scholarly journals Motorcycle Safety System With Android Based Arduino

2021 ◽  
Vol 1 (2) ◽  
pp. 57-63
Author(s):  
Zulfian Wathoni ◽  
Khairunazri ◽  
Muh. Fahrurrozi

 Motorcycle security systems today still use manual locks that are easily damaged by thieves in seconds. Although there are several motorbike manufacturers that have used Shutter Key Magnets, in fact, this security is not efficient for security because it is prone to damage using only the T key. In this digital era, many new security systems are safer than manual locks. Therefore, the idea of ​​designing This tool the author uses Ar-duinoUno and Smartphone as controllers in starting a motorcycle easily. For example a computer-based security system.

2021 ◽  
Vol 19 (2) ◽  
pp. 47-53
Author(s):  
Herwin Simanjuntak ◽  
Rully Pramudita ◽  
Nadya Safitri

Abstract- At this time motorcycle theft cases are still often occur plus the increasing use of motorcycle vehicles, motorcycle theft is caused by the lack of a security system on the ignition which only uses keys and key covers, where security systems like this have been understood mostly motorcycle thieves, the necessity of a motorcycle safety system is needed. To overcome this, a Motorcycle Safety System was made using Arduno-based GPS and Radio Frequency Identification (RFID) to prevent and facilitate the recovery of stolen motor vehicles. The results of this study, the system is made using the Global Positioning System (GPS) as a tool to detect the location of motorcycles, and smart key contacts are added using RFID, SMS gateway and DC-DC Converter.


Respati ◽  
2021 ◽  
Vol 16 (2) ◽  
pp. 63
Author(s):  
Fajar Mahardika, Asep Saepullah, Muhammad Zaky Nur Fuadi,Indra Darmawan

INTISASIDengan meningkatnya pertumbuhan kendaraan bermotor, khususnya kendaraan bermotor roda dua setiap tahun, juga menyebabkan peningkatan kejahatan yang terjadi di masyarakat. Berdasarkan data statistik na-sional, tindakan kriminal, terutama kendaraan roda dua saat ini, tidak lagi mengejutkan. Pencurian ini banyak terjadi baik di kota-kota besar maupun di pedesaan. Dengan perkembangan saat ini kendaraan bermotor roda dua bukan kendaraan khusus lagi, karena setiap kepala rumah tangga memiliki lebih dari satu kendaraan bermotor roda dua. Masyarakat banyak memilih kendaraan bermotor roda dua karena fleksibilitas. Sistem kunci ini kadang lupa di lakukan oleh pemilik kendaan bermotor roda dua. Hal ini menyebabkan para pelaku kejahatan bebas mengambil tindakan tanpa dicurigai oleh masyarakat sekitar. Dengan kondisi tersebut, kurang efektif dengan keamanan yang menggunakan sistem kunci. Dengan perkembangan ilmu teknologi saat ini menjadi pengaruh sangat besar untuk pengembangan sistem keamanan kendaraan bermotor roda dua. Teknologi yang sedang berkembang sekrang yaitu mikrokontroler. Dengan menggabungkan sistem keamanan kunci dengan arduino bisa menghasilkan sistem pengaman kendaraan bermotor roda dua dengan alarm Arduino.  Dengan semakin meningkatnya kejadian peneliti melakukan penelitian tentang sistem keselamatan sepeda motor. Dalam penelitian ini menggunakan metode waterfall sebagai desain sistem keamanan. Dari hasil penelitian diperoleh skema keselamatan kendaraan bermotor menggunakan Arduino Nano V3.Kata kunci— Sepeda motor, Sistem Keamanan, Waterfall. ABSTRACTWith the increasing growth of motor vehicles, especially two-wheeled motorized vehicles each year, also causes an increase in crime that occurs in the community. Based on national statistical data, criminal acts, especially two-wheeled motor vehicles today, are no longer surprising. This theft happens a lot both in big cities and in the countryside. With the current development of two-wheeled motorized vehicles is not a special vehicle anymore, because every head of household has more than one two-wheeled motorized vehicle. Many people choose two-wheeled motorized vehicles because of their flexibility. This key system is sometimes forgot-ten by the owner of a two-wheeled motorized vehicle. This causes the perpetrators of crime to be free to take action without being suspected by the surrounding community. Under these conditions, it is less effective with security using a key system. With the development of technology now is a very big influence for the develop-ment of two-wheeled motor vehicle safety systems. The technology that is currently developing is a microcon-troller. By combining a key security system with Arduino it can produce a two-wheeled motorized vehicle safety system with an Arduino alarm. With the ever increasing incidence of researchers conducting research on mo-torcycle safety systems. In this study using the waterfall method as a security system design. From the research results obtained a motor vehicle safety scheme using Arunio Nano V3.Kata kunci—  Motorcycle, Safety System, Waterfall..


Author(s):  
إبراهيم محمد زين

الملخّص يهدف هذا البحث لبيان أن السبيل الناجح لمواجهة الإرهاب الدولي المعاصر الملتبس بدعاوي الجهاد الإسلامي وإحياء دولة الخلافة الإسلامية هو التركز على معاني الأمن الفكري والروحي في الإسلام وهذا الاتجاه في المباحثة يُعيد النظر في طرائق قضايا الجهاد ويميز بين ما هو عقائدي ومرتبط بنظام الإسلام الكلي وبين ما هو من مجال حروب الفتنة والصعلكة.  الكلمات المفتاحيّة: الجهاد، حروب الصعلكة، حروب الفتنة، الأمن الروحي والفكري.              Abstract This study focuses on the most effective way of combating global terrorism that utilizes the banner of Jihad and restoration of the Khilafa system of governance. It should be emphasized that there is a dire need for a new line of investigation concerning the issue of Jihad that pays more attention to both spiritual and intellectual security systems in Islam. This requires a distinction to be made between what is universalistic in the Islamic system and what is particular. In this regard one has to differentiate between acts of just war and those of economic or sedition wars. Keywords: Jihad, economic war, sedition war, spiritual-intellectual security system.


2021 ◽  
Vol 2 (2) ◽  
pp. 105-115
Author(s):  
Mahmod Al-Bkree

This work is to optimize perimeter surveillance and explore the distribution of ground bases for unmanned aerial vehicles along the Jordanian border and optimize the set of technologies for each aerial vehicle. This model is part of ongoing research on perimeter security systems based on unmanned aerial vehicles. The suggested models give an initial insight about selecting technologies carried by unmanned aerial vehicles based on their priority; it runs for a small scale system that can be expanded, the initial results show the need for at least four ground bases along the length of the border, and a selected set of various technologies for each vehicle.


2019 ◽  
Vol 4 (2) ◽  
pp. 112-120
Author(s):  
Hadjira BELAIDI ◽  
Nour-El-Houda MEDDAH

This work deals with lock and home security systems. First, Motion sensors detect movement indoors and outdoors to guard against intruders, protect valuables and more. Thus, if any movement, RFID reader will be activated and database will be scanned to identify the persons who have the access to the home. This enhances the effectiveness of the security system and provides the user with the complete, whole-house protection he needs. An RFID badge can be used to unlock the door and access to the home. Alerts also are received on the smart phone if motion is sensed in a protected area inside or outside; giving the user the information it needs to act quickly. The door can also be remotely locked/unlocked. A microcontroller (ATmega2560) is used to control the entire system, and GSM is used to send alerts to the Smartphone. An Ethernet shield that connects the microcontroller to the database (DB) is also added.


2017 ◽  
Vol 2 (1) ◽  
pp. 155-167
Author(s):  
Badrudin Badrudin

This study aimed to analyze the management of ICT-based Arabic learning. This study was designed to find the management of ICT-based Arabic learning in MA Daarul Uluum Majalengka. This study proposed that the integration of various fields of studies with ICT, including Arabic language learning, is undeniably vital to be enhanced in this digital era. However, the constraints experienced by some institutions, especially the educators, have not had a clear format of the use of ICT in the integration effort of the both disciplines. This study applied a qualitative research approach. The research method was descriptive method. The data were collected by conducting observation, interview, and documentation. The data were analyzed using the techniques qualitative analysis. The results showed that the design of ICT-based Arabic learning model can be developed at MA Daarul Uluum Majalengka a communicative computer-based Arabic learning model. The materials and other learning tools are designed using a computer program. Through this kind of learning models, a teacher served as learning motivator and facilitator elaborating the materials that need clarification for the learners.


2021 ◽  
Vol 6 (6) ◽  
pp. 69-73
Author(s):  
Md. Abdullah Al Rakib ◽  
Md. Moklesur Rahman ◽  
Md. Sohel Rana ◽  
Md. Sanjib Islam ◽  
Fysol Ibna Abbas

In this paper, we worked on how to control home apparatuses, safety, and security systems utilizing GSM innovation by utilizing a cell phone. We will likewise show that we can control the apparatuses even without a phone by sending an ordinary call. The favorable position of utilizing GSM innovation is that we can handle home appliances from any place in the world. This system permits the proprietor to control the appliances and to get a feedback status of the home apparatuses by sending calls just as through a portable application. For the home security system, we are utilizing an antitheft announcing system that will report the proprietor by sending a message and ringing a call. Likewise, for the security system, when fire or gas spillage is expected to occur, it will also report the proprietor by sending a call. Subsequently, by utilizing GSM innovation, it gives remote access to the gadgets to be controlled.


1998 ◽  
Vol 7 (4) ◽  
Author(s):  
Tomáš Sirovátka

Individual responsibility and subsidiarity represent more general principles of market transition which are also relevant for social security system. The main goals of transformation of social security systems in transition countries have been defined as follows: more transparency and better targeting which is - considering cost efficiency requirement - necessary condition to protect the citizens against the newly emerging social risks. The question how far the effects of social security system transformation correspond to these claims seems to be extremely politically significant.


2010 ◽  
Vol 2010.20 (0) ◽  
pp. 147-150
Author(s):  
Yuichiro SEKI ◽  
Kengo KUNIGAMI ◽  
Katsumasa IHARA ◽  
Motoshi MURAOKA ◽  
Takuya KIRIKAWA ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document