StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Anti-car theft system - Coursework Example

Cite this document
Summary
The company formed in 2015 with the mission to commercialize a new technology for the Anti-car theft system.it is mainly aimed to designed new system to protect our vehicles from theft. We often have mixed ideas to protect our vehicles. So we feel it makes us good demand in the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Anti-car theft system
Read Text Preview

Extract of sample "Anti-car theft system"

Download file to see previous pages

GSM based anti-car theft is based on operation through the consideration of GSM module and micro controller programming (Chandra, 2005). The system used in the security comprises GSM which functions as an intermediate between the car owner and the entire car system. The system is responsible for both receiving of calls for system activation and also its deactivation and sending a text message to the owner. The output of the system is fed in to the microcontroller. The microcontroller is considered the main brain behind the entire system with a written program stored in the Read Only Memory.

The controller with the direction of the written program connects and coordinates the system of operation through different aspects. The connection occurs when the system is active as it monitors both the car doors and the boot of the car to each if there is opening of the car by a stranger. The system also works to demobilize the car by disconnecting the ignition line from the battery supply through the actuator(Eberspächer, Vögel & Bettstetter, 2001). The design also works with the start up an alarm for the purpose of alert.

If the system is inactive there will be disabling of all the outputs and sensor inputs. In the project, there was utilizing of the design through locally assembled microcontroller and other few basic components of electronic components to achieve both the controller and the controlled. Microcontrollers have been seen to be used in performance of the simple security task inn which performance of humans might be able to degrade over time(Halonen, Romero & Melero, 2003). The engineering technique that has been used in the design is that which makes it reliable,durable and capable for offering guarantee security at all times, the power supply that has been used provides the voltage and current which is required for effective performance

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Anti-car theft system Coursework Example | Topics and Well Written Essays - 1750 words”, n.d.)
Anti-car theft system Coursework Example | Topics and Well Written Essays - 1750 words. Retrieved from https://studentshare.org/engineering-and-construction/1693468-anti-car-theft-system
(Anti-Car Theft System Coursework Example | Topics and Well Written Essays - 1750 Words)
Anti-Car Theft System Coursework Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/engineering-and-construction/1693468-anti-car-theft-system.
“Anti-Car Theft System Coursework Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/engineering-and-construction/1693468-anti-car-theft-system.
  • Cited: 0 times

CHECK THESE SAMPLES OF Anti-car theft system

Management of Information Systems

The author presents a detailed analysis of the information system which they want to implement for business management and data handling.... I have searched for the online computer system and printer.... These are the two main items that will be needed for the Eats2Go restaurant business information system handing.... n this section, I will present a detailed analysis of the Dell dimension 4600 Desktop computers for the Eats2Go restaurant business management system....
7 Pages (1750 words) Assignment

Criminal Justice, Issues within Security Management Practice and Personal Security

This coursework outlines criminal justice, issues within security management practice and personal security.... This paper demonstrates types of business crimes, loss prevention in retail businesses and impacts of centralization of United States intelligence.... hellip; Risk assessment, also called security risk analysis is the process through which the possible threats and risks exposed to a business are identified and short listed according to their probability....
8 Pages (2000 words) Coursework

Identity Theft

This is one area where frauds and crooks have the greatest leverage and control and are always looking to find a loophole; maybe a weak encryption system.... The identity world will continue to experience this cycle where a smart organization comes up with a secure system to protect identity and an even smarter crook comes up with a way around the security measure (‘Consumer protection Division', 2005).... Without the basic code and kernel, the frauds would have a very big problem accessing a system or network....
2 Pages (500 words) Assignment

International, Global, and Domestic Business

However, it is not necessary that they can provide adequate protection by deploying effective controls and procedures for ensuring safety against theft of the controlled substances require a safe place, as per distributor's requirements.... Likewise, the same perspective is applicable to other experts, as all the security controls will be investigated to evaluate the compatibility as per laws and regulations for ensuring theft protection....
5 Pages (1250 words) Coursework

SHORT written assignment

Hackers are people who use the system and network vulnerabilities to gain unauthorized… Hacking entails the use of various tools to perpetrate these acts of privacy invasion and sabotage that has significant and often disastrous outcomes for the victims.... Hackers are people who use the system and network vulnerabilities to gain unauthorized access to information and other related resources.... Viruses are specific pieces of software, command sequences and series of data that exploit a glitch, bug or vulnerability to propagate and proliferate in a computer, network or system (Furnell & Warren, 1999)....
1 Pages (250 words) Essay

New Car Alarm Market Research

Luminescent Alarms Ltd is a UK vehicle security company established in 2010 that has developed a new innovative car alarm system that is intended to solve the problem of car theft.... The SWOT Analysis of the company´s product and the market research has found the forces of the Luminescent Alarm system and market of choice.... nbsp;The system is tamper proof and can be tracked on a number of devices (including computers, laptops, and smartphones)....
14 Pages (3500 words) Essay

The Future Car and Its Effects on Us

The paper "The Future Car and Its Effects on Us" states that Japanese manufacturers are planning to subsidize their environmental cars to help them expand their market.... As other companies are planning to establish hybrid cars, Toyota Company in Japan has already done it....  … Ford future car will be a continuation of the aero look in their cars....
11 Pages (2750 words) Research Paper

Aspects of Policing

This essay examines the more recent and less common aspects of policing: social service and problem-oriented aspects of policing.... nbsp;Community policing represents a departure from the traditional aspects of policing designed to control crime.... Community policing delivers a social service… Policing is a highly visible institution used by States for formal social control....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us