Vehicle Theft Catcher
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 6
Abstract
The process of finding stolen vehicle is very time-consuming for the cops. So, we are developing such a software that will help cops to find the STOLEN vehicle faster. For this reason there is a need for a system where the vehicle must have it’s unique and universal identity. In this project we are using the Ic which we will embed in the vechicle. Whenever the vehicle goes, it will have it’s unique and universal identity with it. When anybody stolen the vehicles, the owner of the vehicle register his/her complaints to the police station, then police will upload the information of stolen vehicle in the server database.If that stolen vehicle will passes through the range of receiver then the message will display on the tablet of police which contains the whole information about that stolen vehicle.So, this system can be useful to detect the vehicle and get it’s details like it’s insurance, registration details, vehicle information, current location and many more. Any person cannot hide the vehicles identity. The vehicle can be tracked anywhere in this world, where the universal vehicle catcher system is available.
Authors and Affiliations
Ms. Ketki Ram Bhakare , Ms. Samiksha Bhakare , Mr. Nitin Bhomle
Improved Shortest Remaining Burst Round Robin (ISRBRR) Using RMS as its time quantum
Round Robin (RR) performs optimally in timeshared systems because each process is given an equal amount of static time quantum. But the effectiveness of RR algorithm solely depends upon the choice of time quantum....
Evaluating NIST Metric for English to Hindi Language Using ManTra Machine
Evaluation of MT is required for Indian languages because the same MT is not works in Indian language as in European languages due to the language structure. So, there is a great need to develop appropriate evaluation...
Proposing Trust Count Based Validation Method to Lessen Internal Attacks in Mobile Adhoc Networks
Security is an essential service for wired and wireless network communications. The success of mobile ad hoc networks (MANET) strongly depends on people’s confidence in its security. However, the characteristics o...
Blind Image De-convolution In Surveillance Systems By Genetic Programming
surveillance systems has an important part as a Image acquisition and filtering, segmentation, object detection and tracking the object in that image. In blind image de-convolution .most of the methods requires tha...
Public-Key Infrastructure (PKI
This paper presents a survey on Public-Key Infrastructure (PKI). This discussion is centered on overview of public-key infrastructure, its key elements, PKI management functions, protocols, digital certificate format...