scholarly journals Smart Door Lock

Author(s):  
Athirah Nabihah Mas Erwan ◽  
Mohamad Norul Hafiz Muzaffar Alfian ◽  
Mohamad Syafiq Mohamad Adenan

Internet of Things (IoT) has become a phenomenon in many researchers. A smart digital automated system based on IoT plays major role which helps in reducing human work by applying interaction technology in daily life. This research introduces the IoT Smart Door Lock where smartphone uses Wireless Fidelity (Wi-Fi) to activate the door lock. By using Android software, the smartphone will automatically activate the door lock within a specific range. Data transmission will be done using Wi-Fi technology. So, the user does not have to worry whether the door has been locked or not because user can control it by using their smartphone within a specific range. The user also does not have to worry about losing the door key anymore because there is no device required except user’s smartphone. This project consists of hardware and software development. The main purpose on the design is to prevent the situation where the user is unable to unlock the door when the key is missing also to give a solution for users to monitor door status when they forget the door has been locked or not. This system aims to eliminate the use of keys to access the door, where the daily struggle faced to bring along a bunch of keys anywhere. Besides that, the door locking system must function efficiently. The prototype of this system is successfully done, the procedure and the software and hardware requirement has been compiled in this report.

Internet of Things(IoT) is playing a pivotal role in our daily life as well as in various fields like Health, agriculture, industries etc. In the go, the data in the various IoT applications will be easily available to the physical dominion and thus the process of ensuringthe security of the data will be a major concern. For the extensive implementation of the numerous applications of IoT , the data security is a critical component. In our work, we have developed an encryption technique to secure the data of IoT. With the help of Merkle-Hellman encryption the data collected from the various IoT devices are first of all encrypted and then the secret message is generated with the help of Elliptic Curve Cryptography.


2020 ◽  
Vol 4 (2) ◽  
Author(s):  
Muhammad Daffa Akbari ◽  
Rusdianto Roestam

The rapid growth of technology has brought the basic needs of human to become easier to be fulfilled. Moreover, in this globalization era, the use of Smartphone and Internet of Things (IOT) has become common things in daily life. This advancement in technology could be applied in accommodating people’s necessity. One of the common cases to be found nearby is on how parents could keep their eyes on their children; which could be lacked at times. Sometimes, the children could be out of the parents’ reach, especially when it comes to the need of working on daily chores. This research study aims to facilitate the problem faced by most parents in monitoring their children: within the use of technology to monitor the children’s activity. This research brought the centralized Wi-Fi network using Telegram application on smartphone which provide automated system that will automatically send notification when the children is crossing their safety line. All system requirements needs to be identified first before planning, design, and developing system. Conducting test will be the last step to make sure the system is working properly.


2021 ◽  
Vol 13 (15) ◽  
pp. 8120
Author(s):  
Shaheer Ansari ◽  
Afida Ayob ◽  
Molla S. Hossain Lipu ◽  
Mohamad Hanif Md Saad ◽  
Aini Hussain

Solar photovoltaic (PV) is one of the prominent sustainable energy sources which shares a greater percentage of the energy generated from renewable resources. As the need for solar energy has risen tremendously in the last few decades, monitoring technologies have received considerable attention in relation to performance enhancement. Recently, the solar PV monitoring system has been integrated with a wireless platform that comprises data acquisition from various sensors and nodes through wireless data transmission. However, several issues could affect the performance of solar PV monitoring, such as large data management, signal interference, long-range data transmission, and security. Therefore, this paper comprehensively reviews the progress of several solar PV-based monitoring technologies focusing on various data processing modules and data transmission protocols. Each module and transmission protocol-based monitoring technology is investigated with regard to type, design, implementations, specifications, and limitations. The critical discussion and analysis are carried out with respect to configurations, parameters monitored, software, platform, achievements, and suggestions. Moreover, various key issues and challenges are explored to identify the existing research gaps. Finally, this review delivers selective proposals for future research works. All the highlighted insights of this review will hopefully lead to increased efforts toward the enhancement of the monitoring technologies in future sustainable solar PV applications.


2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Jinhua Fu ◽  
Sihai Qiao ◽  
Yongzhong Huang ◽  
Xueming Si ◽  
Bin Li ◽  
...  

Blockchain is widely used in encrypted currency, Internet of Things (IoT), supply chain finance, data sharing, and other fields. However, there are security problems in blockchains to varying degrees. As an important component of blockchain, hash function has relatively low computational efficiency. Therefore, this paper proposes a new scheme to optimize the blockchain hashing algorithm based on PRCA (Proactive Reconfigurable Computing Architecture). In order to improve the calculation performance of hashing function, the paper realizes the pipeline hashing algorithm and optimizes the efficiency of communication facilities and network data transmission by combining blockchains with mimic computers. Meanwhile, to ensure the security of data information, this paper chooses lightweight hashing algorithm to do multiple hashing and transforms the hash algorithm structure as well. The experimental results show that the scheme given in the paper not only improves the security of blockchains but also improves the efficiency of data processing.


Author(s):  
Алексей Горлов ◽  
Aleksey Gorlov ◽  
Михаил Рытов ◽  
Mikhail Rytov ◽  
Дмитрий Лысов ◽  
...  

This article discusses the process of automating the assessment of the effectiveness of software and hardware information protection by creating an automated system. The main functions of the proposed system are: conducting an audit of information security, forming a model of information security threats, forming recommendations for creating a software and hardware system for protecting information, and creating organizational-technical documentation. The developed automated system for evaluating the effectiveness of software and hardware protection of information allows in an automated way to build a model of information security threats, to form organizational and technical documentation governing the protection of confidential information, and also to make recommendations for improving the software and hardware system for protecting information. The use of this system will significantly reduce the time and material costs of auditing information security and developing additional measures to protect information.


2014 ◽  
Vol 998-999 ◽  
pp. 1374-1377
Author(s):  
Da Hui Li

This article introduces the services and development of the Internet of Things, and analyzes the driving forces and obstacles behind such development. Looking at application types and the different development stages of the Internet of Things, this article categorizes its services into four types: identity related services, information aggregation services, collaborative-aware services, and ubiquitous services. For the first two types of services, applications and system framework are discussed; for the last two types, development trends are discussed. Services provided by the Internet of Things will gradually be integrated into human life and society; with the development of the Internet of Things, applications will evolve from relatively simple identity-related and information aggregation-related applications, to collaboratively-aware and finally ubiquitous applications. It will then be possible for the Internet of Things to be fully integrated with Internet and telecommunications networks


Sign in / Sign up

Export Citation Format

Share Document