Building a Dedicated GSM GPS Module Tracking System for Fleet Management


Book Description

This book shows how to build a "INFelecPHY GPS Unit" (IEP-GPS) tracking system for fleet management that is based on 3G and GPRS modules. This model should provide reliability since it deals with several protocols: 1) HTTP and HTTPS to navigate, download and upload in real time the information to a web server, 2) FTTP and FTTPS to handle in a non-real time the files to the web application, and 3) SMTP and POP3 to send and receive email directly from the unit in case of any alert. Similar to a mobile device, but without screen for display, it is multifunctional because it links to a GPRS module, a camera, a speaker, headphone, a keypad and screen.




Building a Dedicated GSM GPS Module Tracking System for Fleet Management


Book Description

This book shows how to build a "INFelecPHY GPS Unit" (IEP-GPS) tracking system for fleet management that is based on 3G and GPRS modules. This model should provide reliability since it deals with several protocols: 1) HTTP and HTTPS to navigate, download and upload in real time the information to a web server, 2) FTTP and FTTPS to handle in a non-real time the files to the web application, and 3) SMTP and POP3 to send and receive email directly from the unit in case of any alert. Similar to a mobile device, but without screen for display, it is multifunctional because it links to a GPRS module, a camera, a speaker, headphone, a keypad and screen.




Data Intelligence and Cognitive Informatics


Book Description

The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and Cognitive Informatics (ICDICI 2023), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during June 27–28, 2023. This book discusses new cognitive informatics tools, algorithms and methods that mimic the mechanisms of the human brain which lead to an impending revolution in understating a large amount of data generated by various smart applications. The book includes novel work in data intelligence domain which combines with the increasing efforts of artificial intelligence, machine learning, deep learning and cognitive science to study and develop a deeper understanding of the information processing systems.




Management Information Systems


Book Description

Management Information Systems provides comprehensive and integrative coverage of essential new technologies, information system applications, and their impact on business models and managerial decision-making in an exciting and interactive manner. The twelfth edition focuses on the major changes that have been made in information technology over the past two years, and includes new opening, closing, and Interactive Session cases.




Science Abstracts


Book Description




Fleet Telematics


Book Description

This book combines wireless telematics systems with dynamic vehicle routing algorithms and vehicle-positioning systems to produce a telematics-enabled information system that can be employed by commercial fleet operators for real-time monitoring, control, and planning. The book further presents a Messaging And Fleet Monitoring System and a Dynamic Planning System (DPS) that provides real-time decision support considering the current state of the transportation system.




Location-Based Services


Book Description

Location-based Services (LBSs) are mobile services for providing information that has been created, compiled, selected or filtered under consideration of the users’ current locations or those of other persons or mobile devices. Typical examples are restaurant finders, buddy trackers, navigation services or applications in the areas of mobile marketing and mobile gaming. The attractiveness of LBSs is due to the fact that users are not required to enter location information manually but are automatically pinpointed and tracked. This book explains the fundamentals and operation of LBSs and gives a thorough introduction to the key technologies and organizational procedures, offering comprehensive coverage of positioning methods, location protocols and service platforms, alongside an overview of interfaces, languages, APIs and middleware with examples demonstrating their usage. Explanation and comparison of all protocols and architectures for location services In-depth coverage of satellite, cellular and local positioning All embracing introduction to 3GPP positioning methods, such as Cell-Id, E-OTD, U-TdoA, OTDoA-IPDL and Assisted GPS Explains the operation of enhanced emergency services such as E-911 Identifies unsolved research issues and challenges in the area of LBSs This comprehensive guide will be invaluable to undergraduate and postgraduate students and lecturers in the area of telecommunications. It will also be a useful resource to developers and researchers seeking to expand their knowledge in this field.




Enterprise IoT


Book Description

Current hype aside, the Internet of Things will ultimately become as fundamental as the Internet itself, with lots of opportunities and trials along the way. To help you navigate these choppy waters, this practical guide introduces a dedicated methodology for businesses preparing to transition towards IoT-based business models. With a set of best practices based on case study analysis, expert interviews, and the authors’ own experience, the Ignite | IoT Methodology outlined in this book delivers actionable guidelines to assist you with IoT strategy management and project execution. You’ll also find a detailed case study of a project fully developed with this methodology. This book consists of three parts: Illustrative case studies of selected IoT domains, including smart energy, connected vehicles, manufacturing and supply chain management, and smart cities The Ignite | IoT Methodology for defining IoT strategy, preparing your organization for IoT adoption, and planning and executing IoT projects A detailed case study of the IIC Track & Trace testbed, one of the first projects to be fully developed according to the Ignite | IoT Methodology




Iris Biometric Model for Secured Network Access


Book Description

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgentSystem (ICAS), which is based on a biometric method for authentication using the iris of the eyes and an asymmetric cryptography method using "Rivest-Shamir-Adleman" (RSA) in an agent-based architecture. It focuses on the development of new methods in biometric authentication in order to provide greater efficiency in the ICAS model. It also covers the pretopological aspects in the development of the indexed hierarchy to classify DRVA iris templates. The book introduces biometric systems, cryptography, and multi-agent systems (MAS) and explains how they can be used to solve security problems in complex systems. Examining the growing interest to exploit MAS across a range of fields through the integration of various features of agents, it also explains how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access. The book presents the various conventional methods for the localization of external and internal edges of the iris of the eye based on five simulations and details the effectiveness of each. It also improves upon existing methods for the localization of the external and internal edges of the iris and for removing the intrusive effects of the eyelids.




The Car Hacker's Handbook


Book Description

Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven’t kept pace with today’s more hostile security environment, leaving millions vulnerable to attack. The Car Hacker’s Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems. Then, once you have an understanding of a vehicle’s communication network, you’ll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker’s Handbook will show you how to: –Build an accurate threat model for your vehicle –Reverse engineer the CAN bus to fake engine signals –Exploit vulnerabilities in diagnostic and data-logging systems –Hack the ECU and other firmware and embedded systems –Feed exploits through infotainment and vehicle-to-vehicle communication systems –Override factory settings with performance-tuning techniques –Build physical and virtual test benches to try out exploits safely If you’re curious about automotive security and have the urge to hack a two-ton computer, make The Car Hacker’s Handbook your first stop.