scholarly journals Smart Home Security System Design Sensor Based on Pir and Microcontroller

2017 ◽  
Vol 1 (1) ◽  
pp. 67 ◽  
Author(s):  
Pristisal Wibowo ◽  
Solly Aryza Lubis ◽  
. Hermansyah ◽  
. Hamdani ◽  
Zuraidah Tharo

Technological developments are so rapid at this time to make people want always to be creative and trigger to create something new which can be applied and can use quickly and practically and control from close range and distance. In this research how to design home security system using PIR sensor (Passive Infra Red) based on microcontroller. Where this safety will work if the PIR (Passive Infra Red) sensor detects any human being that does not want to enter into the house, and then the micro controller process and instructs cell phone 1 to send an alarm signal in the form of SMS (Short Message Service).

2015 ◽  
Vol 793 ◽  
pp. 554-558
Author(s):  
Ooi Soo Hoey ◽  
Zetty Nurazlinda Zakaria ◽  
Muhammad Shakir Laili

The advance in technology has negatively affected to a home as crime rate is increasing as well as any other emergency case due to lack of awareness on security and safety when a person are on vacation. Overall, the paper presents the design of the security of home against intruders, fire and leakage of gas by alarming the specific person via Short Message Service (SMS) through Global System for Mobile Communication (GSM) modem. The system required the integration of PIC16F877A microcontroller with input and output devices such as GSM module, gas detector, vibration sensor, LDR sensor, keypad and magnetic door lock. The home security system has a special feature which is capable to send an immediate alert message to both homeowner and relevant civil authorities in order to prevent the incidents grow critically. Besides, the security system also provides a door lock security system that required a password entering by using a keypad. Finally, the system is able to send sms to both home owner and the authority bodies has been discussed.


2021 ◽  
Author(s):  
N. Stalin ◽  
N. Shobanadevi

Abstract In recent scenario the home automation system has rapidly evolved with specific advantages using internetand Wi-Fi. This paper based on the GSM technology used to send the very short message service to operate the devices connected in the common node. The home assisting software has installed in smart phone to make the system simple. A smart home automation system based on Zigbee wireless communication is used to monitor and control the devices which are connected to the common test bed simultaneously minimize the energy cost.


2018 ◽  
Vol 3 (1) ◽  
pp. 17-21
Author(s):  
Bakhtiar Ali Karim ◽  
Halgurd Nawzad Awl

Due to increasing robbery and intrusion, establishing home-security system has become a correlated part of the modern houses, buildings, and offices. As the family members are not at home all the time, the traditional home security system, which makes alarm sound only, may not be efficient enough. Alternatively, Global System for Mobile communications (GSM) based security system can provide higher level of security and convenience compared to the traditionally used systems. The main objective of the current paper is to design and implement cost-efficient and reliable security, safety and home automation system for protection and occupants’ convenience. If any undesired events, such as intrusion, gas leakage and fire occurs in the house, our system warns the homeowner in real-time using Short Message Service (SMS). With the proposed system home appliances can also be controlled in three ways, namely sending SMS from the authorized numbers to the system through GSM network, smartphone app using Bluetooth module and infrared (IR) control using IR module


Author(s):  
Affa Rozana Abdul Rashid ◽  
Farzana Zakaria

home security system using a piezoelectric sensor is designed to detect intrusion and unauthorized entry into the residential house. A piezoelectric sensor is used because of its capability that can convert mechanical pressure into electrical energy by the deformation of the crystal's structure. The relationship between the mechanical pressure and generated voltage is investigated by conducting an experiment using various pressure conditions and body weight. The relationship between pressure and body weight is directly proportional to the generated voltage. This home security system will control the home appliances based on the information given and send feedback when there is a security breach. The homeowner will receive a notification via a short message service (SMS) from an Arduino board equipped with a Global System for Mobile Communication (GSM) shield.


Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3716
Author(s):  
Francisco Velasco-Álvarez ◽  
Álvaro Fernández-Rodríguez ◽  
Francisco-Javier Vizcaíno-Martín ◽  
Antonio Díaz-Estrella ◽  
Ricardo Ron-Angevin

Brain–computer interfaces (BCI) are a type of assistive technology that uses the brain signals of users to establish a communication and control channel between them and an external device. BCI systems may be a suitable tool to restore communication skills in severely motor-disabled patients, as BCI do not rely on muscular control. The loss of communication is one of the most negative consequences reported by such patients. This paper presents a BCI system focused on the control of four mainstream messaging applications running in a smartphone: WhatsApp, Telegram, e-mail and short message service (SMS). The control of the BCI is achieved through the well-known visual P300 row-column paradigm (RCP), allowing the user to select control commands as well as spelling characters. For the control of the smartphone, the system sends synthesized voice commands that are interpreted by a virtual assistant running in the smartphone. Four tasks related to the four mentioned messaging services were tested with 15 healthy volunteers, most of whom were able to accomplish the tasks, which included sending free text e-mails to an address proposed by the subjects themselves. The online performance results obtained, as well as the results of subjective questionnaires, support the viability of the proposed system.


Author(s):  
Vemireddy Sai sindhu reddy ◽  
P. V. K. Sai ◽  
Anupama Namburu

Author(s):  
I Komang Krisna Ade Marta ◽  
I Nyoman Buda Hartawan ◽  
I Kadek Susila Satwika

AbstrakKeamanan server merupakan hal penting yang perlu diberikan perhatian lebih saat melakukan konfigurasi server. Pada umumnya serangan yang terjadi pada server diketahui setelah terjadinya kegagalan pada server dalam memberikan layanan. Pada penelitian ini, dibangun sebuah sistem keamanan server yang dapat melakukan monitoring pada sebuah server ketika terdeteksi adanya aktivitas yang tidak wajar. Pemberitahuan akan dikirimkan melalui SMS (Short Message Service) ke handphone Administrator jaringan. Sistem yang dibangun melakukan pendeteksian intrusi pada server secara realtime menggunakan SNORT. Ketika terjadi akses yang tidak wajar pada server, maka SNORT akan mendeteksi dan mengirimkan informasi terjadinya aktivitas yang tidak wajar ke Administrator jaringan. Sistem ini diujikan dengan lima jenis serangan yakni PING Attack, DoS/DDoS Attack, Port Scanning, Telnet Access dan FTP Access. Parameter yang diamati pada penelitian ini adalah beban aktivitas yang terjadi pada sumber daya server meliputi CPU, Memory (RAM) dan beban jaringan. Hasil penelitian menunjukkan bahwa saat terjadi upaya serangan terhadap server, SNORT dapat menghasilkan alert yang akan disimpan pada log sekaligus dikirimkan ke handphone Administrator melalui SMS. AbstractServer security is an important thing that needs to be given more attention when configuring a server. In general, attacks that occur on the server are known after a failure on the server in providing services. In this study, a server security system was built that could monitor a server when an unusual activity was detected. Notifications will be sent via SMS (Short Message Service) to the network Administrator's smartphone. The system is built to detect intrusions on the server in real time using SNORT. When improper access occurs on the server, SNORT will detect and send information about the occurrence of unusual activity to the network Administrator. This system is tested with five types of attacks namely PING Attack, DoS / DDoS Attack, Port Scanning, Telnet Access and FTP Access. The parameters observed in this study are the activity load that occurs on server resources including CPU, Memory (RAM) and network load. The results showed that when an attempt was made to attack the server, SNORT could produce alerts that would be stored in a log as well as sent to the Administrator's smartphone via SMS.


Author(s):  
Saurabh Singh ◽  
Pradip Kumar Sharma ◽  
Seo Yeon Moon ◽  
Jong Hyuk Park

Sign in / Sign up

Export Citation Format

Share Document