scholarly journals Design prototype of a smart household touch sensitive locker security system based on GSM technology

Author(s):  
Mohammad Zeyad ◽  
Susmita Ghosh ◽  
S.M. Masum Ahmed

This paper illustrates a portable domestic locker security system which is based on GSM (Global System for Mobile Communications) technology. A handcrafted low-cost touch sensitive box is designed (using Vero board) for the project which is one of the most attractive features of the system. The system will operate in a way that if there is any unexpected user, tries to touch any portion of the touch sensitive box, a feedback system will be turned on immediately. The feedback system will alert the property holder about the unexpected user by sending SMS (Short Message Service) and turning on an alarm system. The alarm system will be turned off only if it receives a specific SMS from the property holder. This system not only has the advantages of high sensitivity, small size and lightweight, but also it is easy to use. This system is featured with an uncomplicated design, convenient use, strong flexibility and reliable performance. Since the circuit in the system is simple and easy to contrivance, the system can be installed without any difficulty at homes & offices. It will also provide a good security in the vehicles and Automated Teller Machine (ATM) booths.

Author(s):  
Wan Haszerila Wan Hassan ◽  
Aiman Zakwan Jidin ◽  
Siti Asma Che Aziz ◽  
Norain Rahim

The early warning systems for flood management have been developed rapidly with the growth of technologies. These system help to alert people early with the used of Short Message Service (SMS) via Global System for Mobile Communications (GSM). This paper presents a simple, portable and low cost of early warning system using Arduino board, which is used to control the whole system and GSM shields to send the data. System has been designed and implemented based on two components which is hardware and software. The model determines the water level using float switch sensors, then it analyzes the collected data and determine the type of danger present. The detected level is translated into an alert message and sent to the user. The GSM network is used to connect the overall system units via SMS.


2018 ◽  
Vol 3 (1) ◽  
pp. 17-21
Author(s):  
Bakhtiar Ali Karim ◽  
Halgurd Nawzad Awl

Due to increasing robbery and intrusion, establishing home-security system has become a correlated part of the modern houses, buildings, and offices. As the family members are not at home all the time, the traditional home security system, which makes alarm sound only, may not be efficient enough. Alternatively, Global System for Mobile communications (GSM) based security system can provide higher level of security and convenience compared to the traditionally used systems. The main objective of the current paper is to design and implement cost-efficient and reliable security, safety and home automation system for protection and occupants’ convenience. If any undesired events, such as intrusion, gas leakage and fire occurs in the house, our system warns the homeowner in real-time using Short Message Service (SMS). With the proposed system home appliances can also be controlled in three ways, namely sending SMS from the authorized numbers to the system through GSM network, smartphone app using Bluetooth module and infrared (IR) control using IR module


This document describes the design and development of a low-cost security system to detect unauthorized access of people in an office, using Arduino microcontroller technology. It used a passive infrared sensor (PIR) to detect movements of people, a Wi-Fi interface to send security alerts to the cloud platform and a GSM modem, in the same way, to send the detected security events to the frame of Cloud. The latter will be used if it is not possible to establish a link to the cloud platform, via the Wi-Fi interface. In addition, the security system sends an SMS (Short Message Service) directly to the security agent's mobile every time a security event is detected. A dual communication interface is used to guarantee the sending of alerts to the cloud platform and, on the other hand, to ensure the delivery of notifications of the alerts detected to the security agent, through the channels: Notify my device (NMD), email, Twitter and SMS. As a result, it has been obtained that the fastest interface to send the detected security alerts to the cloud platform is Wi-Fi and the channel with less time to notify the security agent is NMD. Therefore, this proposed security system represents an ideal solution for security problems, both level domestic and commercial, since it has characteristics of being pervasive, that is, it can be used anywhere and agnostic in so far as of the wireless interface Communication.


Author(s):  
I Komang Krisna Ade Marta ◽  
I Nyoman Buda Hartawan ◽  
I Kadek Susila Satwika

AbstrakKeamanan server merupakan hal penting yang perlu diberikan perhatian lebih saat melakukan konfigurasi server. Pada umumnya serangan yang terjadi pada server diketahui setelah terjadinya kegagalan pada server dalam memberikan layanan. Pada penelitian ini, dibangun sebuah sistem keamanan server yang dapat melakukan monitoring pada sebuah server ketika terdeteksi adanya aktivitas yang tidak wajar. Pemberitahuan akan dikirimkan melalui SMS (Short Message Service) ke handphone Administrator jaringan. Sistem yang dibangun melakukan pendeteksian intrusi pada server secara realtime menggunakan SNORT. Ketika terjadi akses yang tidak wajar pada server, maka SNORT akan mendeteksi dan mengirimkan informasi terjadinya aktivitas yang tidak wajar ke Administrator jaringan. Sistem ini diujikan dengan lima jenis serangan yakni PING Attack, DoS/DDoS Attack, Port Scanning, Telnet Access dan FTP Access. Parameter yang diamati pada penelitian ini adalah beban aktivitas yang terjadi pada sumber daya server meliputi CPU, Memory (RAM) dan beban jaringan. Hasil penelitian menunjukkan bahwa saat terjadi upaya serangan terhadap server, SNORT dapat menghasilkan alert yang akan disimpan pada log sekaligus dikirimkan ke handphone Administrator melalui SMS. AbstractServer security is an important thing that needs to be given more attention when configuring a server. In general, attacks that occur on the server are known after a failure on the server in providing services. In this study, a server security system was built that could monitor a server when an unusual activity was detected. Notifications will be sent via SMS (Short Message Service) to the network Administrator's smartphone. The system is built to detect intrusions on the server in real time using SNORT. When improper access occurs on the server, SNORT will detect and send information about the occurrence of unusual activity to the network Administrator. This system is tested with five types of attacks namely PING Attack, DoS / DDoS Attack, Port Scanning, Telnet Access and FTP Access. The parameters observed in this study are the activity load that occurs on server resources including CPU, Memory (RAM) and network load. The results showed that when an attempt was made to attack the server, SNORT could produce alerts that would be stored in a log as well as sent to the Administrator's smartphone via SMS.


Author(s):  
Shunichi Ishihara

This study is one of the first likelihood ratio-based forensic text comparison studies in forensic authorship analysis. The likelihood-ratio-based evaluation of scientific evidence has started being adopted in many disciplines of forensic evidence comparison sciences, such as DNA, handwriting, fingerprints, footwear, voice recording, etc., and it is largely accepted that this is the way to ensure the maximum accountability and transparency of the process. Due to its convenience and low cost, short message service (SMS) has been a very popular medium of communication for quite some time. Unfortunately, however, SMS messages are sometimes used for reprehensible purposes, e.g., communication between drug dealers and buyers, or in illicit acts such as extortion, fraud, scams, hoaxes, and false reports of terrorist threats. In this study, the author performs a likelihood-ratio-based forensic text comparison of SMS messages focusing on lexical features. The likelihood ratios (LRs) are calculated in Aitken and Lucy’s (2004) multivariate kernel density procedure, and are calibrated. The validity of the system is assessed based on the magnitude of the LRs using the log-likelihood-ratio cost (Cllr). The strength of the derived LRs is graphically presented in Tippett plots. The results of the current study are compared with those of previous studies.


2009 ◽  
pp. 47-55
Author(s):  
George K. Lalopoulos ◽  
Ioannis P. Chochliouros ◽  
Anastasia S. Spiliopoulou-Chochliourou

The tremendous growth in mobile communications has affected our lives significantly. The mobile phone is now pervasive and used in virtually every sector of human activity—private, business, and government. Its usage is not restricted to making basic phone calls; instead, digital content, products, and services are offered. Among them, mobile commerce (m-commerce) holds a very important and promising position. M-commerce can be defined as: using mobile technology to access the Internet through a wireless device such as a cell phone or a PDA (Personal Digital Assistant), in order to sell or buy items (products or services), conduct a transaction, and perform supply-chain or demand-chain functions (Adams, 2001). Within the context of the present study, we shall examine widespread used and emerging m-commerce services, from early ones (i.e., SMS [Short Message Service]) to innovative (i.e., mobile banking and specific products offered by known suppliers). We shall also investigate some important factors for the development of m-commerce, as well as some existing risks. Particular emphasis is given to the issue of collaboration among the key-players for developing standardization, interoperability, and security, and for obtaining market penetration.


Author(s):  
C.Anna Palagan

This paper proposes and implements a solution for the navigation difficulty and enhancing the rail transportation in a simple way by combining Wireless Communication and GPS Technology by developing a GPS Based Real Time Personal Destination Predictor. In this method by sending SMS (Short Message Service) and Voice Call to the registered passenger’s mobile phone, we alert the passenger about his destination at the specified time before reaching the destination. If the user sends the PNR (Passenger’s Name Record) number obviously the server responds with a SMS to the mobile phone of the particular ticket received user. Once the request is responded, the GPS (Global Positioning System) which is the train will locate the live position of the train as latitude and longitude value which will be transferred by the wireless communication to the server and the server will response the location from the Google Maps and intimate the passenger before the specified time of the arrival of the destination station of the passenger, which can be known from the PNR details of the passenger, through SMS and Voice Call. Even the person waiting for the passenger in the destination can avail this facility from his mobile phone by registering with the passenger’s PNR number.


2017 ◽  
Vol 3 (1) ◽  
pp. 1
Author(s):  
Muhammad Irsyad

Dalam melaksanakan Tugas dan Kewajiban yang tertuang dalam Tridharma Perguruan Tinggi, dosen melakukan berbagai macam kegiatan. Untuk memaksimalkan pelaksanaan kegiatan dosen agar tidak ada kegiatan yang terlewatkan, maka dibutuhkan sebuah pengingat kegiatan  yang berbeda dengan pengingat yang telah ada saat ini. Untuk itu dibuat sebuah aplikasi e-Reminder Services (layanan pengingat elektronik) untuk kegiatan dosen berbasis SMS (Short Message Service) gateway. Alasan digunakannya media SMS karena layanan SMS pasti ada disetiap ponsel, berbeda dengan MMS dan WAP yang hanya ada dibeberapa merek dan tipe ponsel tertentu, serta penggunaan SMS tidak memakan banyak biaya. SMS gateway pada aplikasi ini menggunakan operator GSM (Global system for mobile Communications) dan modem GSM sebagai alat penghubung perangkat komputer dengan SMS gateway. Hasil akhir penelitian ini adalah SMS pengingat kegiatan yang diterima oleh dosen pada ponsel masing-masing. Dari hasil pengujian dapat ditarik kesimpulan bahwa aplikasi e-Reminder Services (layanan pengingat elektronik) untuk kegiatan dosen dapat diimplementasikan pada Jurusan Teknik Informatika UIN Suska Riau.


2012 ◽  
Vol 4 (3) ◽  
pp. 47-57 ◽  
Author(s):  
Shunichi Ishihara

This study is one of the first likelihood ratio-based forensic text comparison studies in forensic authorship analysis. The likelihood-ratio-based evaluation of scientific evidence has started being adopted in many disciplines of forensic evidence comparison sciences, such as DNA, handwriting, fingerprints, footwear, voice recording, etc., and it is largely accepted that this is the way to ensure the maximum accountability and transparency of the process. Due to its convenience and low cost, short message service (SMS) has been a very popular medium of communication for quite some time. Unfortunately, however, SMS messages are sometimes used for reprehensible purposes, e.g., communication between drug dealers and buyers, or in illicit acts such as extortion, fraud, scams, hoaxes, and false reports of terrorist threats. In this study, the author performs a likelihood-ratio-based forensic text comparison of SMS messages focusing on lexical features. The likelihood ratios (LRs) are calculated in Aitken and Lucy’s (2004) multivariate kernel density procedure, and are calibrated. The validity of the system is assessed based on the magnitude of the LRs using the log-likelihood-ratio cost (Cllr). The strength of the derived LRs is graphically presented in Tippett plots. The results of the current study are compared with those of previous studies.


Sign in / Sign up

Export Citation Format

Share Document