scholarly journals Sistem Controling Engine Menggunakan Fingerprint Berbasis Arduino

2019 ◽  
Vol 4 (1) ◽  
pp. 36-40
Author(s):  
Nur Hidayat Syukron

The growth of motorcycles at this time is very fast. The case of motorcycle theft is still often the case, this happens because there is still a lack of security systems that exist in motor vehicles that only use the ignition key. In addition, the lack of human control systems are still often missed. Motorcycles are the main transportation at this time, so it needs to be made bicycle security system. Security is done in the form of a system with fingerprints in anticipation of the frequent mode of motorcycle theft, which can access by using fingerprints are certain people whose fingerprint data has been programmed into the system, so that the motorcycle can not live without the match between the fingerprint which is detected by the sensor by fingerprint.

2020 ◽  
Vol 2 (10) ◽  
pp. 135-143
Author(s):  
Iryna Litvinchuk ◽  
Nataliia Korshun ◽  
Maksym Vorokhob

The article is devoted to the development of a method for evaluating the effectiveness of the level of protection at the object of information activities when using an integrated security system. Such systems provide for the sharing of resources of subsystems of fire and security alarm, video surveillance, access control systems and others. The application of integration provides a number of benefits, including: quick and accurate reaction to events, facilitating the work of the operator by automating management processes, control and decision-making on security, reducing the probability of erroneous actions of the operator, reducing equipment costs. Among the requirements for integrated security systems are reducing the role of man in the security process by increasing the systems intelligence, reducing the level of false positives due to closer use of subsystems and openness. Implementation of these requirements will increase the efficiency of security systems, reduce the human factor and will make the construction of integrated systems more transparent. The proposed method of assessing the integrated security system summarizes the state of security at the object of information activities, points to the weaknesses of the existing integrated security system, those that need of improvement. It can also be used when selecting the appropriate integrated security system. The assessment of the level of protection takes into account such criteria as complexity, functionality, size, speed, fault tolerance, scalability, interaction with external systems, the possibility of expansion.


Compiler ◽  
2012 ◽  
Vol 1 (2) ◽  
Author(s):  
Suwito Suwito ◽  
Hero Wintolo ◽  
Dwi Nugraheny

Synchronization is the process of setting the course of several processes at the same time. Synchronization builds upon students' academic value table STTA Yogyakarta by comparing records for the records in the database. If there is a difference in the academic value of the table the different values will be returned as the value of the original with comparing by using the master database. Record based table synchronization is expected to address the security system on the database and provide security guarantees a safe and comfortable.Authentication is a process by which a user is identified by the server before the user using the network. In the process, the user is requesting access rights to the server to use a network. Authorization is the allocation of what services are entitled to be accessed by the user on the network. Authorization is done when the user has been declared eligible to use the network. Accounting is a process performed by the server to record all user activity in the network, such as when the user starts using the network, end user when the connection to the network, how long the user using the network, how much data is accessed from the network user.The results of the implementation of synchronization using a table based record system security authentication, authorization, accounting changes that may prevent the occurrence of data in a database, optimizing the use of stored, and enhance security systems at the database STTA center of Yogyakarta.


EXPLORE ◽  
2019 ◽  
Vol 9 (1) ◽  
pp. 1 ◽  
Author(s):  
Erfan Wahyudi ◽  
Muhammad Masjun Efendi

One of the major changes in the telecommunications sector is the use of wireless technology. But many problems that must be faced when implementing this wireless network, one of which is a security problem. Many people are still questioning about wireless security, and many others believe that wireless security systems using WPA2-PSK are more secure than other wireless security systems. However, based on the results of literature studies conducted, a wireless security system that really can provide more secure security is to use the system security Remote Authentication Dial-In User Servers (RADIUS) server. While at present, many parties still use WPA2-PSK as their wireless security system to avoid the possibility of unauthorized use of internet access by unauthorized people. This study aims to analyze the comparison of the two wireless network security systems above. The test was performed using wireless penetration testing method, and the result stated that 80% of Security Captive Portal system is more secure than WPA2-PSK.


Author(s):  
إبراهيم محمد زين

الملخّص يهدف هذا البحث لبيان أن السبيل الناجح لمواجهة الإرهاب الدولي المعاصر الملتبس بدعاوي الجهاد الإسلامي وإحياء دولة الخلافة الإسلامية هو التركز على معاني الأمن الفكري والروحي في الإسلام وهذا الاتجاه في المباحثة يُعيد النظر في طرائق قضايا الجهاد ويميز بين ما هو عقائدي ومرتبط بنظام الإسلام الكلي وبين ما هو من مجال حروب الفتنة والصعلكة.  الكلمات المفتاحيّة: الجهاد، حروب الصعلكة، حروب الفتنة، الأمن الروحي والفكري.              Abstract This study focuses on the most effective way of combating global terrorism that utilizes the banner of Jihad and restoration of the Khilafa system of governance. It should be emphasized that there is a dire need for a new line of investigation concerning the issue of Jihad that pays more attention to both spiritual and intellectual security systems in Islam. This requires a distinction to be made between what is universalistic in the Islamic system and what is particular. In this regard one has to differentiate between acts of just war and those of economic or sedition wars. Keywords: Jihad, economic war, sedition war, spiritual-intellectual security system.


2021 ◽  
Vol 2 (2) ◽  
pp. 105-115
Author(s):  
Mahmod Al-Bkree

This work is to optimize perimeter surveillance and explore the distribution of ground bases for unmanned aerial vehicles along the Jordanian border and optimize the set of technologies for each aerial vehicle. This model is part of ongoing research on perimeter security systems based on unmanned aerial vehicles. The suggested models give an initial insight about selecting technologies carried by unmanned aerial vehicles based on their priority; it runs for a small scale system that can be expanded, the initial results show the need for at least four ground bases along the length of the border, and a selected set of various technologies for each vehicle.


2019 ◽  
Vol 4 (2) ◽  
pp. 112-120
Author(s):  
Hadjira BELAIDI ◽  
Nour-El-Houda MEDDAH

This work deals with lock and home security systems. First, Motion sensors detect movement indoors and outdoors to guard against intruders, protect valuables and more. Thus, if any movement, RFID reader will be activated and database will be scanned to identify the persons who have the access to the home. This enhances the effectiveness of the security system and provides the user with the complete, whole-house protection he needs. An RFID badge can be used to unlock the door and access to the home. Alerts also are received on the smart phone if motion is sensed in a protected area inside or outside; giving the user the information it needs to act quickly. The door can also be remotely locked/unlocked. A microcontroller (ATmega2560) is used to control the entire system, and GSM is used to send alerts to the Smartphone. An Ethernet shield that connects the microcontroller to the database (DB) is also added.


2021 ◽  
Vol 6 (6) ◽  
pp. 69-73
Author(s):  
Md. Abdullah Al Rakib ◽  
Md. Moklesur Rahman ◽  
Md. Sohel Rana ◽  
Md. Sanjib Islam ◽  
Fysol Ibna Abbas

In this paper, we worked on how to control home apparatuses, safety, and security systems utilizing GSM innovation by utilizing a cell phone. We will likewise show that we can control the apparatuses even without a phone by sending an ordinary call. The favorable position of utilizing GSM innovation is that we can handle home appliances from any place in the world. This system permits the proprietor to control the appliances and to get a feedback status of the home apparatuses by sending calls just as through a portable application. For the home security system, we are utilizing an antitheft announcing system that will report the proprietor by sending a message and ringing a call. Likewise, for the security system, when fire or gas spillage is expected to occur, it will also report the proprietor by sending a call. Subsequently, by utilizing GSM innovation, it gives remote access to the gadgets to be controlled.


1998 ◽  
Vol 7 (4) ◽  
Author(s):  
Tomáš Sirovátka

Individual responsibility and subsidiarity represent more general principles of market transition which are also relevant for social security system. The main goals of transformation of social security systems in transition countries have been defined as follows: more transparency and better targeting which is - considering cost efficiency requirement - necessary condition to protect the citizens against the newly emerging social risks. The question how far the effects of social security system transformation correspond to these claims seems to be extremely politically significant.


2014 ◽  
Vol 571-572 ◽  
pp. 1037-1041
Author(s):  
Ya Liu ◽  
Jian Hua Mao ◽  
Xue Feng Liu

The traditional smart security systems have poor extensity, delayed alarm systems, and cannot be controlled through the remote network. To solve the shortcomings, this article proposed a smart security system based on Sensor Web. The system used Sensor Observation Service to achieve the data transmission and storage in real time. Users can send requests to Sensor Observation Service to get home environment information in real time via Internet. The system also implemented Sensor Event Service, so that users can get home security alarm information in real time by subscribing the events they are interested in.


Sign in / Sign up

Export Citation Format

Share Document