scholarly journals Enhanced Security Methods of Door Locking Based Fingerprint

This paper presents an enhanced methodology in implementing and designing a security system for door locking purpose based on fingerprint, GSM technology, monitoring camera, alarm system and password system. This security system will provide enough security by limiting unauthorized people access and taking a record of those who pass through it. Sometimes unauthorized people or burglars try to break the door for evil intentions at a time when no one is available at a targeted place, so this paper introduces some security solutions for that problem and they are the main contribution of our paper. We introduce an alarm system to alert the people at the surroundings, GSM module that’s used to send an SMS message to the registered user’s (responsible person) and a web camera that’s used to take a video for a person who tries to break the lock, password keypad that’s used after fingerprint sensing to provide extra security. Definitely the registered users are the only persons who can access the lock, and the door closes after five seconds from the opening time. The method used to implement this experiment involves the use of a fingerprint scanner R305 that’s interfaced with Arduino microcontroller-ATMEGA328P to control the locking and unlocking process of a door. During all the opening and closing processes, the16x2 Liquid Crystal Display (LCD) displays some commands which can be used to instruct the users like, place your finger on the sensor, the door is opened, the door is closed, the message is sent, please enter the password etc. If an unregistered user tries to access the door using their fingerprints, automatically his/her access is denied. The proposed door lock security system is can be used at homes, offices, banks, hospitals, and in other governmental and private sectors. Our proposed system was tested in real-time and has shown competitive results compared to other projects using RFI and password.

2020 ◽  
Vol 2 (4) ◽  
Author(s):  
Ruizheng Wang ◽  
Xuan Liu ◽  
Xinhao Huang

in order to improve the security of home residence, this paper studies and designs an intelligent home security alarm system, using STC89C51 single chip microcomputer as the main controller of the security system, and real-time monitoring by controlling the human pyroelectric infrared sensor and smoke sensor in the case of strangers invading the security range and showing signs of fire. Once the abnormal situation is found, the intelligent home security alarm system will start the acousto-optic alarm prompted by the LED lamp and pass through the information processing system of the GSM module. Send an abnormal text message to the user of the security system at the first time face, and finally realize the purpose of modern intelligent home security alarm.


2018 ◽  
Vol 12 (1) ◽  
pp. 1-24
Author(s):  
Koesparmono Irsan ◽  
Anggreany Haryani Putri

Brimob is a special top of Indonesian National Police Force, Brimob was trained to face special crimes using guns and other special weapon to face crimes using force. All politics is a struggle for power is violence. The reemergence in the early 1980s of terrorism motivated by a religions imperative and state-sponsored terrorist set in motion perfound changes in the nature, motivations and capabilitis of terrorist that are still unfolding. Torture is used as a strategic component of state security system to achieve board political ends thorugh the victimizaztion of individuals which serves pain of suffering, wether physical of metal, is intentionally inflicted : ‘many person, of course, harbor all sorts of radical and extreme belifts and opinion, and many of them belong to radical or even illegal of proscribed political organization. However, if they do not use violence in the pursuance of their beliefs, they cannot be considered terrorist. The willful application of force in such a way that is intentionally injurious to the person or group against whom it applied. Injury is under stood to include psychological as well as physical harm. Police use arms to protect himself and the people.


2013 ◽  
Vol 10 (1) ◽  
pp. 14
Author(s):  
Auradian Marta ◽  
Khairul Anwar ◽  
Hery Suryadi

This research aims to describe of process or mechanism and formulation model of RencanaPembangunan Jangka Menengah Desa (RPJMDes) Buluh Cina 2011-2015. This research is descriptivetype with used qualitative method. The data on this research obtained are depth interview with informanand documentation study. From this research obtained result that on formulation Rencana PembangunanDesa (RPJMDes) Buluh Cina 2011-2015 pass through Musrenbangdes. Musrenbangdes involved allcomponent participation from institutional and the people. Thus, in formulation RPJMDes used democraticmodel.Keywords: formulation, democratic model, RPJMDes


Author(s):  
Vikram Kulkarni ◽  
Viswaprakash Babu

In this proposed embedded car security system, FDS(Face Detection System) is used to detect the face of the driver and compare it with the predefined face. For example, in the night when the car’s owner is sleeping and someone theft the car then FDS obtains images by one tiny web camera which can be hidden easily in somewhere in the car. FDS compares the obtained image with the predefined images if the image doesn’t match, then the information is sent to the owner through MMS. So now owner can obtain the image of the thief in his mobile as well as he can trace the location through GPS. The location of the car as well as its speed can be displayed to the owner through SMS. So by using this system, owner can identify the thief image as well as the location of the car This system prototype is built on the base of one embedded platform in which one SoC named “SEP4020”(works at 100MHz) controls all the processes .Experimental results illuminate the validity of this car security system.


2021 ◽  
Vol 7 (1) ◽  
pp. 10-18
Author(s):  
Arief Saptono ◽  
Abdul Malik ◽  
Muhamad Satim

Computer and information technology from time to time are always experiencing developments, both in terms of hardware, software and the internet being one of the most important things atthis time. The increasing number of applications of computer technology will make the role of computers increasingly important to be more advanced (modernization). The security system isstill not effective and efficient enough, so that a control using a website is needed to help the security control process at the gate. This system is not only used in offices, but can be used inhome security, etc. So we need a security system, where the security control system uses a tool to monitor realtime security via a web browser, namely a webcam (Web Camera). A web-basedgate control system can be designed using the Raspberry Pi B +. From the explanation mentioned above, the researcher made a gate control device that was given to the Microcontroller using a Web Browser in order to open and close the gate. So it is hoped that this security system application can provide a sense of comfort, in addition, of course, with this system application it can reduce the number of crimes that occur both crimes and other crimes.


Author(s):  
Bobomurod Juraevich Abdullaev ◽  

This article provides insights into the existing and politically important security system in the Central Asian khanates. The khanates of Bukhara, Khiva and Kokand had their own military power and were divided into different parts. The security departments of the khanates also played an important role in the development of the state and the security of the people. During the years of independence, as in any other field, significant changes have taken place in the field of security services. In particular, the President of the Republic of Uzbekistan Shavkat Mirziyoyev has improved the security service in the National Guard.


1986 ◽  
Vol 79 (4) ◽  
pp. 337-348
Author(s):  
Michael James Hauan
Keyword(s):  

“‘…for I will pass through the midst of you,’ says Yahweh”In commenting on this verse, most scholars have understood Amos's image of Yahweh passing through the midst of the people Israel as an allusion to his passing through Egypt. They make reference in this regard to Exod 12:12:For I will pass through (we ʿābarû) the land of Egypt that night, and I will smite all the first-born in the land of Egypt, both man and beast; and on all the gods of Egypt I will execute judgments: I am Yahweh.


2018 ◽  
Vol 7 (3.33) ◽  
pp. 165
Author(s):  
JangMook KANG ◽  
Cheol Hee YOON ◽  
Tae Hyeong KWON

Malicious hacking is evolving continuously malicious code attacks. It needs flexible solutions such as the prevention leakage of personal information, demanding the ability of institutions to prevent high level of infringement. But, typical simple's security control system is limited by responding only to the tertiary industry equipment in the ICT field. A CPS type security system is capable of responding to the transition from ICT to AI which is should be applied. This is time of reorganization from the current security domain to the artificial intelligent ICBM device, it should apply the digital twin model which we are considering the people and environment of CPS type system. In this paper, we have studied a model of how cyber - physical systems can be implemented using existing security system platform technology. We also propose a new security technology applying model through analyzing log form of security equipment that has occurred for many years.  


Sign in / Sign up

Export Citation Format

Share Document