To see the other types of publications on this topic, follow the link: Automobile security.

Journal articles on the topic 'Automobile security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Automobile security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Okegbile, Samuel Dayo, Segun Aina, Sanmi Akinmodun, Adeniran Ishola Oluwaranti, and Aderonke Rasheedat Lawal. "A Multimodal Approach to Enhancing Automobile Security." International Journal of Computer Vision and Image Processing 9, no. 2 (April 2019): 32–47. http://dx.doi.org/10.4018/ijcvip.2019040103.

Full text
Abstract:
The continuous increase in use of the automobiles has resulted in increase in vehicular traffic and social vices such as theft, thus necessitating efforts for improving automobile security. As a result of this, various solutions such as satellite monitoring and General Packet Radio Services have been adopted to track vehicle locations over time. This article combines the uniqueness of an automobile plate number and the face(s) of an authorized vehicle driver to enhance the automobile security system, hence eliminating the inefficiency of the existing tag system while reducing the cases of unauthorized automobile use and outright theft. A weighted score approach was used in evaluating the efficiency of the character recognition subsystem with an accuracy of 89.3% recorded. The face recognition subsystem also achieved reliable genuine and an imposter attempt at 0.0 confidence level. The designed system ensured security of an automobile through the combination of a plate number and image recognition, thereby preventing an unauthorized driver from taking a vehicle out of a controlled area.
APA, Harvard, Vancouver, ISO, and other styles
2

Brooks, R. R., S. Sander, Juan Deng, and Joachim Taiber. "Automobile security concerns." IEEE Vehicular Technology Magazine 4, no. 2 (June 2009): 52–64. http://dx.doi.org/10.1109/mvt.2009.932539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Adhikari, Deependra, Kabita Nepal, Deepak Rasaily, and Aarfin Ashraf. "Advanced Security System for Automobile." International Journal of Engineering Trends and Technology 33, no. 7 (March 25, 2016): 365–68. http://dx.doi.org/10.14445/22315381/ijett-v33p270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Babu, Prathibha S., K. L. Sree Harsha, A. Santosh, M. Naga Kaushik, and K. Anil Kumar. "Arduino Based Automobile Security System." Indian Journal of Science and Technology 11, no. 23 (June 1, 2018): 1–8. http://dx.doi.org/10.17485/ijst/2018/v11i23/125627.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lei, Qiong Hong. "The Study of Holonic Control Strategy in Modern Automobile." Advanced Materials Research 308-310 (August 2011): 2258–61. http://dx.doi.org/10.4028/www.scientific.net/amr.308-310.2258.

Full text
Abstract:
The popularity of modern automobiles requires better using performances of them, even better security and environmental protection. So, there are some electrically controlled equipment used in a modern automobile. Since this, it is urgently necessary to develop an integrated or synthetical control strategy in automobiles by using new technologies and advanced algorithms. In this paper, a new method based on the holon conception is presented to study the synthetical control in automobiles [1-3]. The control system is divided into three levels and is defined as three holons, and the function of every holon level is discussed. The coordinated model is established to study the coordination strategy among different holon levels, which will help to improve the synthetical control efficiency, security, stability and environmental protection and etc. of modern automobiles [4-5].
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Xiao Yan, Pei Xin Qu, and Xiao Jing Li. "Braking Performance Study for Automobile with Numerical Simulation." Applied Mechanics and Materials 155-156 (February 2012): 1159–63. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.1159.

Full text
Abstract:
The excellent braking characteristics is a key security measure for automobile operation. Braking system is used in modern automobiles for enhanced safety and reliability. During automobile design stage, a full model of automobile is established in ADAMS software circumstance in according to structural feature and main parameters. The article focuses on modeling and parameter settings of brake system, tire system and body system. Based on the requirement of country standard and national standard, the braking performance analysis and appraise is carried out in this study, at the same time, the braking performance is optimized.
APA, Harvard, Vancouver, ISO, and other styles
7

B, Jignesh. "Innovative Automobile Security System Using Various Security Modules." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 2 (2015): 583–86. http://dx.doi.org/10.17762/ijritcc2321-8169.150233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Xiu Feng, and Gang Cui. "Multifunction GPS/GPRS Automobile Security System." Advanced Materials Research 433-440 (January 2012): 629–34. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.629.

Full text
Abstract:
Based on ARM,multifuncttion GPS/GPRS automobile security system was designed,which focused on security and detectiong.The system combines with detection technology, sensor technology, GPS technology, GPRS technology and digital filtering technology.This system was discussed from software and hardware. Related math model was established. Corresponding test was been brought forward to improve system reliability. Average filtering method and median filtering algorithm have been used to inhibiting interference signals with variety of frequency in software. In this paper,the advantages of this system have been discussed.The embeded system realizes the function with characteristics of low cost, high performance, real-time and reliability ,it has high practical value.
APA, Harvard, Vancouver, ISO, and other styles
9

., N. Chandra Kumar. "SMART AUTOMOBILE SECURITY SYSTEM USING LABVIEW." International Journal of Research in Engineering and Technology 03, no. 14 (March 25, 2014): 35–38. http://dx.doi.org/10.15623/ijret.2014.0314007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pervez, Laiba, Aiza Khan, and Noor ul Ain. "Cyber Security Challenge in an Automobile." International Journal of Scientific and Research Publications (IJSRP) 10, no. 12 (December 6, 2020): 162–66. http://dx.doi.org/10.29322/ijsrp.10.12.2020.p10815.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Zhang, Jia He. "An Analysis on the Ergonomics in the Design of Automobile Instrument Panels." Advanced Materials Research 945-949 (June 2014): 388–92. http://dx.doi.org/10.4028/www.scientific.net/amr.945-949.388.

Full text
Abstract:
Instrument panels provide the main platform for drivers to obtain all kinds of parameters of automobiles, as well as make the principal work environment where drivers steer their wheels. A properly designed instrument panel not only reduces chances of misoperation by drivers but also effectively relieves fatigue of them, thus increasing security coefficient in driving. This article makes an analysis on the ergonomics in several kinds of automobile instrument panels and gives a discussion about ergonomics in the design of automobile instrument panels and its future direction of development.
APA, Harvard, Vancouver, ISO, and other styles
12

Moon, Y. S., K. Wong, and K. S. Ho. "GSM mobile phone based automobile security system." Electronics Letters 36, no. 5 (2000): 463. http://dx.doi.org/10.1049/el:20000358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Irfan, Sahid, and R. Udayakumar. "Vulnerabilities of Can Bus & Automobile Security." International Journal of Control and Automation 12, no. 5 (May 31, 2019): 13–24. http://dx.doi.org/10.33832/ijca.2019.12.5.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Bao, Jian Min, Gang Cui, and Xiu Feng Wang. "Automobile Information Identification Device Implementation Based on SOA for Environmental Monitoring." Advanced Materials Research 518-523 (May 2012): 1291–300. http://dx.doi.org/10.4028/www.scientific.net/amr.518-523.1291.

Full text
Abstract:
Many automobile security systems are provided today, but their functions are not enough to satisfy the applications for Environmental Monitoring based on Service Oriented Architecture (SOA).In this paper, we proposed and introduced new device which is an automobile information Identification device with sensors network to strengthen automobile security system function for monitoring environment. This device aims at monitoring status of automobile as well as its environment by collecting data through sensors network. In order to increase the security, we used a new designed architecture of sensors network to gather data. GPS and GPRS were also added to locate the automobile and to transmit filtered data into the monitor. A New Design approach of system was discussed on both software and hardware. One math model for showing gas and voltage value relation was established. In order to improve system reliability, various testing methods were applied in this system. The results showed that the combination of average filtering algorithm and median filtering algorithm to inhibit interference signal at variety of frequency case can effectively filter different frequency interference signal in the software system. The advantage of this system was discussed. The system has low cost, high performance, real-time and reliability characteristics. It can not only strengthen current security system functions but also can satisfy requirements of future automobile. It also has large potential market.
APA, Harvard, Vancouver, ISO, and other styles
15

Isa, Mohd Anuar Mat, Habibah Hashim, Syed Farid Syed Adnan, Norhaflyza Marbukhari, and Nur Nabila Mohamed. "An automobile security protocol: side-channel security against timing and relay attacks." International Journal of Electronic Security and Digital Forensics 9, no. 3 (2017): 239. http://dx.doi.org/10.1504/ijesdf.2017.085194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Marbukhari, Norhaflyza, Nur Nabila Mohamed, Mohd Anuar Mat Isa, Syed Farid Syed Adnan, and Habibah Hashim. "An automobile security protocol: side-channel security against timing and relay attacks." International Journal of Electronic Security and Digital Forensics 9, no. 3 (2017): 239. http://dx.doi.org/10.1504/ijesdf.2017.10005632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Hartzell, Shawn, Christopher Stubel, and Tamara Bonaci. "Security Analysis of an Automobile Controller Area Network Bus." IEEE Potentials 39, no. 3 (May 2020): 19–24. http://dx.doi.org/10.1109/mpot.2018.2837686.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Mahmood, Jabar, Zongtao Duan, Yun Yang, Qinglong Wang, Jamel Nebhen, and Muhammad Nasir Mumtaz Bhutta. "Security in Vehicular Ad Hoc Networks: Challenges and Countermeasures." Security and Communication Networks 2021 (June 30, 2021): 1–20. http://dx.doi.org/10.1155/2021/9997771.

Full text
Abstract:
Recently, vehicular ad hoc networks (VANETs) got much popularity and are now being considered as integral parts of the automobile industry. As a subclass of MANETs, the VANETs are being used in the intelligent transport system (ITS) to support passengers, vehicles, and facilities like road protection, including misadventure warnings and driver succor, along with other infotainment services. The advantages and comforts of VANETs are obvious; however, with the continuous progression in autonomous automobile technologies, VANETs are facing numerous security challenges including DoS, Sybil, impersonation, replay, and related attacks. This paper discusses the characteristics and security issues including attacks and threats at different protocol layers of the VANETs architecture. Moreover, the paper also surveys different countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
19

Deng, Yan Ning, Zi E. Zhou, and Fa Zong Li. "Study on the Fuzzy Control Strategy of Automobile Braking Stability." Advanced Materials Research 631-632 (January 2013): 1160–65. http://dx.doi.org/10.4028/www.scientific.net/amr.631-632.1160.

Full text
Abstract:
The article is put forward to using fuzzy control to improve brake stability, designing the fuzzy controller of automobile braking stability, determine the yawing moment control strategy. The simulation experiment indicates that braking stability of automobile that using fuzzy control has a good stability and security, the proposed control strategy can make automobile quickly recover to the expected driving lane after partial drove and maintain a good braking performance, the research shows that the proposed braking stability control strategy is effective and has certain significance for improving the safety of the automobile driving.
APA, Harvard, Vancouver, ISO, and other styles
20

Palit, Shamik, and Chandrima Sinha Roy. "IoT in Safety and Security of Automobiles." International Journal of Innovative Technology and Exploring Engineering 10, no. 2 (December 10, 2020): 10–17. http://dx.doi.org/10.35940/ijitee.b8222.1210220.

Full text
Abstract:
This article is about IoT. The IoT on vehicles will be discussed. For an automobile for safety and security, I am making progress in making an IoT comparative analysis. A new web wave that is expected to rework our lives could be the Things Web (IoT). The Web has people connected andconnects Things to create flawless communication and pooling of intelligence. IoT could be an era of RIOTous, with the remarkable ability to control the world and the method we tend to live. It uses gadgets and sensors relating to the net, which produce new characteristics. In the age of modern international, we as the purchasers are leaning in the direction of smart vehicles and extra to make lifestyle easier. The Internet and society center states that 90% of accidents that occur around the place are caused by human errors and failures. We can reduce the error from the very least when we implement IoT on cars. In 2020, the Automobile Manufacturers ' Alliance forecast that 75% of cars are capable of using the internet and that unsecured devices can be accessible without difficulty, which is why it is important that safety is guaranteed in cars. This paper analyzes the various securities of IoT technologies in IoT.Then suggesting new security policy
APA, Harvard, Vancouver, ISO, and other styles
21

Sun, Xu Song. "Automobile Alarm System Based on Face Recognition Method." Advanced Materials Research 468-471 (February 2012): 496–99. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.496.

Full text
Abstract:
Advanced systems for auto safety are an ongoing need in our current mobile and ever expanding society. The safety and security of automobiles is becoming an ever, difficult problem Face recognition systems have been promised to provide many different security applications. The goal of this research has been the development of an optically based computer system, which will locate and track the head, face, and eyes of a driver. The system will then determine the driver's identity and verify his/her authorization to operate the vehicle. While the car is in operation, the system will also determine if the driver is awake, sober and able to safely operate the vehicle.
APA, Harvard, Vancouver, ISO, and other styles
22

Mo, Xiao Ling. "Study and Application of Electronic Technology in Automobile Brake System." Advanced Materials Research 1049-1050 (October 2014): 646–48. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.646.

Full text
Abstract:
Vehicle braking system in vehicle security plays an important role.In recent years, with the progress of vehicle technology and improvement of the car speed, the rapid development of electronic technology provides a more broad space of development to the braking system. Based on the use of electronic technology in automobile braking system present situation as the research object, the application of electronic technology in automobile braking system has carried on the detailed exploration and research, to promote the further study of electronic technology in automobile braking system and the application.
APA, Harvard, Vancouver, ISO, and other styles
23

Zhao, Li Hong, Cheng Xi Lei, Zhong Wen Xing, and Bin Wu. "Experimental Research on the Stiffness of Hyperboloid Shallow Shell." Advanced Materials Research 940 (June 2014): 179–83. http://dx.doi.org/10.4028/www.scientific.net/amr.940.179.

Full text
Abstract:
Stiffness is a very important property of automobile panel, especially for high-strength thinning sheet due to personnel security and energy conservation on auto industry. It is difficult to study because of the complexity streamline feature of auto body. An experiment method for determining stiffness was presented. The experiment study models of which based on the hyperboloid shallow shells that could represent automobile panel’s surface features was established. The criterion and research technique of automobile panel stiffness were introduced. The experiment research works of effects of two main process conditions on stiffness which blank holding force (BHF) and boundary condition during the stiffness test were obtained. All conclusions provided a particularly effective process guidance and technical approach in the automobile panel production.
APA, Harvard, Vancouver, ISO, and other styles
24

Yu, Dong Man, Xiao Jing Li, and Di Wang. "Numerical Analysis for Braking System of Virtual Automobile Model." Applied Mechanics and Materials 556-562 (May 2014): 1314–17. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.1314.

Full text
Abstract:
The excellent braking characteristics is a key security measure for automobile operation. The study focuses on modeling and parameter settings of brake system, tire system and body system. During automobile design stage, a full model of automobile is established in ADAMS software circumstance in according to structural feature and main parameters. Virtual model technology can simulate the working condition, analyze whole performance of related products, solve some drawbacks in the traditional design and manufacturing process. Based on the requirement of country standard and national standard, the braking performance analysis and appraise is carried out in this study, at the same time, the braking performance is optimized.
APA, Harvard, Vancouver, ISO, and other styles
25

Gong, Ting, and Hui Yan. "Research on Two-Speed CAN BUS Technique in Automobile Manufacturing System." Applied Mechanics and Materials 214 (November 2012): 591–95. http://dx.doi.org/10.4028/www.scientific.net/amm.214.591.

Full text
Abstract:
In order to enhance the automation and safety of vehicle, the application of computer technology to the automobile control system has increasingly become a trend. In this paper, the TMS320LF2407 produced by TI Corporation is employed as the microprocessor controller and gateway, which constitute a two-speed CAN communication and control network designed for the automobile control system. Then a specific design plan of application of Two-Speed BUS in automobile control system is elaborated. Through this two-speed CAN bus technique in the vehicle control system, the overall system data sharing is achieved and the performance and security of vehicle control system are improved.
APA, Harvard, Vancouver, ISO, and other styles
26

Pott, Claudius, Philipp Jungklass, David Jacek Csejka, Thomas Eisenbarth, and Marco Siebert. "Firmware Security Module." Journal of Hardware and Systems Security 5, no. 2 (April 30, 2021): 103–13. http://dx.doi.org/10.1007/s41635-021-00114-4.

Full text
Abstract:
AbstractNew services such as autonomous driving, the connectivity of the traffic infrastructure and the tight coupling of user operated smart devices with the vehicle have significantly increased the demand for cryptographic protection in the automobile. To provide a secure environment for the calculation and verification of cryptographic material, automotive microcontrollers now frequently integrate Hardware Security Modules (HSM), special well-protected co-processors, which are protected against manipulation and external access. HSMs use special hardware accelerators to provide the required cryptographic services. While these accelerators provide good performance, they limit flexibility and updatability. In addition, as more services require cryptographic protection, the amount of key material that needs to be managed by the HSM also increases, turning the limited protected memory of the HSM into a bottleneck. This paper presents a framework that uses the safety mechanisms of a microcontroller to achieve both HSM-equivalent security through software solutions, while providing an equivalent level of functionality. Furthermore, the proposed framework provides crypto-agility, as the security stack can be updated if desired. In order to verify the functionality, the presented framework is implemented and evaluated on an Infineon AURIX TC399 and compared with the integrated HSM.
APA, Harvard, Vancouver, ISO, and other styles
27

Liao, Xiao Mei. "Design and Application of Electromechanical Brake System." Applied Mechanics and Materials 705 (December 2014): 152–56. http://dx.doi.org/10.4028/www.scientific.net/amm.705.152.

Full text
Abstract:
Aim at the brake fluid system cannot protect the automobile security effectively, this article analyzes the electromechanical brake system in details. At first, it introduces the theory and the advantage composition of the electromechanical brake system. Then, this article introduces the hardware of EBS system and evaluates the design of EMB electrical machine and electron pedal. At last, it particularly analyzes the system software. This article has significant meaning to the automobile maintainers and the braking system researchers.
APA, Harvard, Vancouver, ISO, and other styles
28

Сазонова, Z. Sazonova, Трофименко, Yuri Trofimenko, Федюкина, and T. Fedyukina. "Engineers Training for Solution of Problems related to Security in Technosphere." Safety in Technosphere 3, no. 1 (February 18, 2014): 70–76. http://dx.doi.org/10.12737/2782.

Full text
Abstract:
Technosphere’s security problems solution in the context of continuous growth of technosphere objects number is imperative for life safety and environment protection. In the present paper organizational and psychological-pedagogical conditions for engineers’ professional training related to technospchere’s security problems solution are discussed. An experience acquired in this area at the Moscow State Automobile & Road Technical University – MADI is analyzed.
APA, Harvard, Vancouver, ISO, and other styles
29

Wang, Xin Na, Qian Gao, and Ping Chuan Zhang. "Automobile Reversing Radar Based on Ultrasonic Wave." Advanced Materials Research 383-390 (November 2011): 366–71. http://dx.doi.org/10.4028/www.scientific.net/amr.383-390.366.

Full text
Abstract:
Automobile reversing process should be paying more attention for security. This paper analyzes the principle of ultrasonic distance measurement, made simple and practical automobile reversing radar, in which the SPCE061A MCU / DSP of high-performance 16-bit microprocessor was used as the control core and the ultrasonic sensors modular for detection signal. The system design is the modularization structure, so as to simplify the debugging effort, well done eventually reversing radar. The experiments shows that the detection range may be up to 15cm-200cm, the error of distance is only 5cm, fully meet the practical requirements, and low cost.
APA, Harvard, Vancouver, ISO, and other styles
30

Ruan, Xian Jing. "Information Security System of the New Energy Automobile Production Line Based on RFID." Applied Mechanics and Materials 416-417 (September 2013): 1434–38. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1434.

Full text
Abstract:
The application of RFID technology in the new energy automobile manufacturing, can achieve that the visualization, on time and collaborative business processes of energy vehicles discrete manufacturing production process, to establish a advanced "just-in-time" production model, provide real-time and accurate information for production plans and management decisions, which will help to improve the quality of enterprise production management decision-making and the overall optimization of production operations management functions. On the basis of proposed mainly from management systems and supporting techniques to solve the security issues of the RFID system, give the basic framework of build the RFID system safety management system. The security of the RFID system is technically divided into two security domains, focusing on security issues by the reader to the application system. The intrusion detection technology is introduced in RFID system, and research on the improved of intrusion detection from two aspects: First, the use of clustering algorithm for data preprocessing to reduce the computational complexity, improve the detection efficiency; second, use immune particle swarm evolutionary algorithm directly improved feature selection to improve detection accuracy.
APA, Harvard, Vancouver, ISO, and other styles
31

Lee, Yousik, Samuel Woo, Jungho Lee, Yunkeun Song, Heeseok Moon, and Dong Hoon Lee. "Enhanced Android App-Repackaging Attack on In-Vehicle Network." Wireless Communications and Mobile Computing 2019 (February 3, 2019): 1–13. http://dx.doi.org/10.1155/2019/5650245.

Full text
Abstract:
The convergence of automobiles and ICT (information and communication technology) has become a new paradigm for the development of next-generation vehicles. In particular, connected cars represent the most in-demand automobile-ICT convergence technology. With the development of 5G technology, communication between vehicle and external device using autonomous driving and Internet of things (IoT) technology has been remarkably developed. Control of vehicles using smart phones has become a routine feature, and over 200 Android apps are in use. However, Android apps are easy to tamper by repackaging and allowing hackers to attack vehicles with using this vulnerability, which can lead to life-critical accidents. In this study, we analyze the vulnerabilities of connected car environments when connecting with IoT technologies and demonstrate the possibility of cyberattack by performing attack experiments using real cars and repackaging for commercial apps. Furthermore, we propose a realistic security technology as a countermeasure to attain safety against cyberattacks. To evaluate the safety of the proposed method, a security module is developed and a performance evaluation is conducted on an actual vehicle.
APA, Harvard, Vancouver, ISO, and other styles
32

Song, Jin Hu. "The Development of Automatic Girth Welding Machine with Dual-Arm for Automobile Axle." Advanced Materials Research 779-780 (September 2013): 1089–93. http://dx.doi.org/10.4028/www.scientific.net/amr.779-780.1089.

Full text
Abstract:
In order to solve the problem of automobile rear axlewelding equipment with the low level of automation,the poor accuracy, the poorefficiency, a automatic girth welding machine with dual-arm for automobile axlehas been developed based on PLC. Thewelding Proeess automation is realized by PLC controlling gun movement. Theautomatic welding machine has the characteristics of high control precision,good security, fast response speed, high degree of automation, improving weldingquality and production effieiency, lowed serap rates, eonvenient operation, easymaintenance, in particular to improve the working eonditions of workers and improveproduetion effieieney has obvious praetical signifieanee.
APA, Harvard, Vancouver, ISO, and other styles
33

Lu, Hua Chen. "Study on Security Analysis and Management of Motor Based on Fuzzy Theory." Advanced Materials Research 591-593 (November 2012): 692–96. http://dx.doi.org/10.4028/www.scientific.net/amr.591-593.692.

Full text
Abstract:
Technique problems on motor security analysis and management are solved based on fuzzy theory. Combining such theory with present research of car engine structure and its related technique, based on abroad investigation of car engine malfunctions, index system suitable for motor engine security analysis is developed and fuzzy theory, a mature theory in the management science is induced in the security analysis. In the study, method and techniques for car engine security analysis and management are proposed. The real case proves that this index system and analytical technique are applicable, the analytical result could be used as theoretical references for security management, production manufacture and improvement, it could be used for analyzing similar automobile products.
APA, Harvard, Vancouver, ISO, and other styles
34

Cong, Zhou, Xiao Jian, and Muhammad Naveed Iqbal. "Review on Automobile Steering-by-Wire System Development." Applied Mechanics and Materials 130-134 (October 2011): 2194–97. http://dx.doi.org/10.4028/www.scientific.net/amm.130-134.2194.

Full text
Abstract:
There is much advancement in steering control technology with time. Steering-By-Wire (SBW) system is the most modern and efficient technique. This paper first introduces current status and history of SBW system from concept proposal, prototype design and development of concept car with SBW system. The structure, principle, key components and classification of SBW system are also described systematically. Then several features of SBW system are analyzed in detail in connection with efficient handling, stability, spatial structure, intelligence and security of vehicle. Finally the future issues to be researched are discussed, including system reliability, hardware technology, system control strategy and power supply.
APA, Harvard, Vancouver, ISO, and other styles
35

Lee, Byung-Suck. "The Problems on the Concept of Operation in Automobile Liability Security Law." BUSINESS LAW REVIEW 30, no. 4 (December 31, 2016): 147. http://dx.doi.org/10.24886/blr.2016.12.30.4.147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Wang, Xin, Chuan Wang, Zhi Xu, and Jiahai Zhang. "Research on security technology of automobile electronic communication based on genetic assessment." Microprocessors and Microsystems 82 (April 2021): 103736. http://dx.doi.org/10.1016/j.micpro.2020.103736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Howser, Gerry, and Bruce McMillin. "Modeling and reasoning about the security of drive-by-wire automobile systems." International Journal of Critical Infrastructure Protection 5, no. 3-4 (December 2012): 127–34. http://dx.doi.org/10.1016/j.ijcip.2012.09.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Bansal, Ved Prakash. "Risk and Return Analysis of Stocks with Special Reference to Automobile Sector." Journal of Business Management and Information Systems 5, no. 1 (June 30, 2018): 35–42. http://dx.doi.org/10.48001/jbmis.2018.0501005.

Full text
Abstract:
An important source of funds for companies is the stock market and it is a medium of earning returns for investors while giving them liquidity. An investor therefore, before purchasing or selling any security (in our case- equity shares) needs to make an analysis of the Risk and Returns associated with the security. It is only by the buying and selling of these securities than enables economic growth of a country. The present study aims to analyze the risk and returns of companies listed on National Stock Exchange of India in the automobile sector. The study recommends for suitable investment in the priority stocks in the sector
APA, Harvard, Vancouver, ISO, and other styles
39

Yin, Hui Jun, Jian Jin, Ping Hui Yang, Yu Pan, and Shu Kun Ma. "Simulation Analysis of Crash Tests for the Front Side Member in LS-DYNA." Advanced Materials Research 199-200 (February 2011): 1200–1205. http://dx.doi.org/10.4028/www.scientific.net/amr.199-200.1200.

Full text
Abstract:
How to improve the collision process of safety performance has become one of the most important issue in the automobile manufacturing enterprises. This paper using LS-DYNA made a security analyses about former girders, based in half vehicle model, analyzing the security of the front side member to reflect the vehicle’s performance. At the same time, through the front side member’s assembly structure’s contrast with the modified ones, the result has proved the improvement is more effective.
APA, Harvard, Vancouver, ISO, and other styles
40

Bozdal, Mehmet, Mohammad Samie, Sohaib Aslam, and Ian Jennions. "Evaluation of CAN Bus Security Challenges." Sensors 20, no. 8 (April 21, 2020): 2364. http://dx.doi.org/10.3390/s20082364.

Full text
Abstract:
The automobile industry no longer relies on pure mechanical systems; instead, it benefits from many smart features based on advanced embedded electronics. Although the rise in electronics and connectivity has improved comfort, functionality, and safe driving, it has also created new attack surfaces to penetrate the in-vehicle communication network, which was initially designed as a close loop system. For such applications, the Controller Area Network (CAN) is the most-widely used communication protocol, which still suffers from various security issues because of the lack of encryption and authentication. As a result, any malicious/hijacked node can cause catastrophic accidents and financial loss. This paper analyses the CAN bus comprehensively to provide an outlook on security concerns. It also presents the security vulnerabilities of the CAN and a state-of-the-art attack surface with cases of implemented attack scenarios and goes through different solutions that assist in attack prevention, mainly based on an intrusion detection system (IDS).
APA, Harvard, Vancouver, ISO, and other styles
41

Tuloki, Szilárd, and István Nagy. "Mapping and Security Analysis of Sensor Network for Electric Vehicles." Műszaki Tudományos Közlemények 9, no. 1 (October 1, 2018): 243–46. http://dx.doi.org/10.33894/mtk-2018.09.56.

Full text
Abstract:
Abstract Today’s vehicles are becoming more and more complex in order to meet the ever increasing safety and comfort requirements. Most people usually do not consider the car sitting in their driveway to be on the leading edge of new technology. However, for most people, the personal automobile has now become their initial exposure to new intelligent computational technologies such as fuzzy logic, neural networks, adaptive computing, voice recognition and others. This paper explores the sensory-network of electric vehicles and analyses it from a security and reliability perspective.
APA, Harvard, Vancouver, ISO, and other styles
42

Bai, K. S. Nirmala. "A Review on Wireless Communication Protocol and Security Privacy." International Journal of Wireless Networks and Broadband Technologies 8, no. 2 (July 2019): 11–17. http://dx.doi.org/10.4018/ijwnbt.2019070102.

Full text
Abstract:
The significant way of using the technology relies on the effective way of utilizing and regenerating the resources. Technology advancements increase day by day in each and every sector including construction, automobile, manufacture, production, bio-medical sciences and home appliances. The use of wireless protocols that bridges the gap with the Security and Privacy Issues in Internet of Things has been drastically in demand as always. Ipv6, IEEE 802.15.4, WirelessHart had played a vital role in the field of Internet of Things. Their impact can be further advanced with the specifications designed in Wireless Protocols. Robust and more secure bits preserving communication protocol leading the earlier protocols used.
APA, Harvard, Vancouver, ISO, and other styles
43

Kim, Seong-Kyu, Ung-Mo Kim, and Jun-Ho Huh. "A Study on Improvement of Blockchain Application to Overcome Vulnerability of IoT Multiplatform Security." Energies 12, no. 3 (January 27, 2019): 402. http://dx.doi.org/10.3390/en12030402.

Full text
Abstract:
IoT devices are widely used in the smart home, automobile, and aerospace areas. Note, however, that recent information on thefts and hacking have given rise to many problems. The aim of this study is to overcome the security weaknesses of existing Internet of Things (IoT) devices using Blockchain technology, which is a recent issue. This technology is used in Machine-to-Machine (M2M) access payment—KYD (Know Your Device)—based on the reliability of existing IoT devices. Thus, this paper proposes a BoT (Blockchain of Things) ecosystem to overcome problems related to the hacking risk of IoT devices to be introduced, such as logistics management and history management. There are also many security vulnerabilities in the sensor multi-platform from the IoT point of view. In this paper, we propose a model that solves the security vulnerability in the sensor multi-platform by using blockchain technology on an empirical model. The color spectrum chain mentioned in this paper suggests a blockchain technique completed by using the multiple-agreement algorithm to enhance Thin-Plate Spline (TPS) performance and measure various security strengths. In conclusion, we propose a radix of the blockchain’s core algorithm to overcome the weaknesses of sensor devices such as automobile, airplane, and close-circuit television (CCTV) using blockchain technology. Because all IoT devices use wireless technology, they have a fundamental weakness over wired networks. Sensors are exposed to hacking and sensor multi-platforms are vulnerable to security by multiple channels. In addition, since IoT devices have a lot of security weaknesses we intend to show the authentication strength of security through the color spectrum chain and apply it to sensor and multi-platform using Blockchain in the future.
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, Fu Long, Xiao Ya Fan, and Gui Chun Ma. "Study on CAN-Based Lighting and Identifying System for Automobiles." Key Engineering Materials 364-366 (December 2007): 779–82. http://dx.doi.org/10.4028/www.scientific.net/kem.364-366.779.

Full text
Abstract:
Head lamps, tail lamps, side lamps, roof lamps, alarm signal lamps and other lamps of an automobile constitute a whole lighting system, and identifying devices constitute a guarding system against theft and alarm. In traditional designs, each lamp is independent and controlled artificially by persons, and the automobile cannot show maintenance men which lamp is broken-down and needs mending or replacing. The lamp is either ON or OFF, and its luminance can be adjusted neither automatically nor artificially so that much energy goes to waste. Moreover, lighting system is isolated from identifying system so that they are difficult to manage by a uniform system. Currently, identifying systems of many automobiles key system, door-controlling system, UHF sending/receiving system, alarm system and so on. Once the key is lost or stolen, those persons that have not the ownership can also open the door of the car with it. In this paper, an ISO Standard (ISO 11898) for serial communication- CAN is introduced. Through CAN micro-controller provided by ATMEL, each lamp of lighting system is a component and can be interconnected. Identifying system, in which fingerprint encryption technique is utilized, can also be interconnected with lighting system. This system can be controlled completely, and has some advantages such as smartness, security, low power, low cost, etc.
APA, Harvard, Vancouver, ISO, and other styles
45

Shakya, Subarna. "EFFICIENT SECURITY AND PRIVACY MECHANISM FOR BLOCK CHAIN APPLICATION." December 2019 01, no. 02 (December 4, 2019): 58–67. http://dx.doi.org/10.36548/jitdw.2019.2.001.

Full text
Abstract:
The block chain has become one of the predominant term in the applications like financial, automobile, health care, risk management, and internet of things due to its reliability and more beneficial services. It executes every transaction by establishing trust in the open environment. The deployment of the block chain technology in the various applications remains as the recent research topic as the privacy and the security of the bock chain are undecided and unconvinced, so the paper tries to develop an efficient security and privacy mechanism for the block chain applications. The proposed method puts forth the biometric recognition in the block chain technology to improve the security and the privacy mechanism for the block chain application.
APA, Harvard, Vancouver, ISO, and other styles
46

Palaniapan, Senthilnathan, and Mohammed Ahsan Kollathodi. "Real time implementation of embedded devices as a security system in intelligent vehicles connected via Vanets." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (December 1, 2019): 4788. http://dx.doi.org/10.11591/ijece.v9i6.pp4788-4797.

Full text
Abstract:
<p>The fast boom of technology has made our lives easier. The number of computer based functions embedded in cars have multiplied extensively over the past two decades. These days, many embedded sensors allowing localization and verbal exchange are being advanced to enhance reliability, protection and define new exploitation modes in intelligent guided transports. An in-car embedded electronic architecture is a complex setup machine, the improvement of that particular system is related to unique manufacturers and providers. There are several factors required in an efficient and secure system along with protection features, real time monitoring, reliability, robustness, and many other integrated features[1-2]. The appearance of modern era has also expanded the use of vehicles and its associated dangers. Dangers and the road accidents take place often which causes loss of lives and assets due to the bad emergency centres, lack of safety features and limitations within devices embedded within a vehicle. A rpm-speed calculating device can be used in a vehicle such that risku situations while driving can be detected. A system with Ultra sonic sensor can be used as a crash detector of the automobile in the course of the event and also after a crash. With indicators from the device, extreme coincidences also can be recognized. .As the amount of urban automobile grows automobile theft has become a shared difficulty for all citizens. As a solution an antitheft system can be implemented using PIR motion sensors where the system can be attached to the peripheral surface of the vehicle. When these sensors are interfaced with Arduino microcontroller an efficient and reliable security system can be developed[3].</p>
APA, Harvard, Vancouver, ISO, and other styles
47

Kaur, Sandeep, and Annu Maheshwari. "Effect of dust and automobile exhaust fumes on security guards in Bathinda City." International Journal of Medical Science and Public Health 2, no. 2 (2013): 390. http://dx.doi.org/10.5455/ijmsph.2013.2.404-407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Gao, Jun, Hong Hui Zhu, and Bin Li. "Research of Automobile Collision Avoidance System Based on Video Image Processing." Applied Mechanics and Materials 734 (February 2015): 312–20. http://dx.doi.org/10.4028/www.scientific.net/amm.734.312.

Full text
Abstract:
In this paper, an automobile collision avoidance system based on video image processing is proposed for vehicle active safety. Firstly, considering the requirement of real-time system, FPGA is responsible for the core task of video image processing. In the process, this paper introduces an image segmentation algorithm to extract the Region of Interest, a fast median filtering algorithm and an improved adaptive threshold Ostu segmentation algorithm. Secondly, in the design of alarm system, we use the STM32 chip which is based on Cortex-M3 kernel as the embedded platform. Finally, in order to analyze the data obtained by image processing and make smart decisions on the embedded platform, we establish a double parameter alarm mechanism of automobile security model. It can help the drivers to take appropriate hedging measures. The system in this paper has the characteristics of low cost, real-time and high reliability. Through the debugging and experiments, the system has reached the expected effect and met the requirements of automobile collision avoidance system.
APA, Harvard, Vancouver, ISO, and other styles
49

Block, Richard N. "Collective bargaining, competitiveness and employment in the United States." Transfer: European Review of Labour and Research 7, no. 4 (November 2001): 697–715. http://dx.doi.org/10.1177/102425890100700412.

Full text
Abstract:
This paper discusses collective bargaining in the United States over matters of job security, employment creation, and firm competitiveness. It first points out that US policy on economic issues is oriented toward facilitating the operation of markets; therefore, there is almost no public policy toward job security, employment creation, and competitiveness on which collective bargaining can build. Within the collective bargaining system, government policy merely enables unions and employers bargain over job security, employment creation, and firm competitiveness; it neither requires it nor even encourages it. Incidence of such use of collective bargaining thus varies by industry, with occasional use for competitiveness, but rare use for job creation. An exception is the automobile assembly industry, which is highlighted.
APA, Harvard, Vancouver, ISO, and other styles
50

Reddy, Gurunath, and Sharvani G. S. "Evaluation of High Speed Communication Interfaces for Next Generation Secure Element." International Journal of Engineering and Advanced Technology 10, no. 5 (June 30, 2021): 170–72. http://dx.doi.org/10.35940/ijeat.e2737.0610521.

Full text
Abstract:
Secure element is a microprocessor chip that provides a secure environment to store the data, execute the applications and communicate the data to external entities securely. As secure element provides a promising security feature, it is used in various domains like IOT, automobile and mobile phones. Nowadays, the size of the security key and size of the data to be processed are increasing whereas the processing time of the secure element is expected to reduce. As the data size increases, the time to communicate the data between secure element and host increases. Host and secure element are connected via SPI over ISO IEC 7816-4 (T1) communication interface. In this paper, we evaluate the throughput of SPI over ISO IEC 7816-4 (T1) interface which is widely used in smart card domains. Throughput of the interface is evaluated by examining the time spent at communication interface for varying data size. We focus on understanding the parameters that affect the throughput of the SPI over T1 interface
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography