scholarly journals Rancang Bangun Sistem Kontrol Keamanan Gerbang Menggunakan Raspberry Pi B+ Berbasis Web

2021 ◽  
Vol 7 (1) ◽  
pp. 10-18
Author(s):  
Arief Saptono ◽  
Abdul Malik ◽  
Muhamad Satim

Computer and information technology from time to time are always experiencing developments, both in terms of hardware, software and the internet being one of the most important things atthis time. The increasing number of applications of computer technology will make the role of computers increasingly important to be more advanced (modernization). The security system isstill not effective and efficient enough, so that a control using a website is needed to help the security control process at the gate. This system is not only used in offices, but can be used inhome security, etc. So we need a security system, where the security control system uses a tool to monitor realtime security via a web browser, namely a webcam (Web Camera). A web-basedgate control system can be designed using the Raspberry Pi B +. From the explanation mentioned above, the researcher made a gate control device that was given to the Microcontroller using a Web Browser in order to open and close the gate. So it is hoped that this security system application can provide a sense of comfort, in addition, of course, with this system application it can reduce the number of crimes that occur both crimes and other crimes.

Author(s):  
Kalyani Pendke ◽  
Jasmine Nadar ◽  
Samiksha Ramteke ◽  
Mayuri Rokade ◽  
Bhagyashree Rokade

In this new-fangedworld crime has become an important issue to be resolved. Some of the real time incidents as of today are thefts at home, trespassers and so on. Though people have no time to look up on these things as they are held up in their daily life, they always want to ensure their safety of their beloved ones and beloved things. Sometimes they forget to look after their necessary things like keys, wallet, credit cards etc. Without these, they are unable to access their home or any place they want. Smart locker security control system has become indispensable in daily life. This paper explains about the design and development of a security system, using remotely monitoring technology and human face recognition technology, to confirm the identity of the visitor and to control door accessibility using Internet of Things (raspberry pi) and also the implementation and deployment of wireless control system and accessibility to a home environment for only authenticated people.This paper also explain simple IOT based low cost security Locker security system for domestic and office lockers.


JOURNAL ASRO ◽  
2020 ◽  
Vol 11 (1) ◽  
pp. 202
Author(s):  
Firman Yudianto ◽  
Fajar Annas Susanto

Currently a low cost security system is needed and easy to apply especially at educational institutions that willimplement smart school and industry 4.0. Needed devices are raspberry pi and web camera. Raspberry pi willonly save moving images taken from the web camera. Because by storing an image whose file size is not toolarge will ease the performance of the server. In this study, a design for the raspberry pi based motion detectionsystem will be applied at SMK PGRI Sukodadi Lamongan Regency which has not have security system. Thissystem will save the file in the form of an image that will be put together into a moving image that looks like avideo that will displayed in a LED monitor.Keywords: smart school, motion detection, moving image.


2019 ◽  
Vol 5 (1) ◽  
Author(s):  
Eko Riyanto

Smart Home is one of the tools that is developed for ease of automation of smart home management from the start of address, security, comfort, savings, through automation with Android. In designing a micro home security system controller using raspberry pi 3 and Android smartphones that can reduce the number of criminal acts of burglary door. This tool consists of an electro magnetic door lock called a solenoid door lock.This solenoid key is placed on the door of the house for security. The design of this home door security system utilizes Raspberyy pi b + as a control device from near and far by utilizing the wifi network and sms gateway to control opening and closing the home door lock that is controlled via an android mobile. Through web bootstrap that will display the results captured by the camera to provide a home situation every time someone enters.This house door security system that has been successfully built and tested with the working principle if there is someone who forces or breaks the house door in a closed condition, the system will activate a warning or alarm by sounding the buzzer¸ because there is an LDR sensor connected to one switch connected to the solenoid key that results, if the key is opened with a security system then the LDR sensor will turn off and there will be no alarm, but if it is forced to break the LDR sensor will activate and read the movement of the door so that the reaction occurs and the buzzer alarm will sound. This security system is a solution to increase the level of home security ¸ besides this sophisticated system is very easy to use and integrated with android smartphones


2020 ◽  
Vol 2 (1) ◽  
pp. 46-53
Author(s):  
Azim Ben ◽  
Embara Adly ◽  
Devia Hasannah

Internet of thing (IoT) is a concept that aims to expand the benefits of internet connectivity that is connected continuously. Internet of things (IoT) can be used in buildings to control electronic equipment such as room lights that can be operated remotely via a computer network. This study aims to build a remote control device by utilizing internet technology to carry out the mobile-based light control process. The research was conducted by building a prototype and mobile-based application using the python programming language. In this study, there is a control feature, namely one light control which is used to turn on one lamp and two controls used to turn on the lamp simultaneously.


2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


2015 ◽  
Vol 1 (1) ◽  
pp. 37-45
Author(s):  
Irwansyah Irwansyah ◽  
Hendra Kusumah ◽  
Muhammad Syarif

Along with the times, recently there have been found tool to facilitate human’s work. Electronics is one of technology to facilitate human’s work. One of human desire is being safe, so that people think to make a tool which can monitor the surrounding condition without being monitored with people’s own eyes. Public awareness of the underground water channels currently felt still very little so frequent floods. To avoid the flood disaster monitoring needs to be done to underground water channels.This tool is controlled via a web browser. for the components used in this monitoring system is the Raspberry Pi technology where the system can take pictures in real time with the help of Logitech C170 webcam camera. web browser and Raspberry Pi make everyone can control the devices around with using smartphone, laptop, computer and ipad. This research is expected to be able to help the users in knowing the blockage on water flow and monitored around in realtime.


2020 ◽  
Vol 5 ◽  
pp. 94-106
Author(s):  
Y.M. Iskanderov ◽  
◽  
M.D. Pautov

Aim. The use of modern information technologies makes it possible to achieve a qualitatively new level of control in supply chains. In these conditions, ensuring information security is the most important task. The article shows the possibilities of applying the spatial concepts of the actor-network theory in the interests of forming a relevant intelligent information security management system for supply chains. Materials and methods. The article discusses a new approach based on the provisions of the actor-network theory, which makes it possible to form the structure of an intelligent information security control system for supply chains, consisting of three main functional blocks: technical, psychological and administrative. The incoming information security threats and the relevant system responses generated through the interaction of the system blocks were considered as enacting the three Law’s spaces: the space of regions, the space of networks and the space of fl uids. Results. It is shown that the stability of this system in the space of networks is a necessary condition for its successful functioning in the space of regions, and its resilience in the space of fl uids gained through the dynamic knowledge formation helps overcome the adverse effects of the fl uidity. The problems of the intentional / unintentional nature of information security threats, as well as the reactivity / proactivity of the corresponding responses of the intelligent information security management system for supply chains are investigated. Conclusions. The proposed approach showed the possibility of using such an interdisciplinary tool in the fi eld of information security as the concepts of the actor-network theory. The intelligent information security control system built on its basis ensures that almost all the features of solving information security problems in supply chains are taken into account.


2021 ◽  
Vol 1916 (1) ◽  
pp. 012137
Author(s):  
Kumar R Senthil ◽  
M Prabu ◽  
K S Rani ◽  
K Prabaakaran ◽  
Penekalapati Soniya Chowdary ◽  
...  

Author(s):  
Bura Vijay Kumar ◽  
Seena Naik Korra ◽  
N Swathi ◽  
D. Kothandaraman ◽  
Nagender Yamsani ◽  
...  

2018 ◽  
Vol 2018 ◽  
pp. 1-20 ◽  
Author(s):  
Yassine Rabhi ◽  
Makrem Mrabet ◽  
Farhat Fnaiech

A new control system of a hand gesture-controlled wheelchair (EWC) is proposed. This smart control device is suitable for a large number of patients who cannot manipulate a standard joystick wheelchair. The movement control system uses a camera fixed on the wheelchair. The patient’s hand movements are recognized using a visual recognition algorithm and artificial intelligence software; the derived corresponding signals are thus used to control the EWC in real time. One of the main features of this control technique is that it allows the patient to drive the wheelchair with a variable speed similar to that of a standard joystick. The designed device “hand gesture-controlled wheelchair” is performed at low cost and has been tested on real patients and exhibits good results. Before testing the proposed control device, we have created a three-dimensional environment simulator to test its performances with extreme security. These tests were performed on real patients with diverse hand pathologies in Mohamed Kassab National Institute of Orthopedics, Physical and Functional Rehabilitation Hospital of Tunis, and the validity of this intelligent control system had been proved.


Sign in / Sign up

Export Citation Format

Share Document