Literatura académica sobre el tema "Door locks"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Door locks".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Door locks"

1

LU, Zhi Yuan, Bo Zhao, Tie Liu, Yun Peng Song y You Meng Zhang. "Video Detection System Design of Meshing Depth of Elevator’s Door Lock". Advanced Materials Research 580 (octubre de 2012): 231–35. http://dx.doi.org/10.4028/www.scientific.net/amr.580.231.

Texto completo
Resumen
The detection of meshing depth of elevator’s door lock is an important content in the detections of elevator safety performance. Based on machine vision and the principle of image processing, this paper established a detection system of meshing depth of elevator’s door lock, and designed a handheld instrument. Combined with the environment of building for the detection of meshing depth of elevator’s door lock, this paper developed a software system suitable for multiple door locks. The detection system used industrial camera for the image acquisition of door lock’s meshing, and the images would be processed automatically in the micro computer. The instrument is easy to carry. The paper designed two ways including the offline and online automatic calibration for the instrument of video imaging. This paper solved the synchronization problem of image snapshot when the moment of conduction for door lock’s circuit. The detection way has no damage and interference from door lock’s circuit and ensures the independence of detection process.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Wendanto, Wisnu, D. Jayus Nor Salim y Dhika Wahyu Trisna Putra. "Rancang Bangun Sistem Keamanan Smart Door Lock Menggunakan E-KTP (Elektronik Kartu Tanda Penduduk) Dan Personal Identification Number Berbasis Arduino Mega R3". Go Infotech: Jurnal Ilmiah STMIK AUB 25, n.º 2 (18 de diciembre de 2019): 133. http://dx.doi.org/10.36309/goi.v25i2.111.

Texto completo
Resumen
Existing house door security during conventional still uses door locks as keys and often cases of door burglary and theft occur and the majority of homeowners work so the lack of house supervision by the owner. So we need a more practical and efficient key and more security for door locks, from this problem the author has the idea to produce a safe and practical door safety device based on RFID by utilizing e-KTP as an RFID tag and Keypad as a PIN to secure the door of the house. This design uses an Arduino Mega R3 microcontroller. This tool consists of several main components, namely e-KTP, RFID reader, microcontroller, 4x4 Keypad, Relay, and Solenoid Door Lock. The e-KTP chip functions as a label of an object in which there is data about the object. RFID reader is used as a reader of information contained in e-KTP. The microcontroller as the main controller, 4x4 keypad as personal access number identification and solenoid door lock as the key. The test results can be concluded that the door security system uses e-KTP and this PIN is able to read the e-KTP ID with a maximum distance of 1cm with the MFRC522 sensor RFID reader which has a frequency of 13.56 MHz placed in plywood 1cm thick. The PIN runs well by entering the 6 digit pin code on the available keypad. As well as the Solenoid Door Lock as a door lock runs smoothly.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Perng, Jau-Woei y Tung-Li Hsieh. "An Electromagnetic Lock Actuated by a Mobile Phone Equipped with a Self-Made Laser Pointer". Electronics 8, n.º 12 (11 de diciembre de 2019): 1524. http://dx.doi.org/10.3390/electronics8121524.

Texto completo
Resumen
The main purpose of this study was to create an acousto-optic control lock device to convert electrical signals with a specific sound command using an acousto-optic conversion module, thereby improving the reliability and safety of opening or closing remote controlled door locks, such as car central locks or rolling doors. We used music playing through a smart phone speaker to create a special laser pointer to connect with the smart phone‘s auxiliary input. The laser pointer (wavelength of 630–650 nm and maximum output of 5 mw) lights up when the smart phone’s music starts playing at a music frequency matching the light frequency. When the solar panel receives light, it converts the frequency of the light signal into an electrical frequency signal. The current is amplified using the power amplifier and then the amplified current flows to the sound recognition module. The sound recognition module performs audio comparison on the set sound signal, and once the comparison is correct, the output voltage activates the electromagnetic switch on the door to open or close it.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Hamas, Abdullah, Amgad Muneer y Suliman Mohamed Fati. "Smart security door system using SMS based energy harvest". International Journal of Electrical and Computer Engineering (IJECE) 11, n.º 4 (1 de agosto de 2021): 3410. http://dx.doi.org/10.11591/ijece.v11i4.pp3410-3423.

Texto completo
Resumen
Over the last decade, different studies have been conducted to increase security to identify sensor technology and provide alternative energy with other energy harvest techniques such as vibration energy harvester and sun energy harvester. There is no combinational approach to utilize the door to create energy and use it for security measures in the literature, making our system different and unique. This proposed system comprises the security and the energy harvest; the security section utilizes a motion detector sensor to detect intruders. For instance, the magnetic door lock type firmly locks the door, which can only open with a generated password. On the other side, the energy harvest section utilizes the door motion to generate electricity for the system, which solves power shortage and limited battery life issues. Moreover, this study includes a GSM module that allows authorized owners to receive a generated password as a security enhancement. This design mainly focuses on improving or optimizing the conventional security doors' overall performance as sliding door, panel door, or revolving door. The experimental results show the system efficiency in terms of power generation and the time needed to authenticate the property owner. Notably, the power generator can generate electricity more rapidly, while the needed time to receive the mobile device's security code is around 3.6 seconds.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

HERIANSYAH, HERIANSYAH, RAHMAN ECKY R, DIANA ANGGRAENI S y SWADEXI ISTIQPHARA. "Sistem Kunci Pintu Otomatis Kelas Perkuliahan Berbasis Android Terintegrasi Sistem Informasi Akademik". MIND Journal 5, n.º 2 (4 de julio de 2021): 121–34. http://dx.doi.org/10.26760/mindjournal.v5i2.121-134.

Texto completo
Resumen
AbstrakKunci pintu otomatis menawarkan kemudahan untuk mengakses ruangan dengan cara yang lebih efektif dan efisien dibandingkan dengan metode konvensional. Pada penelitian ini sistem kunci pintu otomatis menggunakan QR code dari aplikasi Pocket ITERA yang berbasis Android yang terintegrasi dengan Sistem Informasi Akademik (Siakad). Metode penelitian yang digunakan yaitu studi literatur mengenai kunci pintu otomatis, eksplorasi, dan spesifikasi alat. Adapun metode analisisnya yaitu analisis kebutuhan dan analisis operasional hardware dan software. Hasil implementasi rancangan menghasilkan sebuah perangkat kunci pintu otomatis berbasis IoT dan dapat dibuka dengan aplikasi Pocket ITERA di mana keduanya berkomunikasi secara realtime dengan database Siakad. Sistem ini berhasil dijalankan dengan baik sehingga pemanfaatan ruang kelas menjadi optimal dan berjalan sesuai jadwal yang telah ditentukan.Kata kunci: Android, Kunci Pintu Otomatis, QR Code, Sistem InformasiABSTRACTAutomatic door locks offer convenience to access the room in a more effective and efficient way compared to conventional methods. In this study, an automatic door lock system using a QR code from the Pocket ITERA application based on Android that is integrated with the Academic Information System (Siakad). The research method used is the study of literature on automatic door locks, exploration, and determining tool specifications. The methods of analysis are need and operational analysis of hardware & software. The results of the design implementation produce an IoT-based automatic door lock device and can be opened with the Pocket ITERA application where both communicate in real time with the Siakad database. Furthermore, this system successfully implemented, hence the utilization of the classrooms became optimal and runs according to a predetermined schedule.Keywords: Automatic Door Lock, Android, IoT, QR code, Infromation System
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Siallagan, Timbo Faritcan y Tita Tita. "Di Rancang Bangun Sistem Keamanan Terhadap Kunci Ruangan Berbasis Bot Telegram Menggunakan Mikrokontroler Esp8266". Journal of Information Technology 2, n.º 2 (24 de agosto de 2020): 45–54. http://dx.doi.org/10.47292/joint.v2i2.23.

Texto completo
Resumen
A building or a house is a shelter and gathering of a family or group of people. One of the requirements for a safe house or building is a good door lock security system. Conventional doors use locks as a lock. This method has many security risks in terms of reliability and use. Among its weaknesses is that access to open or close keys can only be done by key holders and directly on the spot. Thus it will be difficult if you do security control of the door remotely, there is a risk of delay in handling the crime of theft, therefore an appropriate technology is needed to overcome this problem, namely a security system for the room where this system can be made based on Telegram Bot which uses a microcontroller. With the creation of such a system, the tools needed are microcontroller ESP8266 model, notepad ++ editors and Bascom AVR, using assembler programming language.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Wu, Xiu Ting, Xiao Feng Yin, Xiao Hua Wu y Qi Chang Yang. "Modeling and Simulation of an Automotive Body Electronic Control System". Applied Mechanics and Materials 278-280 (enero de 2013): 1754–57. http://dx.doi.org/10.4028/www.scientific.net/amm.278-280.1754.

Texto completo
Resumen
To simplify the wiring harness of automotive body control system, the functional requirements of automotive door locks, window lifters, rearview mirrors, trunk lock, and lights were analyzed, and an architecture of automotive body electronic control system was put forward based on CAN bus technology. The application layer protocol referring SAE J1939 protocol specification was defined. And the door lock system was modeled and simulated as an example by using CANoe. The simulation results show that the proposed architecture of automotive body electronic control system works well, and the reliability of automotive body control system can be improved and the automotive weight and cost can be reduced.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Ihsan, Indah Purwitasari, Sukriyah Buwarda, Hilda Novianty y Ifsan Aditya Putra. "Voice Recognition Untuk Otomatisasi Sistem Pengakses Pintu". JSAI (Journal Scientific and Applied Informatics) 4, n.º 1 (31 de enero de 2021): 116–25. http://dx.doi.org/10.36085/jsai.v4i1.1318.

Texto completo
Resumen
Penggunaan kunci manual sebagai pembuka dan pengunci pintu masih belum optimal. Masalah yang sering terjadi adalah pemilik kunci sering kali lupa dimana menyimpan kunci bahkan hingga terjadi kehilangan kunci. Sistem biometrik pola suara memiliki ciri khas dan karakteristik yang berbeda pada setiap manusia, maka suara dapat dijadikan salah satu alternatif solusi, yaitu suara sebagai kunci untuk membuka pintu secara otomatis sehingga lebih efisien. Otomatisasi sistem pengunci pintu dibuat menggunakan Elechouse v3 yang berfungsi sebagai voice recognition serta Solenoid lock door sebagai pengunci otomatis pada pintu. Hasil pengujian fungsional menggunakan black box menunjukkan bahwa seluruh alat yang dirangkai berfungsi sesuai fungsinya. Pengujian tingkat keberhasilan sistem dilakukan menggunakan variable derau, non derau dan jarak. Pada data training tingkat keberhasilan sistem ini jika tanpa derau adalah 100%, sedangkan dengan derau 50.0 dB hingga 70 dB rata-rata tingkat keberhasilannya adalah 56,2%. Untuk jarak 30 cm sampai 180 cm rata-rata keberhasilannya sebesar 40,51%. Jarak terjauh adalah pada jarak 150 cm dengan presentase keberhasilan 5%. Pada data testing tingkat keberhasilannya jika tanpa derau adalah 0%, sedangkan dengan derau 50.0 dB hingga 70 dB rata-rata tingkat keberhasilannya adalah 1,9%. Untuk jarak 30 cm sampai 180 cm rata-rata keberhasilannya sebesar 0%.The use of manual locks as door openers and locks is still not optimal. The problem that often occurs is that the key owner often forgets where to store the key and even loses the key. The voice pattern biometric system has different characteristics for each human, so sound can be an alternative solution, namely voice as a key to open doors automatically so that it is more efficient. Door lock system automation is made using Elechouse v3 which functions as voice recognition and Solenoid door lock as automatic locking of doors. The results of functional testing using a black box show that all the tools assembled function according to their function. Testing the success rate of the system is carried out using noise, non-noise and distance variables. In the training data, the success rate of this system without noise is 100%, while with a noise of 50.0 dB to 70 dB the average success rate is 56.2%. For a distance of 30 cm to 180 cm the success rate is 40.51%. The farthest distance is at a distance of 150 cm with a success percentage of 5%. In the testing data, the success rate without noise is 0%, while with a noise of 50.0 dB to 70 dB the average success rate is 1.9%. For a distance of 30 cm to 180 cm the success rate is 0%.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Rothenberg, Ellen V. "GATA-3 locks the door to the B-cell option". Blood 121, n.º 10 (7 de marzo de 2013): 1673–74. http://dx.doi.org/10.1182/blood-2013-01-477737.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Mahali, Muhammad Izzuddin. "Smart Door Locks Based on Internet of Things Concept with mobile Backend as a Service". Elinvo (Electronics, Informatics, and Vocational Education) 1, n.º 3 (30 de mayo de 2017): 171–81. http://dx.doi.org/10.21831/elinvo.v1i3.14260.

Texto completo
Resumen
Smart Door Locks System Based on Internet of Things Concept with Mobile Backend as s Service is the smart door locks development are supported by cloud computing technology as data storage. Methods of development that exist in this system is to combine technology (1) ESP8266 (2) Firebase and (3) Android Apps. Firebase is one of cloud-based services that are used to store data online. ESP8266 able to communicate with firebase well to process the read and write data directly using internet communication channels. Android application used to direct communication to the firebase for monitoring and controlling simultaneously to the system. Android app can control / monitoring Indirectly to ESP8266 module via Firebase that serves as a mobile Backend as a Service to apply the rules of the Internet of Things
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Tesis sobre el tema "Door locks"

1

Samuel, David. "RFID security in door locks". Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-12186.

Texto completo
Resumen

Radio frequency identification, RFID is a technology that is used in many fields including locks. The unlimited access to the reader and the transponder has resulted in severe security weaknesses and made it possible to apply different attacks. To classify door locks as secure they must at least fulfil two main criteria: the first is the use of a challenge-response authentication protocol and the second is to deploy sophisticated and secure algorithms.

MiFare classic and KeeLoq are two widely applied technologies that are still in use in many security critical applications and are considered to be secure but which have been broken by cryptanalysis and with modest efforts and cost.

How secure a certain solution is depends on how expensive it is to buy the equipment that can break the system and reveal the secret key and how secure a lock should be depends on the value of what it is protecting.

The dropping price of powerful computers and the availability of security related information on the web will lead to an increase of the number of attacks on different systems.

By the time this thesis is published those locks evaluated are not secure enough, to overcome the security shortage some improvements have to be made such as: the use of sophisticated algorithms, the use of longer key of at least 128-bit, the use of non-deterministic random number generators and the use of pure hardware solutions both in the receiver and the transmitter to reduce leakage.

Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Viderberg, Arvid. "Security evaluation of smart door locks". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254962.

Texto completo
Resumen
Smart locks are a part of the up and rising Internet of Things (IoT). They’re used as a complement to traditional locks in order to make it easier to share keys electronically, rather than physically. Smart door locks are mounted on a existing door and enables users to control the state of the lock with their smartphone. In this report we want to investigate if previous acknowledged attacks on smart locks still exists in today’s available locks for the Swedish market. By studying previous work and conduct a threat model, we create attacks to apply on the locks in order to answer what deficiencies exist in smart door locks today.The results conclude that there are several deficiencies in today’s smart locks, where the most severe has been reported under responsible disclosure to the manufacturer. The locks investigated shows vulnerabilities in state consistency, password policies and password reset mechanism.
Smarta lås är en del av sakernas internet (IoT). Smarta lås används som ett komplement till traditionella lås för att göra det enklare att dela nycklar elektroniskt. Smarta dörrlås monteras på befintlig dörr och gör det möjligt för användare att styra låset med sin smartphone. I den här rapporten vill vi undersöka om tidigare kända attacker på smarta lås fortfarande finns i dagens tillgängliga lås på svenska marknaden. Genom att studera tidigare arbete och genomföra en hotmodell skapar vi attacker för att applicera på låsen, för att kunna svara på vilka brister som finns i smarta dörrlås idag. Resultatet drar slutsatsen att det finns flera brister i dagens smarta lås, där de allvarligaste har rapporterats till tillverkaren. De undersökta låsen visar sårbarhet i konsistens mellan tillstånd, lösenordspolicys och lösenordsåterställning.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Andersson, Tim. "Bluetooth Low Energy and Smartphones for Proximity-Based Automatic Door Locks". Thesis, Linköpings universitet, Interaktiva och kognitiva system, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-107332.

Texto completo
Resumen
Bluetooth Low Energy is becoming increasingly popular in mobile applications due to the possibility of using it for proximity data. Proximity can be estimated by measuring the strength of the Bluetooth signal, and actions can then be performed based on a user's proximity to a certain location or object. One of the most interesting applications of proximity information is automating common tasks; this paper evaluates Bluetooth Low Energy in the context of using smartphones to automatically unlock a door when a user approaches the door. Measurements were performed to determine signal strength reliability, energy consumption and connection latency. The results show that Bluetooth Low Energy is a suitable technology for proximity-based door locks despite the large variance in signal strength.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Sopi, Jeton. "NFC Door Lock". Thesis, Högskolan i Halmstad, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-30306.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

ANDERSSON, FILIP y DAVID BERGLING. "Knock-Knock Door Lock : Unlocking your door with a secret knock sequence". Thesis, KTH, Skolan för industriell teknik och management (ITM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279814.

Texto completo
Resumen
The door lock - a key function in every modern home, as well as a product which is today undergoing drastic change. The digital revolution has not left the door lock untouched, and there is today a wide variety of digital door locks utilizing technologies ranging from touch displays to fingerprint readers. The premises of the project was to try a different approach to the digital door lock and implement it schoolyard-style using a secret knock sequence, set by the user. The secret sequence would consist of two elements, both a rhythmical and a positional pattern. To unlock the door, the user would therefore need to simultaneously knock the correct rhythm and knock at the correct positions. To record and analyze the knock vibrations, piezo electric sensors connected to an Arduino Uno were used. To unlock the door, a small servo motor, two gears and a timing belt were used to turn the lock turning knob . Despite a short time frame and hardships due to the limitations caused by the coronavirus outbreak, a fully functional prototype which fulfilled both reliability and consistency was achieved. It could with good consistency recognize the test sequence, which was the intro rhythm to ”We Will Rock You” knocked in a square pattern. But even with flawless functionality, the conclusion would have been the same. The security of the system may be exceptional from a technical perspective, but it falls flat when the human factor is taken into account. The ability for a potential burglar to simply watch as one executes the secret knock is too much of a security hazard for the system to ever be considered as a competitor to other alternatives. The usage of the system is therefore better suited for applications where the thrill of using the product is more important than the actual security of it.
Dörrlåset - en grundläggande funktion i varje modernt hem, och samtidigt en produkt som idag genomgår drastisk förändring. Som resultat av den digitala revolutionen finns det idag en uppsjö av olika digitala dörrlås som utnyttjar allt från touchskärmar till fingeravtrycksläsare. Syftet med projektet var att testa en annorlunda tappning på det digitala dörrlåset, och förverkliga något många hade drömt om i barndomen - ett dörrlås aktiverat genom ett eget hemligt knackningsmönster. Det hemliga knackningsmönstret skulle då bestå av både ett rytmiskt och ett positionellt mönster. Därmed skulle den som ville öppna dörren behöva knacka både rätt rytm, och på rätt ställen på dörren. För att spela in och analysera vibrationerna från knackningarna användes piezoelektriska sensorer kopplade till en Arduino Uno. Mekanismen som styrde själva upplåsningen bestod av en liten servomotor, två kugghjul och en kuggrem som kopplade samman det hela. Trots en begränsad tidsram och motgångar orsakade av coronaviruset lyckades en fullt fungerande prototyp med hög pålitlighet färdigställas. Den kunde med hög tillförlitlighet känns igen testsekvensen, som var introrytmen till ”We Will Rock You” knackat i mönstret av en kvadrat. Men även med felfri prestanda hade slutsatsen varit densamma. Säkerheten för systemet må vara exeptionell ur ett rent tekniskt perspektiv, men den faller platt när den mänskliga faktorn tas med i beräkningen. Risken att en potentiell inbrottstjuv helt enkelt tittar på när någon knackar det hemliga mönstret är för stor för att systemet någonsin skulle kunna betraktas som en seriös konkurrent till andra digitala dörrlås. Produkten är därmed bäst lämpad för användningsområden där nöjet av att använda den är av högre prioritet än själva säkerheten.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Petersson, Linus. "Peer-to-peer : time to lock the door". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1724.

Texto completo
Resumen
Is a regulating policy concerning peer-to-peer applications required so that companies and institutions can better manage the security issues of internal peer-to-peer applications? There is high security and privacy risks involved when using p2p applications like KaZaA, Bearshare, Audiogalaxy and ICQ. With the high speed networks of today it is very important to really know what is going on in your network and which applications is doing what and with whom. If not, there are high possibilities that your system will be used for more or less malicious purposes. Therefore it is interesting to find out if p2p applications have found their way behind company walls. A policy can prevent the issues discussed either by banning employees from using p2p applications or by regulate the use of these applications in a very detailed manner. The implementation of a policy makes the usage controlled and easily supervised by the company security staff. Implementing a policy that regulates the use of p2p applications can prevent possible attacks on the company/organisation network.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Almosawi, Massar y Kristoffer Djupsjö. "IoT Security Applied on a Smart Door Lock Application". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230153.

Texto completo
Resumen
This thesis describes the development of an IOT application based upon Digitizing a smart door lock for making it connected to the internet and able to recognize employees that work in the office. This thesis concentrates primarily on the security aspects by listing the typical security challenges in IOT systems in general and summing these challenges up to develop a functional and secure product from scratch. A microcontroller is chosen for this project and a test environment is built to experiment and develop the security breaches. Architectural designs are chosen for the API being developed and even for the Android Application. A detailed description is made of the multi-master database represented by Azure active directory and its importance to achieving the security of an essential security breach. A new technique called Eddystone is introduced in the project to serve the transmission protocol with Bluetooth beacons. The final stage of this project is completing the development of the Android application and making sure that all the subsystems developed do communicate with each other, to deliver a functional and secure flow of the IoT system.
Följande examensarbete beskriver utvecklingen av en IoT-produkt baserad på digitalisering av ett smart dörrlås där applikationen ansluts till internet för igenkänning av anställda som arbetar på ett kontor. Examensarbetet fokuserar primärt på säkerhetsaspekterna genom att notera de typiska säkerhetsutmaningarna som generella IOT-system utsätts för och summerar dessa utmaningar för att utveckla en funktionell och säker produkt från start av projektet. En mikrokontroller väljs ut specifikt för projektet och en testmiljö byggs för att undersöka och motverka eventuella säkerhetsbrister. Rapporten ger även detaljerad beskrivning av multi-master databasen Azure Active Directory och dess betydelse för att uppnå önskad säkerheten i systemet. En ny teknik som heter Eddystone introduceras i projektet för att betjäna som överföringsprotokoll till Bluetooth-beacons. Det sista steget i detta projekt kompletteras utvecklingen av systemet med Androidapplikation som ser till att alla utvecklade delsystem kommunicerar med varandra och levererar ett funktionellt och säkert flöde av IOT-systemet.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Karim, Rafid y Haidara Al-Fakhri. "Smart Door Lock : A first prototype of a networked power lock controller with an NFC interface". Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-134894.

Texto completo
Resumen
Most major cell phone manufacturers have been releasing cell phones equipped with Near Field Communication (NFC). At the same time there is also increasing use of mobile payments and user verification with the use of the NFC technology. These trends indicate both the increasing popularity and great potential for increased use of NFC in today’s society. As a result NFC has a huge potential to simplify our everyday tasks, ranging from paying for items to accessing our office or home. In this context we will focus on using NFC together with a Power over Ethernet (PoE) powered circuit board and NFC reader to realize a simple system for granting access to open a locked door. One of the purposes of this realization is to explore what services can be realized when such a system is connected to the home/building network and connected to the Internet. A second purpose is to learn how to use network attached devices, as the concept of the Internet of Things is considered by many to be a driving force in the next generation Internet. This project uses very in expensive and low power hardware, as the number of devices is potentially very large and thus in order to minimize the technology’s impact on the environment we must consider how to minimize the power used – while maintaining the desired user functionality. This bachelor’s thesis project made it possible for a PoE powered circuit board containing a MSP430 microcontroller to work along with a NFC reader, which was connected through the Serial Peripheral Interface (SPI). We hope that the end result of this project will lead to a simpler life by exploiting this increasingly ubiquitous technology. For example, a homeowner could send a one-time key to a repair person who is coming to fix their sink. Similarly a homeowner could send a key to their neighbor which is valid for two weeks so that their neighbor could come into their home to water the plants while they are away on vacation. Another example is lending your apartment key to a friend while you are out of town.
Det blir allt vanligare med närfältskommunikation (NFC) i dagens samhälle, mobiltelefons-tillverkarna börjar utveckla nya telefoner med NFC teknik inbyggd, samtidigt som användningen av NFC ökat. Det sker även en utveckling inom mobila betalningar och användar-verifiering med användning av NFC, då NFC förenklar detta. Med detta sagt kommer vi att arbeta med detta i detta kandidatexamens-arbete där vi fokuserar på NFC samt Power over Ethernet som använder MSP430 chippet som kärna. Med dessa enheter kombinerade kommer en enkel rörelse med ett NFC kort över en NFC läsare som sedan skall ge åtkomst till en låst dörr. Detta i större kombination med en Internetuppkoppling kunna ge ägaren möjligheten att kunna skicka ut dörrnycklar till andra användare. I detta kandidatexamensarbete gjorde vi det möjligt för ett PoE kretskort bestående av ett MPS430 mikroprocessor att samarbeta med en NFC läsare genom SPI protokollet. Genom att utveckla detta projekt hoppas vi att vårt slutresultat leder till en enklare delning av nycklar med hjälp av denna teknologi.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Flores, Ryan Maximiliano. "Design of load-lock door for unit dose continuous lyophilization process for complex biologics". Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/127917.

Texto completo
Resumen
Thesis: S.B., Massachusetts Institute of Technology, Department of Mechanical Engineering, May, 2020
Cataloged from the official PDF of thesis.
Includes bibliographical references (pages 61-62).
The process of unit dose continuous lyophilization consists of moving vials containing unit doses of pharmaceutical product though a series of process chambers with varying pressures and temperatures. In order to move the vials between process chambers with varying pressures without disturbing the conditions within each respective chamber, a load lock is required. Although load locks are commonly used in the semiconductor industry, existing designs are not directly applicable to the unit dose continuous lyophilization process due to the unique geometric constraints on the system. This thesis document details the design of a load-lock door for the unit dose continuous lyophilization process. To meet the load-lock door functional requirements, a four-bar linkage load-lock door and a load-lock door with ground pivots offset from the sealing surface were designed. Because the driving performance parameters cannot be reliably modeled, the seal performance, particle generation, and seal adhesion of each design will be experimentally tested. The highest performing design will be chosen and improved based on the experimental results.
by Ryan Maximiliano Flores.
S.B.
S.B. Massachusetts Institute of Technology, Department of Mechanical Engineering
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Ruwaida, Bassam y Toni Minkkinen. "Home Automation System : A cheap and open-source alternative to control household appliances". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-137741.

Texto completo
Resumen
This project revolves around creating a home automation system prototype with the main focus being the ability to lock/unlock a door through the internet. The system consists of a central device, a server and an Android application.The central device is a microprocessor, in this case, a Raspberry Pi that connects to the Internet and receives an order to control a motor which in turn turns the lock with the help of gears. The ability to rotate the motor in both directions is achieved by the use of an H-bridge. The server manages users and devices, and handles the communication between the application and the central device. Users and devices are stored in a database on the server. The application is a frontend which presents the user with a list of devices to interact with.The main prototype where the Raspberry Pi acted as a central device was abandoned due to time and resource constraints. It was instead used to control the motor directly. This brought up some problems concerning powering the device using batteries. The software of the prototype is mostly working but due to the same time limitations not all planned features could be implemented.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Libros sobre el tema "Door locks"

1

Wallace, Edgar. The door with 7 locks. Hornchurch: Ian Henry Publications, 1985.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Morgenroth, Ulrich. Four hundred years and more -: Locks and fittings from Velbert. Velbert: Scala Verlag, 2003.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Dubé, Françoise. La quincaillerie d'architecture de Place-Royale. [Québec]: Gouvernement du Québec, Ministère des affaires culturelles, 1991.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Oates, Joyce Carol. I lock my door upon myself. Princeton, NJ: Ontario Review Press, 2002.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Oates, Joyce Carol. I lock my door upon myself. New York: Ecco Press, 1990.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Oates, Joyce Carol. I lock my door upon myself. New York, N.Y., U.S.A: Plume, 1991.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Oates, Joyce Carol. I lock my door upon myself. Belfast: Blackstaff Press, 1992.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Commission, United States International Trade. Certain residential door locks and parts thereof from Taiwan: Determination of the Commission in investigation no. 731-TA-433 (final) under the Tariff Act of 1930, together with the information obtained in the investigation. Washington, D.C: U.S. International Trade Commission, 1990.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Roberts, William. " Remember to lock the door": MMI and the Hacker. London: Queen Mary College, Department of Computer Science and Statistics, 1986.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Bruce, Glen. Security in distributed computing: Did you lock the door? Saddle River, NJ: Prentice Hall, 1997.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Capítulos de libros sobre el tema "Door locks"

1

Suprakash Mukherjee y Subhendu Mondal. "A Scheme for QR Code Based Smart Door Locks Security System Using an ARM Computer". En Advances in Intelligent Systems and Computing, 613–21. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-2035-3_62.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Taylor, Richard. "Conservation and Repair of Locks". En Doors, 363–75. New York, NY: Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9781315651224-15.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Patel, Harsh R., Parth R. Karkar, Shitul G. Borad, Hitesh N. Baradiya y Vatsal H. Shah. "Biometric Door Lock Using Mobile Fingerprint". En Advances in Intelligent Systems and Computing, 713–19. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9927-9_69.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Ahmad Taslim, Hazeem, Nor Azlinah Md Lazam y Nor Akmar Mohd Yahya. "Development of Smart Home Door Lock System". En Advances in Robotics, Automation and Data Analytics, 118–26. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70917-4_13.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Song, Wang, Ma Xiuying y Ma Qiang. "Simulation and Optimization of Automobile Back Door Lock". En Advances in Intelligent Systems and Computing, 482–87. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5887-0_70.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Shanthini, M. y G. Vidya. "IoT-Based Smart Door Lock with Sanitizing System". En Inventive Computation and Information Technologies, 63–79. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4305-4_6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

de Lima, Anderson B., Bibek Gurung y Sardar M. Farhad. "Efficient App Based Smart Door Lock System Using Bluetooth". En Advances in Intelligent Systems and Computing, 1046–55. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44038-1_97.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Jeong, Jeong-ile. "A Study on the IoT Based Smart Door Lock System". En Lecture Notes in Electrical Engineering, 1307–18. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0557-2_123.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Lin, Wen-Shan, Chao-Ting Chu y Chian C. Ho. "Two-Dimensional Inductance Plane Sensor for Smart Home Door Lock". En Advances in Networked-based Information Systems, 508–16. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29029-0_49.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Dansana, Debabrata, Brojo Kishore Mishra, K. Sindhuja y Subhashree Sahoo. "IoT-Based Smart Security System on a Door Lock Application". En Lecture Notes in Networks and Systems, 695–703. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0666-3_57.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Door locks"

1

Sousa, Pedro Jose, Rafael Tavares, Paulo Abreu, Manuel Quintas, Ana Reis y Maria Teresa Restivo. "Wireless control and network management of door locks". En 2015 3rd Experiment International Conference (exp.at'15). IEEE, 2015. http://dx.doi.org/10.1109/expat.2015.7463244.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Dhondge, Kaustubh, Kaushik Ayinala, Baek-Young Choi y Sejun Song. "Infrared Optical Wireless Communication for Smart Door Locks Using Smartphones". En 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN). IEEE, 2016. http://dx.doi.org/10.1109/msn.2016.047.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Oh, Seongyeol, Joon-Sung Yang, Andrea Bianchi y Hyoungshick Kim. "Devil in a box: Installing backdoors in electronic door locks". En 2015 13th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2015. http://dx.doi.org/10.1109/pst.2015.7232965.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Zhang, Xiaoyin, Binhong Ren, Xinwang Wang, Weiming Chen y Wei Wang. "Research on Grounding Technology of Door Locks of Charging pile". En 2020 12th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC). IEEE, 2020. http://dx.doi.org/10.1109/ihmsc49165.2020.00070.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Ismail, N. H., Zarina Tukiran, N. N. Shamsuddin y E. I. S. Saadon. "Android-based home door locks application via Bluetooth for disabled people". En 2014 IEEE International Conference on Control System, Computing and Engineering (ICCSCE). IEEE, 2014. http://dx.doi.org/10.1109/iccsce.2014.7072720.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Mu, Zhaonan, Wenting Li, Chao Lou y Mengzhu Liu. "Investigation and Application of Smart Door Locks based on Bluetooth Control Technology". En 2020 Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC). IEEE, 2020. http://dx.doi.org/10.1109/ipec49694.2020.9115189.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Han, Donhee, Hongjin Kim y Juwook Jang. "Blockchain based smart door lock system". En 2017 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2017. http://dx.doi.org/10.1109/ictc.2017.8190886.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Vongchumyen, Charoen, Pakorn Watanachaturaporn, Chompoonuch Jinjakam, Akkradach Watcharapupong, Watjanapong Kasemsiri, Kiatnarong Tongprasert, Aranya Walairacht, Thaweesak Penpokai, Thongchai Jenweerawat y Aunnisa Hami. "Door lock system via web application". En 2017 International Electrical Engineering Congress (iEECON). IEEE, 2017. http://dx.doi.org/10.1109/ieecon.2017.8075909.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Ibrahim, Adnan, Afhal Paravath, P. K. Aswin, Shijin Mohammed Iqbal y Shaeez Usman Abdulla. "GSM based digital door lock security system". En 2015 International Conference on Power, Instrumentation, Control and Computing (PICC). IEEE, 2015. http://dx.doi.org/10.1109/picc.2015.7455796.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Shetty, Shrajna, Shubham Shetty, Varsha Vishwakarma y Smita Patil. "Review Paper on Door Lock Security Systems". En 2020 International Conference on Convergence to Digital World - Quo Vadis (ICCDW). IEEE, 2020. http://dx.doi.org/10.1109/iccdw45521.2020.9318636.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Informes sobre el tema "Door locks"

1

Cooper, Hannah. Funding the Humanitarian Response in Yemen: Are donors doing their fair share? Oxfam, octubre de 2020. http://dx.doi.org/10.21201/2020.6713.

Texto completo
Resumen
Almost six years on from the escalation of conflict in March 2015, the humanitarian crisis in Yemen remains the worst in the world. Eighty percent of the population is in need of some kind of humanitarian assistance or protection, yet the Humanitarian Response Plan is only 42 percent funded. This paper looks at donor contributions to the 2020 Yemen Humanitarian Response Plan to date. Using a methodology based on the relative global share of Gross National Income for high-income countries, it examines whether these countries are doing their ‘fair share’ in funding the response to the crisis in Yemen.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Carty, Tracy, Jan Kowalzig y Bertram Zagema. Climate Finance Shadow Report 2020: Assessing progress towards the $100 billion commitment. Oxfam, octubre de 2020. http://dx.doi.org/10.21201/2020.6621.

Texto completo
Resumen
International climate finance is vital to global cooperation on climate change. As many developing countries reel from the effects of coronavirus, the prospect of climate-induced extreme weather risks compounding crises and poverty. Climate change could undo decades of progress in development and dramatically increase global inequalities. There is an urgent need for climate finance to help countries cope and adapt. Over a decade ago, developed countries committed to mobilize $100bn per year by 2020 to support developing countries to adapt and reduce their emissions. The goal is a critical part of the Paris Agreement. As 2020 draws to a close, Oxfam’s Climate Finance Shadow Report 2020 offers an assessment of progress towards the $100bn goal. The third in a series, this report looks at the latest donor figures for 2017–18, with a strong focus on public finance. It considers how climate finance is being counted and spent; where it is going; how close we are to the $100bn goal; and what lessons need to be learned for climate finance post-2020.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía