scholarly journals Door Security Design using Radio Frequency Identification With a Short Message Service Warning System

In the workspace, when we are working at home it is vital for property holders to keep up vital records and information. In this manner, the security of the workspace entryway is extremely important to build security and it can avoid burglary when the workspace isn't utilized or relinquished. The easiest security for the entryway is introducing a manual key. Yet, manual key is anything but difficult to break. With advancement of entryway security innovation it utilizes watchword, finger check, and numerous others, yet security is just to open and shutting entryway. Yet, when the entryway was persuasively opened or harmed by hoodlums, the property holder still had no data that the entryway was broken. To conquer this issue, a framework that can supplant the manual entryway bolt to a more advanced entryway security framework is required with the goal that it is difficult to separate and can see whether the entryway is opened or harmed by a cheat. To run this framework, 3 parts are utilized, to be specific RFID card as a key re-arrangement apparatus, a sensor to gauge vibration on the entryway when it is constrained open or harmed by criminals and tells the mortgage holder by means of SMS

2019 ◽  
Vol 4 (1) ◽  
pp. 70-77
Author(s):  
Kustori Kustori

Politeknik Penerbangan Surabaya memiliki Laboratorium Airfield Lighting System yang sudah menggunakan Fingerprint dalam pengoperasiannya, tetapi karena kurangnya pengawasan terhadap suatu alat yang akan dipinjam mengakibatkan hilangnya barang atau peralatan yang ada pada laboratorium. Permasalahan yang dikaji dalam penelitian ini adalah belum adanya pengawasan terhadap peminjaman alat yang ada pada laboratorium Airfield Lighting System serta kurangnya sisi keamanan pada laboratorium. Penulisan penelitian ini bertujuan untuk merancang suatu sistem proteksi otomatis pada laboratorium Airfield Lighting System Politeknik Penerbangan Surabaya dengan menggunakan Motion Detector sebagai pendeteksi gerakan manusia, Radio Frequency Identification (RFID) sebagai pendeteksi peralatan dan CCTV sebagai Monitor keadaan yang ada pada laboratorium. Pengontrolan dilakukan secara wireless yaitu dengan menggunakan media Short Message Service (SMS). Hasil dari rancangan ini adalah terciptanya suatu alat bantu untuk memonitor peminjaman alat yang ada pada laboratorium dan menambah sistem keamanan untuk mencegah terjadinya pencurian pada laboratorium Airfield Lighting System


2021 ◽  
Vol 4 (2) ◽  
pp. 127-133
Author(s):  
Anggi Martua Valentino Sianipar ◽  
Solikhun Solikhun ◽  
Widodo Saputra ◽  
Iin Parlina ◽  
Zulaini Masruro Nasution

In the era of the industrial revolution 4.0 today, many technologies are used by humans to help their daily activities, one of which is in the field of home door security. To improve the security of home doors, we can use the Arduino Mega2560 as a control center, we can design a prototype for a door security system using E-KTP which is equipped with several sensors to improve the security of the door that is used as access for entry and exit. E-KTP is a card that is used as a person's identification and can also be used as a tool to open the door in the design of this tool, because in it there is a chip that can be read using electromagnetic waves. RFID (Radio Frequency Identification) is a sensor that can be used to read E-KTP, and to control it remotely, we can use the SMS (Short Message Service) service that is on every Cellphone / Smartphone so that the security of the house door is better because it is also equipped with Magnetic sensors and Buzzer as security if the door is forced to open by an irresponsible person.


Nowadays security is the most common problem in door locking system. Anyone can break the door using hard objects and make a robbery of the home, offices and any other properties. This can lead to huge loss for the human economy. In this paper we are proposing a model, in which we used to lock and open the entryway utilizing the google help over the voice and stun IoT board and stun IoT application. The existing system rely on microcontroller, Global System for Mobile (GSM) , GPS(Global Positioning System), various sensors, programming like MATLAB, biometric face affirmation, Iris scanner, RFID(Radio frequency identification ) technology [6], smart card and mystery express etc. In a colossal fragment of frameworks, Short Message Service (SMS) approach is utilized for correspondence so the structure, it requires some test to pass on message.


Author(s):  
Nur Anis Athirah ◽  
N. H. Radzi ◽  
M. N. Abdullah ◽  
S. A. Jumaat ◽  
N. Z. Mohamad

<span>Flood is one of the most common hazards in Malaysia. Flood effects can be local, or very large, affecting the neighborhood or community and entire river basins. This flood develops slowly; sometimes over a period of days while sometimes develop quickly in just few minutes. With the real time flood information, it will allow public safety organizations and other emergency managers to effectively plan their resource deployment within the limited time of alert. Hence, this project aims to design the solar powered flood alert warning system by using solar energy as the power supply. This system will send message using GSM to the residents to notify them about the flood occurred. In this project, three LEDs were used to indicate the height of the water levels which are safe, alert and danger conditions. Each of the height have different water level that indicates the level of safety for each condition. </span>


BMC Medicine ◽  
2020 ◽  
Vol 18 (1) ◽  
Author(s):  
Paul Loubet ◽  
Christian Czeschan ◽  
Matthieu Sintes ◽  
Albert Sotto ◽  
Didier Laureillard

Abstract Background Mobile health innovations are well adapted for ambulatory coronavirus disease 2019 (COVID-19) patients who risk clinical deterioration at home during the second week of illness. Methods A short message service (SMS) communication program was implemented by French physicians to monitor COVID-19 patients after discharge from outpatient or emergency care. The aim of the SMS tracking is to advise patients about their need for medical reassessment if reporting worsening of COVID-19 symptoms. A follow-up via SMS to all confirmed positive patients in the Nîmes area (France) was established. Every morning, patients received four follow-up questions. Daily responses were converted to green, orange or red trees, analysed in real time by physicians. “Red” patients were called immediately to check their condition and organise transfer to hospital if needed. “Orange” patients were called within two hours to verify whether the specific instructions following the SMS had been followed. Results From March 21 to June 30, 2020, 1007 patients agreed to sign up to the SMS tracking, 62% were women and the mean age was 41.5 years (standard deviation (SD) 16.0). During follow-up, 649 (64%) became “orange” and 69 (7%) “red”. Ten patients were directly admitted to the Infectious Diseases Department during their follow-up due to clinical worsening, all but one as a result of SMS alerts and subsequent telephone assessment by physicians. Conclusion SMS tracking platforms could be useful as an early warning system to refer patients with worsening clinical status to hospital-based care or additional clinician advice.


Author(s):  
Shu Wen Lee ◽  
Pek Hia Lai

Most governments around the world have implemented or are in the midst of implementing electronic government (e-Government). E-Government has its share of advantages, disadvantages and limitations. The rise of mobile technologies can be seen as the answer to complement e-Government. With the high adoption level of mobile devices and the rising demands for instant information and interactions with government bodies, mobile government (m-Government) is born. Unlike e-Government, m-Government is not restricted to being internet-based. Different wireless or mobile communication modes such as Short Message Service (SMS), mobile applications, and Radio Frequency Identification (RFID) have provided different avenues to implement or enhance M-Government. Both e-Government and m-Government implementations create different values for the different stakeholders. This chapter examines an e-Government and m-Government Component Assessment Cube Framework for value assessment of both e-Government and m-Government information technology project implementations. The three main groups explored in the framework are namely (value) components, stages, and stakeholders.


2021 ◽  
Vol 3 (1) ◽  
pp. 76
Author(s):  
Chandra Adrian ◽  
Mia Galina

This paper concentrates of creating a fault detection system that detect both emergency fault and fault that need of maintenance with prototype of electrical installation that is done through manual simulation method. The prototype consists of the lamp as the load integrated with Arduino UNO as the microcontroller with GSM module and buzzer. The microcontroller will detect and deduce the type of the fault happened in the installation and will send the data of the fault through the GSM module. GSM module then transmits the data to the mobile phone and let the user aware of the fault. Also, there will be buzzer as the warning system by producing high pitch sound that signalizes the fault that need immediate handling or emergency. The data of both faults will be sent as Short Message Service (SMS) to the user. The SMS will give the user the type of fault either emergency or need of maintenance, happened in the installation.


2015 ◽  
pp. 735-752
Author(s):  
Shu Wen Lee ◽  
Pek Hia Lai

Most governments around the world have implemented or are in the midst of implementing electronic government (e-Government). E-Government has its share of advantages, disadvantages and limitations. The rise of mobile technologies can be seen as the answer to complement e-Government. With the high adoption level of mobile devices and the rising demands for instant information and interactions with government bodies, mobile government (m-Government) is born. Unlike e-Government, m-Government is not restricted to being internet-based. Different wireless or mobile communication modes such as Short Message Service (SMS), mobile applications, and Radio Frequency Identification (RFID) have provided different avenues to implement or enhance M-Government. Both e-Government and m-Government implementations create different values for the different stakeholders. This chapter examines an e-Government and m-Government Component Assessment Cube Framework for value assessment of both e-Government and m-Government information technology project implementations. The three main groups explored in the framework are namely (value) components, stages, and stakeholders.


2018 ◽  
Vol 7 (4.36) ◽  
pp. 841 ◽  
Author(s):  
Mamilla Sirisha ◽  
Neelam Syamala

The examination may be the heart of the education framework. The principal reason for the examination will be to select the proficient applicants for several positions. Every year we get the news regarding postponed/canceled exam because of paper leakages. So we need come up with manageable and compact result and decided to design and execute an “examination paper leakage security framework “that will be a much-protected framework depend on “ARM processor”. Together with “the GSM modem, keypad, electromagnetic lock, and RFID module “would be utilized in this framework. First, the university will send the exam paper to the college in “an electronic sealed box”that is termed as “Electronic Control Box”. The “Electronic Control Box “will be an embedded framework, which might have been proposed utilizing “ARM processor” that has inbuilt RTC to display “the Electronic Control Box”. Whether anybody tries to open that box previous and afterward the time duration of the RFID swipe, the framework communicates to the university powers by sending “and SMS (Short Message Service)” through the GSM, which several malfunctioning has taken place with “the Electronic Control Box". For instance, whether the secret key doesn’t match then the client who has access to get the message on his telephone. If we enter the invalid secret ID then the ringer will be ON. Therefore we might effectively recognize that the question papers have been leaked.This paper defines the electronic security for the leakage of question paper that will be an exceptionally protected framework. The examination will be the heart of “the education framework”. We have recommended an electronic framework to identify and avoid the leakage of exam papers. In this proposed system, the exam papers that are in “the electronically locked box” will be sent to the examination centers. The box will be unlocked after a predefined time, date and only by a certified client. Essentially the exam papers will be existing in the sub-boxes. Secret ID secures these boxes; the exam manager will send an SMS with the password to open the specific sub-boxes. The electromagnetic lock is used to unlock the box, when the time, date, and password match. In this framework, we are utilizing a ringer for any unapproved interference. 


Sign in / Sign up

Export Citation Format

Share Document