Design of the Airport Perimeter Security System Based on Internet of Things

2013 ◽  
Vol 361-363 ◽  
pp. 2276-2281
Author(s):  
Xue Ming Cao ◽  
Chen Mei Jing ◽  
Xiao Dan Zheng

As an important part of the security system in a civil aviation airport, Airport Perimeter Security System construction has been paid universal attention by airport authorities. Sensor fencea novel, low-cost, low maintenance system that may be used on new or existing fences that results in an improved capability to detect, locate and classify intruders. By reviewing the concept and application trends of Internet of Things, features and applicability of different types of the airport perimeter security system are summarized. The Internet of Things is a kind of new technology that sensors and existing internet are integrated based on the technologies, such as RFID, wireless data communications. In this paper, the third generation of airport perimeter security system based on Internet of Things is proposed and designed.

2014 ◽  
Vol 889-890 ◽  
pp. 671-675 ◽  
Author(s):  
Jun Jin Yang ◽  
Cheng Hua Fu ◽  
Zi Qi Dong

This paper presents a remote security system based on the Internet of things. The system uses S3C2440 as the control core, Linux operating system as the software platform, combined with remote security system construction of GPRS communication technology. The system introduces V4L2 camera video capture process based on Linux operating system, the GPRS module alarm information sending and receiving process, and the project of Android platform video monitoring software. At last, experiments show the system can monitor designated area. When meeting a critical situation,it will automatically alarm. It is of far-reaching significance.


2014 ◽  
Vol 1014 ◽  
pp. 399-403
Author(s):  
Ying Zhao

Along with the development of information technology, archives information has developed from original paper archives to current digital archives, electronic photos, electronic drawings etc., and the utilization of archives has also achieved computer search and online inquiry. The development of various modern information stealing technologies has brought potential threat to the security of network archival information, especially some military scientific research archives, student archives etc., which are not only involved with the normal operation and development of schools, but also with official secrets. Therefore, establishing the archives security system of colleges and universities has become the priority among priorities in the archives work of colleges and universities. This article starts from the current status of the archives security system construction of colleges and universities, analyzing the apparent features of the technology of the Internet of Things in information technology, and then raising the specific application measures of the technology of the Internet of Things in archives security system construction of colleges and universities, making suggestions on the archives security system construction of colleges and universities.


2012 ◽  
Vol 6-7 ◽  
pp. 957-963 ◽  
Author(s):  
Shun Bing Zhu ◽  
Chun Quan Du ◽  
Miao Miao Niu

The wisdom community is the basic unit of the smart city, is a set of urban management, public services, social services, residents’ autonomy and mutual aid services in one of the new technology applications. This article analyzes the current situation and existing problems of the wisdom community, then described the Internet of Things architecture, equipment features, community cloud computing platform and structure, the last detailed analysis of the wisdom community features and community network video intercom, home security, appliance control, non-contact card access control, card consumption management, community security, community e-service technology and other technical content and features.


Author(s):  
H. B. Chi ◽  
M. F. N. Tajuddin ◽  
N. H. Ghazali ◽  
A. Azmi ◽  
M. U. Maaz

<span>This paper presents a low-cost PV current-voltage or <em>I-V</em> curve tracer that has the Internet of Things (IoT) capability. Single ended primary inductance converter (SEPIC) is used to develop the <em>I-V</em> tracer, which is able to cope with rapidly changing irradiation conditions. The <em>I-V</em> tracer control software also has the ability to automatically adapt to the varying irradiation conditions. The performance of the <em>I-V</em> curve tracer is evaluated and verified using simulation and experimental tests.</span>


Author(s):  
Yingying Hu ◽  
Zhongyang Li

Against the background of the growing development of the Internet of Things, this article conducts research on more efficient methods for controlling the interconnection of all things, and proposes that smart devices use the same operating platform, and the human-computer interface presents universal modular controls for manipulation, it can satisfy the requirement that one device controls several different types of controlled device simultaneously. At the same time, the interactive method uses the controlled device to actively submit control content to the control device, and discusses the human-computer interactive control method applicable to the Internet of Everything, and strives to achieve a convenient and easy-to-use human-computer control experience.


Author(s):  
Bin Lin

The Internet of Things is another information technology revolution and industrial wave after computer, Internet and mobile communication. It is becoming a key foundation and an important engine for the green, intelligent and sustainable development of economic society. The new networked intelligent production mode characterized by the integration innovation of the Internet of Things is shaping the core competitiveness of the future manufacturing industry. The application of sensor network data positioning and monitoring technology based on the Internet of Things in industry, power and other industries is a hot field for the development of the Internet of Things. Sensor network processing and industrial applications are becoming increasingly complex, and new features have appeared in the sensor network scale and infrastructure in these fields. Therefore, the Internet of Things perception data processing has become a research hotspot in the deep integration process between industry and the Internet of Things. This paper deeply analyzes and summarizes the characteristics of sensor network perception data under the new trend of the Internet of Things as well as the research on location monitoring technology, and makes in-depth exploration from the release and location monitoring of sensor network perception data of the Internet of Things. Sensor network technology integrated sensor technology, micro-electromechanical system technology, wireless communication technology, embedded computing technology and distributed information processing technology in one, with easy layout, easy control, low power consumption, flexible communication, low cost and other characteristics. Therefore, based on the release and location monitoring technologies of sensor network data based on the Internet of Things in different applications, this paper studies the corresponding networking technologies, energy management, data management and fusion methods. Standardization system in wireless sensor network low cost, and convenient data management needs, design the iot oriented middleware, and develops the software and hardware system, the application demonstration, the results show that the design of wireless sensor network based on iot data monitoring and positioning technology is better meet the application requirements, fine convenient integration of software and hardware, and standardized requirements and suitable for promotion.


Author(s):  
Sarita Tripathy ◽  
Shaswati Patra

The huge number of items associated with web is known as the internet of things. It is associated with worldwide data consisting of various components and different types of gadgets, sensors, and software, and a large variety of other instruments. A large number of applications that are required in the field of agriculture should implement methods that should be realistic and reliable. Precision agriculture practices in farming are more efficient than traditional farming techniques. Precision farming simultaneously analyzes data along with generating it by the use of sensors. The application areas include tracking of farm vehicles, monitoring of the livestock, observation of field, and monitoring of storage. This type of system is already being accepted and adopted in many countries. The modern method of smart farming has started utilizing the IoT for better and faster yield of crops. This chapter gives a review of the various IoT techniques used in smart farming.


2020 ◽  
Vol 14 (1) ◽  
pp. 144-151 ◽  
Author(s):  
Sudip Misra ◽  
Sanku Kumar Roy ◽  
Arijit Roy ◽  
Mohammad S. Obaidat ◽  
Avantika Jha

2018 ◽  
Vol 7 (3) ◽  
pp. 1491
Author(s):  
Dr Chalasani Srinivas ◽  
Dr Srinivas Malladi

The Internet of Things (IoT) is growing in the web of an age-old IPv6 address for Internet connections and messages that arise between these and other devices and systems that work with the Internet. It is equipped with the unique ID and data transfer capability through the network. Among other things, tracking and tracking online travel is a major issue. Although there are many tracking techniques for moving objects, many are at risk. So there is a need for tracking the safety of an object Safety protocols should provide visibility and tracking of street objects in support of the Internet (IoT). This protocol is based on the RFID Identity System for IoT Objects. Existing ones do not provide authentication of sites that lead to fakes. Great use of energy. The proposed protocol improves road safety tracking using the base protocol light and SPDL. The requested protocol is intended to ensure accuracy, accuracy, confidentiality and encryption. To ensure safe monitoring of objects, the requested protocols use cryptic primitives that use HMAC concepts that are used to authenticate an object. This protocol introduction relies on code authentication code (CMC), which is used to reduce power consumption at low cost. The testing of a test network evaluates protocol implementation and is found to be safer and requires less calculation than existing protocols.  


Sign in / Sign up

Export Citation Format

Share Document