scholarly journals Access Control and Security System Via Bluetooth Application on Android Smartphone

2022 ◽  
Vol 6 (1) ◽  
pp. 100-108
Author(s):  
Husna Amiliansyah ◽  
Mia Galina ◽  
Joni Welman

Smartphone technology can be applied not only to establish communication needs but also to support other purposes. One of them is related to personal safety and security functions. It is undeniable that criminal acts can occur anytime and anywhere. Even in a private or residential area, theft could happen. Smartphone and sensor technology can be used as a solution to encounter this problem. In this case, it can be utilized to improve the security control system of the gate or garage door at home. This research presents a prototype of a gate and garage door control and security system that operates through an application on an android smartphone. The application of HC-05 Bluetooth is used to send signals from the smartphone to the Arduino Uno microcontroller, while the micro servo acts as a locking mechanism on the gate itself. The buzzer function is presented to notify homeowners when the gate or garage door is open for more than 15 seconds. This prototype can control gates and garage doors with an average connection time of only about 5 seconds. Thus, this prototype is feasible to use as an alternative to control and improve housing security systems.

Author(s):  
إبراهيم محمد زين

الملخّص يهدف هذا البحث لبيان أن السبيل الناجح لمواجهة الإرهاب الدولي المعاصر الملتبس بدعاوي الجهاد الإسلامي وإحياء دولة الخلافة الإسلامية هو التركز على معاني الأمن الفكري والروحي في الإسلام وهذا الاتجاه في المباحثة يُعيد النظر في طرائق قضايا الجهاد ويميز بين ما هو عقائدي ومرتبط بنظام الإسلام الكلي وبين ما هو من مجال حروب الفتنة والصعلكة.  الكلمات المفتاحيّة: الجهاد، حروب الصعلكة، حروب الفتنة، الأمن الروحي والفكري.              Abstract This study focuses on the most effective way of combating global terrorism that utilizes the banner of Jihad and restoration of the Khilafa system of governance. It should be emphasized that there is a dire need for a new line of investigation concerning the issue of Jihad that pays more attention to both spiritual and intellectual security systems in Islam. This requires a distinction to be made between what is universalistic in the Islamic system and what is particular. In this regard one has to differentiate between acts of just war and those of economic or sedition wars. Keywords: Jihad, economic war, sedition war, spiritual-intellectual security system.


2021 ◽  
Vol 2 (2) ◽  
pp. 105-115
Author(s):  
Mahmod Al-Bkree

This work is to optimize perimeter surveillance and explore the distribution of ground bases for unmanned aerial vehicles along the Jordanian border and optimize the set of technologies for each aerial vehicle. This model is part of ongoing research on perimeter security systems based on unmanned aerial vehicles. The suggested models give an initial insight about selecting technologies carried by unmanned aerial vehicles based on their priority; it runs for a small scale system that can be expanded, the initial results show the need for at least four ground bases along the length of the border, and a selected set of various technologies for each vehicle.


2012 ◽  
Vol 479-481 ◽  
pp. 1318-1324
Author(s):  
Zhi Qing Li ◽  
Jin Xin Tian ◽  
Tian Hua Song

The contradiction between the effective supply and the uncertain demand in housing security system, which is an important part of the urban social security system, has been a major obstacle to urban sustainable development since 1998, and how to effectively deal with it is becoming more and more important. In this paper, the uncertain demand of indemnificatory housing, which was caused by the rapid urbanization, is considered, and the models for indemnificatory housing provision under box constraints, ellipsoid constraints and polyhedral constraints are constructed respectively by using distributional robust optimization, and at the same time, the reliability of optimal models in theory is proved in the form of theorem. In the end, as application of models, the paper takes Beijing as an example, and conducts empirical research on provision of indemnificatory housing during the past five years (2006-2010), which shows the effectiveness of the method.


2019 ◽  
Vol 4 (2) ◽  
pp. 112-120
Author(s):  
Hadjira BELAIDI ◽  
Nour-El-Houda MEDDAH

This work deals with lock and home security systems. First, Motion sensors detect movement indoors and outdoors to guard against intruders, protect valuables and more. Thus, if any movement, RFID reader will be activated and database will be scanned to identify the persons who have the access to the home. This enhances the effectiveness of the security system and provides the user with the complete, whole-house protection he needs. An RFID badge can be used to unlock the door and access to the home. Alerts also are received on the smart phone if motion is sensed in a protected area inside or outside; giving the user the information it needs to act quickly. The door can also be remotely locked/unlocked. A microcontroller (ATmega2560) is used to control the entire system, and GSM is used to send alerts to the Smartphone. An Ethernet shield that connects the microcontroller to the database (DB) is also added.


2021 ◽  
Vol 7 (1) ◽  
pp. 10-18
Author(s):  
Arief Saptono ◽  
Abdul Malik ◽  
Muhamad Satim

Computer and information technology from time to time are always experiencing developments, both in terms of hardware, software and the internet being one of the most important things atthis time. The increasing number of applications of computer technology will make the role of computers increasingly important to be more advanced (modernization). The security system isstill not effective and efficient enough, so that a control using a website is needed to help the security control process at the gate. This system is not only used in offices, but can be used inhome security, etc. So we need a security system, where the security control system uses a tool to monitor realtime security via a web browser, namely a webcam (Web Camera). A web-basedgate control system can be designed using the Raspberry Pi B +. From the explanation mentioned above, the researcher made a gate control device that was given to the Microcontroller using a Web Browser in order to open and close the gate. So it is hoped that this security system application can provide a sense of comfort, in addition, of course, with this system application it can reduce the number of crimes that occur both crimes and other crimes.


2021 ◽  
Vol 6 (6) ◽  
pp. 69-73
Author(s):  
Md. Abdullah Al Rakib ◽  
Md. Moklesur Rahman ◽  
Md. Sohel Rana ◽  
Md. Sanjib Islam ◽  
Fysol Ibna Abbas

In this paper, we worked on how to control home apparatuses, safety, and security systems utilizing GSM innovation by utilizing a cell phone. We will likewise show that we can control the apparatuses even without a phone by sending an ordinary call. The favorable position of utilizing GSM innovation is that we can handle home appliances from any place in the world. This system permits the proprietor to control the appliances and to get a feedback status of the home apparatuses by sending calls just as through a portable application. For the home security system, we are utilizing an antitheft announcing system that will report the proprietor by sending a message and ringing a call. Likewise, for the security system, when fire or gas spillage is expected to occur, it will also report the proprietor by sending a call. Subsequently, by utilizing GSM innovation, it gives remote access to the gadgets to be controlled.


2018 ◽  
Vol 7 (3.33) ◽  
pp. 165
Author(s):  
JangMook KANG ◽  
Cheol Hee YOON ◽  
Tae Hyeong KWON

Malicious hacking is evolving continuously malicious code attacks. It needs flexible solutions such as the prevention leakage of personal information, demanding the ability of institutions to prevent high level of infringement. But, typical simple's security control system is limited by responding only to the tertiary industry equipment in the ICT field. A CPS type security system is capable of responding to the transition from ICT to AI which is should be applied. This is time of reorganization from the current security domain to the artificial intelligent ICBM device, it should apply the digital twin model which we are considering the people and environment of CPS type system. In this paper, we have studied a model of how cyber - physical systems can be implemented using existing security system platform technology. We also propose a new security technology applying model through analyzing log form of security equipment that has occurred for many years.  


1998 ◽  
Vol 7 (4) ◽  
Author(s):  
Tomáš Sirovátka

Individual responsibility and subsidiarity represent more general principles of market transition which are also relevant for social security system. The main goals of transformation of social security systems in transition countries have been defined as follows: more transparency and better targeting which is - considering cost efficiency requirement - necessary condition to protect the citizens against the newly emerging social risks. The question how far the effects of social security system transformation correspond to these claims seems to be extremely politically significant.


Sign in / Sign up

Export Citation Format

Share Document