IJITCS Vol. 10, No. 9, 8 Sep. 2018
Cover page and Table of Contents: PDF (size: 618KB)
Full Text (PDF, 618KB), PP.32-38
Views: 0 Downloads: 0
Ambush, Arduino, Authentication and RFID
The suggested system aims to develop the level of security for the Egyptian police ambushes and to decrease the overcrowding because the traditional police ambushes was depressing in the last decade in Egypt due to the actions of terrorism and the threatening of our nation security, which was causing a waste of human casualties and will decrease the income of the tourism and reputation of our nations. The direct interaction with the vehicles inside the police ambushes may cause an unnecessary overcrowding. The introduced system try to minimize the human element in the police ambush through utilizing RFID technology by specifying an RFID card for each vehicle and vehicle driver which will be like the electronic passport at the RFID Sensing check point before the ambush. After checking for the information saved on the RFID card supposed inside the vehicle and also registered previously on the system server results in giving the vehicle the “PASS” signal or “ARRESSTED” signal which required a capture photo shot for the vehicle. So that system aims to increase the security level and reduce casualties of police ambushes anywhere even if it is fixed or non-fixed.
Hussam Elbehiery, "Electronic Police Ambush System via Vehicles/Drivers Safety Authentication System", International Journal of Information Technology and Computer Science(IJITCS), Vol.10, No.9, pp.32-38, 2018. DOI:10.5815/ijitcs.2018.09.04
[1]Y. Daniel Liang, “Introduction to java programming: Brief Version,” 10th Edition, ISBN-10: 0133592200, ISBN-13: 978-0133592207, Pearson, USA, January 7, 2014.
[2]Oracle Fusion Middleware 11g: Java Programming,” Volume I, Student Guide Student Guide (Edition 1.1), Kate Heap, USA, May 2009.
[3]C. Thomas Wu, “An Introduction to Object-Oriented Programming With Java™,” 5th Edition, ISBN-10: 0073523305, ISBN-13: 978-0073523309, McGraw-Hill Education; USA, March 24, 2009.
[4]Ramez Elmasri and Shamkant B. Navathe, “Fundamentals of Database Systems,” 7th Edition, ISBN-10: 0133970779, ISBN-13: 978-0133970777, Pearson; USA, June 18, 2015.
[5]Carlos Coronel, Steven Morris, Peter Rob, “Database Systems: Design, Implementation and Management,” ISBN-10: 0538748842, ISBN-13: 978-0538748841, Cengage Learning; 9th Edition, UK, November 23, 2009.
[6]Technology Solutions UK Ltd, Suite A, Loughborough Technology Centre, Epinal Way, Loughborough, Leicestershire, LE11 3GE, UK. https://www.tsl.com/
[7]Makwana Foram R. , Rahul R. Menon , Patel Harsh K., “Automobile Driver Authentication system using Electronic Driving License,” International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 2, ISSN(Online): 2320-9801 ISSN (Print) : 2320-9798, India, February 2016,
[8]Min Chen, Sergio Gonzalez, Victor Leung, Qian Zhang, and Ming Li, “A 2G-RFID-based E-healthcare system,” IEEE wireless communications, pp. (1536-1284), USA, February 2010.
[9]Zeinab Kamal Aldein Mohammeda , Elmustafa Sayed Ali Ahmedb, “Internet of Things Applications, Challenges and Related Future Technologies,” World Scientific News (WSN) 67(2) 126-148, EISSN 2392-2192, Poland, 2017.
[10]Martin Evans, Joshua Noble, Jordan Hochenbaum and Mark Sproul, “Arduino in Action,” Manning Publications Company, Paperback, ISBN-10: 1617290246, ISBN-13: 9781617290244, eBay Product ID (ePID): 112138228, Waukegan, Illinois, USA, 2013.
[11]Richard Blum, “Arduino Programming in 24 Hours, Sams Teach Yourself,” 1st Edition, ISBN-10: 0672337126, ISBN-13: 978-0672337123, Indianapolis, Indiana, USA, August 31, 2014.
[12]Michael Miller, “The Internet of Things,” Pearson, Que Publishing, ISBN: 0-7897-5400-2, USA, March 2015.
[13]Ramez Elmasri, and Shamkant B. Navathe, “Fundamentals of database systems,” 6th Edition, ISBN: 0136086209 9780136086208, Addison-Wesley Publishing Company, USA, ©2010,
[14]Joseph Valacich, Joey George, “Modern Systems Analysis and Design,”8th Edition, Pearson; ISBN-10: 0134204921, ISBN-13: 978-0134204925, USA, January 17, 2016.
[15]James Kurose, Keith Ross, “Computer Networking: A Top-Down Approach,” 7th Edition, Pearson; ISBN-10: 0133594149, ISBN-13: 978-0133594140, USA, May 6, 2016.