Figure 3 - uploaded by Lama Jamjoom
Content may be subject to copyright.

Context in source publication

Context 1
... commands are successfully executed by the front-end controller by employing the specifically developed C base application which is configured on the ATmega2560 microcontroller. A screenshot of the Bluetooth connectivity, passcode verification and car lock/unlock motor control mechanism is shown on Figure 13-A. The status of devised system is successfully updated on the cloud by employing the MATLAB server based "thingspeakwrite" function [8]. ...

Citations

... We have proposed an innovative design comprising both hardware and software to compel the users to have authentic metadata required to drive that vehicle. Review of Literature L. Jamjoom et al. [1] infer that the right implementation of IoT technology with a smart combination of an Androidbased smartphone, Bluetooth wireless interface, front-end controller, and a server would allow monitoring certain parameters of intended cars like tracking, remote engine break, petrol consumption, CO2 emission rate, etc. which will eventually reduce the pollution, increase safety as well as create a new smart system for transportation. The frontend module, the server, and the smartphone all had wireless interfaces that were sent delta-based and eventdriven, which increased the system's efficiency in terms of resource use and power consumption. ...
Article
The proposed solution focuses on verifying the accuracy of the vehicle documentation whenever a person enters the car and only permits that person to start the engine when all necessary documentation is current. By installing an actuator in the vehicle that is managed by the software that verifies the legitimacy of all the documents, we intend to achieve this. The car will not operate if any of these documents are expired and must be renewed or replaced. The program will offer an emergency alternative that can be utilized in urgent situations, but it will only work a certain number of times to prevent it from being used as a backdoor to renew the necessary documents.
... Moreover, as embedded technologies are centred around software applications, future updates to this governing software will enable manufacturers to enhance functionality and response times without modifying the original hardware: future applications will be able to control devices according to precise function, required priority level as part of the device network, and required level of power consumption. To illustrate this relationship, the below model highlights how advancements in IoT have in turn enhanced energy efficiency and distribution; economic mobility and perceived quality of life [17]. ...
Article
Smart cities and autonomous vehicles have been emerging to be predominant and key players in today's cutting-edge technology. Their emergence has been rapidly escalated with the advancements of concepts of Internet of Things (IoTs). IoTs are characterized by nodes and agents which help in effective collection of vital information, relaying the information to adjacent nodes to the destination thus incorporating smartness into existing systems. Localization of these nodes and agents is a challenging issue especially in the applications such smart vehicles, autonomous vehicles etc. which are continuously in the mobile state. Continuous monitoring of their position and coordinates dictates the overall efficiency and precision of the IoT based system. A cooperative localization scheme for determination of these coordinates is proposed based on the Factor Graph-based Fisher Information Matrix theory. The Fisher Information Matrix (FIM) derived for the proposed model is utilized in the Bayesian Paradigm to compute the default prior or the relative density of nodes as a weight function. Finally, the Crammer Rao Lower Bound (CRLB) model is used to compute best set of neighboring nodes which help in triangulating the position of the target node. The proposed work has been tested for its efficiency against benchmark methods to validate the superiority of proposed work.
... Something important to mention with the implementation of technology in-vehicle control has to do with response times in the emergency services Satyakrishna & Sagar (2018) and Jamjoom et al. (2018), through bettercoordinated action taking advantage of the information provided by the sensors. ...
Article
Full-text available
This research aims to explore the various challenges of cybersecurity in the Internet of Things in a Smart Mobility framework within Smart Cities by reviewing the academic literature. Methodology - Through the review and analysis of the academic literature available in different databases to generate an empirical study, the prospective knowledge on strategy and technology that concatenates the concepts of the Internet of Things, Smart Mobility, and Smart Cities is derived. Contribution - Cybersecurity schemes in today's Internet of Things still present significant challenges arising from the lack of clarity in policies and strategies regarding the reliability of data collection by the various services present in the Smart Mobility framework.
... Moreover, as embedded technologies are centred around software applications, future updates to this governing software will enable manufacturers to enhance functionality and response times without modifying the original hardware: future applications will be able to control devices according to precise function, required priority level as part of the device network, and required level of power consumption. To illustrate this relationship, the below model highlights how advancements in IoT have in turn enhanced energy efficiency and distribution; economic mobility and perceived quality of life [17]. ...
Article
Our project aim is to design a system that will automate the college transport fare collection process using GPS contactless smartcard technologies as well as provide industrial IOT facilities to knows present location of the college vehicle and the arrival time at the particular bus stop. The system keep tracking of each passenger will be able to know the current balance in his smartcard amount and can recharge it when needed. The present generation requires the information time to time. The use of technology has been increasing day by day. So, we are planning for the combination of present technology with the requirements of information transmission, we planned for the creative approach “ Vehicle Tracking System Using GPS and GSM”. To overcome the drawback of the previous method of a Project based and we introduced a project to track a vehicle using GPS and GSM. Vehicle tracking system can also be used for accident detection alert system. The tracking system and many more by just make few changes in hardware and software and widely in tracking cab/taxi, stolen vehicles, school/college buses etc. Student safety is a primary in our society. Increased rate of children abduction signify the relevance of a proper mechanism to track children. The current system involves parents calling the cab driver to ensure student has boarded the bus and to know the current location. There us always an element of uncertainty regarding student whereabouts. Proposed system involves a low-cost solution by allowing parents to track child location via a mobile application. The system involves allotment of a unique identification for each student using RFID (Radio Frequency based identification system). Live tracking of the bus is enabled using GPS (Global Positioning System).
Chapter
Security is the most essential factor in software as well as internet environment. In the current era, software and hardware security is the most important thing to secure our digital and physical assets. In many cases, tangible entities like smart homes, smart car etc. having some IoT base support enhance the supervision. This paper proposes a secure alternative for the car unlocking system by dynamically generating disposable encryption keys that cater to the future demands of smart cars powered by Internet of Things while employing ultra-modern communications techniques like MAC-then-encrypt. Encryption keys are used to facilitate locking and unlocking functionality of car via the internet to ensure security. The paper compares the proposed methodology with existing algorithms like Digital Signature Authentication to verify its effectiveness in real world scenarios.KeywordsConnected carsInternet of vehiclesPseudorandom numberHashingRolling code
Chapter
Full-text available
Fog and haze naturally or artificially appearing in the environment, limit human visibility. As a way of improving the visibility, digital images are captured and many different image enhancement methods are applied to remove the fog and haze effects. One of the fundamental methods is the Dark Channel Prior (DCP) method. DCP can remove fog and haze on a single image by modelling the psychical diminishing structure of fog. In this study, the spectral signature of the DCP method was investigated by using the transmission maps produced by the results of the DCP method on the Spectral Hazy Image Database (SHIA) dataset, which consists of hyperspectral images taken in the visible and near infrared band range. In this study, it was observed that the transmission response of different regions in the image to the increase in fog density was different. By using this distinctiveness on two foggy images taken from the scene in two different high fog level, this study achieves to reveal the silhouette of the scene which is totally not visible to human eye.