ARTICLE
TITLE

Development of a Secured Vehicle Spot Detection System Using GSM

SUMMARY

The number of vehicles stolen is increasing annually. The alarm system for vehicles is commonly used to expose the burglars publicly to make a scene. If the vehicle owner is far away, it will be hard to distinguish the threat to the vehicle from the intruder. To deter such crime, there should be a safer protection mechanism for vehicles around the globe. Moreover, overcrowd parking lot problems have always been an issue. Nevertheless, it became even worse with the progressing urbanization and population expansion. Anyone may have experienced that moment of panic when you realize you have no idea where you parked your vehicle. Note that, the keyless remote control of vehicles has a short-range radio transmitter. It usually can reach up 5–20 meters. Therefore, this paper develops a proposed system that is used for detecting vehicle location using Global System for Mobile Communications (GSM). It is basically capable to switch ON and OFF vehicle alarm system to detect the location of the vehicle in a crowded area. PIC microcontroller that has been embedded in the system programmed using C language. The intelligent proposed system also designs to enhance the security feature for the transportation era. The proposed system offers better service and cost-effective for the vehicle owners.

 Articles related

Eid Al Hajri,Farrukh Hafeez,Ameer Azhar N V    

This paper is based on study and implementation of the pilot project for customized, automated, highly secured class room management system known as JIC CMS (Jubail Industrial College Class room management System). In this research paper, the strategies,... see more


Raja Nasrul Fuad,Haikal Nando Winata    

The WAV file format that is widely used rough on various kinds of multimedia and gaming platforms. Ease of access and technological development with a variety of media to facilitate the exchange of information to various places. The data are important an... see more


Clement Agbeboaye,France O. Akpojedje,Joshua Okoekhian    

There is a geometric growth in the manufacturing and sales of wireless network devices presently. This growth is not connected with the advantages ushered in by wireless network e.g user mobility, the flexibility of the network, enable network connection... see more


Hemraj Saini    

Most of the critical information is stored or travelled throughout the Internet and prone to cyber threats all the time. The current manuscript provides a process to develop and implement an automated proactive security framework to alert/avoid such cybe... see more


R. I. Banakh    

Context. An issue of correct configuration of honeypots is still opened, especially it is about honeypots that simulate wireless networksas their clients are mobile and zone of control is not limited. Wrong configuration of honeypot may become its usage ... see more