Font Size: a A A

Vehicle And Driver Archive Image Management System Design And Implementation

Posted on:2013-07-12Degree:MasterType:Thesis
Country:ChinaCandidate:M LuFull Text:PDF
GTID:2248330374986169Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Information Technology systems is applied in vehicle management and driver’smanagement for several years, and it provide Police Officers more convenience andhigh performance for the work of vehicle file management. By the network of thesesystems, information query/tracking becomes much easier for users. However, moreand more problems, like poor software architecture, are present as the application oftraditional car management system. Based on the analysis of how to improve thesoftware to face the more and more complicated system requirement,an extensible andmore security system architecture is designed in the thesis. The sub-modules of thissystem include: this article starts off scanning input, image query, image encryption,image recognition, auto vehicle image matching, storage and backup sub-system,security protect mechanism, database system. According to the referring relevantvehicle management policy of the Ministry of Public Security, P.R. China, the articleproposes one better modern vehicle file image management system, and presents oneusable solution for implement and operation.The modern systems include features as modular function and system structure,and also adapt to large information and key technology of information databaseintelligent processing. Information query is much more important, and with thenetwork of information systems, shared inquiry can increase traffic law enforcement’scapacity. By remote on line query, vehicles and drivers, who break the traffic law,like vehicle robbery, disuse, smuggling, assemble and so on, can be recognizedefficiently. The systems, instead of manual management, provide some automaticmechanical method to reduce mistakes of file management. When vehicle information ischanged, and also resolve problems of altering and losing data when information issearched. What’s more, data disaster recovery is another important aspect, and thesecurity of user permissions should be considered.
Keywords/Search Tags:file management, scanning input, image query, image encryption, rubbing distinguish, backup
PDF Full Text Request
Related items