Free Essay

Barcode License Plate Recognition

In:

Submitted By montessori
Words 6502
Pages 27
ABSTRACT
Barcode License Plate Recognition (BLPR) is a system capable of recognising number plates by scanning their barcodes for various different uses. A sophisticated barcode reader and algorithm converts the barcodes, into identifiable data. This allows the capture of critical information such as the registration of every vehicle entering a site or crossing the red light at traffics. This information can be passed to the police to assist in the pursuit and identification of contraventions.
Visual proof of traffic contraventions with the corresponding time and date information can be provided as evidence and to avoid disputes. Using information supplied by the Driver Vehicle Licensing Authority (DVLA), because of our approved operator status, it is possible to identify the registered keeper of a vehicle and process the contravention automatically.
The BLPR is to help eradicate road accidents on our roads which has become a headache to the government since all efforts are proving futile.
It is been developed with Visual Basic.Net and Structured Query Language(SQL) Server using the Waterfall model.
All data gathered by the BLPR system is stored in a database for future analysis and reporting.
This project will provide an efficient way of combating crime and making the work of the MTTU easier.
ACKNOWLEDGEMENT

Our greatest and foremost thanks goes to God the Almighty Father. To Him be the glory for the great things he has done. It is just by His grace and guidance that has made this work a success and fruitful.

We would like to express our gratitude to the management of the Driver Vehicle
Licensing Authority (DVLA) and the Motor Traffic and Transport Unit (MTTU) for providing us with the information that made this project a success.

Our greatest appreciation goes to Mr. Yeboah Paul of the Faculty of Information and Communication Sciences and Technology, CUCG, for his encouragement, guidance, contribution and for editing this project. We are also grateful to Miss Asante Audrey for her contributions to this project. It would be a mistake if no mention is made of the entire members of the staff of the Faculty of Information and Communication Sciences and Technology.

1.2 Objectives of the Study
A workable ANPR is integral to the monitoring of the safety of road users i.e. drivers, motorcyclists and pedestrians.

1.3 Significance of the Study
ANPR is an internationally recognized tool that can significantly reduce the volume of crime, heighten patrol focus, increase detection rates, tackle cross border crime and provide vital intelligence for use in counter terrorist and serious crime work. It is a technology that captures registration images displayed on all types of vehicle and transfers them to a database for intelligence and analytical purpose.
The ANPR puts information of crime immediately on the finger tips of the MTTU officers and the police, thereby giving them knowledge and power when combating crime. This allows the speed with which the police respond to crimes to be much faster and more precise because they have all the information about the perpetrators of the crime and their address.
This project is to help the police avoid the errors that occur in allowing humans manually record the number plates of road user rules offenders and also ensure that the right people are charged with the right offences committed by them.
This project is also to help other students who have interest in delving deeper into this area or project to have a fair idea of what the BLPR which is part of the ANPR is all about.
1.4 Methodology
The Waterfall Model was used in the development of this system. It provided a sequential design process in which progress in the software development cycle was seen as flowing steadily downwards along the requirement capture and analysis phase to the implementation and testing phases.
The choice of this model was based on the fact that it offers a much cheaper and economical way of dealing with and fixing bugs noticed in an early stage than at a later stage. This eliminates the scrapping off of work done over several months due to broken design which would be discovered in the implementation phase. In addition, the documentations that are done in each stage of development proves to be informational to new developers when some developers leave before the completion of the work. Due to object oriented support in VB.NET, various concepts (like reusability, polymorphism, isolation etc.) are already there but for the efficient management of system components, Component based Software Engineering will also be exercised which will help in a resultant library of components, the benefit of which will be reusability and fast development. . Testing will begin from the lower levels of the system and will move towards higher level components, which will be based on design phase rather than coding phase.

1.5 Organisation of the Project
The first chapter of the project is the introduction which comprises the background of the study, problem statement, objectives of the study, significance of the study, methodology and the organization of the project, the subsequent chapter delves into the literature review, the theoretical framework of the whole project and the empirical evidence that accounts for works, thus existing systems. Chapter three talks about the system, the procedures used to gather the data for the study or project. While chapter four centers on the design specification and Implementation of the system, recommendation and conclusion sums up the project in chapter five.

CHAPTER TWO
LITERATURE REVIEW
2.0 Introduction
Automatic Number Plate Recognition is a mass surveillance method that uses optical character recognition on images to read vehicle registration plates. They are used by various police forces and as a method of electronic toll collection on pay-per-use roads and cataloging the movements of traffic or individuals. ANPR and Facial Recognition Systems have proven to be an effective way to combat crime and control reckless driving on roads in developed countries.[7]
2.1 Theoretical framework
2.1.1 History of Automatic Number Plate Recognition (ANPR)
Automatic Number Plate Recognition was invented in 1976 at the Police Scientific Development Branch in the UK. Prototype systems were working by 1979, and contracts were let to produce industrial systems, first at EMI Electronics, and then at Computer Recognition Systems (CRS) in Wokingham, UK. Early trial systems were deployed on the A1 road and at the Dartford Tunnel. The first arrest through detection of a stolen car was made in 1981.
Concerns about these systems have centered on privacy fears of government tracking citizens' movements, misidentification, high error rates, and increased government spending. On 11th March 2008, the Federal Constitutional Court of Germany ruled that some areas of the laws permitting the use of automated number plate recognition systems in Germany violated the right to privacy. More specifically, the court found that the retention of any sort of information (i.e. Number Plate data) which wasn't for any pre-destined use (e.g. for use tracking suspected terrorists or for enforcement of speeding laws) was in violation of German law. These systems were provided by Jenoptik Robot GmbH, and called TraffiCapture.
In Australia, several State Police Forces, and the Department of Justice (Victoria) utilise both fixed and mobile ANPR systems. The New South Wales Police Force Highway Patrol was the first to trial and use a fixed ANPR camera system in Australia in 2005. In 2009 they began a roll-out of a mobile ANPR system (known officially as MANPR) with three infrared cameras fitted to its Highway Patrol fleet. The system identifies unregistered and stolen vehicles as well as disqualified or suspended drivers as well as other 'persons of interest' such as persons having outstanding warrants.
Also, The UK has an extensive (ANPR) automatic number plate recognition camera network. Effectively, the police and security services track all car movements around the country and are able to track any car in close to real time. Vehicle movements are stored for two years in the National ANPR Data Center to be analyzed for intelligence and to be used as evidence.
In 1997 a system of one hundred ANPR cameras, codenamed GLUTTON was installed to feed into the automated British Military Intelligence Systems in Northern Ireland. Further cameras were also installed on the British mainland, including unspecified ports on the east and west coasts. [8]
2.1.2 Advantages of ANPR
The ability to automatically identify vehicles by their recognition numbers can be beneficial for several reasons since the ANPR aims to a. Reduce crime and terrorism. b. Reduce road traffic casualties. c. Increases the number of offences brought justice. d. Increase public perceptions of safety and confidence in the police. e. Make more efficient the resources of the police.
2.1.2 Disadvantages of ANPR
There are a number of possible difficulties that the software must be able to cope with. These include: a. Poor image resolution, usually because the plate is too far away but sometimes resulting from the use of a low-quality camera. b. Blurry images, particularly motion blur. c. Poor lighting and low contrast due to overexposure, reflection or shadows. d. An object obscuring (part of) the plate, quite often a tow bar, or dirt on the plate. e. A different font, popular for vanity plates (some countries do not allow such plates, eliminating the problem). f. Circumvention techniques. g. Lack of coordination between countries or states. Two cars from different h. countries or states can have the same number but different design of the plate.
2.1.3 History of Barcodes
Also, Barcode It has evolved from a punch card system, designed to speed the purchasing process, to the modern barcodes we see on every product imaginable. The original punch cards proved to be too expensive and the idea was abandoned by its inventor. More than a decade later the barcode as we know it took shape in its simplest form. The original or prototype system used ultraviolet ink but it had a propensity for fading and therefore not feasible; it was also fairly expensive and not economically viable.
The basic idea for the barcode came from Morse code but the dots where extended into lines that alternated black and white in a parallel fashion, and this is still the case today. The original method of scanning the barcode to identify the product was accomplished through high wattage light bulbs, 500 watts to start with, and was used in conjunction with a film industry photomultiplier. This increased the intensity of the light and made the scanning easier for the time being. As more and more companies needed to cut costs and wanted a system for inventory, more technology needed to be invented to make the system feasible.
As the barcode history progressed, more ideas and innovations were developed and implemented. The parallel lines we recognize as barcodes were not the only form of identification used in the development of barcodes. These are categorized as 2D barcodes or a matrix code. These complex codes were represented in patterns of dots, circles, and a variety and blending of geometric shapes. The complexity of the shapes allows this system to contain more data in a code, but wasn't used nearly as much as linear barcodes or 1D barcodes. These kinds of barcodes can be found in cellular phone applications such as encoding URLs and images, as well as purchased ticket information for movies and sporting events on a cellular phone.
It wasn't until the 1960s that barcodes were scanned with a laser, a helium neon laser to be exact. At first only a single laser was used to scan the barcode but soon the addition of other lasers at separate angles were added to make the process more efficient and easier to use. The laser interprets the width of the black lines; each number has its own specific width. The white spaces tell the laser were one number ends and the next begins. Any string of numbers in any order or length can be scanned against a database of information to account for inventory, sales and purchases. Today we use a standardized 11 digit code that identifies any unique product. This code is referred to as the UPC, or Universal Product Code.
This was put into practice in 1973 as a test by the Kroger Corporation and it used a system of "bull's eye" patterns instead of the parallel line patterns we are used to. The system proved unusable as the printed codes were often smeared and could not be read.
One year later the IBM system of barcode lines was adopted and the modern barcode history was born. These barcodes are now used for absolutely everything we purchase from virtually any industry from new cars to new computers - and from baseball tickets to surfing the web with our cellular phones and PDAs. There are few parts of our lives that are not touched by a barcode; they have become an integral part of our everyday lives.[17]

2.1.4 Advantages of Barcodes
Barcode systems provide an array of benefits, including operational efficiency, better customer service, and improved visibility of key business information to management. They also speed up work since the work that would have been by typing can be done within a second by just scanning the barcode.
They also help to avoid errors that arise from typing and provide high level of reliability.
2.1.5 Disadvantages of Barcodes
Despite all the advantages associated with barcodes, they have drawbacks i. System Failure may cost more delays. ii. Scratched or crumpled barcodes may cause problems. iii. Data must be coded in the barcode which will take time. iv. In laser scanning, durability and cost are the two disadvantages . 2.2 Empirical Evidence and Related Works
Many Software companies have developed ANPRs with different capabilities. Some of these companies and their ANPR software include
AASSET Visualisation and Management Software, GeoVision Car License Plate Recognition, HoneyWell Fusion ANPR, Geutebruck Car License Software, Artec Multieye-ANPR. It is hypothesized that ANPRs help to reduce the number of crimes and road accidents and the following five literature reviews attempt to demonstrate and support this hypothesis.
The AASSET Visualization and Management Software was developed by the AASSET Securities with the aim of reducing road accidents and car theft mainly in South Africa. The Software has the following features. It allows visualizing in real time and recording vehicle flow, searching by time slot, name or plate number, administration of vehicle and visitors access rights, Vehicle count (total and by section), Administration of authorized parking period. Visualizing in real time and recording vehicle flow helps to know the movement of all vehicles on the road since the cameras connected to this software are virtually everywhere. This therefore helps to trace vehicles especially vehicles being pursued by the police for committing crimes. Also, giving visitors and vehicle access rights helps to trace unregistered vehicles and vehicles on the roads without proper authorization. The capabilities of this software support the hypothesis that the ANPR helps to reduce crime and road accidents. One limitation to this software is that it runs only on Windows 2000 Professional or Windows XP Professional.[9]
Next is the GeoVision LPR system which is capable of identifying vehicles by their license plates. It uses access-control systems and CCTV (Closed Circuit Television) cameras to capture images of the plate. The CPR software when used for car parking management reads the license plate of vehicles, signals to the parking gate and keeps a time record on the entry or exit of the parking lot for automatic payment calculations. It has the following features. It is able to detect unauthorized plates and then send immediate alarm to guard or the police force to take immediate actions, records images in JPEG(Joint Photographic Experts Group) format, applies Digital Watermark Technology for legitimate record and support recycle and backup features. The features of this software also support our hypothesis. The only limitation to this software is that it only works with cameras. [10]
Also The Geutebruck Software License is an ANPR software that can capture multiple images and save them as channels. The picture data of the selected channel are analyzed for number plate information according to parameter settings and country code. If a number plate is recognized, the corresponding metadata are assigned to the image in the picture database for later analysis. Every available channel under GeViScope and reporter (analog or IP) can be used for the number plate analysis. The number plate data are stored in the system, categorized and saved in a black/white list. Configurable system actions can then be triggered depending on the category and black/ white list assignment of a recognized number plate. It can monitor roads 24hrs and with its country code, it is able to detect unregistered cars brought into a country from another country. This feature introduced aids in international car theft. This features that are incorporated into this software supports the hypothesis that the ANPR helps in combating crime especially on our roads. [11]

The Intertraff Plate Recognition Software is an ANPR Software which provides solutions for access control, security, law enforcement, traffic and parking applications using our number plate recognition software. The license plate recognition software applications are all based around Intertraff ANPR Engine, which locates the number plate in an image and extracts the registration number for further processing. It can read Latin characters as well as Arabic number plates. Some of the features of this software include the ability of being able to monitor contemporarily 5 lanes of traffic. It also uses cameras which work perfectly even in de worst conditions and helps in Intrusive and unintrusive vehicle detection technology, barrier controls which gives access to only known cars and plates in particular countries with specified number plates. Therefore any unknown vehicle plate number is not given free pass across barriers. This has helped in solving cases which involves car theft and removal of license plates. The features of this ANPR software describe and support the hypothesis that these software help in solving crimes related to vehicles. The limitation to this software is that it only runs on systems running a windows XP operating System. [12]

Lastly the ARTEC Multieye-ANPR Gate Software is an ANPR system which is used for the access control of vehicles. Access and exit controls are situated in front of barriers, car parks or the registration of supplier vehicles on company grounds. This software is used on company grounds to give access to authorized vehicles and also only allows authorized vehicles to exit the company grounds. This software can monitor two lanes. Number plates out of over 40 countries are recognized and registered safely and reliably. The concept behind this whole software is to make sure cars with plates been fed into the system are only allowed to reduce theft on company grounds. The software in one way or the other supports the hypothesis of our work that the ANPR system in a great way aids in combating crime.[13]

Taken together all the features and capabilities of these individual software, it indicates that the ANPR system plays a major role in controlling the use of our roads and aiding law enforcement agencies in their work. ANPR has led to thousands of arrests for offences including possessing offensive weapons, burglary and drug dealing, as well as the seizure of over many thousands of unsafe vehicles. ANPR targets criminals, not innocent law abiding motorists. ANPR does not only reduce crime but it is also used to reduce road deaths and serious injuries. It can be assumed from the above five literature reviews that the ANPR system cannot be put aside if law enforcement agencies have the aim of checking traffic light rule violations, unworthy road vehicles, car thefts, speeding and all sort of road and vehicle crimes.

CHAPTER THREE
METHODOLOGY OF THE PROPOSED SYSTEM
3.1 Introduction
This chapter contains in detail all the processes involved in developing this system. These processes include the ways in which information was gathered and analyzed, Modeling diagrams used, case tools used and other procedures employed.

3.2 The Proposed System
The Barcode License Plate Recognition (BLPR) System is developed to help the security agencies especially the MTTU department of the Police Service to fight crime and control road accidents. This system allows real time information on the owner of a vehicle to be provided to the police as and when a crime is committed by that fellow.
This system is built using VB.NET and SQL Server. A barcode reader is used to extract the information of the vehicle that causes the flouting of the road safety rule by scanning it's barcode.

3.3 Development Approach
A Software Development Life Cycle (SDLC) is essentially a series of steps, or phases, that provide a model for the development and lifecycle management of an application or piece of software. The methodology within the SDLC process can vary across industries and organisations. [16]

The Waterfall Model was used in the development of this program. This Methodology provides a sequential design process in which progress in the software development cycle is seen as flowing steadily downwards along the requirement capture and analysis phase to the implementation and testing phases.

Fig.11 Model Used
A. Requirement Analysis This is the phase where all the information needed for the development of the system were gathered. Most of the requirements were gathered through participatory observation of how the MTTU does their work especially how they control traffic. Interviews were also conducted to get information from the management of both the DVLA and the MTTU. The interview was done using the informal, conversational format which made the interview very broad and very informational. Through the interview, the types of crimes that were committed most by drivers and motorists, the amount of fine the police would want to charge in the case where some specific crimes are committed were all known. Also all the information required by the DVLA in order to register cars was also known.
The requirements captured were divided into two major parts: Functional and Non-functional requirements. The functional requirements show the functions and behaviour of the system whilst the non-functional requirements show requirement that are not concerned with specific functions of the system.
i. Functional Requirement
The specific functions of the system shows the services and tasks performed by the system. These include 1. Number plate capture 2. Barcode image to text conversion 3. Request information from the database 4. Update existing information in the database 5. Keep records of all persons and their activities.

ii. Non –Functional Requirements
Non-Functional Requirements show properties such as reliability, data storage capacity, space and performance as well as delivery requirements.

Non-functional requirements

External requirements
Product requirements
Organizational requirements

Interoperability requirement
Ethical requirements
Portability requirements
Reliability requirements
Efficiency requirements

Legislative requirements
Standard requirements
Implementation requirements
Delivery requirements

Usability requirementss

Safety requirements
Space requirements
Performance measure

Privacy requirements

Fig. 1 Non-functional requirement types

Table 3.1 Non-functional requirements of ANPR NON-FUNCTIONAL REQUIREMENTS | Product requirements | ANRP is;a. efficient and reliableb. maintainablec. robust since its able to recover user information | | Organizational requirements | ANRP will be used by the police to check law flaunters. only the administrator would have the access into creating an account for a new customer. | | External requirements | a. customers should be able to make payments themselves when billed.b. customers should be able to ask for proof of the offence they are being accused of. |

B. System Design
After gathering all the information needed from both the MTTU and DVLA, The system to be developed was designed on paper and this included the number of forms that were going to be needed to suit the requirements that had been gotten that is the overall structure of the system. How to set privileges, send bills when specific crimes are committed and also retrieve the information of cars and make available to other stations when drivers commit crimes.
Database Design

A good application always has a well-structured, normalized and secured database. The database for the BLPR was designed such that accessing data from the database would not be much of a problem. Redundancy in a database was a problem that was addressed in the creating of this database. This ensured that the database was free of information duplication.
The automatic number plate recognition system’s database was built to capture all the necessary data required about users and their activities. Below are models showing the components of the database

Fig.2 Database Design

Normalization
Normalization is a technique that can be used in reducing redundancies in tables in databases. There are many forms of normalization and we decided to use two of the many forms, the first and the second (1st, 2nd) normal forms.
First normal form (1NF): the first normal form is satisfied if all duplicative columns in the same table are eliminated and new tables created for each group of related data each row with a unique column or set of columns are identified. All tables in the system have been normalized in this form.
Second normal form (2NF): in the second normal form, all requirements for the 1NF are met and subsets of data that apply to multiple rows of the table are removed and placed in separate tables. Also relationships between these new tables and their predecessors are created through the use of foreign keys.

Entity Relationship Diagram
The entity relationship diagram shows all the entities in the database and their attributes. It also shows connections between some of these entities and the relationship between them.

Fig.3 Entity Relationship Diagram

The entity relationship diagram shown above shows how we connected all the entities in the database. In all, as it can be seen, we have 6 entities in the database.

The Car entity is used to store information of all registered cars and also store identity(ID's) of cars that have been registered and have either been stolen or have been used to commit a crime. The License plate number of the Car is used as the primary key in this table that is carID. The Car entity is linked with the Crime entity based on the CrimeID which is a primary key in the Crime entity and is a foreign key in the Car entity.
It is also linked with the Stolen Cars entity based on the stolenID which is a primary key in the Stolen Cars entity and is a foreign key in the Car entity.

Since registration of cars is based on information about the car and also the owner of the car, the Registration entity which is used to save information about the owner of the car is linked with the Car entity based on the License Plate Number of the car which is a primary Key in the cars table (carID) and is a foreign key in the Registration table.

The Stolen Cars entity is used to save all the information about cars that have been stolen and reported. An ID is automatically generated for a car that is been reported as stolen and this ID is used as a primary key in this table and sent to the Cars table or entity to be a foreign key in there. Therefore every registered Car that is been reported stolen automatically has a stolenID linked to it. This makes it easier to search for all registered cars that have been stolen. Also the same ID is sent to the Found table to be a foreign key if fortunately the Car is found after being reported stolen.

The Found Entity or table is used to store information of all cars that have been stolen and then later been found. All cars that were previously in the stolen cars table are moved to this table when they are found in a later date. An auto incremented count is used as a primary key in this table and this primary key just increases itself according to the number of entries made into this table. It is linked with the stolen cars entity or table based on the stolenID created for cars when they are reported stolen in the stolen cars table.

The crime table or entity is used to save all the information about cars that have been used to commit crimes and been captured by the camera or reported manually. A distinct ID is generated for each crime reported both manually or automatically and this ID is used as primary key in this table and is sent to both the Cars and Solved table as a foreign key.

The Solved entity or table is used to hold information about all crimes that have been reported and have been solved. An auto incremented count is used as the primary key. This primary key increases as per the number of entries made into this table. The crime that has been solved's ID is used to link the Solved entity to the crime entity.

The Security Entity or table is used to save all the information about the users who will be granted access to the software. The username they choose is the primary key in this table or entity.

Case Tools Employed
Different tools were used for different parts of this system, from designing the front end to the hard coding. This part shows most of the tools used in the development of this project.
Microsoft Visio 2007: Microsoft Visio is a diagramming tool that can be used to visually communicate technical as well as non-technical representations of ideas, processes, concepts, structures, layouts, software models, blueprints, etc. Microsoft Visio eliminates the laborious process of creating diagrams by providing the tools to create complex diagrams in a user friendly manner [15]. It is used in developing database models including the entity relationship diagram, relational model etc. This software was used in designing the entity relationship diagram of the database used for ANRP.
Visual Basic.NET (VB.NET)
The VB.NET is an object-oriented computer programming language that can be viewed as an evolution of the classic Visual Basic (VB), implemented on the VB.NET Framework.
Visual Basic.NET offers the most productive and easiest language and it acts as a tool for rapidly building web and Windows applications. It offers a powerful integrated development environment, increased application performance and enhanced visual designs.
Data access scenario can be easily tackled with ActiveX Data Object(ADO) and ActiveX Data Object.Net(ADO.NET) data access. The flexibility of ADO.NET enables binding of data to any database as well as arrays, collections and classes and offers true Extensible Markup Language( XML) representation of data. With the help of ADO.NET, VB.NET can gain access to Microsoft access, Oracle, Microsoft Structured Query Language (MS SQL) Server, etc. with high speed.
With the help of VB.NET coding can be done effectively at a faster pace. A multitude of enhancements to the code editor, including background compiler of real-time notification of syntax errors, smart list of code and enhance IntelliSense transforms into a rapid application development coding machine.
Apart from the above-mentioned features and uses, VB.NET offers other advantages like direct access to the platform, full object-oriented construction, XML Web services, mobile applications, COM interoperability, reuse existing investment, upgrade wizard, etc.
Microsoft SQL Server There are at least a dozen different editions of Microsoft SQL Server aimed at different audiences and for different workloads (ranging from small applications that store and retrieve data on the same computer, to millions of users and computers that access huge amounts of data from the Internet at the same time). Its primary query languages are T-SQL and American National Standard Institute (ANSI) SQL.
SQL Server 7.0 and SQL Server 2000 included modifications and extensions to the Sybase code base, adding support for the IA-64 architecture. By SQL Server 2005 the legacy Sybase code had been completely rewritten.
SQL Server is one of the world's most flexible and complex database that offers a variety of administrative tools that makes development of database, maintenance and administration easy. Its primary query language, SQL Server is an application that is used to create computer databases for Microsoft windows family of server operating systems. It would serve as the backend. This was chosen because it has the ability to withstand multiple hits at any point in time without crashing. This capability allows our safety critical system to remain operational during peak hours where there is much traffic and the possibilities of lots of traffic offences may be committed.
C. Deployment After doing our integration test and realising that everything worked perfectly, we then decided to see how the whole system works in a user environment. So we got a barcode scanner and a few barcodes to see if after registering the barcodes as license plate numbers, and then scanning them with the barcode reader, the system will be able to retrieve it's information, update other networked stations and then send a bill into the mail of the offender.

The choice of this model was based on the fact that it offers a much cheaper and economical way of dealing and fixing bugs noticed in an early stage than at a later stage.
Also the choice of the waterfall model was based on the fact that it is easy to use and implement and also easy to manage due to the rigidity of the model that is each phase has specific deliverables and a review process.
It helps to avoid starting work done over several months due to broken design which would be discovered in the implementation phase. In addition, the documentations that are done in each stage of development proves to be informational to new developers when some developers leave before the completion of the work. Due to object oriented support in VB.NET, various concepts (like reusability, polymorphism, isolation etc.) are already there but for the efficient management of system components, Component based Software Engineering was exercised which helped in a resultant library of components, the benefit of which was reusability and fast development. Testing was done from the rudimentary levels of the system and moved towards higher level components, which was based on design phase rather than coding phase Words.

4.3 System Testing and Implementation
a. Implementation
After having all the design structure on paper, the system was developed in bits that is the coding of the system was started. Development of the log in page which holds the key to the security of the software was done first. This is where all privileges set as to which type of users have access to which parts of the system. The homepage which was going to be the main navigational part of the system was then developed. Giving users access to perform specific kind of tasks. The individual tasks the system was going to perform were developed afterwards until the last stage where the user logs out and ends his or her session was done with. All these individual parts of the system were developed after each part or unit was developed, tested and seen as been complete.

b. Integration and Testing
Every system upon completion has to be tested to ensure there are no bugs, errors or mistakes in the program that is why BLPR was very well tested. This system was tested using the divide and conquer method of testing. This method of testing requires that the system be divided into modules or units and tested accordingly before bringing together every module to form the entire system.

After developing the individual components of the system, they were brought together to see how they will function and then get to know the errors that were going to arise after they were been integrated. Each unit was tested for syntax, logical and semantic errors and measures were put in place to reduce user errors. Feedback features were also added to the application such that users would not be stuck on a particular error message and not know what to do in handling such messages. Input errors on the part of the user were taken into consideration during the validation of input boxes and other places user input is required. Validations were also checked to make sure that even after integrating them, they still worked.

After testing the system, bugs were found and all of them were dealt with to make sure the system was bug or error free.
4.4 Maintenance
The BLPR system has been designed in such a way that, making changes to its functionalities will be easy. Maintaining it is therefore not much of a problem. The codes written for the functionalities have been commented to enable the understanding of the codes by different programmers; that makes the maintenance of this system very easy. The system is one that checks the daily activities of road users; therefore it would have to be updated as and when something new that has got to do with road users pops up. This would ensure that the BLPR system stays functional meeting the needs of the changing time.

CHAPTER 5
CONCLUSION AND RECOMMENDATIONS
5.1 Introduction
The project on its completion has been evaluated and some recommendations were made. The conclusion and recommendations for this project are shown in this chapter. It is necessary that the outcome of this project compares to the objectives set for the project. The evaluation of the methodologies used in the development of this project is done in this chapter as well.

5.2 Evaluation of Project
The development of this project has been a success since the most important objective of the project, the capability of the MTTU to be able to prevent reckless driving on the road has been met. The system is very efficient since it is able to process information at a very fast rate and also generate reports based on certain specifications by the administrator.

5.3 Architecture
The 3-tier architecture was employed in the development of this project where the presentation layer, application layer and the storage are separate from each other. The user of the network only gets to see the presentation and storage layer enabling a fast connection to the database, and with the use of a computer that has the software installed on it, one with a unique and valid user id can have access to report crimes as well as know the perpetrators of crimes. The storage (database) however, can be on a different computer (server) and managed by the administrator.

5.4 Technology Used
The major tool used in the creation of the BLPR system is visual basic.net. This was a very adequate tool in terms of the interface design and coding. It helped in the design of the project interfaces and also in generating some of the codes that we used.

Similar Documents

Free Essay

A Survey of Ocr Applications

...Abstract—Optical Character Recognition or OCR is the electronic translation of handwritten, typewritten or printed text into machine translated images. It is widely used to recognize and search text from electronic documents or to publish the text on a website. The paper presents a survey of applications of OCR in different fields and further presents the experimentation for three important applications such as Captcha, Institutional Repository and Optical Music Character Recognition. We make use of an enhanced image segmentation algorithm based on histogram equalization using genetic algorithms for optical character recognition. The paper will act as a good literature survey for researchers starting to work in the field of optical character recognition. Index Terms— Genetic algorithm, bimodal images, Captcha, institutional repositories and digital libraries, optical music recognition, optical character recognition. I. INTRODUCTION Highlight in 1950’s [1], applied throughout the spectrum of industries resulting into revolutionizing the document management process. Optical Character Recognition or OCR has enabled scanned documents to become more than just image files, turning into fully searchable documents with text content recognized by computers. Optical Character Recognition extracts the relevant information and automatically enters it into electronic database instead of the conventional way of manually retyping the text. Optical Character Recognition is a vast field with a...

Words: 3379 - Pages: 14

Free Essay

Sample

...Table of Contents I. II. III. History of the Envelope An Overview of Envelope Beginnings Introduction to the Envelope Envelope Construction and Types Standard Sizes and How They Originated The Beginning of Size Standardization Envelope Construction, Seams and Flaps 1. Seam Construction 2. Glues and Flaps V. Selecting the Right Materials 1. 2. 3. 4. 5. 6. 7. VI. VII. VIII. IX. Paper & Other Substrates Window Film Gums/Adhesives Inks Envelope Storage Envelope Materials and the Environment The Paper Industry and the Environment IV. Talking with an Envelope Manufacturer How to Get the Best Finished Product Working with the Postal Service Finding the Information You Need Final Thoughts Glossary of Terms 1 Forward – The EMA Guide to Envelopes & Mailing The envelope is only a folded piece of paper yet it is an important part of our national communications system. The power of the envelope is the power to touch someone else in a very personal way. The envelope has been used to convey important messages of national interest or just to say “hello.” It may contain a greeting card sent to a friend or relative, a bill or other important notice. The envelope never bothers you during the dinner hour nor does it shout at you in the middle of a television program. The envelope is a silent messenger – a very personal way to tell someone you care or get them interested in your product or service. Many people purchase envelopes over the counter and have never stopped to think about...

Words: 21505 - Pages: 87

Premium Essay

Hospital Capstone Charter & Scope

...os St. Catherine Specialty Hospital Designing the Future of IP-based Healthcare Data Networks _________________ Project Charter Document with Scope Table of Contents A. General Project Information Page 3. B. Project Objectives -Project Mission Statement -Business Case -Problem Statement -Goal Statement -Definition of Terms Target Project Goals Page 4. Acceptance to Terms of Deliverables Key Project Directives Page 5. C. Project Assumptions Page 6. Telecommunication Location Specification Page 8. Telecommunication Room Specifications Telecommunication Power Requirements Additional Network Requirements Page 9. Project Deliverables Page 12. D. Project Scope Page 14. ScopeAgenda Fulfilling IP Convergence Requirements Network Verification Requirements Page 16. Work Area Designations Infectious Control Requirements Page 17. Cable Run Specifications Page 18. Scope Exclusions Page 20. E. Project Milestones Page 21. F. Impact Statement Page 22. G. Roles & Responsibilities Page 23. H. Resources Page 24. I. Project Risks Page 25. J. Success Measurements Page 26. K. Project Participant Signatures Page 27. A. - General Information Project Title: | St. Catherine Specialty Hospital - Network and Data Infrastructure | Brief Project Description: | New hospital...

Words: 8359 - Pages: 34

Premium Essay

Student

...Do The Deep Information Computer Technology Author Musisi Boney 2013 EDITION Authored by Musisi Boney; +256788489095 2 Table of contents Topics Page Introduction To Computer …………………………………………………….. 5 History & Evolution Of Computers ………………………………………….... 7 Computer Generation …………………………………………………………. 11 Computers Today ……………………………………………………………... 15 Computer Classification ………………………………………………………. 19 Computer System ……………………………………………………………... 25 Computer Hardware ………………………………………………………….. 27 - Input devices/hardware .………………………………………………..27 - Output devices/ hardware..…………………………………….…….....39 - Storage hardware /devices ……………………………………………..49 - Processing devices/hardware …………………………………………..63 - Communication devices/hardware…………………………………….. Computer Software …………………………………………….……………...69 - Utility program …………………………………………………………70 - Operating system ……………………………………………….………72 - Programming languages ………………………………………………78 - Terminologies Used in Software ………………..……………….…....80 Powering A Computer ……………………………………………….………..83 Uninterrupted Power Supply……………………………………………….....85 Computer Configuration…………...…………………………….……………87 Computer Viruses ……………………………………………….……………89 Communication ………………………………………………………………95 Internet ………………………………………………………………………113 Web Design …………………………………………………………………121 Computer Ethics …………………………………………………….………125 Computer Crimes …………………………………………………….……..129 Authored by Musisi Boney; +256788489095 3 Authored by Musisi Boney; +256788489095 4 A COMPUTER ...

Words: 30445 - Pages: 122

Free Essay

Footwear and Leathergoods Sector Footwear Making Nc Ii

...TABLE OF CONTENTS FOOTWEAR AND LEATHERGOODS SECTOR FOOTWEAR MAKING NC II | |Page No. | | | | |PREFACE | | |FOREWORD | | | | | |SECTION 1 FOOTWEAR MAKING NC II QUALIFICATION |1 - 2 | | | | | | | |SECTION 2 COMPETENCY STANDARDS |3 - 103 | | | | |Basic Competencies ...

Words: 18251 - Pages: 74

Premium Essay

Test

...Request for Proposal  UK‐1357‐14  Proposal Due Date – 04/17/14      Environmental Health & Safety Software‐Based  Research Facilities Inspection and  Recordkeeping System  An Equal Opportunity University  REQUEST FOR PROPOSAL (RFP) ATTENTION: This is not an order. Read all instructions, terms and conditions carefully. PROPOSAL NO.: Issue Date: UK-1357-14 RETURN ORIGINAL COPY OF PROPOSAL TO: 3/20/2014 UNIVERSITY OF KENTUCKY Environmental Health & Safety SoftwarePURCHASING DIVISION Based Research Facilities Inspection and 411 S LIMESTONE Title: Recordkeeping System ROOM 322 PETERSON SERVICE BLDG. Purchasing Officer: Joyce Holmberg LEXINGTON, KY 40506-0005 Phone: 859-257-9104 IMPORTANT: PROPOSALS MUST BE RECEIVED BY: April 17, 2014 @ 3 P.M. LEXINGTON, KY TIME. 1. NOTICE OF REQUIREMENTS The University’s General Terms and Conditions and Instructions to Bidders, viewable at www.uky.edu/Purchasing/terms.htm, apply to this RFP. When the RFP includes construction services, the University’s General Conditions for Construction and Instructions to Bidders, viewable at www.uky.edu/Purchasing/ccphome.htm, apply to the RFP. Contracts resulting from this RFP must be governed by and in accordance with the laws of the Commonwealth of Kentucky. Any agreement or collusion among offerors or prospective offerors, which restrains, tends to restrain, or is reasonably calculated to restrain competition by agreement to bid at a fixed price or to refrain from offering, or otherwise, is prohibited...

Words: 10677 - Pages: 43

Free Essay

Ifsm

...August 31, 2007 Dear Potential Offeror, You are invited to submit a proposal in accordance with the requirements set forth in the attached Request for Proposal, (RFP 154:7-061) using Best Value Acquisition procedures. This RFP is being issued by the Virginia Department of Motor Vehicles (DMV) for the purpose of seeking solutions to address the requirements of the DMV CSI Systems Redesign effort as identified in the attached RFP. An original proposal, signed by your contractually binding authority, with 7 full copies and 2 redacted copies, must be received by DMV Contracts and Procurement Department no later than 3:00 p.m. local time on Tuesday, December 4, 2007. An optional pre-proposal conference will be held at DMV Headquarters, 2300 West Broad Street, Richmond, Virginia, Room 702, on Tuesday, October 2, 2007 at 10:00 a.m. local time. Please refer to RFP Section VII for additional information. All questions or inquiries regarding this RFP must be received by Wednesday, October 31, 2007 at 5:00 p.m. local time and must be submitted in writing exclusively to: Nancy M. Davis, CPPB, CPPO, VCO Contracts and Procurement Manager Department of Motor Vehicles Room 319 2300 West Broad Street Richmond, VA 23220 E-mail: nancy.davis@dmv.virginia.gov Fax: (804) 367-0046 All inquiries must be submitted electronically as indicated in the RFP. Please refer to RFP Section VII for additional information. No verbal inquiries will be accepted. From the date of issuance of this RFP until the...

Words: 37401 - Pages: 150

Free Essay

Notes

...Uses parallel processing, quantum computation and nano-technology. * Respond to natural language input and capable of learning and self-organization. Computer Literacy * Knowledge and understanding of computers and their uses. Computer * An electronic device that transform input into output. Information Processing Cycle * Is a series of Input, Process, Output and Storage. Components of a Computer * Input, Process, Output, Storage and Communication Computer Systems * It has data inputs, processes that transform data into output that is required. Basic Computer Units (Refer Figure 1.1) * Input – Data flowing from the outside environment into the computer system. E.g., keyboard, mouse, joystick, scanner, barcode readers, voice input, hard disk or floppy disk. * Central Processing Unit (CPU) – all data processing of computer from input to output. * Control Unit - Exercise control over all other...

Words: 10287 - Pages: 42

Premium Essay

Report

...Table of Contents City of Riverside profile . . . . . . . . . . . . . . . . . .2 Mission and Values Statement . . . . . . . . . . . . .2 Message from the Chief . . . . . . . . . . . . . . . . . .3 Executive Command Staff . . . . . . . . . . . . . . . . .4 Office of the Chief of Police . . . . . . . . . . . . . . .5 Strategic Plan Audit and Compliance Bureau Office of Internal Affairs Public Information Chief's Community Advisory Board Magnolia Station Grand Opening . . . . . . . . . .11 Riverside Police Department Facilities . . . . . .13 Administration Public Safety Communications . . . . . . . . . . . .14 Support Services . . . . . . . . . . . . . . . . . . . . . . .16 Personnel Bureau Training Bureau Management Services . . . . . . . . . . . . . . . . . .21 Finance Payroll Grants Administration Fleet Services Facilities Management Court Services Unit (CSU) Alarm Enforcement Unit (EAU) Records Management Front Counters/Telephone Report Unit Automation and Digital Records Crime Analysis Unit (CAU) Property/Evidence Unit Operations Field Operations . . . . . . . . . . . . . . . . . . . . . . .29 Neighborhood Policing Centers (NPCs) Management Accountability Program (RPD~MAP) Watch Commanders Problem Oriented Policing (POP) Bike Team El Protector University Neighborhood Enhancement Team (UNET) Crime Statistics Special Operations . . . . . . . . . . . . . . . . . . . . .39 Community Services Group Citizen Academy Crime Free Multi-Housing Neighborhood Watch Business Watch Youth...

Words: 22303 - Pages: 90

Free Essay

Annual Report

...Partner in Technological and Industrial Growth Contents ITI Quality Policy 1 Act & Legislation 2 Mandate 2 Vision 2 Mission 2 Board of Management and Committees 3 Organization Structure 4 Senior Management 5 Chairman’s Message 6 Executive Report 8 Performance Highlights 15 Quality Infrastructure 19 Accelerating Industrial Technology Development 22 Benchmarking for Competitiveness 28 Monitoring and Mitigating Pollution 33 Technology for Human welfare and Socio-economic Upliftment 37 Training Programs & Workshops 38 Capacity Building 40 New Initiatives 43 Corporate Awareness 46 Information for Industry 48 Awards and Recognition 52 Corporate Social Responsibility 54 Social, Welfare and Religious Activities 55 Publications, Presentations and Patents 57 Human Resources 62 Executive Staff 65 Financial Report 2011 Auditor's Report AG's Report Reply ITI Quality Policy “The management of the Industrial Technology Institute is unreservedly committed to maintain the ISO 17025 Quality Management System for the Testing and Calibration services and ISO 9000 Quality Management System for the entire Institute, in keeping with the National Quality Policy, thus providing customers with services of the highest professional standards. All ITI staff has been made fully aware of the Quality Systems operated within the Institute and ...

Words: 25991 - Pages: 104

Premium Essay

Management Information Systems

...Course Technology’s Management Information Systems Instructor and Student Resources Introduction to IS/MIS Principles of Information Systems, Eighth Edition • Stair, Reynolds Fundamentals of Information Systems, Fourth Edition • Stair, Reynolds Management Information Systems, Sixth Edition • Oz Information Technology in Theory • Aksoy, DeNardis Office Applications in Business Problem-Solving Cases in Microsoft Access & Excel, Sixth Annual Edition • Brady, Monk Succeeding in Business Applications with Microsoft Office 2007 • Bast, Gross, Akaiwa, Flynn, et.al Succeeding in Business with Microsoft Office Excel 2007 • Gross, Akaiwa, Nordquist Succeeding in Business with Microsoft Office Access 2007 • Bast, Cygman, Flynn, Tidwell Databases Database Systems, Eighth Edition • Rob, Coronel Concepts of Database Management, Sixth Edition • Pratt, Adamski Data Modeling and Database Design • Umanath, Scamell A Guide to SQL, Seventh Edition • Pratt A Guide to MySQL • Pratt, Last Guide to Oracle 10g • Morrison, Morrison, Conrad Oracle 10g Titles Oracle9i Titles Enterprise Resource Planning Concepts in Enterprise Resource Planning, Third Edition • Monk, Wagner Data Communications Data Communications and Computer Networks: A Business User’s Approach, Fourth Edition • White Systems Analysis and Design Systems Analysis and Design in a Changing World, Fifth Edition • Satzinger, Jackson, Burd Object-Oriented Analysis and Design with the Unified Process • Satzinger, Jackson, Burd Systems Analysis and...

Words: 223685 - Pages: 895

Free Essay

Core Concepts of Ais

...CORE CONCEPTS OF Accounting Information Systems Twelfth Edition Mark G. Simkin, Ph.D. Professor Department of Accounting and Information Systems University of Nevada Jacob M. Rose, Ph.D. Professor Department of Accounting and Finance University of New Hampshire Carolyn Strand Norman, Ph.D., CPA Professor Department of Accounting Virginia Commonwealth University JOHN WILEY & SONS, INC. VICE PRESIDENT & PUBLISHER SENIOR ACQUISITIONS EDITOR PROJECT EDITOR ASSOCIATE EDITOR SENIOR EDITORIAL ASSISTANT PRODUCTION MANAGER PRODUCTION EDITOR MARKETING MANAGER CREATIVE DIRECTOR SENIOR DESIGNER PRODUCTION MANAGEMENT SERVICES SENIOR ILLUSTRATION EDITOR PHOTO EDITOR MEDIA EDITOR COVER PHOTO George Hoffman Michael McDonald Brian Kamins Sarah Vernon Jacqueline Kepping Dorothy Sinclair Erin Bascom Karolina Zarychta Harry Nolan Wendy Lai Laserwords Maine Anna Melhorn Elle Wagner Greg Chaput Maciej Frolow/Brand X/Getty Images, Inc. This book was set in 10/12pt Garamond by Laserwords Private Limited, and printed and bound by RR Donnelley/Jefferson City. The cover was printed by RR Donnelley/Jefferson City. This book is printed on acid free paper. Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the...

Words: 241803 - Pages: 968

Premium Essay

Scavenger Hunt Questions and Answers

...2012 Catalog Volume 20 Issue 1 March 5, 2012 – December 31, 2012 This Catalog contains information, policies, procedures, regulations and requirements that were correct at the time of publication and are subject to the terms and conditions of the Enrollment Agreement entered into between the Student and ECPI University. In keeping with the educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed, changed and updated. Consequently, this document cannot be considered binding. Students are responsible for keeping informed of official policies and meeting all relevant requirements. When required changes to the Catalog occur, they will be communicated through catalog inserts and other means until a revised edition of the Catalog is published. The policies in this Catalog have been approved under the authority of the ECPI University Board of Trustees and, therefore, constitute official University policy. Students should become familiar with the policies in this Catalog. These policies outline both student rights and student responsibilities. The University reserves the right and authority at any time to alter any or all of the statements contained herein, to modify the requirements for admission and graduation, to change or discontinue programs of study, to amend any regulation or policy affecting the student body, to increase tuition and fees, to deny admission, to revoke an offer...

Words: 130938 - Pages: 524

Premium Essay

Form

...OFFICIAL CATALOG This Catalog contains information, policies, procedures, regulations and requirements that were correct at the time of publication and are subject to the terms and conditions of the Enrollment Agreement entered into between the Student and ECPI University. In keeping with the educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed, changed and updated. Consequently, this document cannot be considered binding. Students are responsible for keeping informed of official policies and meeting all relevant requirements. When required changes to the Catalog occur, they will be communicated through catalog inserts and other means until a revised edition of the Catalog is published. The policies in this Catalog have been approved under the authority of the ECPI University Board of Trustees and, therefore, constitute official University policy. Students should become familiar with the policies in this Catalog. These policies outline both student rights and student responsibilities. The University reserves the right and authority at any time to alter any or all of the statements contained herein, to modify the requirements for admission and graduation, to change or discontinue programs of study, to amend any regulation or policy affecting the student body, to increase tuition and fees, to deny admission, to revoke an offer of admission and to dismiss from the...

Words: 149595 - Pages: 599

Premium Essay

Ggggggg

...Retailing in the 21st Century Manfred Krafft ´ Murali K. Mantrala (Editors) Retailing in the 21st Century Current and Future Trends With 79 Figures and 32 Tables 12 Professor Dr. Manfred Krafft University of Muenster Institute of Marketing Am Stadtgraben 13±15 48143 Muenster Germany mkrafft@uni-muenster.de Professor Murali K. Mantrala, PhD University of Missouri ± Columbia College of Business 438 Cornell Hall Columbia, MO 65211 USA mantralam@missouri.edu ISBN-10 3-540-28399-4 Springer Berlin Heidelberg New York ISBN-13 978-3-540-28399-7 Springer Berlin Heidelberg New York Cataloging-in-Publication Data Library of Congress Control Number: 2005932316 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag. Violations are liable for prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springeronline.com ° Springer Berlin ´ Heidelberg 2006 Printed in Germany The use of general descriptive names, registered names, trademarks, etc. in this publication does not...

Words: 158632 - Pages: 635