shah, and Muhammad Iqbal Zakaria. "Time Delay Analysis in Networked Control System Based Controller Area Network." In First International Conference on Advances in Computer and Information Technology. Singapore: Research Publishing Services, 2012. http://dx.doi.org/10.3850/978-981-07-3161-8_acit-249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang Ying and Yin Gang. "An intelligent instrument based on controller area network (CAN)." In 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccsit.2010.5563581.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Akpinar, Murat, Klaus Werner Schmidt, and Ece Guran Schmidt. "Improved Clock Synchronization Algorithms for the Controller Area Network (CAN)." In 2019 28th International Conference on Computer Communication and Networks (ICCCN). IEEE, 2019. http://dx.doi.org/10.1109/icccn.2019.8846935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Piao, Chang-hao, Lu Chen, and Ju Cao. "A design for Controller Area Network bus real-time monitoring system." In 2011 International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2011. http://dx.doi.org/10.1109/iccsnt.2011.6182276.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Desta, Araya Kibrom, Shuji Ohira, Ismail Arai, and Kazutoshi Fujikawa. "U-CAN: A Convolutional Neural Network Based Intrusion Detection for Controller Area Networks." In 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2022. http://dx.doi.org/10.1109/compsac54236.2022.00235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tian-tong Zhou and Zheng-hua Ma. "The monitoring system of CH4's thickness based on controller area network." In 2010 2nd International Conference on Computer Engineering and Technology. IEEE, 2010. http://dx.doi.org/10.1109/iccet.2010.5485975.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rao, Amith Kaushal, and Haibo Zeng. "Online message delay prediction for model predictive control over controller area network." In 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, 2017. http://dx.doi.org/10.1109/iccad.2017.8203776.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Controller Area Network (Computer network)"

1

Terry, D. J. Advanced CAN (Controller Area Network) Tool. Office of Scientific and Technical Information (OSTI), March 2000. http://dx.doi.org/10.2172/752339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zarkesh-Ha, Payman. STIMULUS: End-System Network Interface Controller for 100 Gb/s Wide Area Networks. Office of Scientific and Technical Information (OSTI), September 2014. http://dx.doi.org/10.2172/1156586.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wen, Jesse. End-System Network Interface Controller for 100 Gb/s Wide Area Networks: Final Report. Office of Scientific and Technical Information (OSTI), August 2013. http://dx.doi.org/10.2172/1091514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nechaev, V., Володимир Миколайович Соловйов, and A. Nagibas. Complex economic systems structural organization modelling. Politecnico di Torino, 2006. http://dx.doi.org/10.31812/0564/1118.

Full text
Abstract:
One of the well-known results of the theory of management is the fact, that multi-stage hierarchical organization of management is unstable. Hence, the ideas expressed in a number of works by Don Tapscott on advantages of network organization of businesses over vertically integrated ones is clear. While studying the basic tendencies of business organization in the conditions of globalization, computerization and internetization of the society and the results of the financial activities of the well-known companies, the authors arrive at the conclusion, that such companies, as IBM, Boeing, Mercedes-Benz and some others companies have not been engaged in their traditional business for a long time. Their partner networks performs this function instead of them. The companies themselves perform the function of system integrators. The Tapscott’s idea finds its confirmation within the framework of a new powerful direction of the development of the modern interdisciplinary science – the theory of the complex networks (CN) [2]. CN-s are multifractal objects, the loss of multifractality being the indicator of the system transition from more complex state into more simple state. We tested the multifractal properties of the data using the wavelet transform modulus maxima approach in order to analyze scaling properties of our company. Comparative analysis of the singularity spectrumf(®), namely, the difference between maximum and minimum values of ® (∆ = ®max ¡ ®min) shows that IBM company is considerably more fractal in comparison with Apple Computer. Really, for it the value of ∆ is equal to 0.3, while for the vertically integrated company Apple it only makes 0.06 – 5 times less. The comparison of other companies shows that this dependence is of general character. Taking into consideration the fact that network organization of business has become dominant in the last 5-10 years, we carried out research for the selected companies in the earliest possible period of time which was determined by the availability of data in the Internet, or by historically later beginning of stock trade of computer companies. A singularity spectrum of the first group of companies turned out to be considerably narrower, or shifted toward the smaller values of ® in the pre-network period. The latter means that dynamic series were antipersistant. That is, these companies‘ management was rigidly controlled while the impact of market mechanisms was minimized. In the second group of companies if even the situation did changed it did not change for the better. In addition, we discuss applications to the construction of portfolios of stock that have a stable ratio of risk to return.
APA, Harvard, Vancouver, ISO, and other styles
5

LI, Zhendong, Hangjian Qiu, xiaoqian Wang, chengcheng Zhang, and Yuejuan Zhang. Comparative Efficacy of 5 non-pharmaceutical Therapies For Adults With Post-stroke Cognitive Impairment: Protocol For A Bayesian Network Analysis Based on 55 Randomized Controlled Trials. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, June 2022. http://dx.doi.org/10.37766/inplasy2022.6.0036.

Full text
Abstract:
Review question / Objective: This study will provide evidence-based references for the efficacy of 5 different non-pharmaceutical therapies in the treatment of post-stroke cognitive impairment(PSCI). 1. Types of studies. Only randomized controlled trials (RCTs) of Transcranial Magnetic Stimulation(TMS), Transcranial Direct Current Stimulation(tDCS), Acupuncture, Virtual Reality Exposure Therapy(VR) and Computer-assisted cognitive rehabilitation(CA) for PSCI will be recruited. Additionally, Studies should be available in full papers as well as peer reviewed and the original data should be clear and adequate. 2. Types of participants. All adults with a recent or previous history of ischaemic or hemorrhagic stroke and diagnosed according to clearly defined or internationally recognized diagnostic criteria, regardless of nationality, race, sex, age, or educational background. 3.Types of interventions and controls. The control group takes non-acupuncture treatment, including conventional rehabilitation or in combination with symptomatic support therapy. The experimental group should be treated with acupuncture on basis of the control group. 4.The interventions of the experimental groups were Transcranial Magnetic Stimulation(TMS), Transcranial Direct Current Stimulation(tDCS), Acupuncture, Virtual Reality Exposure Therapy(VR) or Computer-assisted cognitive rehabilitation(CA), and the interventions of the control group takes routine rehabilitation and cognition training or other therapies mentioned above that were different from the intervention group. 5.Types of outcomes. The primary outcomes are measured with The Mini-Mental State Examination (MMSE) and/or The Montreal Cognitive Assessment Scale (MoCA), which have been widely used to evaluate the cognitive abilities. The secondary outcome indicator was the Barthel Index (BI) to assess independence in activities of daily living (ADLs).
APA, Harvard, Vancouver, ISO, and other styles
6

Taiber, Joachim. Unsettled Topics Concerning the Impact of Quantum Technologies on Automotive Cybersecurity. SAE International, December 2020. http://dx.doi.org/10.4271/epr2020026.

Full text
Abstract:
Quantum computing is considered the “next big thing” when it comes to solving computational problems impossible to tackle using conventional computers. However, a major concern is that quantum computers could be used to crack current cryptographic schemes designed to withstand traditional cyberattacks. This threat also impacts future automated vehicles as they become embedded in a vehicle-to-everything (V2X) ecosystem. In this scenario, encrypted data is transmitted between a complex network of cloud-based data servers, vehicle-based data servers, and vehicle sensors and controllers. While the vehicle hardware ages, the software enabling V2X interactions will be updated multiple times. It is essential to make the V2X ecosystem quantum-safe through use of “post-quantum cryptography” as well other applicable quantum technologies. This SAE EDGE™ Research Report considers the following three areas to be unsettled questions in the V2X ecosystem: How soon will quantum computing pose a threat to connected and automated vehicle technologies? What steps and measures are needed to make a V2X ecosystem “quantum-safe?” What standardization is needed to ensure that quantum technologies do not pose an unacceptable risk from an automotive cybersecurity perspective?
APA, Harvard, Vancouver, ISO, and other styles
7

Tayeb, Shahab. Protecting Our Community from the Hidden Vulnerabilities of Today’s Intelligent Transportation Systems. Mineta Transportation Institute, May 2022. http://dx.doi.org/10.31979/mti.2022.2132.

Full text
Abstract:
The ever-evolving technology interwoven into the transportation industry leaves it frequently at risk for cyber-attacks. This study analyzes the security of a common in-vehicle network, the Controller Area Network (CAN), standard in most vehicles being manufactured today. Like many other networks, CAN comes with inherent vulnerabilities that leave CAN implementations at risk of being targeted by cybercriminals. Such vulnerabilities range from eavesdropping, where the attacker can read the raw data traversing the vehicle, to spoofing, where the attacker can place fabricated traffic on the network. The research team initially performed a simulation of CAN traffic generation followed by hardware implementation of the same on a test vehicle. Due to the concealed and untransparent nature of CAN, the team reverse-engineered the missing parameters through a series of passive "sniffing attacks" (attacks using data reading utilities called packet sniffers) on the network and then demonstrated the feasibility of the attack by placing fabricated frames on the CAN.
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Howell, Enrique Saldivar-Carranza, Jijo K. Mathew, Woosung Kim, Jairaj Desai, Timothy Wells, and Darcy M. Bullock. Extraction of Vehicle CAN Bus Data for Roadway Condition Monitoring. Purdue University, 2020. http://dx.doi.org/10.5703/1288284317212.

Full text
Abstract:
Obtaining timely information across the state roadway network is important for monitoring the condition of the roads and operating characteristics of traffic. One of the most significant challenges in winter roadway maintenance is identifying emerging or deteriorating conditions before significant crashes occur. For instance, almost all modern vehicles have accelerometers, anti-lock brake (ABS) and traction control systems. This data can be read from the Controller Area Network (CAN) of the vehicle, and combined with GPS coordinates and cellular connectivity, can provide valuable on-the-ground sampling of vehicle dynamics at the onset of a storm. We are rapidly entering an era where this vehicle data can provide an agency with opportunities to more effectively manage their systems than traditional procedures that rely on fixed infrastructure sensors and telephone reports. This data could also reduce the density of roadway weather information systems (RWIS), similar to how probe vehicle data has reduced the need for micro loop or side fire sensors for collecting traffic speeds.
APA, Harvard, Vancouver, ISO, and other styles
9

Parker, Michael, Alex Stott, Brian Quinn, Bruce Elder, Tate Meehan, and Sally Shoop. Joint Chilean and US mobility testing in extreme environments. Engineer Research and Development Center (U.S.), November 2021. http://dx.doi.org/10.21079/11681/42362.

Full text
Abstract:
Vehicle mobility in cold and challenging terrains is of interest to both the US and Chilean Armies. Mobility in winter conditions is highly vehicle dependent with autonomous vehicles experiencing additional challenges over manned vehicles. They lack the ability to make informed decisions based on what they are “seeing” and instead need to rely on input from sensors on the vehicle, or from Unmanned Aerial Systems (UAS) or satellite data collections. This work focuses on onboard vehicle Controller Area Network (CAN) Bus sensors, driver input sensors, and some externally mounted sensors to assist with terrain identification and overall vehicle mobility. Analysis of winter vehicle/sensor data collected in collaboration with the Chilean Army in Lonquimay, Chile during July and August 2019 will be discussed in this report.
APA, Harvard, Vancouver, ISO, and other styles
10

Balali, Vahid, Arash Tavakoli, and Arsalan Heydarian. A Multimodal Approach for Monitoring Driving Behavior and Emotions. Mineta Transportation Institute, July 2020. http://dx.doi.org/10.31979/mti.2020.1928.

Full text
Abstract:
Studies have indicated that emotions can significantly be influenced by environmental factors; these factors can also significantly influence drivers’ emotional state and, accordingly, their driving behavior. Furthermore, as the demand for autonomous vehicles is expected to significantly increase within the next decade, a proper understanding of drivers’/passengers’ emotions, behavior, and preferences will be needed in order to create an acceptable level of trust with humans. This paper proposes a novel semi-automated approach for understanding the effect of environmental factors on drivers’ emotions and behavioral changes through a naturalistic driving study. This setup includes a frontal road and facial camera, a smart watch for tracking physiological measurements, and a Controller Area Network (CAN) serial data logger. The results suggest that the driver’s affect is highly influenced by the type of road and the weather conditions, which have the potential to change driving behaviors. For instance, when the research defines emotional metrics as valence and engagement, results reveal there exist significant differences between human emotion in different weather conditions and road types. Participants’ engagement was higher in rainy and clear weather compared to cloudy weather. More-over, engagement was higher on city streets and highways compared to one-lane roads and two-lane highways.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography