Performance Analysis of Acceleration Sensor for Movement Detection in Vehicle Security System
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 10
Abstract
The vehicle security system is a critical part of an entire car system in order to prevent unauthorized access into the car. As the statistic has shown that the number of cases of the private car being stolen is increasing and the recovery rate is decreasing sharply, it shows that the car security system failed to perform to prevent unauthorized access. Most of the vehicle security system simply consists of a few door-open detection switches, siren, and remote control to protect the car, which appears to be weak against experienced car theft. Therefore, the project is carried out to develop a vehicle security system that can measure the dynamic acceleration inside the vehicle using the ADXL345 accelerometer and locate the coordinate of the vehicle by using U-Blox Neo-6M GPS receiver. In order to evaluate the performance of the proposed vehicle security system, the experiment to determine the most suitable position among the four places inside a car to place the device was conducted. Then, the performance analysis of the GPS receiver for accurate tracking also was done. The results showed that the most suitable position to place the device is inside the center of the car dashboard and the GPS receiver has a mean cold start-up time of 5 minutes 47 seconds and hot start-up time of 11.72 seconds, with a standard deviation of 0.000003706° in latitude and 0.000002762° in longitude for position tracking.
Authors and Affiliations
A. M. Kassim, A. K. R. A. Jaya, A. H. Azahar, H. I. Jaafar, S Sivarao, F. A. Jafar, M. S. M. Aras
Detection of Visual Positive Sentiment using PCNN
Many people all over the world use online social networks to express their feeling and sharing their experience, and the easiest way from their perspective is using images and videos to do so. This paper shows the utiliz...
Cyber Romance Scam Victimization Analysis using Routine Activity Theory Versus Apriori Algorithm
The advance new digital era nowadays has led to the increasing cases of cyber romance scam in Malaysia. These technologies have offered both opportunities and challenge, depending on the purpose of the user. To face this...
IMPROVING THE SECURITY OF THE MEDICAL IMAGES
Applying security to the transmitted medical images is important to protect the privacy of patients. Secure transmission requires cryptography, and watermarking to achieve confidentiality, and data integrity. Improving c...
Predictive Method for Service Composition in Heterogeneous Environments within Client Requirements
Cloud computing is a new delivery model for Information Technology services. Many actors and parameters play an important role in provisioning of dynamically elastic and virtualized resources at the levels of infrastruct...
Glaucoma-Deep: Detection of Glaucoma Eye Disease on Retinal Fundus Images using Deep Learning
Detection of glaucoma eye disease is still a challenging task for computer-aided diagnostics (CADx) systems. During eye screening process, the ophthalmologists measures the glaucoma by structure changes in optic disc (OD...