scholarly journals Door Lock Security System Using Recent Technology

Author(s):  
Sanskruti Dharme

Abstract: In terms of house security, the door is pivotal. To keep the hearthstone secure, the proprietor will keep the door locked at all times. Still, owing to a rush when leaving the house, the proprietor may forget to lock the door, or they may be doubtful if they’ve closed the door or not. Wireless security grounded operation have fleetly increased due to the dramatic enhancement of ultramodern technologies. Numerous access control systems were designed and/or enforced grounded on different types of wireless communication technologies by different people. Radio Frequency identification (RFID) is a contactless technology that’s extensively used in several diligences for tasks like access control system, book shadowing in libraries, tollgate system, forced chain operation, and so on. For enforcing this design, we will be using Arduino mega 2560 pro mini, a fingerprint sensor, Keypad module. ESP-32 CAM module, RFID sensor, solenoid lock and ESP8266. We have also created an application for monitoring and controlling the security features of the door lock. We can also open the door through mobile fingerprint. Keywords: Arduino mega 2560 pro mini, ESP32-CAM, ESP8266, Fingerprint sensor, Keypad module, RFID sensor.

2018 ◽  
Vol 8 (8) ◽  
pp. 1282 ◽  
Author(s):  
Nikola Cmiljanic ◽  
Hugo Landaluce ◽  
Asier Perallos

Radio Frequency Identification (RFID) is a technology that uses radio frequency signals to identify objects. RFID is one of the key technologies used by the Internet of Things (IoT). This technology enables communication between the main devices used in RFID, the reader and the tags. The tags share a communication channel. Therefore, if several tags attempt to send information at the same time, the reader will be unable to distinguish these signals. This is called the tag collision problem. This results in an increased time necessary for system identification and energy consumption. To minimize tag collisions, RFID readers must use an anti-collision protocol. Different types of anti-collision protocols have been proposed in the literature in order to solve this problem. This paper provides an update including some of the most relevant anti-collision protocols.


Author(s):  
Yousif Abulhassan ◽  
Doug DeMoulin

Locating injured firefighters is critical in immediately dangerous to life or health (IDLH) environments where they can be overcome by smoke, or exposed to other environmental stressors. Auditory and visual communication technologies such as Personal Alert Safety System (PASS) devices and radio communications are often used to locate firefighters entering IDLH environments. However, the reliability of these communication methods can be detrimental in pinpointing the location of an injured firefighter due to unconsciousness, disorientation, or unfamiliarity with the layout of the building. The purpose of this study was to identify the effects of visibility conditions, rescuer familiarity with the search area, and search and rescue method on the time needed to locate victims in an IDLH environment. Results of the study indicated that time needed to locate victims could be significantly reduced when using a radio frequency identification (RFID) based real time locating method compared to a traditional grid search rescue method.


2021 ◽  
Vol 3 (1) ◽  
pp. 83-91
Author(s):  
Moch Iqbal Tawakal ◽  
Yudi Ramdhani

Tingkat kriminalitas dan keahlian para pencuri khususnya pencurian sebuah rumah elite yang semakin tinggi, membuat penulis memperoleh ide atau gagasan inovasi alat pengaman pintu rumah menggunakan Radio Frequency Identification (RFID) berbasis Internet of Things dengan menggunakan mikrokontroler NodeMcu Lolin V3 yang tentunya dengan sistem pengamanan yang tinggi dan juga dapat terkoneksi pada internet sehingga bisa juga di akses melalui smartphone android. Rancangan keamanan ini tidak mengandalkan mekanik sebagai interfacenya melainkan menggunakan perangkat elektronik yang cukup sulit untuk dibobol karena selain diperlukan pengetahuan mengenai elektronik, para pelaku kriminalitas juga harus memilki pengetahuan dibidang pemrograman dan teknologi informasi. Berbeda dengan kunci mekanik, kunci elektronik pada rancangan keamanan ini menggunakan Radio Frequency Identification (RFID) sebagai pembukanya dan juga dengan memanfaatkan teknologi Internet of Things (IoT) dengan menggunakan wireless yang terhubung pada aplikasi Smartphone Android. Berdasarkan hasil pengujian dapat disimpulkan bahwa simulasi alat pengaman pintu dapat beroperasi dengan baik, sesuai rancangan yang dibuat. RFID reader yang digunakan memiliki keamanan yang lebih terjamin,karena yang mana untuk mendaftarkan e-KTP dengan menggunakan aplikasi Blynk pada Smartphone Android , jadi tidak semua orang bisa mendaftarkan e-KTP, dan juga terdapat buzzer dan lampu LED, buzzer akan mengeluarkan suara dan lampu LED menyala hijau apabila kunci pintu dibuka sesuai dengan frekuensi 13,56MHz yang diletakkan dalam miniatur berbentuk rumah dengan tebal 2mm dapat membaca UID e-KTP dengan jarak maksimal 2.5 cm. Buzzer akan mengeluarkan suara dan lampu LED menyala merah apabila UID e-KTP tidak terdaftar pada alat tersebut. Solenoid Door Lock dapat membuka pengunci pintu apabila UID e-KTP sesuai dengan NodeMcu Lolin V3, solenoid akan mengunci kembali dalam waktu 5 detik.


Author(s):  
Diane Whitehouse ◽  
Penny Duquenoy

The use of information and communication technologies (ICT) is increasing rapidly in many spheres of contemporary life in Europe. The ethical use of ICT in all areas of its application is of growing importance. This is especially evident in the field of healthcare. The regional, national, and Europe-wide electronic aspects of health services and systems are related fundamentally to these two developments. This chapter explores the relevance of ethics to eHealth generally. It outlines two main contrasting ideas that have influenced ethical thought: Kantian ethics and consequentialism. It investigates the ways in which teaching and practice for ICT professionals and trainees can be enhanced and extended to increase the awareness of ethical issues in eHealth. It takes as examples two technological applications that are in increasing use in the eHealth field: electronic health records and radio frequency identification devices. The chapter ends with a brief discussion and conclusions about how this ethical awareness can be expanded beyond ICT professionals to other stakeholder groups, and to other eHealth technologies or applications.


2021 ◽  
Vol 11 (4) ◽  
pp. 5564-5576
Author(s):  
Sabari L. Umamaheswari ◽  
Thota Dhana Sekhar ◽  
S. Guna Saideep ◽  
S. Joshua ◽  
Arimani Munirakesh ◽  
...  

In this paper a Door lock system using RFID and IOT Technologies. Using smart phone with Blynk App the Admin or owner can remotely monitor, control (ON & OFF the access) and can get Blynk notifications from the door lock when someone try to access it or if any suspicious activity happens (someone try to break the it). The registered User will receive Gmail’s when he tries to unlock the door. Other features are the admin or owner can remotely unlock and lock the door from any place, and he can disable the switch which is used for getting out from the room, for blocking the unknown persons who went with theft RFID card, it is done by seeing the notifications send to the user when door is unlocked with his card through Admin. For authorized person the lock will be opened and closed automatically after a predetermined delay. If it is an unauthorized person tries it alerts the admin and neighbors through a Blynk notification and buzzer sound. Thus, once implemented, the system will prove An Effective security with minimum cost and increase in comfort for system users and also more efficient compared to existing cost ineffective systems.


Sign in / Sign up

Export Citation Format

Share Document