scholarly journals RANCANG BANGUN SISTEM INFORMASI E TI C KETING PARKIR KENDARAAN MENGGUNAKAN NFC CARD

2019 ◽  
Vol 5 (3) ◽  
Author(s):  
I Gede Sujana Eka Putra

ABSTRACT Parking security system is needed in providing security system and comfort for visitors. Ticketing systems that use parking tickets, have disadvantages such as, tickets can be lost and can also be damaged / torn or lost and the identity of the vehicle does not match the parking ticket and is easily falsified. Based on the background above, an information system is designed that applies the card as a vehicle ticket for parking replacing the parking ticket, improve accurate identification and vehicle security. This application requires data entry of a vehicle number, and vehicle owner name which stored on an RFID card which are encrypted, increasing security and making it difficult for others to duplicate the card. Data entered in the form of the vehicle number, the name of the vehicle owner whose data is stored on the NFC card. When a visitor leaves the location, the NFC card is tapped into NFC reader to verify the scanned data in RFID the same as the vehicle number, which data has been stored in the database, and calculates the vehicle parking duration so that the vehicle parking cost could be calculated automatically. System output are RFID card which shows vehicle numbers and driver's names The system provides a daiy recapitulation report and monthly summary of vehicle parking data such as the number of vehicles, the vehicle number and the name of the driver who is parking, total parking duration and total parking revenue for the period. Keywords: NFC Card, encryption, e-ticketing, RFID<br />ABSTRAK<br />Sistem keamanan parkir diperlukan dalam memberikan rasa aman dan nyaman bagi pengunjung yang parkir. Sistem ticketing yang menggunakan karcis parkir, memiliki kelemahan seperti, karcis dapat hilang dan dapat juga rusak /robek atau terselip/hilang dan identitas kendaraan tidak sesuai dengan karcis parkir dan mudah dipalsukan. Berdasarkan latar belakang diatas, dirancang sistem informasi yang menerapkan kartu sebagai tiket kendaraan untuk parkir menggantikan karcis parkir memudahkan identifikasi dan meningkatkan keamanan kendaraan.Aplikasi ini memerlukan masukan data berupa nomor kendaraan yang disimpan dalam kartu RFID. Data yang disimpan pada kartu RFID di enkripsi, sehingga meningkatkan keamanan dan menyulitkan pihak lain untuk menggandakan kartu tersebut. Data yang diinput berupa nomor kendaraan, nama pemilik kendaraan yang datanya disimpan dalam kartu NFC. Saat pengunjung keluar dari lokasi, kartu NFC dipindai dengan NFC reader untuk memverifikasi data yang di scanning sama dengan data nomor kendaraan yang sudah tersimpan dalam database, dan menghitung durasi parkir kendaraan sehingga dihitung tarif parkir kendaraan. Informasi keluaran sistem berupa kartu RFID yang menunjukkan rekaman data nomor kendaraan bermotor dan nama pengendara. Sistem menyediakan laporan rekapitulasi parkir harian dan kesimpulan data parkir kendaraan bulanan seperti jumlah kendaraan, nomor kendaraan dan nama pengendara yang parkir, total durasi parkir dan total pemasukan parkir pada periode tersebut.<br />Kata Kunci: kartu NFC, enkripsi, e-ticketing, RFID

This paper deals with development of a Vehicle Security and Entertainment System, which is being used to monitor, track the vehicle, and to offer local entertainment system. The development system makes used of two embedded devices to split the entertainment system from the security system to ensure isolation and security. The security system is equipped with camera, distress signal switch and GPS/GPRS module to track, report a problem, and monitor the vehicle by sending data to a centralized database server where vehicle owner can access and retrieve these data to guarantee the safety of the passengers and the vehicle too. The second system is the entertainment system, where this system uses a powerful Intel atom embedded device and local network to allow users to connect and offer entertaining services. These services include, E-Book library and multimedia streaming. The main concept of research to develop a low cost system to secure and entertain passengers on vehicles like buses, train and even cars. The development is cost effective and as well as can be modified to add extra modules or to develop extra entertainment services. If the vehicle is stolen the system is able to send a distress signal to the owner or company. They can help the passengers by monitoring through the vehicle camera. In this research we have successfully developed and tested the system.


Author(s):  
Amol S. Dhotre ◽  
Abhishek S. Chandurkar ◽  
Sumedh. S. Jadhav

This project will focus on developing an enhancement of the vehicle alarm security system via SMS. The system will manipulate a mobile phone to send SMS (Short Message Service). Even though the SMS can be sent using the features available in the mobile, the objective of this project is to activate the SMS sending by the mobile phone using external program, connected physically to the mobile phone. The study of telecommunication is an interesting field because it involves digital signal processing, signal and systems, programming and more. This inspires people to improvise the technology into daily use. In this project, the technology of telecommunication, to be specific; SMS, is integrated or improvised to the present vehicle security system. Instead of human to human telecommunication, this system creates new entity which is machine to human telecommunication. This system is an upgrading and improving vehicle security system by integrating SMS features to alert vehicle owners whenever intrusion occurs. This project involves hardware and software parts construction and the integration of both parts to create the system. We succeed in achieving the objective and in fact, add another feature to the system which will initiates a call to the owner after sending the SMS. In the end of this project, we will document all the hardware and software development and provide a simulation model of the system. An interfacing mobile is also connected to the microcontroller, which is in turn, connected to the engine. Once, the vehicle is being stolen, the information is being used by the vehicle owner for further processing. The information is passed onto the central processing insurance system which is in the form of the sms, the microcontroller unit reads the sms and sends it to the Global Positioning System (GPS) module and using the triangulation method, GPS module feeds the exact location in the form of latitude and longitude to the user’s mobile. By reading the signals received by the mobile, one can control the ignition of the engine.


1982 ◽  
Vol 21 (04) ◽  
pp. 181-186 ◽  
Author(s):  
M. A. A. Moussa

A drug information system (DARIS) has been created for handling reports on suspected drug reactions. The system is suitable for being run on desktop computers with a minimum of hardware requirements: 187 K read/write memory, flexible or hard disc drive and a thermal printer. The data base (DRUG) uses the QUERY and IMAGE programming capabilities for data entry and search. The data base to statistics link program (DBSTAT) enables data transfer from the data base into a file for statistical analysis and signalling suspected adverse drug reactions.The operational, medical and statistical aspects of the general population voluntary adverse drug reaction monitoring programme—recently initiated in the State of Kuwait—are described.


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Anindya Retno Wardhani ◽  
A.A Gde Satia Utama

Branch of PT Pelabuhan Indonesia III (Persero) in Tanjung Perak is one of the institution body that appointed by the Government to carry out the collection and remittance of WAPU VAT according to PMK No. 85 / PMK.03 / 2012 (amended by PMK No. 136 / PMK.03 / 2012). WAPU VAT collection and deposit system are inefficient because it requires a lot of time and effort when it comes to input the data entry of tax invoice, printing Tax Deposit and sent it to Bank Perception. Three steps activities need to be done more than once. Therefore, Branch of PT Pelabuhan Indonesia III (Persero) in Tanjung Perak need the collection and remittance of the WAPU VAT system that sufficient to improve the efficiency of tax suboffices performance.This research aims to design the accounting information system for collecting and depositing process WAPU VAT. WAPU VAT Deposit using e-tax payment application are expected to overcome the problems that will arise in the WAPU VAT system deposit.Exploratory qualitative approach with case study method chosen in order to dig up the real problem occurs and find a solution. This research are expected to contribute significantly towards Branch of PT Pelabuhan Indonesia III (Persero) in Tanjung Perak as a research subject. In addition, the implementation of draft e-tax application payment system are expected to improve efficiency process of collection and remittance of WAPU VAT. Keyword : System Design, Wapu VAT, Efficiency, e-tax payment


2018 ◽  
Vol 5 (1) ◽  
pp. 137-144
Author(s):  
Ade Mubarok ◽  
Ivan Sofyan ◽  
Ali Akbar Rismayadi ◽  
Ina Najiyah

Abstrak Keamanan merupakan hal sangat penting bagi setiap orang. Rumah yang sering ditinggal pemiliknya dapat dimanfaatkan oleh pencuri untuk melakukan aksinya. Oleh karena itu diperlukan sistem keamanan rumah yang efektif agar pemilik rumah dapat mengetahui informasi apabila rumahnya dibobol oleh pencuri. Penulis merancang sebuah sistem keamanan rumah dengan memanfaatkan teknologi RFID yang di lengkapi dengan sensor PIR dan modul GSM sebagai sistem informasi peringatan SMS, dimana semua sistemnya diolah dalam sebuah mikrokontroler ATmega328. Tujuan dari penelitian ini untuk mengganti kunci konvesional dengan kunci solenoid sehingga sulit untuk diduplikat serta mengurangi kesempatan aksi pencurian ketika rumah dalam keadaan kosong. Metode penelitian yang digunakan antara lain dimulai dari pengumpulan data (observasi, wawancara dan studi pustaka) serta pembuatan alat (planning, analisis, desain dan testing). Berdasarkan hasil pengujian diperoleh bahwa kunci solenoid dapat bekerja sesuai dengan kartu akses RFID yang diberikan. Sensor PIR dan modul GSM dapat bekerja dengan baik saat pencuri masuk kedalam rumah, sehingga rumah menjadi aman ketika ditinggalkan oleh pemiliknya. Kata Kunci: RFID, Sensor PIR, Modul GSM, ATmega328 Abstract Security is very important for everyone. Homes that are often left the owner can be used by thieves to perform the action. Therefore required an effective home security system so that homeowners can find out information if the house burglarized by thieves. The author designed a home security system by utilizing RFID technology that is equipped with PIR sensor and GSM module as SMS warning information system, where all the system is processed in an ATmega328 microcontroller. The purpose of this research is to change the conventional key with the solenoid key so that it is difficult to duplicate and reduce the chance of theft action when the house is empty. Research methods used, among others, starting from data collection (observation, interview and literature study) as well as making tools (planning, analysis, design and testing). Based on the test results obtained that the solenoid key can work in accordance with the given RFID access card. PIR sensors and GSM modules work well when thieves enter the house, so the house becomes secure when left by the owner. Key Word: RFID, PIR Sensor, GSM Module, ATmega328


Author(s):  
A. Valdez ◽  
C. Canales ◽  
D. Huamán ◽  
C. Pascual ◽  
M. Chauca ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document