scholarly journals “Branket” Design as a Safe Deposit Box Security System using Arduino-Based Tap Sensor

2021 ◽  
Vol 3 (1) ◽  
pp. 0210108
Author(s):  
Arsha Raulnadi Trikusuma ◽  
Mona Rizqa ◽  
Dhimas Aria Wardhana ◽  
Noora Qotrun Nada

Safe is a safe place to store valuables or documents. Because they are usually made of strong and hard materials, a safe is a place to store valuables and important documents in the event of a natural disaster or fire. In addition, the safe is also equipped with a locking system so that it can also be used to secure valuables or documents from theft. Usually, safes are used by agencies or companies and the general public who have valuable items or documents. Safe security systems that have been used generally use either a manual lock, a rotary lock, or a digital lock. There are several security system developments in the safe, including using a microcontroller-based password and fingerprint code, a fingerprint sensor and an Arduino UNO-based RF remote control, using a microcontroller via SMS and FSK facilities, and other developments in the safe security system. “Branket” (Tap Safe) is a safe with a smart lock system using a knock pattern. The bracket is composed of several electronic components, mainly a microcontroller, a solenoid lock, and a piezoelectric knock sensor. The workflow for using the bracket begins by pressing the power button to turn on the bracket. Then the user sticks his hand into the small space to store or opens the safe by tapping the sensor according to the pattern. Increased security on the bank account includes a locking system with a secret knock pattern, easy to remember by the owner, faster opening of the safe, and the process of opening the safe is difficult for others to know. It is hoped that “branket” will become a new innovation in a unique locking system that still has a high level of security.

Foristek ◽  
2020 ◽  
Vol 10 (1) ◽  
Author(s):  
Fendi Pradana ◽  
Ardi Amir

Building or home security systems at this time are needed because there are still many security systems that can trigger crime, one of which is the use of padlock or conventional door locks and security that has not worked automatically. A security system is needed which has a high level of security and is automatic so that it does not bother users. Security systems are often a problem, namely the low level of security, how to use is not easy, and not automatic. The way to overcome this problem is to create a security system that has tight security, easy to use, works continuously automatically and can be connected to the user's mobile phone. Based on research that has been made this security system shows one of the security systems that have a high level of security because it is equipped with an infrared sensor that serves to detect the presence of humans, the camera takes pictures if the infrared sensor detects humans, a fingerprint sensor that functions as access to open the door and all The sensor works automatically and continuously and can be connected to mobile phones through the internet, this security system works well and can be relied upon.


Author(s):  
إبراهيم محمد زين

الملخّص يهدف هذا البحث لبيان أن السبيل الناجح لمواجهة الإرهاب الدولي المعاصر الملتبس بدعاوي الجهاد الإسلامي وإحياء دولة الخلافة الإسلامية هو التركز على معاني الأمن الفكري والروحي في الإسلام وهذا الاتجاه في المباحثة يُعيد النظر في طرائق قضايا الجهاد ويميز بين ما هو عقائدي ومرتبط بنظام الإسلام الكلي وبين ما هو من مجال حروب الفتنة والصعلكة.  الكلمات المفتاحيّة: الجهاد، حروب الصعلكة، حروب الفتنة، الأمن الروحي والفكري.              Abstract This study focuses on the most effective way of combating global terrorism that utilizes the banner of Jihad and restoration of the Khilafa system of governance. It should be emphasized that there is a dire need for a new line of investigation concerning the issue of Jihad that pays more attention to both spiritual and intellectual security systems in Islam. This requires a distinction to be made between what is universalistic in the Islamic system and what is particular. In this regard one has to differentiate between acts of just war and those of economic or sedition wars. Keywords: Jihad, economic war, sedition war, spiritual-intellectual security system.


2021 ◽  
Vol 2 (2) ◽  
pp. 105-115
Author(s):  
Mahmod Al-Bkree

This work is to optimize perimeter surveillance and explore the distribution of ground bases for unmanned aerial vehicles along the Jordanian border and optimize the set of technologies for each aerial vehicle. This model is part of ongoing research on perimeter security systems based on unmanned aerial vehicles. The suggested models give an initial insight about selecting technologies carried by unmanned aerial vehicles based on their priority; it runs for a small scale system that can be expanded, the initial results show the need for at least four ground bases along the length of the border, and a selected set of various technologies for each vehicle.


2019 ◽  
Vol 4 (2) ◽  
pp. 112-120
Author(s):  
Hadjira BELAIDI ◽  
Nour-El-Houda MEDDAH

This work deals with lock and home security systems. First, Motion sensors detect movement indoors and outdoors to guard against intruders, protect valuables and more. Thus, if any movement, RFID reader will be activated and database will be scanned to identify the persons who have the access to the home. This enhances the effectiveness of the security system and provides the user with the complete, whole-house protection he needs. An RFID badge can be used to unlock the door and access to the home. Alerts also are received on the smart phone if motion is sensed in a protected area inside or outside; giving the user the information it needs to act quickly. The door can also be remotely locked/unlocked. A microcontroller (ATmega2560) is used to control the entire system, and GSM is used to send alerts to the Smartphone. An Ethernet shield that connects the microcontroller to the database (DB) is also added.


2021 ◽  
Vol 6 (6) ◽  
pp. 69-73
Author(s):  
Md. Abdullah Al Rakib ◽  
Md. Moklesur Rahman ◽  
Md. Sohel Rana ◽  
Md. Sanjib Islam ◽  
Fysol Ibna Abbas

In this paper, we worked on how to control home apparatuses, safety, and security systems utilizing GSM innovation by utilizing a cell phone. We will likewise show that we can control the apparatuses even without a phone by sending an ordinary call. The favorable position of utilizing GSM innovation is that we can handle home appliances from any place in the world. This system permits the proprietor to control the appliances and to get a feedback status of the home apparatuses by sending calls just as through a portable application. For the home security system, we are utilizing an antitheft announcing system that will report the proprietor by sending a message and ringing a call. Likewise, for the security system, when fire or gas spillage is expected to occur, it will also report the proprietor by sending a call. Subsequently, by utilizing GSM innovation, it gives remote access to the gadgets to be controlled.


2018 ◽  
Vol 7 (3.33) ◽  
pp. 165
Author(s):  
JangMook KANG ◽  
Cheol Hee YOON ◽  
Tae Hyeong KWON

Malicious hacking is evolving continuously malicious code attacks. It needs flexible solutions such as the prevention leakage of personal information, demanding the ability of institutions to prevent high level of infringement. But, typical simple's security control system is limited by responding only to the tertiary industry equipment in the ICT field. A CPS type security system is capable of responding to the transition from ICT to AI which is should be applied. This is time of reorganization from the current security domain to the artificial intelligent ICBM device, it should apply the digital twin model which we are considering the people and environment of CPS type system. In this paper, we have studied a model of how cyber - physical systems can be implemented using existing security system platform technology. We also propose a new security technology applying model through analyzing log form of security equipment that has occurred for many years.  


1998 ◽  
Vol 7 (4) ◽  
Author(s):  
Tomáš Sirovátka

Individual responsibility and subsidiarity represent more general principles of market transition which are also relevant for social security system. The main goals of transformation of social security systems in transition countries have been defined as follows: more transparency and better targeting which is - considering cost efficiency requirement - necessary condition to protect the citizens against the newly emerging social risks. The question how far the effects of social security system transformation correspond to these claims seems to be extremely politically significant.


2014 ◽  
Vol 571-572 ◽  
pp. 1037-1041
Author(s):  
Ya Liu ◽  
Jian Hua Mao ◽  
Xue Feng Liu

The traditional smart security systems have poor extensity, delayed alarm systems, and cannot be controlled through the remote network. To solve the shortcomings, this article proposed a smart security system based on Sensor Web. The system used Sensor Observation Service to achieve the data transmission and storage in real time. Users can send requests to Sensor Observation Service to get home environment information in real time via Internet. The system also implemented Sensor Event Service, so that users can get home security alarm information in real time by subscribing the events they are interested in.


2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Naveed Ahmed Azam

This paper presents a novel image encryption technique based on multiple right translated AES Gray S-boxes (RTSs) and phase embedding technique. First of all, a secret image is diffused with a fuzzily selected RTS. The fuzzy selection of RTS is variable and depends upon pixels of the secret image. Then two random masks are used to enhance confusion in the spatial and frequency domains of the diffused secret image. These random masks are generated by applying two different RTSs on a host image. The decryption process of the proposed cryptosystem needs the host image for generation of masks. It is therefore, necessary, to secure the host image from unauthorized users. This task is achieved by diffusing the host image with another RTS and embedding the diffused secret image into the phase terms of the diffused host image. The cryptographic strength of the proposed security system is measured by implementing it on several images and applying rigorous analyses. Performance comparison of the proposed security technique with some of the state-of-the-art security systems, including S-box cryptosystem and steganocryptosystems, is also performed. Results and comparison show that the newly developed cryptosystem is more secure.


Sign in / Sign up

Export Citation Format

Share Document