International Journal of Advance Computational Engineering and Networking (IJACEN)
.
IRAJ Home     Conferences
FOLLOW
current issues
Volume-7, Issue-6  ( Jun, 2019 )
Past issues
  1. Volume-7, Issue-5  ( May, 2019 )
  2. Volume-7, Issue-4  ( Apr, 2019 )
  3. Volume-7, Issue-3  ( Mar, 2019 )
  4. Volume-7, Issue-2  ( Feb, 2019 )
  5. Volume-7, Issue-1  ( Jan, 2019 )
  6. Volume-6, Issue-12  ( Dec, 2018 )
  7. Volume-6, Issue-11  ( Nov, 2018 )
  8. Volume-6, Issue-10  ( Oct, 2018 )
  9. Volume-6, Issue-9  ( Sep, 2018 )
  10. Volume-6, Issue-8  ( Aug, 2018 )

Statistics report
Aug. 2019
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 77
Paper Published : 1176
No. of Authors : 2946
  Journal Paper

Paper Title
Improving Privacy and Cyber Security in Autonomous Vehicle Networks with Application to Smart Cities

Abstract
Smart cities offer various kinds of cyber parks. Information and communication technologies (ICT) are believed to make the e-economy, e-government, e-medicine, elearning, and e-society of a city more efficient and effective. The major goal is to encourage people to better use the outdoor environment in safety. Advanced ICT aims to promote the movement of people from virtual life to real life in society. In other words, information communication technologies and tools aim to free humans the prison called virtual life and its predominantly sedentary behaviors. ICT can be used to incentivize people to use public open spaces and to spend more time outdoors. This paper introduces ICT tools that are used in public places to promote human safety. Smart cameras have been installed in many places. However, their application to smart cities and natural settings is more recent and limited. ICT tools are implemented in smart cities to prevent crime and to increase the safety of outdoor activities. Security services include users’ position determination and signal tracking with the support of smart digital, mobile phones, the GPS/ GNSS, QR code, web services, and Wi-fi. User location can be determined by these services. When users request information about a place from the location- based server, the server needs to know the location of the user, and hence location information is normally requested. Furthermore, biometric of all types are considered an enhancement of visual surveillance. Biometric are already being used for identification and verification including fingerprint, face iris, speech, eye, and DNA analysis. Index Terms—ICT, privacy, information security


Author - Jamal Raiyn

| PDF |
Viewed - 44
| Published on 2018-12-22
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY