scholarly journals RANCANG BANGUN SISTEM PENGAMANAN GEDUNG YANG DIKONTROL MELALUI APLIKASI ANDROID BERBASIS IoT

Foristek ◽  
2020 ◽  
Vol 10 (1) ◽  
Author(s):  
Fendi Pradana ◽  
Ardi Amir

Building or home security systems at this time are needed because there are still many security systems that can trigger crime, one of which is the use of padlock or conventional door locks and security that has not worked automatically. A security system is needed which has a high level of security and is automatic so that it does not bother users. Security systems are often a problem, namely the low level of security, how to use is not easy, and not automatic. The way to overcome this problem is to create a security system that has tight security, easy to use, works continuously automatically and can be connected to the user's mobile phone. Based on research that has been made this security system shows one of the security systems that have a high level of security because it is equipped with an infrared sensor that serves to detect the presence of humans, the camera takes pictures if the infrared sensor detects humans, a fingerprint sensor that functions as access to open the door and all The sensor works automatically and continuously and can be connected to mobile phones through the internet, this security system works well and can be relied upon.

2012 ◽  
Vol 17 (1) ◽  
pp. 37
Author(s):  
Donny Pratama ◽  
Subali Subali

Donny Pratama, Subali, in paper programming of auto home security system connected to mobile phone based on microcontroller ATMEGA8 and ATMEGA162 explain that in modernization era, almost all using automation tools, both in industrial, office, especially at home. Especially with the advance of age more unemployment also exist. With so many unemployed crime was more rampant. Therefore, the security of the home and its contents is very necessary for every homeowner. Especially when the house in a discharged condition or homeowners are doing activities outside the home. Home security system that uses a microcontroller-based mobile phone as a medium of information is a tool that is needed in every home. Where this system in any room in the home will attach several sensors are used to monitor the condition of the house. The sensors used include PIR sensor (Passive Infra - Red) to detect motion, gas sensors to detect a gas leak and also uses a temperature sensor to determine the temperature of the room. All these sensors are programmed according to the function of each tool. And as a basic programming language used compiler (Bascom) to support the work of all the sensors. For sensor work will then be processed by a microcontroller which will then be sent the information to a cell phone via a modem homeowners. Keyword : home security systems, mobile telephone, microcontroller, ATMEGA8, ATMega162


2014 ◽  
Vol 602-605 ◽  
pp. 3363-3366
Author(s):  
Yi Ming Sun ◽  
Chun Lei Han

In order to automatically identify the mobile phones' reviews that the users comment on the mobile phone on the internet and obtain valuable information from the reviews, this paper presents the process of constructing ontology for the mobile phones' reviews and preliminarily establish a domain ontology of the mobile phones' reviews. The ontology construction adopts the Protégé tool and the Seven Steps method of Stanford University research. The ontology can provide convenience for the semantic information mining on Web mobile phones' reviews, and it can provide a new method to effectively mine the use feelings of the phone from a large number of mobile phone users' reviews.


2019 ◽  
Vol 4 (2) ◽  
pp. 112-120
Author(s):  
Hadjira BELAIDI ◽  
Nour-El-Houda MEDDAH

This work deals with lock and home security systems. First, Motion sensors detect movement indoors and outdoors to guard against intruders, protect valuables and more. Thus, if any movement, RFID reader will be activated and database will be scanned to identify the persons who have the access to the home. This enhances the effectiveness of the security system and provides the user with the complete, whole-house protection he needs. An RFID badge can be used to unlock the door and access to the home. Alerts also are received on the smart phone if motion is sensed in a protected area inside or outside; giving the user the information it needs to act quickly. The door can also be remotely locked/unlocked. A microcontroller (ATmega2560) is used to control the entire system, and GSM is used to send alerts to the Smartphone. An Ethernet shield that connects the microcontroller to the database (DB) is also added.


2021 ◽  
Vol 6 (6) ◽  
pp. 69-73
Author(s):  
Md. Abdullah Al Rakib ◽  
Md. Moklesur Rahman ◽  
Md. Sohel Rana ◽  
Md. Sanjib Islam ◽  
Fysol Ibna Abbas

In this paper, we worked on how to control home apparatuses, safety, and security systems utilizing GSM innovation by utilizing a cell phone. We will likewise show that we can control the apparatuses even without a phone by sending an ordinary call. The favorable position of utilizing GSM innovation is that we can handle home appliances from any place in the world. This system permits the proprietor to control the appliances and to get a feedback status of the home apparatuses by sending calls just as through a portable application. For the home security system, we are utilizing an antitheft announcing system that will report the proprietor by sending a message and ringing a call. Likewise, for the security system, when fire or gas spillage is expected to occur, it will also report the proprietor by sending a call. Subsequently, by utilizing GSM innovation, it gives remote access to the gadgets to be controlled.


Author(s):  
Ziad Hunaiti ◽  
Daniel Tairo ◽  
Eliamani Sedoyeka ◽  
Sammi Elgazzar

This chapter discuss the challenges facing mobile commerce deployment in the United Kingdom. Although the number of mobile phone users is increasing and the technology is available for successful implementation of m-commerce, only a small number of users utilise m-commerce services. At the same time, mobile phones are becoming smarter, and most of latest phones are capable of connecting to the Internet. This chapter looks at the background of m-commerce as well as the technological development of mobile phones to their current stage. Also, technical and non technical issues which hinder the adoption of m-commerce are discussed and solutions and recommendations are given.


2014 ◽  
Vol 571-572 ◽  
pp. 1037-1041
Author(s):  
Ya Liu ◽  
Jian Hua Mao ◽  
Xue Feng Liu

The traditional smart security systems have poor extensity, delayed alarm systems, and cannot be controlled through the remote network. To solve the shortcomings, this article proposed a smart security system based on Sensor Web. The system used Sensor Observation Service to achieve the data transmission and storage in real time. Users can send requests to Sensor Observation Service to get home environment information in real time via Internet. The system also implemented Sensor Event Service, so that users can get home security alarm information in real time by subscribing the events they are interested in.


Author(s):  
Ahmed Waleed Al-Khafaji

Physical security systems are applied to alert in advance a well-known vector of attacks. This paper presents an analysis of the research and assessment of physical security systems applying the PSMECA technique (analysis of modes, efforts, and criticality of physical security). The object of research and analysis is the physical security system of the Ministry of Education and Science of Iraq (as the infrastructure of the region's objects), as well as the area of the compact living of students and co-workers (campus). This paper discusses the organization of physical security systems, which are based on devices with low power consumption and function in the Internet of things environment. The main aim is to describe and develop a physical security system that functions in the Internet of things environment, as well as the development of a scheme for the research and development of models and methods for risk analysis, models of functions and components, models of failures and conducting research and analysis of occurrence failures of PSS. The generalized structural and hierarchical scheme of the physical security system of the infrastructure of the region is presented, as well as the applied application of the scheme is illustrated by the example of the physical security system of a student campus of one of the universities of Baghdad. The functional modeling scheme of the object is provided and is based on the use of the Raspberry Pi microcomputer and the Arduino microcontroller. The set-theoretical models of functions, components, and failures of the system under study, as well as the projection of a hierarchical failure structure in the table of the basic structural elements of the system, are presented. The IDEF0 diagram, showing a power outage scenario (accidental or intentional) in connection with lighting and video subsystems, is presented. The scheme of research and development of models and methods of analysis of risks of PSS is carried out in the paper. A PSMECA table for the CCTV system has been created, which allows you to more precisely determine the cause of the failure in the physical security system and the importance of failure criticality


Author(s):  
Satish Agarwal ◽  
Priyanka Bhagoliwal

<div><p><em>The mobile phone handset industry is growing at a fast pace in the world and  is dominating the Indian market with Hi-Tech products and innovation. This industry offers products and services with advanced technology and innovation making it an important gadget for survival among the people. It is hard to imagine a life without mobile phones. The study describes the various features of mobile phone handsets which are valued by the teenagers so as to place and promote the products perfectly. The study found that  teenagers frequently use mobile phones mainly for games, social  networking, chatting on Whatsapp, listening to music, browsing the internet, and feels that mobile phone handset is  a style statement and it exhibits their status, standard, esteem etc. </em><strong></strong></p></div>


2019 ◽  
Vol 13 (1) ◽  
pp. 994-1008
Author(s):  
Ștefan Andrei Neştian ◽  
Silviu Mihail Tiţă ◽  
Elena-Sabina Turnea

Abstract Mobile phone has become today a multi tasking tool, used in the work environment for both, personal and professional purposes. On the one hand, used for personal purposes, mobile phone can bring many benefits: it reduces stress, helps to schedule time after work, helps the employee to find useful information on the Internet, etc. On the other hand, mobile phone can also have negative effects when it is used at work for personal purposes: decreases productivity at work, distracts the attention, exposes to risks employees that are working in production, etc. In what concerns the professional purposes, the benefits depend of the nature of work: keeps constant connections with supervisors and clients, employees find quick information related to working tasks, and information can be shared at any time with colleagues, etc. Of course there are also negative effects of the mobile phone used at the workplace: disturbing the activity of colleagues, non-dissipation of information to others in a timely manner, etc. In this paper we present some preliminary results from a study that highlights both, professional and personal use of mobile phones in information processes at work. The research sample has 368 respondents from different fields of activity. Based on the frequency of their use, the results indicate that, for personal purposes, text messaging applications comes on the first place, search for useful information on the Internet comes on the second place and finally, the phone calls (voice only) are on the third position. For professional purposes, at work, most employees use phone calls (voice only), then they search for useful information on the Internet, and finally, they use messaging applications.


Sign in / Sign up

Export Citation Format

Share Document