scholarly journals Motion Detector Security System for Indoor Geolocation

Author(s):  
Nosiri O.C. ◽  
Akwiwu-Uzoma C.C. ◽  
Nmaju U.A. ◽  
Elumeziem C.H.
2019 ◽  
Vol 1 (2) ◽  
pp. 59-62
Author(s):  
Tuti Hartati ◽  
Susanto Susanto

The development of technology towards IoT or the Internet of Things has been very advanced so that the fulfillment of human needs is increasingly easy and comfortable. One example is the need to control and monitor the air temperature in the server room. The server room requires a cool and stable temperature so that the computer devices inside can function properly. In addition, the room also requires a security system to prevent undesirable things, such as intruders or people who are other than server admin officers. These needs can be fulfilled by creating an IoT-based device. Arduino as the main device and online Cayenne web-based application as a medium for controlling Arduino. This device is equipped with a motion detection security system using the PIR Motion Detector HCSR501 sensor while for temperature monitoring using a DHT22 sensor. Control of tools can be done using a web browser on a PC (Personal Computer) and an android smartphone via an internet connection


Author(s):  
SENTHIL KUMAR. M ◽  
PADMAVATHY. N

Mobile phones have been important Electronic devices in our life. Consequently, Home automation and security system becomes one of the prominent futures on mobile devices. In this paper, we have developed the android application that interfaces with the security system using wifi direct technology. The wifi technology is relatively new as compared to other technologies and there is huge potential of its growth and practical application. The android application loaded on mobile devices, can connect with security system and easy to use GUI. The application developed to command lock, unlock or video monitoring of the home. The security system then acts on these command and responds to the user. The CMOS camera and the motion detector are attached with security system for remote surveillance.


2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


Sign in / Sign up

Export Citation Format

Share Document