scholarly journals The impact of foreign markets globalization on the price and functionality of electronic access control systems

2021 ◽  
Vol 92 ◽  
pp. 07009
Author(s):  
Martin Boroš ◽  
Filip Lenko ◽  
Andrej Velas

Research background: The research, which is the subject of the paper, is based on the global expansion of the use of electronic access control systems using biometric data for user verification. Due to the globalization of products from foreign markets to Slovakia, there is a competition between suppliers. The disadvantage is that organizations that are considering procuring an electronic access control system focus their attention only on its price. Globalization and global use have neglected the skills gap between European, American, and Asian markets. Purpose of the article: The paper will aim to point out, through a case study, the financial and functional differences of electronic access control systems. In the case study, a comparison of three different systems with the possibility of procurement on the European, American, and Asian markets will be performed on the building - administrative building. Methods: The article will mainly use methods such as the global method and the optimization model of the financial plan. As well as a case study, the cooperation of achieved results and analysis of possibilities of foreign markets. Findings & Value added: The results achieved by the paper will be globally usable in the conditions of European countries. These will be the conclusions of a case study that will point to the appropriateness of choosing an electronic access control system using biometric features in a standard office building. We can also consider the creation of a project budget usable for organizations as one of the added values.

2019 ◽  
Vol 15 (2) ◽  
pp. 23-28
Author(s):  
Evgeny A. Godovnikov ◽  
Anatoliy V. Shicelov ◽  
Ruslan T. Usmanov

This article discusses the design of a physical access control system for an enterprise with various methods of authentication and user identification. A review of existing solutions in the design of physical access control systems was conducted. In the course of the work, a system design was proposed, and its components were described in detail.


2018 ◽  
Vol 47 (3) ◽  
Author(s):  
Ammar Boucherit ◽  
Laura M. Castro ◽  
Abdallah Khababa ◽  
Osman Hasan

2021 ◽  
Vol 53 (1) ◽  
pp. 83-90
Author(s):  
ALEXANDER N. MARENKOV ◽  
◽  
VALENTINA YU. KUZNETSOVA ◽  
TIMUR M. GELAGAEV ◽  
◽  
...  

The article shows the relevance of the widespread use of computer vision technology on the example of face recognition as part of the access control and management system. The main methods that are used in the implementation of classical control systems and access control are considered. The scheme for the implementation of the access control with face recognition technology is described. The use of this technology makes it possible to increase the level of information security of enterprises and, as a result, reduce the possible financial damage from the implementation of attacks on their assets from illegitimate penetration into the protected area through the access control system using the passes of legal users.


This article is devoted to the presentation of the threat state model of access control, which allows calculating the probabilities of the impact of threats on the access control system and the probability of opening this system based on taking into account the generalized algorithm for the implementation of external threats, and determines the need to develop additional components of the access control system designed to identify and classify attacks.


2014 ◽  
Vol 1039 ◽  
pp. 433-437
Author(s):  
Peng Wei Fei ◽  
Gao Wei Zhan ◽  
Jie Cong Nie ◽  
Ying Zhong Tian

Nowadays, with the in-depth development of networking, informatization and integration the access control system has become more and more popular and important in campus. Most access control systems were developed based on MCU with the characteristics of fixed functions and hardly to extend. A kind of campus intelligent access control system based on ARM is introduced in this paper. The overall structure of the system is as follow: the communication way between host computer and the access controller is TCP/IP protocol; using CAN-BUS for communication between access controller and RFID reader. In the design process, top-down design ideas has been adopted. From the overall structure to the local design, from the host computer to access controller and RFID reader, by means of functional analysis, process planning, hardware design and software programming, finally developed a campus intelligent access control system with excellent exhibitions on powerful, stability and scalability.


2010 ◽  
Vol 2010 (1) ◽  
pp. 000047-000051
Author(s):  
Zdenka J. Delalic ◽  
Sandeepsarma Josyula ◽  
B Anand

Verification for access control is faster and cheaper than identification based access control systems. The aim of this project was to develop a fingerprint based access control system, where the verification or validation of the entry is based upon the data from a RFID card. The multi-hop unit is controlled by a PIC 18F series, RISC processor. The capacitive sensor employed extracts 40 minutiae points, which are verified based on the pre-stored data in the RFID card. The capacitive sensor is capable of detecting human tissue, eliminating brute-force or latent print attacks. The low power RFID reader makes the unit portable. The use of RFID cards and verification mechanisms eliminate the use of a centralized database to store the data of every valid entry. The Infineon RFID card has an operating distance of 5mm, as opposed to 0.5mm normally used in swipe based RFID systems, making it easier to use. The packaged fabricated unit was successfully designed to program new RFID cards with minutiae data obtained from the capacitive sensor. Additional features of the unit include blacklisting entries and emergency exit.


2021 ◽  
Vol 10 (9) ◽  
pp. 132-139
Author(s):  
Falohun Adeleye Samuel ◽  
Adedeji Oluyinka Titilayo ◽  
Adegbola Oluwole Abiodun ◽  
Alade Oluwaseun Modupe ◽  
Makinde Bukola Oyeladun ◽  
...  

Security is one of the most important issues for any individual or organization, and as technology has advanced, numerous techniques to protecting lives and property have been deployed through door access control systems. The typical method of unlocking a door is to open it with a real key or by twisting the door knob. Physical keys that are used to open doors are subject to duplication and can be misplaced. Furthermore, typical biometric technologies and other technologies are vulnerable to a variety of failures, such as a person's finger being cut off to produce a fingerprint scan, a pin being hacked using various methods or permutations, and a person's photo being used for facial recognition. Furthermore, it is more difficult for people with physical disabilities to unlock a door system without the assistance or support of others. For example, it is difficult for a person in a wheelchair to open a door system without the assistance or support of another person. As a result, a speech recognition access control system that can accommodate both able-bodied and impaired people is unavoidable. This paper demonstrates how voice recognition may be used to access door systems by creating a door access control system that employs speech recognition to simplify the work of providing access to door systems via a mobile phone connected via Bluetooth. The system's performance is perfectly in line with its design.


2020 ◽  
Vol 1 ◽  
pp. 146-151
Author(s):  
Filip Lenko ◽  
Andrej Veľas

This article discusses the position of access control systems in the field of intruder systems, its benefits and wide-ranging use in the academic environment. This article points out the potential of access control systems and motivates further research in the field of alarm systems and their integration. As part of the dissertation a project for an access control system was submitted, which enabled the purchase and implementation of an access control system for the teaching laboratory at the Faculty of Security Engineering. The installed access control system serves not only as security for the selected laboratory, but also as a teaching aid, which is used in teaching and thus increases the practical competencies of students. The system is also accessible to students, who can create methodological procedures for its testing and subsequently test them. Such measurements are then used in solving students' final diploma and dissertation theses. Approximately 50 students use the access control system during the academic year. The contribution and aim of the paper is to point out the use of the implemented system in the academic environment and its impact on the improvement of teaching. The conclusion of the article consists of the benefits resulting from the implementation of the access control system at the Faculty of Security Engineering and recommendations for its further use.


Sign in / Sign up

Export Citation Format

Share Document