access control system
Recently Published Documents


TOTAL DOCUMENTS

624
(FIVE YEARS 178)

H-INDEX

20
(FIVE YEARS 5)

Author(s):  
Sanskruti Dharme

Abstract: In terms of house security, the door is pivotal. To keep the hearthstone secure, the proprietor will keep the door locked at all times. Still, owing to a rush when leaving the house, the proprietor may forget to lock the door, or they may be doubtful if they’ve closed the door or not. Wireless security grounded operation have fleetly increased due to the dramatic enhancement of ultramodern technologies. Numerous access control systems were designed and/or enforced grounded on different types of wireless communication technologies by different people. Radio Frequency identification (RFID) is a contactless technology that’s extensively used in several diligences for tasks like access control system, book shadowing in libraries, tollgate system, forced chain operation, and so on. For enforcing this design, we will be using Arduino mega 2560 pro mini, a fingerprint sensor, Keypad module. ESP-32 CAM module, RFID sensor, solenoid lock and ESP8266. We have also created an application for monitoring and controlling the security features of the door lock. We can also open the door through mobile fingerprint. Keywords: Arduino mega 2560 pro mini, ESP32-CAM, ESP8266, Fingerprint sensor, Keypad module, RFID sensor.


Author(s):  
Waly Fall ◽  
Djamal Abdoul Nasser Seck ◽  
Fabé Idrissa Barro

This article focuses on the realization of an access control system based on RFID (Radio Frequency by Identification) technology. It is an authentication system for controlling access to a sensitive place. This system is composed of RFID cards which are badges that act as electronic keys, an RFID reader, an electronic lock, a microcontroller, a wifi module and a database installed on a computer. The identification number of an RFID card detected by the RFID reader is transferred, via the serial interface, to the microcontroller that communicates with the computer through the wifi module for verification in the database. If the information is valid, the microcontroller triggers the opening of the electronic lock.


2021 ◽  
Author(s):  
Rizqy Aji Nugroho

Pesatnya perkembangan teknologi mengakibatkan persaingan di bidang bisnis tidak dapat dihindari, sehingga perusahaan perlu mengetahui langkah-langkah yang tepat agar tetap bertahan dan mampu bersaing dengan perusahaan lain yang sejenis. Salah satu langkah yang dapat dilakukan perusahaan adalah dengan menerapkan teknologi pada proses bisnisnya. Teknologi sudah menjadi kebutuhan masyarakat. Penerapan teknologi diharapkan dapat mempermudah, mempercepat proses transaksi, menghemat biaya, waktu, tenaga dan dapat menjangkau pasar yang lebih luas. Turban et all (2012), membagi keuntungan penerapan elektronik atau teknologi dalam proses bisnis menjadi dua, bagi perusahaan dan pelanggan. Manfaat bagi perusahaan adalah memperluas jangkauan pasar menjadi pasar nasional dan internasional, mengurangi biaya pemrosesan, distribusi dan penarikan informasi yang akurat dan real-time. Sedangkan keuntungan bagi pelanggan seperti akses 24 jam ke sejumlah besar barang dan jasa. Liputan6.com (2018), mencatat perkembangan e-commerce sebesar 26,2 juta dan Alibaba merupakan perusahaan e-commerce terbesar untuk saat ini. Badan Pusat Statistik (BPS) mencatat telah terjadi peningkatan jumlah perusahaan yang menerapkan eCommerce di Indonesia dalam 10 tahun terakhir tumbuh menjadi sekitar 17. Dengan demikian, Indonesia Pasar e-Commerce berpeluang untuk tumbuh lebih besar lagi dengan jumlah penduduk terbesar dan tingkat produk domestik bruto (PDB) terbesar di ASEAN. Perusahaan ini bergerak di bidang penjualan produk alat keamanan seperti CCTV, fire alarm, public address system, conference system, intrusion alarm dan access control system sejak tahun 2000. Sutojo (2011), adapun manfaat dari citra perusahaan yang baik dan kuat yang memiliki daya saing jangka menengah dan panjang; menjadi tameng selama masa krisis, menarik eksekutif yang andal, di mana eksekutif yang andal adalah aset perusahaan; meningkatkan efektivitas strategi pemasaran, menghemat biaya operasional. Oleh karena itu, akan lebih baik bagi perusahaan untuk mengetahui apa persepsi pelanggan tentang teknologi tersebut terutama dalam hal peningkatan kualitas layanan berbasis elektronik dan citra perusahaan.


Robotica ◽  
2021 ◽  
pp. 1-19
Author(s):  
Quoc Dien Le ◽  
Tran Thanh Cong Vu ◽  
Tuong Quan Vo

Abstract Over the years, face recognition has been the research topic that has attracted many researchers around the world. One of the most significant applications of face recognition is the access control system. The access control system allows authorized persons to enter or exit certain or restricted areas. As a result, it will increase the security situation without over-investment in staff security. The access information can be the identification, time, and location, etc. It can be used to carry out human resource management tasks such as attendance and inspection of employees in a more fair and transparent manner. Although face recognition has been widely used in access control systems because of its better accuracy and convenience without requiring too much user cooperation, the 2D-based face recognition systems also retain many limitations due to the variations in pose and illumination. By analyzing facial geometries, 3D facial recognition systems can theoretically overcome the disadvantages of prior 2D methods and improve robustness in different working conditions. In this paper, we propose the 3D facial recognition algorithm for use in an access control system. The proposed algorithm includes the preprocessing, feature extraction, and classification stages. The application of the proposed access control system is the automatic sliding door, the controller of the system, the web-based monitoring, control, and storage of data.


2021 ◽  
Vol 2083 (4) ◽  
pp. 042089
Author(s):  
Yuanyuan Wang

Abstract This paper designs and implements a community access control system based on STM32 microcontroller minimum system technology. A power unit composed of steering gear and simple lifting rod device is designed. According to the actual demand, a display device composed of buzzer alarm device and display screen is designed. Considering the need of camera recognition, the program of camera recognition process is designed, the database is written, and the license plate of this area is stored in advance. The system can make the license plate can be recognized by the camera automatically, and through the comparison with the database, the lifting rod or the buzzer alarm is realized. The access control system is of great significance to the control of vehicle entering and leaving and the safety of the community.


Author(s):  
Balakarim Huseynov, Tarana Zeynalova Balakarim Huseynov, Tarana Zeynalova

The proposed system allows you to control the parameters of the house using a remote control system. Changes in temperature and humidity in the house are monitored by telephone. The entire lighting system of the house is controlled. If a gas leak or fire occurs in the house, an alarm is triggered and a notification is sent to the phone. If there is unauthorized access to the house, this is detected by a motion sensor and a notification is sent to the phone. Changes in the apartment, which is "under the control" of the system, can be monitored and managed in the "Serial Monitor" section. Selected optical sensors are sensors that capture an optical image and work by analyzing the darkest and brightest parts of the image using algorithms. The level of security increases depending on the sensor's sensing element, so the higher the sensor's resolution, the better the image details. The ultrasonic signal is transmitted to the finger located on the scanner. Due to the presence of pores and other details that are characteristic of each fingerprint, part of this signal is absorbed, and part is returned to the sensor. As a result, the sensor can recognize fingerprints. Password authorization. A password based door lock system is an access control system that allows only authorized persons to enter a restricted area. When an authorized person enters the user ID and password from the keyboard, the door opens and after a few minutes the door closes again. If the code is entered incorrectly three times in a row, the code lock will go into blocking mode. Keywords: "smart house", control system, temperature sensor, motion sensor, telediagnostics, telecontrol.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Javier Junquera-Sánchez ◽  
Carlos Cilleruelo ◽  
Luis De-Marcos ◽  
José-Javier Martinez-Herráiz

Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different endpoints is continuous authentication, as an access control system. Continuous authentication is the set of technologies capable of determining if a user’s identity remains in time; whether he is the legitimate user (i.e., the only one who should know the secret credentials) or the identity has been impersonated by someone else after the authentication’s process was completed. Continuous authentication does not require the active participation of the user. Aiming to identify the different technologies involved in continuous authentication’s implementations, evaluation methods, and its use cases, this paper presents a systematic review that synthesizes the state of the art. This review is conducted to get a picture about which data sources could allow continuous authentication, in which systems it has been successfully implemented, and which are the most adequate ways to process the data. This review also identifies the defining dimensions of continuous authentication systems.


Sign in / Sign up

Export Citation Format

Share Document