Journal articles on the topic 'Car security'

To see the other types of publications on this topic, follow the link: Car security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Car security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bedarkar, Poonam, and Atul Halmare. "Security System for Car using CAN Protocol." International Journal of Trend in Scientific Research and Development Volume-2, Issue-2 (February 28, 2018): 4–8. http://dx.doi.org/10.31142/ijtsrd8272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Strandberg, Kim, Tomas Olovsson, and Erland Jonsson. "Securing the Connected Car: A Security-Enhancement Methodology." IEEE Vehicular Technology Magazine 13, no. 1 (March 2018): 56–65. http://dx.doi.org/10.1109/mvt.2017.2758179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sirichai, Poonsak, Somkuan Kaviya, and Preecha P. Yupapin. "Smart car with security camera for homeland security." Procedia - Social and Behavioral Sciences 2, no. 1 (2010): 58–61. http://dx.doi.org/10.1016/j.sbspro.2010.01.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nath, Hirak Jyoti. "Smart Car Prevention and Security." International Journal for Research in Applied Science and Engineering Technology 6, no. 3 (March 31, 2018): 2142–46. http://dx.doi.org/10.22214/ijraset.2018.3336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Beringer, Nicole. "The connected car security boundaries." ATZ worldwide 115, no. 10 (September 14, 2013): 22–27. http://dx.doi.org/10.1007/s38311-013-0111-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, De Min. "Elevator Smart Security System." Advanced Materials Research 403-408 (November 2011): 2247–50. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2247.

Full text
Abstract:
The elevator smart security system provides a good method to access the elevator car buttons. It uses contactless smart card to active the car buttons. Only after brushing the authorized card, the car buttons can be selected, so the passenger can take the elevator to his home floor. Visitor can take the elevator via a visitor automatic controller not using card.
APA, Harvard, Vancouver, ISO, and other styles
7

Zuhair, Ahmed, Mansoor Ali, and Ali Al-Humairi. "Intelligent Car Security System Microcontroller based." International Journal of Applied Information Systems 8, no. 3 (February 5, 2015): 7–12. http://dx.doi.org/10.5120/ijais15-451293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gorbenko, I. D., and D. Fesenko. "Using BLOCKCHAIN in automotive security." Radiotekhnika, no. 203 (December 23, 2020): 97–108. http://dx.doi.org/10.30837/rt.2020.4.203.09.

Full text
Abstract:
The analysis of problems of using authentication systems for automobile systems is carried out. It is shown that criminals are increasingly interested in modern car protection systems, cars are becoming more technological, which in turn opens up new opportunities for compromising the operation of vehicle components and systems, so security systems are increasingly required to ensure efficiency and safety. Modern systems of protection against illegal seizure of vehicles, better known as "alarms" try to deter attacks by intruders, but in turn can bring additional backdoors for intruders completely unintentionally, for example by adding an interesting feature to the car system, and then this feature can be dual due to problems with the authentication system. Therefore, based on this, car security systems must have the highest level of authentication security, which requires the use of a decentralized blockchain network with nodes for each car, authenticating the user in groups, this will move away from the standard client-server architecture, which is not sufficiently secure. . The main ways to solve this problem are to build a comprehensive security system, which in turn includes an improved and reliable authentication measure based on a decentralized blockchain network and two comprehensive schemes to update the critical data transmission system of the car – CAN network. The use of these systems will improve the security of the identification system and information flowing between critical units, which will improve the safety of the car from theft, as well as from the ability of attackers to create emergencies remotely.
APA, Harvard, Vancouver, ISO, and other styles
9

Abdullah, Jiwa. "The Design of Mobile Control Car Security System." International Journal of Engineering and Technology 3, no. 3 (2011): 254–62. http://dx.doi.org/10.7763/ijet.2011.v3.234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Loko, A. Z., A. I. Bugaje, and Usman Abdullahi. "Microcontroller Based Smart Card Car Security System." International Journal of Engineering Trends and Technology 29, no. 3 (November 25, 2015): 150–53. http://dx.doi.org/10.14445/22315381/ijett-v29p228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Zheglov, L. F., and A. B. Fominykh. "The Choice of Evaluation Vibration Car Security." Mechanical Engineering and Computer Science, no. 12 (February 11, 2019): 1–14. http://dx.doi.org/10.24108/1218.0001441.

Full text
Abstract:
In the presented material of the article the debatable question - a question of a choice of the field of mathematical modeling of system of vibration isolation of the car is considered. It is known that such a problem can be solved in the frequency and time domain. Since the primary vibration isolation system of the car has non-linear elements, the question arises: how does the solution of the linearized dynamic system in the frequency domain correspond to the data of calculations of the accepted indicators in the time domain? The problem is solved with a random kinematic perturbation from the road surface. Therefore, when working in the time domain, it is necessary to pre-select the method of statistical linearization from the known in practice design of automatic control systems.Four methods of statistical linearization, using which calculations were carried out in the frequency domain, are considered. For a similar dynamic system with its initial and statistically linearized nonlinear elements, calculations were carried out in the time domain. It is shown that the first method of statistical linearization is the most adaptive, according to the amplitude-frequency characteristics of the system. Such calculations were carried out for two surfaces corresponding to the cobblestone and dirt road at different speeds of the car.The analysis of the calculated amplitude-frequency characteristics was carried out for the "resonant" speed of motion, at which the greatest manifestation of the system nonlinearity takes place. When driving in this mode, the system significantly increases the probability of losing contact with the tire support surface. This violates the safety of the vehicle and the system is out of the vibration safety analysis area. Especially this phenomenon is observed when driving on a dirt road at a "resonant" speed. The final results of the calculations are separate-frequency and integral parameters. The latter do not give priority in the selection of the area of calculation, provided the safety of the vehicle.Thus, it can be concluded that the adequacy of the calculations in the frequency and time domain under really specified conditions of the vehicle on the corresponding road surface. However, testing of the problem to be solved, for example, by the eigenfrequency vector of a conservative system, is advisable to be carried out in the frequency domain.
APA, Harvard, Vancouver, ISO, and other styles
12

Abdulhamid, Mohanad, and Achiki Matongo. "Car Security System Based on Raspberry Pi." Scientific Bulletin of Electrical Engineering Faculty 20, no. 1 (April 1, 2020): 22–24. http://dx.doi.org/10.2478/sbeef-2020-0104.

Full text
Abstract:
AbstractStatistics show that there is an increase in production of cars every year worldwide. Similarly, there is an increase in car theft attempts and carjacking cases worldwide. This paper is meant to increase the user’s situational awareness. The user is able to check for surrounding of the vehicle and judge for himself/ herself before approaching the vehicle. Raspberry Pi is used as the controller in this paper. A Universal Serial Bus (USB) webcam plugged into the Raspberry Pi enables the user to view the images captured in real time by use of an application installed on the user’s smartphone.
APA, Harvard, Vancouver, ISO, and other styles
13

Ceresnak, Roman, Michal Kvet, and Karol Matiasko. "Increasing Security of Database During Car Monitoring." Transportation Research Procedia 55 (2021): 118–25. http://dx.doi.org/10.1016/j.trpro.2021.06.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Medelec, N. A. "Modern trends in car security systems development." Izvestiya MGTU MAMI 6, no. 2-1 (January 20, 2012): 255–60. http://dx.doi.org/10.17816/2074-0530-68518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Tawfeek, M., S. Shedid, I. El-Sherif, and Y. Hendawy. "INTEGRATION OF CAR SECURITY LEVELS USING TRANSPONDER KEY: DOUBLE IDENTIFICATION CAR CODE." International Conference on Applied Mechanics and Mechanical Engineering 15, no. 15 (May 1, 2012): 1–9. http://dx.doi.org/10.21608/amme.2012.37255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Marawako, Jonah. "Reflecting on the Impacts of the 2013 coup in Central Africa Republic on Economic Security." International Journal of Scientific Research and Management 10, no. 02 (February 16, 2022): 940–58. http://dx.doi.org/10.18535/ijsrm/v10i2.sh02.

Full text
Abstract:
This article aims to provide a concise overview of the impacts of the 2013 coup in Central Africa Republic (CAR) on human security with particular emphasis on economic security. CAR is a serial coup country and has been rocked by five successful military coups since its independence from France in 1960. The 2013 coup in CAR was the worst one as it ignited human catastrophe and a nosedive economy. The study is incentivised by the fact that although CAR has been a hippodrome of putsch there is scant in literature auditing how the coups affected human security. In order to have a better understanding of the phenomenon under investigation this study interrogates the concepts of coup and human security. The concept of human security has seven dimension and economic security is the major dimension of human security, hence this paper distinctly shows how the 2013 coup in CAR affected economic security and not the other six dimensions of human security which are food, political, personal, environmental, health and community security. The study observed that the 2013 coup resulted in the withdrawal of donors and investors and this resulted into low foreign direct investment. The coup also exposed the countries to external economic shocks which adversely affected the economy. The intrusion of rebel groups in the countries had negative economic ramification such as destruction of infrastructure and wanton looting and pillaging. The study used qualitative research instruments and documentary search was the primary method of collecting data.
APA, Harvard, Vancouver, ISO, and other styles
17

Lu, Hua Chen. "Study on Security Analysis and Management of Motor Based on Fuzzy Theory." Advanced Materials Research 591-593 (November 2012): 692–96. http://dx.doi.org/10.4028/www.scientific.net/amr.591-593.692.

Full text
Abstract:
Technique problems on motor security analysis and management are solved based on fuzzy theory. Combining such theory with present research of car engine structure and its related technique, based on abroad investigation of car engine malfunctions, index system suitable for motor engine security analysis is developed and fuzzy theory, a mature theory in the management science is induced in the security analysis. In the study, method and techniques for car engine security analysis and management are proposed. The real case proves that this index system and analytical technique are applicable, the analytical result could be used as theoretical references for security management, production manufacture and improvement, it could be used for analyzing similar automobile products.
APA, Harvard, Vancouver, ISO, and other styles
18

Horowitz, Jonathan. "United Nations Security Council Resolution 2339." International Legal Materials 56, no. 5 (October 2017): 1041–53. http://dx.doi.org/10.1017/ilm.2017.34.

Full text
Abstract:
On January 27, 2017, the UN Security Council unanimously adopted Resolution 2339 to extend by one year the mandate of a sanctions regime to address protracted violence, insecurity, and political turmoil in the Central African Republic (CAR). Three years after the Council first imposed the regime under Resolution 2127 (2013), the Council's adoption of Resolution 2339 made it clear that the situation in CAR continued to require a robust sanctions regime, that sexual violence in CAR needed heightened political attention, and that states should improve the ways they enforce the sanctions regime's travel ban. Similar to its predecessor resolutions, Resolution 2339 included certain limitations aimed at making the sanctions targeted and humane. But, as has been the case with sanctions regimes aimed at other countries, this one suffered from a lack of due process guarantees for ensuring the protection of the human rights of the people and entities that were punished for noncompliance.
APA, Harvard, Vancouver, ISO, and other styles
19

Sathyaraj, Sandesh Mysore, Venkatachalam Valliappan, and Ajith Kumar Rajendra. "WEB BASED 2WD ROBOTIC CAR FOR SECURITY APPLICATIONS." International Journal of Advanced Scientific Technologies in Engineering and Management Sciences 5, no. 8 (August 10, 2019): 5. http://dx.doi.org/10.22413/ijastems/2019/v5/i8/49612.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Sadhukhan, Sayantam, Aritra Acharyya, and Rajendra Prasad. "Car Security System using Fingerprint scanner and IOT." Indian Journal of Science and Technology 10, no. 40 (December 9, 2017): 1–4. http://dx.doi.org/10.17485/ijst/2017/v10i40/109854.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Shaw, Daniel, and Ken Pease. "Car security and the decision to recommend purchase." Crime Prevention and Community Safety 12, no. 2 (March 17, 2010): 91–98. http://dx.doi.org/10.1057/cpcs.2010.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Ding, Yanjun, Wei Shen, Shuhong Yang, Weijian Han, and Qinhu Chai. "Car dieselization: A solution to China's energy security?" Energy Policy 62 (November 2013): 540–49. http://dx.doi.org/10.1016/j.enpol.2013.06.079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Mazlan, Muhammad Syamil, Isredza Rahmi A Hamid, and Hazalila Kamaludin. "Radio Frequency Identification (RFID) Based Car Parking System." JOIV : International Journal on Informatics Visualization 2, no. 4-2 (September 10, 2018): 318. http://dx.doi.org/10.30630/joiv.2.4-2.173.

Full text
Abstract:
Radio Frequency Identification (RFID) technology is widely used in various applications such as attendance system, tracking system, monitoring system or parking system. Currently, the existing parking system used manual entrance through security guard to access the premise. Therefore, the company need to hire security guard to monitor the premise. In addition, the security guards need to monitor all movement of vehicle or person that enter or leave the premise. As a result, unauthorized vehicle or person can easily access the building. To address this problem, we proposed a parking system using RFID technology that can monitor vehicle’s movement that enter or leave the specific area or place by scanning the RFID tag. The potential benefit is it can improve security for both security guards and users. Besides that, this parking system can facilitate access control for users and improve traffic flow during peaks period. There are five modules in the proposed parking systems which are user registration, vehicle registration, RFID tag, staff and report generation.
APA, Harvard, Vancouver, ISO, and other styles
24

Mudda, Mallikarjun, D. Vamshi Krishna, B. V. Ramana Reddy, and R. Sampath Mahendra. "Advanced Vehicle Security System." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 2057–61. http://dx.doi.org/10.22214/ijraset.2022.40981.

Full text
Abstract:
Abstract: This most important & goal of this proposed venture work is an try to layout a complicated car security utility which could discover automobile accident detection and hearth detection alert can ship the info over GSM to authorized persons. In gift present security models, there's no such automation machine for you to ship alert to the consumer while an coincidence is meet or if it receives stuck with fireplace. It could be very difficult to perceive the automobile in this example we are featuring the brand new safety machine for four wheelers, with a purpose to have given protection to the car. In this gadget, the vehicle will have Position sensor and bump sensors inside the vehicle to discover the vehicle coincidence and we have a temperature sensor to stumble on engine overheating and alert the consumer inside the automobile with buzzer sound and an alert is dispatched over GSM module. The entire safety gadget is controlled with Arduino UNO board. This entire system is designed deliberating the low variety motors to offer them excessive protection. Keywords: GSM module, fire detection, Accident detection, bump sensor.
APA, Harvard, Vancouver, ISO, and other styles
25

Abdul Samad, Shakeeb M. A. N., Fahri Heltha, and M. Faliq. "The Study of Plate Number Recognition for Parking Security System." International Journal of Advanced Technology in Mechanical, Mechatronics and Materials 1, no. 3 (December 31, 2020): 100–107. http://dx.doi.org/10.37869/ijatec.v1i3.34.

Full text
Abstract:
Car Plate Number Recognition System is an important platform that can be used to identify a car vehicle identity. The Recognition System is based on image processing techniques and computer vision. A webcam is used to capture an image of the car plate number from different distance, and the identification is conducted through four processes of stages: Image Acquisition Pre-processing, Extraction, Segmentation, and Character Recognition. The Acquisition Pre-processing stage is extracted the region of interest of the image. The image is captured by live video of the webcam, then converted to grayscale and binary image. The Extraction stage is extracted the plate number characters from binary image using a connected components method. In the Segmentation stage is done by implementing horizontal projection as well as moving average filter. Lastly, in the Character Recognition, is used to identify the segmented characters of the plate number using optical character recognition. The proposed method is worked well for Malaysian's private cars plate number, and can be implemented in car park system to increase level of security of the system by confirming the bar code of the parking ticket and the plate number of the car at the incoming and outgoing gates.
APA, Harvard, Vancouver, ISO, and other styles
26

Kent, Jennifer. "Ontological Security and Private Car Use in Sydney, Australia." Sociological Research Online 21, no. 2 (May 2016): 37–50. http://dx.doi.org/10.5153/sro.3860.

Full text
Abstract:
Successful promotion of alternative transport modes needs to be underpinned by better understandings of a seemingly cemented collective preference for private car use. This paper contributes to these understandings and proposes that automobility's dominance can be explained by a series of benefits intimately linked to the car. These benefits extend beyond those associated with utilitarian factors such as saving time. The concept of ontological security is used to propose that attachments to the private car are underpinned by an innate desire for predictability, autonomy and acceptance in modern lives increasingly characterised by insecurity. Empirical evidence on the journey to work in Australia's largest city, Sydney, is applied to examine the way mobility is practised and inform the paper's central proposition.
APA, Harvard, Vancouver, ISO, and other styles
27

Li, Wei Bing, and Xin Na Wang. "Designing of Detecting and Measurement System for Car Security Based on Supersonic Principle." Advanced Materials Research 179-180 (January 2011): 1346–49. http://dx.doi.org/10.4028/www.scientific.net/amr.179-180.1346.

Full text
Abstract:
this paper designed and developed a car tyre leakage detective system based on the mechanism of supersonic produced when a car tyre leak, by adopting DSP TMS320LF240X MPU technology of TI company. This system is very valuable in detecting the running car tyre leakage in time to enhance the security, experiences shows it’s with high reliability and performance.
APA, Harvard, Vancouver, ISO, and other styles
28

Naeem Yasir, Muntadher, and Muayad Sadik Croock. "Multi-level cyber security system for VANET." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 2 (August 1, 2020): 940. http://dx.doi.org/10.11591/ijeecs.v19.i2.pp940-948.

Full text
Abstract:
<p>Recently, the cyber security of vehicular ad-hoc network (VANET) including two practicable: car-to-car and car-to-infrastructure has been considered due to importance. It has become possible to keep pace with the development in the world, where the safety of people is a priority in the development of technology in general and in particular in the field of VANET. In this paper, a cyber security system for VANET has been proposed to tackle the DOS attacks. The proposed system includes three security levels. Firstly, the registeration level that ask vehicles to be registered in the system, in which the network exclude the unrigestered ones. Secondly, the authentication level that checks the vehicles before joining the network. This is done by applying a proposed algorithm that considers the hash function and factory number. Thirdly, the proposed system ables to detect the DOS attack by any involved vehicle using the monitoring algorithm that allocate such vehicle to be excluded from the network. The obtained results show the efficient performance of the proposed system in managing the security of the VANET network. The multi-level system increases the security of the network, in which the attacks can be eliminated.</p>
APA, Harvard, Vancouver, ISO, and other styles
29

Hao, Jingjing, and Guangsheng Han. "On the Modeling of Automotive Security: A Survey of Methods and Perspectives." Future Internet 12, no. 11 (November 16, 2020): 198. http://dx.doi.org/10.3390/fi12110198.

Full text
Abstract:
As the intelligent car-networking represents the new direction of the future vehicular development, automotive security plays an increasingly important role in the whole car industry chain. On condition that the accompanying problems of security are proofed, vehicles will provide more convenience while ensuring safety. Security models can be utilized as tools to rationalize the security of the automotive system and represent it in a structured manner. It is essential to improve the knowledge about security models by comparing them besides proposing new methods. This paper aims to give a comprehensive introduction to the topic of security models for the Intelligent Transport System (ITS). A survey of the current methodologies for security modeling is conducted and a classification scheme is subsequently proposed. Furthermore, the existing framework and methods to build automotive security models are broadly examined according to the features of automotive electronic system. A number of fundamental aspects are defined to compare the presented methods in order to comprehend the automotive security modeling in depth.
APA, Harvard, Vancouver, ISO, and other styles
30

Sirichai, Poonsak, Somkuan Kaviya, Yusaku Fujii, and Preecha P. Yupapin. "Smart Car with Security Camera for Road Accidence Monitoring." Procedia Engineering 8 (2011): 308–12. http://dx.doi.org/10.1016/j.proeng.2011.03.057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Rahmat, R. F., M. P. Loi, S. Faza, D. Arisandi, and R. Budiarto. "Facial Recognition for Car Security System Using Fisherface Method." Journal of Physics: Conference Series 1235 (June 2019): 012119. http://dx.doi.org/10.1088/1742-6596/1235/1/012119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Tranter, Kieran. "The Car as Avatar in Australian Social Security Decisions." International Journal for the Semiotics of Law - Revue internationale de Sémiotique juridique 27, no. 4 (November 30, 2013): 713–34. http://dx.doi.org/10.1007/s11196-013-9342-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Santoso, Mega Putra Yogia. "Central Lock Car Security System Design Using E-KTP Identification." Jurnal Jartel: Jurnal Jaringan Telekomunikasi 9, no. 4 (December 25, 2019): 1–7. http://dx.doi.org/10.33795/jartel.v9i4.139.

Full text
Abstract:
Currently, most motorized vehicle safety technologies, especially cars, still rely heavily on the manufacturer's default safety system from the car system itself. By using a security system from the factory default there are still shortcomings because a motorized vehicle or car can still be used by anyone and there is no age limit in its use. For that, we need a car safety system that is able to prevent the occurrence of car theft and underage drivers. The purpose of this research is to design a central lock security system for motor vehicles, especially cars, using e-KTP identification to improve the security system and reduce underage drivers. For the identification process of e-KTP ID using the RFID reader MFRC522. The RFID reader is connected to the Arduino Nano as a controller. The results of the research used the RFID reader to read e-KTP ID in a vertical and horizontal position with a distance of less than 12 mm. When there is an acrylic barrier and a glass barrier the maximum reading distance is less than 9 mm and the plate barrier cannot be read. The existence of obstacles makes reading the e-KTP card will be reduced.
APA, Harvard, Vancouver, ISO, and other styles
34

Tian, Ai Qin, and Hao Dong. "Reliability Assessment for Load Bearing Underframe on Car Body." Applied Mechanics and Materials 633-634 (September 2014): 1206–12. http://dx.doi.org/10.4028/www.scientific.net/amm.633-634.1206.

Full text
Abstract:
The security assessment of large underframe on car body is proposed through the SINTAP/FITNET method and with the help of numerical simulation technology of finite element based on some EMU powered car in service at present. The security and reliability of the underframe structure is predicted. The defect tolerance that the underframe is ‘fitness for service’ is put forward in this paper. The result shows that the crack shape a/c has little impact on the security with the semielliptic surface cracks assumption. In addition, the security assessment on dangerous areas and critical crack sizes are acquired based on the assumption a/c=0.2. The critical crack sizes of the dangerous area 1, area 2 and area 3 are about 5 to 5.5 millimeters, while the unilateral penetrate crack size of the area 4 reaches 40 millimeters. The structures are suit for service as the risk of brittle failure is extremely small.
APA, Harvard, Vancouver, ISO, and other styles
35

Abd, Nuha, Khattab M. Ali Alheeti, and Salah Sleibi Al-Rawi. "Intelligent Intrusion Detection System in Internal Communication Systems for Driverless Cars." Webology 17, no. 2 (December 21, 2020): 376–93. http://dx.doi.org/10.14704/web/v17i2/web17039.

Full text
Abstract:
The modern car is a complicated system consisting of Electronic Control Units (ECUs) with engines, detectors and wired and wireless communication protocols, that communicate through different types of intra-car networks. The cyber-physical design relies on this ECU network that has been susceptible to several kinds of attacks using wireless, internal and external access. The internal network contains several security vulnerabilities that make it possible to launch attacks via buses and propagation over the entire ECU network, therefore anomaly detection technology, which represents the security protection, can efficiently reduce security threats. So, this paper proposes new Intrusion Detection System (IDS) using the Artificial Neural Network (ANN) to monitor the state of the car by information collected from internal buses and to achieve security, safety of the internal network The parameters building the ANN structure are trained CAN packet information to devise the fundamental statistical attribute of normal and attacking packets and in defense, extracted the related attribute to classify the attack. Experimental evaluation on Open Car Test-Bed and Network Experiments (OCTANE) show that the proposed IDS achieves acceptable performance in terms of intrusions detection. Results show its capability to detect attacks with false-positive rate of 1.7 %, false-negative rate 24.6 %, and average accuracy of 92.10 %.
APA, Harvard, Vancouver, ISO, and other styles
36

Sun, Xi Long, Deng Feng Wang, and Fang Lu. "Structure Improvement and Experiment Validation for a Car Side Impact." Applied Mechanics and Materials 224 (November 2012): 133–37. http://dx.doi.org/10.4028/www.scientific.net/amm.224.133.

Full text
Abstract:
A side impact simulation model for a car was built according to China New Car Assessment Programme(CNCAP) and the 120ms response of the side impact was calculated by Pam-Crash software. The side security performance of base model was evaluated with the assessment criteria for the side security which was defined base on the experience and development requirement. Because of the stiffness insufficiency of base model, the body side structure was improved by multiple optimizations to improve the side security performance of body-in-white. The optimal scheme was validated by the test results, and the side security performance satisfies the production development requirements. The reliability and accuracy of the side impact model were validated according to the comparison analysis of test and simulation.
APA, Harvard, Vancouver, ISO, and other styles
37

V, Akila, Sriharshini K, Sravani P, Sravanthi D, Rishita Gopi, and Sheela T. "Intelligent Car Anti-Theft Face Recognition System." International Journal of Online and Biomedical Engineering (iJOE) 17, no. 01 (January 19, 2021): 120. http://dx.doi.org/10.3991/ijoe.v17i01.18583.

Full text
Abstract:
<p><strong>Abstract - </strong><strong>Security and safety of the car is the major problem of vehicle users in the present situation. The growth in Biometric Technologies has provided a way to solve the safety and security problems. Here, we use Open CV Face Detection Subsystem (FDS) which works using Global Positioning System (GPS) and Global System for Mobile Communication (GSM) module along with Arduino. This model provides a cheaper cost security system for four or more-wheeled vehicles. This project describes the foremost module for Open CV Face Detection Subsystem (FDS) which takes photos of driver using Open CV algorithm and compare it in database provided with photos of different drivers. The other modules are being useful to send all the authorized information about vehicle to the owner. The whole system works based on Arduino module. This system we can keep track of our vehicle in a very cheaper cost and more accurate. </strong><strong>Using this system the identification of the thief will be easy and tracking the location of the car will be faster and cheaper than </strong><strong>earlier method.</strong></p><p> </p>
APA, Harvard, Vancouver, ISO, and other styles
38

Bai, Jian, Zhuo Zhang, and Bingshen Shen. "Internet of vehicles security situation awareness based on intrusion detection protection systems." Journal of Computational Methods in Sciences and Engineering 22, no. 1 (January 26, 2022): 189–95. http://dx.doi.org/10.3233/jcm-215889.

Full text
Abstract:
With the rise of technologies such as mobile Internet, 5G networks and artificial intelligence, the development of Internet of Vehicle Information Security (ICVS) has become the mainstream and direction for the future development of the automotive industry. ICVS, people, roads, clouds, and APP constitute a complex network of vehicles. As part of the Internet, vehicle networking will inevitably face various complex information security threats and risks. This paper aims to design a kind of security situation awareness of Internet of vehicles based on intrusion detection protection systems (IDPS). By collecting the security data of car, app and private cloud for big data analysis, the whole smart car security situation awareness system is constructed. The system can be used to analyze potential threats, send out warnings, and carry out emergency responses.
APA, Harvard, Vancouver, ISO, and other styles
39

Chao, Yan, Qiong Hong Lei, Dan Dan Fu, and Li Qun Wu. "A Study on Holonic Control in Intelligent Car." Applied Mechanics and Materials 37-38 (November 2010): 55–58. http://dx.doi.org/10.4028/www.scientific.net/amm.37-38.55.

Full text
Abstract:
Traffic incident influences the security of people in the popularity of navigation. It is urgently necessary to develop intelligent vehicles by using new technologies and advanced methodologies. In this paper, a new approach based on holonic conception is presented to study the intelligent control in vehicle tool. The control structure in car is divided into three levels and is defined three holonary, the function of every holon level is discussed, then a distributed multilevel intelligent control architecture in car based on holon is developed. The cooperation relation is analyzed between different levels; the cooperative model is established to study cooperation mechanisms among different holon level, which will help to improve the intelligent control and vehicle security for car.
APA, Harvard, Vancouver, ISO, and other styles
40

Et. al., Nouria Kaream Khoorshed,. "Car Surveillance Video Summarization Based On Car Plate Detection." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 11, 2021): 1132–44. http://dx.doi.org/10.17762/turcomat.v12i6.2431.

Full text
Abstract:
Today, video is a common medium for sharing information. Navigating the internet to download a certain form of video, it takes a long time, a lot of bandwidth, and a lot of disk space. Since sending video over the internet is too costly, therefore video summarization has become a critical technology. Monitoring vehicles of people from a security and traffic perspective is a major issue. This monitoring depends on the identification of the license plate of vehicles. The proposed system includes training and testing stages. Training stage comprises: video preprocessing, Viola-Jones training, and Support Vector Machine (SVM) optimization. Testing stage contains: test video preprocessing, car plate (detection, cropping, resizing, and grouping detecting test car plate, feature extraction using HOG feature. The total time of local recorded videos is (19.5 minutes), (15.5 minutes) for training, and (4 minutes) for testing. This means, (79.5%) for training and (20.5%) for testing. The proposed video summarization has got maximum accuracy of (86%) by using Viola-Jones and SVM by reducing the number of original video frames from (7077) frames to (1200) frames. The accuracy of the Viola-Jones object detection process for training 700 images is (97%). The accuracy of the SVM classifier is (99.6%).
APA, Harvard, Vancouver, ISO, and other styles
41

ROTH, T., and P. MEREDITH. "Hand Injuries from Inflation of an Air Bag Security System." Journal of Hand Surgery 18, no. 4 (August 1993): 520–22. http://dx.doi.org/10.1016/0266-7681(93)90163-a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Muller, Grant E., and Peter J. Witbooi. "An Optimal Portfolio and Capital Management Strategy for Basel III Compliant Commercial Banks." Journal of Applied Mathematics 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/723873.

Full text
Abstract:
We model a Basel III compliant commercial bank that operates in a financial market consisting of a treasury security, a marketable security, and a loan and we regard the interest rate in the market as being stochastic. We find the investment strategy that maximizes an expected utility of the bank’s asset portfolio at a future date. This entails obtaining formulas for the optimal amounts of bank capital invested in different assets. Based on the optimal investment strategy, we derive a model for the Capital Adequacy Ratio (CAR), which the Basel Committee on Banking Supervision (BCBS) introduced as a measure against banks’ susceptibility to failure. Furthermore, we consider the optimal investment strategy subject to a constant CAR at the minimum prescribed level. We derive a formula for the bank’s asset portfolio at constant (minimum) CAR value and present numerical simulations on different scenarios. Under the optimal investment strategy, the CAR is above the minimum prescribed level. The value of the asset portfolio is improved if the CAR is at its (constant) minimum value.
APA, Harvard, Vancouver, ISO, and other styles
43

Mensch, Scott E., and LeAnn Wilkie. "Smart Phone Security Practices." International Journal of Cyber Behavior, Psychology and Learning 9, no. 3 (July 2019): 1–14. http://dx.doi.org/10.4018/ijcbpl.2019070101.

Full text
Abstract:
Hand-held cell phone technology has been around for quite some time, however when Apple introduced the iPhone in 2007, the widespread adoption of smartphones took off. Smartphones allow users to communicate via talk, text and video; access personal and work e-mail and the Internet; run applications; make purchases; manage bank accounts; take pictures - and for many of us are an integral part of our everyday (The Privacy Rights Clearinghouse, 2018). Smartphones are “essentially tiny computers, we reach for these devices when we first wake up, bring them with us into the car, and often keep them with us during our most private moments (The Privacy Rights Clearinghouse, 2018). Many users rarely turn off their smart phones.
APA, Harvard, Vancouver, ISO, and other styles
44

Katin, Viktor, Vladimir Kosygin, Midkhat Akhtiamov, and Andrey Lutsenko. "Elaboration and model analysis of characteristics of the flexible liner for an oil tank car." MATEC Web of Conferences 239 (2018): 01030. http://dx.doi.org/10.1051/matecconf/201823901030.

Full text
Abstract:
The article focuses on the original author's development – the flexible liner for a rail tank car that allows reducing the risk of leakage of hazardous liquid cargos (in particular crude oil or petroleum products) during their transportation by rail. Application of the liner allows ensuring hermetical containment of a tank car even if a barrel has any minor defects, excludes a contact of cargo with tank walls, which leads to increase in the security of hazardous liquid cargo transportation. This original development enables ensuring the safety and security of hazardous cargo transportation and minimizing its impact on the environment. The liner can also be used for increasing the service life of a rail tank car and reducing the costs of its maintenance.
APA, Harvard, Vancouver, ISO, and other styles
45

Hsu, Chih-Yu, Pei-Shan Lee, Kuo-Kun Tseng, and Yifan Li. "Palm Personal Identification for Vehicular Security with a Mobile Device." International Journal of Vehicular Technology 2013 (March 31, 2013): 1–13. http://dx.doi.org/10.1155/2013/901524.

Full text
Abstract:
Security certification is drawing more and more attention in recent years; the biometric technology is used in a variety of different areas of security certification. In this paper, we propose a palm image recognition method to identify an individual for vehicular application; it uses palm image as a key for detecting the car owner. We used mobile phone cameras to take palm images and performed a new identification approach by using feature regularization of palm contour. After identification is confirmed, the phone uses Bluetooth/WiFi to connect the car to unlock it. In our evaluation, the experiments show that our approach is effective and feasible.
APA, Harvard, Vancouver, ISO, and other styles
46

Tang, Li Fang, and Lin Na Huang. "3G Car-Based Networking Technology and its Application." Advanced Materials Research 651 (January 2013): 896–900. http://dx.doi.org/10.4028/www.scientific.net/amr.651.896.

Full text
Abstract:
The main urban transport as well as security issues, introduced the current domestic and foreign cars. Networking Research, the car networking bases for implementation, application and development trend.
APA, Harvard, Vancouver, ISO, and other styles
47

Jain, Khushwant, and Vemu Suluchana. "Design and Development of Smart Robot Car for Border Security." International Journal of Computer Applications 76, no. 7 (August 23, 2013): 23–29. http://dx.doi.org/10.5120/13260-0739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Kriven, Sophie, and Emma Ziersch. "New Car Security and Shifting Vehicle Theft Patterns in Australia." Security Journal 20, no. 2 (March 29, 2007): 111–22. http://dx.doi.org/10.1057/palgrave.sj.8350026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Babu, G., and M. Soniya. "IoT based Intelligent Car Security System using IRIS image features." Journal of Physics: Conference Series 1916, no. 1 (May 1, 2021): 012195. http://dx.doi.org/10.1088/1742-6596/1916/1/012195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Mensah, Isaac Kofi, Zhao Tianyu, Guohua Zeng, and Luo Chuanyong. "Determinants of the Continued Intention of College Students in China to Use DiDi Mobile Car-Sharing Services." SAGE Open 9, no. 4 (July 2019): 215824401989369. http://dx.doi.org/10.1177/2158244019893697.

Full text
Abstract:
This research paper examined the continued intention of college students to use DiDi mobile car-sharing services in China. The unified theory of acceptance and use of technology (UTAUT) was used as the theoretical framework while the data analysis was completed with SPSS. The results have demonstrated that performance expectancy, reliability, efficiency, and security and privacy were significant predictors of the continued intention to use mobile car-sharing services. Contrary to our expectations, effort expectancy was not a significant determinant of the continued intention to use mobile car-sharing services. In addition to these direct effects, the moderating impact of trust in the internet was also examined. The moderating analysis showed that trust in the internet showed no significant moderating impact on the relationship between performance expectancy, effort expectancy, reliability, efficiency, and security and privacy and the continued intention to use mobile car-sharing services. The implications of these findings are discussed.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography