Get the complete project »
- The Complete Research Material is averagely 57 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦4,000
1.1 BACKGROUND OF THE STUDY
High level integration of information technology into aspects of modern life caused demand for processing vehicles as conceptual resources in information systems. There was also a need to transform information about vehicles between the reality and information systems. This can be achieved by special intelligent equipment which is able to recognize vehicles by their number plates in a real environment and reflect it into conceptual resources. Because of this, various recognition techniques have been developed and car plate recognition systems are today used in various traffic and security applications, such as parking, access and border control, or tracking of stolen cars.
Motor vehicle plate registration is the registration of a motor vehicle with a government authority, either compulsory or otherwise. The purpose of motor vehicle registration is to establish a link between a vehicle and an owner or user of the vehicle. This link might be used for taxation or crime detection purposes. While almost all motor vehicles are uniquely identified by a vehicle identification number, only registered vehicles display a vehicle registration plate and carry a vehicle registration certificate. Motor vehicle registration is different from motor vehicle licensing and roadworthiness certification. Motor vehicles may also be registered with property owners or managers to gain benefits. For example, organization with parking facilities may require registration of a vehicle with them to allow authorized users to park there.
A vehicle registration plate is a metal or plastic plate attached to a motor vehicle for official identification purposes. The registration identifier is a numeric or alphanumeric code that uniquely identifies the vehicle within the issuing region's database. In some countries, the identifier is unique within the entire country, while in others it is unique within a state or province. Whether the identifier is associated with a vehicle or a person also varies by issuing agency. Depending on the country, the vehicle registration plate may be called a license plate, tag, car plate or number. Most governments require a registration plate to be attached to both the front and rear of a vehicle, although certain jurisdictions or vehicle types, such as motorboats, require only one plate, which is usually attached to the rear of the vehicle. National databases relate this number to other information describing the vehicle; such as the make, model, color, year of manufacture, engine size, type of fuel used, Vehicle Identification (Chassis) Number, and the name and address of the vehicle's registered owner or keeper.
The term access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons. Physical access control can be achieved by a human (a guard, bouncer, or receptionist) through mechanical means such as locks and keys, or through technological means such as access control systems.
In the modern days, significant development in technology have been made, car plate numbers can be recognize from a reasonable distance by the use of cameras which captures images of the plate number and run the information through a data base for recognition. This is made possible by creating software that run on personal computer based, non-specialist hardware and other means.
1.2 STATEMENT OF THE PROBLEM
In developed countries, high measures have been put in place to control the rate at which unknown vehicles gain access into restricted areas. Auto theft has also been a challenging issue over the years. Security agencies are increasingly adopting the use of cameras to capture images from car plate number in which the data or information captured is run through a data base for recognition. This is easy to achieve because such countries provide themselves with surveillance cameras in strategic points, e.g street lights, traffic lights, government and private structures etc.
In developing countries, where there are limited or no resource to achieve an optical recognition system, yet it can still be achieved pending when the required materials or equipment is provided.
In Nigerian Defence Academy, implementing a system where vehicles are recognize by registering a car plate number into a data-base will go a long way helping the academy, security wise, in the sense that, cars that are not registered will not be allowed into the academy until they under-go proper security verification.
1.3 AIMS AND OBJECTIVES OF THE STUDY
The aim of this research work is to develop an application that will provide access control through computerized car plate recognition.
The objectives of the study are as follows:
1. To design a data base that will serve as repository for car plate numbers already registered within Nigerian Defence Academy.
2. To ensure quick collection of data about vehicles within the scope of study
1.4 SIGNIFICANCE OF THE STUDY
The proposed system will be of great advantage in controlling the rate at which un-authorized vehicles enter within the academy premises through the following ways.
1. Increase efficiency and performance; the difference between situation where by an officer on duty checks cars and then search the car before asking the driver questions in order to get details of who own the car and other related questions, will be seen as time consuming compared to when the plate number or information is manually entered into an onboard computer for verification. If such vehicle is recognized, there is no need for any question or waste of time, the car can be allowed to enter.
2. Enhance access control; the number of vehicles trying to enter the academy will be reduce, provided un-registered cars are not allow to by-pass the gate until they under-go serious verification which will in no way delay their advance.
1.5 SCOPE AND LIMITATION
Every project is carried out to achieve a set of goals with some conditions keeping in mind that it should be easy to use, and user friendly. As the goal of this project is to develop an application that will provide access control through car plate registration, this system will be designed keeping in mind the conditions (easy to use and user friendly) stated above. The proposed project’s intended user is; the security personnel of Nigerian Defence academy.
1.6 JUSTIFICATION OF THE NEW SYSTEM
i. Instant searching through Identification’s Number verification
ii. Instant generating of driver details(Registration)
iii. It goes wide range online to all end users of the website
iv. It also supports intranet, which clients can also check for verifications’ staffs check update online
v. Security implementation systems are embedded to disallow unauthorized personnel from accessing the staff information.
The use of Standalone Web Portal Server Technology together with Public Address subscribes from the Internet Service Provider (ISP) will provide access online widely online for the end users as well as the approach can be on a Local Area Network for multiple access users.
1.7 DEFINITION OF TERMS
i. Optical character recognition (OCR): This is the mechanical or electronic conversion of images of typewritten or printed text into machine-encoded text. It is widely used as a form of data entry from printed paper data records. It is a common method of digitizing printed texts so that it can be electronically edited, searched, stored more compactly, displayed on-line, and used in machine processes such as machine translation, text-to-speech, key data and text mining. OCR is a field of research in pattern recognition, artificial intelligence and computer vision.
ii. Automatic Car Plate Recognition (ACPR): This is a mass surveillance method that uses optical character recognition on images to read vehicle registration plates. They can use existing closed-circuit television or road-rule enforcement cameras, or ones specifically designed for the task.
iii. Surveillance: This is the monitoring of the behaviour, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting them. This can include observation from a distance by means of electronic equipment (such as CCTV cameras), or interception of electronically transmitted information using no, low or high technology methods.
iv. Car Plate: A vehicle registration plate is a metal or plastic plate attached to a motor vehicle for official identification purposes. The registration identifier is a numeric or alphanumeric code that uniquely identifies the vehicle within the issuing region's database.
v. Automation: This is the use of various control systems for operating equipment such as machinery, processes in factories, boilers and heat treating ovens, switching in telephone networks, steering and stabilization of ships, aircraft and other applications with minimal or reduced human intervention. Most processes today have been completely automated. The biggest benefit of automation is that it saves labor; however, it is also used to save energy and materials and to improve quality, accuracy and precision.
vi. Access Control: In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization. Locks and login credentials are two analogous mechanisms of access control.
You either get what you want or your money back. T&C Apply
Share a Comment
You can find more project topics easily, just search
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
» CHAPTER ONE 1.0 INTRODUCTION Several recent proposals have argued for giving third parties and end users control over routing in the network infrastru...Continue Reading »
48 pages | 492 hits | Source: COMPUTER SCIENCE
» ABSTRACT In an attempt to speed up the process of Examination processing system, here comes a need to create a fast, effective and efficient system wh...Continue Reading »
52 pages | 175 hits | Source: COMPUTER SCIENCE
3. DESIGN AND IMPLEMENTATION OF AN ELECTRONIC VOTING SYSTEM WITH FINGERPRINT AUTHENTICATION (A CASE STUDY OF FEDERAL UNIVERSITY OF TECHNOLOGY MINNA)» CHAPTER ONE BACKGROUND OF STUDY 1.0 Background of the Study Voting theory formally began in the 18th century and ever since, many proposal has been ma...Continue Reading »
55 pages | 317 hits | Source: COMPUTER SCIENCE
» ABSTRACT Authentication is unavoidable in any environment where sensitive information is utilized. In accessing resources via the Internet, the most c...Continue Reading »
90 pages | 416 hits | Source: COMPUTER SCIENCE
» ABSTRACT Android is the leading mobile operating system worldwide. Android became the leading mobile Operating System since 2011; almost 220 million s...Continue Reading »
57 pages | 219 hits | Source: COMPUTER SCIENCE
6. DESIGN AND IMPLEMENTATION OF A COMPUTERISED POPULATION CENSUS MONITORING SYSTEM A CASE STUDY OF NATIONAL POPULATION COMMISSION» ABSTRACT The purpose of the study was to design and implement a computer based population monitoring system for Enugu State.The researcher critically ...Continue Reading »
57 pages | 272 hits | Source: COMPUTER SCIENCE
» CHAPTER ONE 1.0 INTRODUCTION Information systems have become the backbone of most organizations. Banks could not process payments, governments could n...Continue Reading »
65 pages | 378 hits | Source: COMPUTER SCIENCE
» ABSTRACT Educational data mining (EDM) is a field that concentrates on prediction and is known for its role in uncovering hidden information from larg...Continue Reading »
52 pages | 192 hits | Source: COMPUTER SCIENCE
9. DESIGN AND IMPLEMENTATION OF A COMPUTERISED BILL OF MATERIAL PROCESSING SYSTEM A CASE STUDY OF NIGERIAN BREWERIES PLC 9TH MILE CORNER SIDE» ABSTRACT Computer has tremendously penetrated into every field of life. It makes work flow very easy. Interesting and result oriented. Bill of materia...Continue Reading »
52 pages | 335 hits | Source: COMPUTER SCIENCE
» CHAPTER ONE 1.0 INTRODUCTION In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today,...Continue Reading »
52 pages | 256 hits | Source: COMPUTER SCIENCE