Font Size: a A A

Research And Implementation Of Privileged Vehicles Supervision System

Posted on:2010-08-11Degree:MasterType:Thesis
Country:ChinaCandidate:J L XuFull Text:PDF
GTID:2178360302960863Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
In China, due to the existence of privileged vehicles, the issues on vehicles running became more serious for a long time. Firstly, lawless person take advantage of privileged vehicles to carry out criminal activities; Secondly, some leaders used privileged vehicles to serve themselves, what' more, they lend or rent license plate to seek exorbitant profits; Thirdly, the traffic accidents about privileged vehicles increased year by year; Fourthly, the department of privileged vehicles supervision could not fulfill their trust. Various reasons caused these phenomena becoming rampant. The national losses were huge. Therefore, it is very important to crack down on fake privileged vehicles and strengthen management to the privileged vehicles right now.Following rapid development of modern science and technology, embedded technology was no longer strange for people, wireless communication technology, global positioning technology, geographic information technology and image processing technology had been widely used in modern industry, military and life. In this paper, the supervision system of privileged vehicles, which combined a variety of modern technology, was designed to solve the problems concerned above. The whole system consisted of three parts: dispatch subsystem of vehicles, the control subsystem of parking access and supervision subsystem of vehicles running.The dispatch subsystem of vehicles and the control subsystem of parking access as supporting systems to the supervision system of vehicles were designed mainly to the strict management of privileged vehicles. There had been many cases about RFID-based access control systems. In this paper, long-distance radio frequency technology was used and image-recognition technology was joined, these technologies were used to realize the automation of access management. Supervision subsystem of vehicles running was the core in this paper, it consisted of information collection terminals and supervision center. The S3C2410 processor, whose core was ARM920T, was used to set up the hardware platform of collection terminal , customized and migration of embedded Linux operating system, developed a good human-computer interface with MiniGUI. The RFID module was used to collect vehicles' ID. The GPS module was used to collect geographic information. The CDMA module was used to send and receive messages. These three modules communicated with control module by serial port. Supervision center was built up based on the internal network. The main purpose was to process messages from collection terminals and determine the legality of military vehicles running. Supervision center using VC + + development tools, embed MapX control, achieved real-time monitoring of vehicles. Collection terminals and supervision center were communicated with each other by CDMA 1X network. This paper has completed the basic functions of the system, and passed the test in the laboratory.
Keywords/Search Tags:RFID, GPS, CDMA, GIS, image process
PDF Full Text Request
Related items