Vehicle And Driver Archive Image Management System Design And Implementation |
Posted on:2013-07-12 | Degree:Master | Type:Thesis |
Country:China | Candidate:M Lu | Full Text:PDF |
GTID:2248330374986169 | Subject:Software engineering |
Abstract/Summary: | PDF Full Text Request |
Information Technology systems is applied in vehicle management and driver’smanagement for several years, and it provide Police Officers more convenience andhigh performance for the work of vehicle file management. By the network of thesesystems, information query/tracking becomes much easier for users. However, moreand more problems, like poor software architecture, are present as the application oftraditional car management system. Based on the analysis of how to improve thesoftware to face the more and more complicated system requirement,an extensible andmore security system architecture is designed in the thesis. The sub-modules of thissystem include: this article starts off scanning input, image query, image encryption,image recognition, auto vehicle image matching, storage and backup sub-system,security protect mechanism, database system. According to the referring relevantvehicle management policy of the Ministry of Public Security, P.R. China, the articleproposes one better modern vehicle file image management system, and presents oneusable solution for implement and operation.The modern systems include features as modular function and system structure,and also adapt to large information and key technology of information databaseintelligent processing. Information query is much more important, and with thenetwork of information systems, shared inquiry can increase traffic law enforcement’scapacity. By remote on line query, vehicles and drivers, who break the traffic law,like vehicle robbery, disuse, smuggling, assemble and so on, can be recognizedefficiently. The systems, instead of manual management, provide some automaticmechanical method to reduce mistakes of file management. When vehicle information ischanged, and also resolve problems of altering and losing data when information issearched. What’s more, data disaster recovery is another important aspect, and thesecurity of user permissions should be considered. |
Keywords/Search Tags: | file management, scanning input, image query, image encryption, rubbing distinguish, backup |
PDF Full Text Request |
Related items |