scholarly journals Control Ports Authorities’ Equipment Based on RFID and SQL Security System

2021 ◽  
Vol 2128 (1) ◽  
pp. 012002
Author(s):  
Mirhan Amgad ◽  
Iman Morsi ◽  
Mohamed M. M. Omar

Abstract Equipment surveillance or tracking is a hard-to-accomplish mission for a multi-locations company. This study examines a complete security system in Alexandria and EL-Dekheila ports of Egypt, as case study, to track equipment location. The system uses RFID (radio frequency identification) and Arduino kit as hardware to detect equipment motion, and visual studio and SQL (structured query language) as software to produce reports. The original place of equipment is saved as a reference. IR and RFID sensors are used at every department’s gate for IT access and for detecting and decoding the received equipment’s RFID card and ID data. Visual studio and SQL help in issuing the report on each equipment’s location and movement time. The system sends instant email messages and cellular phone messages to the control room.

This paper discourses about a very general problem that occurs in everyday life. In many universities, students are at risk of misplacement or theft of valuables. So, to avoid such mis happening, the development of security system was designed for providing the safety of university student belongings. The proposed security system contains some common information, methodology, schematics and some details related to technical field that is employed into the system, such as RFID (Radio Frequency Identification) and barcode readers along with the design of the established system. For the functioning of the system in a most effectively manner, assumptions with some specific requirements that is needed to be met are encompassed in this paper


Author(s):  
Chandana Unnithan ◽  
Arthur Tatnall

Australian hospitals had begun exploring Radio Frequency Identification, a wireless automatic identification and data capture technology for improving the quality of their services towards the end of 2000s. After many an unsuccessful pilots, a breakthrough for large hospitals came in 2010, with a key learning rendered by a large regional hospital that not only experimented with the technology, but also have made it all pervasive in their operations. In this chapter, we present the case study, through an innovation translation perspective, focusing on the socio-technical factors captured through elements of Actor-Network Theory.


PLoS ONE ◽  
2019 ◽  
Vol 14 (1) ◽  
pp. e0210148 ◽  
Author(s):  
Rachael M. Milwid ◽  
Terri L. O’Sullivan ◽  
Zvonimir Poljak ◽  
Marek Laskowski ◽  
Amy L. Greer

2014 ◽  
Vol 2 (3) ◽  
pp. 187-194
Author(s):  
Muhammad Chamdun ◽  
Adian Fatchur Rochim ◽  
Eko Didik Widianto

This final project aims to design a door security device using RFID technology (Radio Frequency Identification) and the keypad as a method of access into the room. The system will automatically give warning when the code is entered incorrectly or burglars entered by breaking the door. The microcontroller that is used as the central data processing is ATMega 16 microcontroller ATMEL production and security sensors are used PIR (Passive Infra Red) and magnetic switches.The design begins with a schematic device hardware and software design using CodeVisionAVR programming. Implementation phase includes the implementation of the physical tools, programs, and sensors. The testing phase is done by testing the input sensors and exit switches, siren output devices, DC motor, LCD (Liquid Crystal Display), the RFID reader, keypad, and system controller.The results of room layered security system works according to design. PIR sensors can detect human activities and turn the LED lamp indicator on. Magnetic switch sensors will provide input to the microcontroller to enable or disable the DC motor as the room locking system. Admin menu that is accessed from the keypad is to add users, remove users, see registered users and change the password. User menu which is also accessed using the keypad, work as the room access using a username and password.This study resulted in the layered security. Room access is done using RFIDTag and password. The room piercing detection is done by sensor PIR (Passive Infra Red) and magnetic switches. Alarm used as a piercing action warning. This layered room safety device produces a better security system. 


Sign in / Sign up

Export Citation Format

Share Document