Siga este enlace para ver otros tipos de publicaciones sobre el tema: Door locks.

Artículos de revistas sobre el tema "Door locks"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Door locks".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

LU, Zhi Yuan, Bo Zhao, Tie Liu, Yun Peng Song y You Meng Zhang. "Video Detection System Design of Meshing Depth of Elevator’s Door Lock". Advanced Materials Research 580 (octubre de 2012): 231–35. http://dx.doi.org/10.4028/www.scientific.net/amr.580.231.

Texto completo
Resumen
The detection of meshing depth of elevator’s door lock is an important content in the detections of elevator safety performance. Based on machine vision and the principle of image processing, this paper established a detection system of meshing depth of elevator’s door lock, and designed a handheld instrument. Combined with the environment of building for the detection of meshing depth of elevator’s door lock, this paper developed a software system suitable for multiple door locks. The detection system used industrial camera for the image acquisition of door lock’s meshing, and the images would be processed automatically in the micro computer. The instrument is easy to carry. The paper designed two ways including the offline and online automatic calibration for the instrument of video imaging. This paper solved the synchronization problem of image snapshot when the moment of conduction for door lock’s circuit. The detection way has no damage and interference from door lock’s circuit and ensures the independence of detection process.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Wendanto, Wisnu, D. Jayus Nor Salim y Dhika Wahyu Trisna Putra. "Rancang Bangun Sistem Keamanan Smart Door Lock Menggunakan E-KTP (Elektronik Kartu Tanda Penduduk) Dan Personal Identification Number Berbasis Arduino Mega R3". Go Infotech: Jurnal Ilmiah STMIK AUB 25, n.º 2 (18 de diciembre de 2019): 133. http://dx.doi.org/10.36309/goi.v25i2.111.

Texto completo
Resumen
Existing house door security during conventional still uses door locks as keys and often cases of door burglary and theft occur and the majority of homeowners work so the lack of house supervision by the owner. So we need a more practical and efficient key and more security for door locks, from this problem the author has the idea to produce a safe and practical door safety device based on RFID by utilizing e-KTP as an RFID tag and Keypad as a PIN to secure the door of the house. This design uses an Arduino Mega R3 microcontroller. This tool consists of several main components, namely e-KTP, RFID reader, microcontroller, 4x4 Keypad, Relay, and Solenoid Door Lock. The e-KTP chip functions as a label of an object in which there is data about the object. RFID reader is used as a reader of information contained in e-KTP. The microcontroller as the main controller, 4x4 keypad as personal access number identification and solenoid door lock as the key. The test results can be concluded that the door security system uses e-KTP and this PIN is able to read the e-KTP ID with a maximum distance of 1cm with the MFRC522 sensor RFID reader which has a frequency of 13.56 MHz placed in plywood 1cm thick. The PIN runs well by entering the 6 digit pin code on the available keypad. As well as the Solenoid Door Lock as a door lock runs smoothly.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Perng, Jau-Woei y Tung-Li Hsieh. "An Electromagnetic Lock Actuated by a Mobile Phone Equipped with a Self-Made Laser Pointer". Electronics 8, n.º 12 (11 de diciembre de 2019): 1524. http://dx.doi.org/10.3390/electronics8121524.

Texto completo
Resumen
The main purpose of this study was to create an acousto-optic control lock device to convert electrical signals with a specific sound command using an acousto-optic conversion module, thereby improving the reliability and safety of opening or closing remote controlled door locks, such as car central locks or rolling doors. We used music playing through a smart phone speaker to create a special laser pointer to connect with the smart phone‘s auxiliary input. The laser pointer (wavelength of 630–650 nm and maximum output of 5 mw) lights up when the smart phone’s music starts playing at a music frequency matching the light frequency. When the solar panel receives light, it converts the frequency of the light signal into an electrical frequency signal. The current is amplified using the power amplifier and then the amplified current flows to the sound recognition module. The sound recognition module performs audio comparison on the set sound signal, and once the comparison is correct, the output voltage activates the electromagnetic switch on the door to open or close it.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Hamas, Abdullah, Amgad Muneer y Suliman Mohamed Fati. "Smart security door system using SMS based energy harvest". International Journal of Electrical and Computer Engineering (IJECE) 11, n.º 4 (1 de agosto de 2021): 3410. http://dx.doi.org/10.11591/ijece.v11i4.pp3410-3423.

Texto completo
Resumen
Over the last decade, different studies have been conducted to increase security to identify sensor technology and provide alternative energy with other energy harvest techniques such as vibration energy harvester and sun energy harvester. There is no combinational approach to utilize the door to create energy and use it for security measures in the literature, making our system different and unique. This proposed system comprises the security and the energy harvest; the security section utilizes a motion detector sensor to detect intruders. For instance, the magnetic door lock type firmly locks the door, which can only open with a generated password. On the other side, the energy harvest section utilizes the door motion to generate electricity for the system, which solves power shortage and limited battery life issues. Moreover, this study includes a GSM module that allows authorized owners to receive a generated password as a security enhancement. This design mainly focuses on improving or optimizing the conventional security doors' overall performance as sliding door, panel door, or revolving door. The experimental results show the system efficiency in terms of power generation and the time needed to authenticate the property owner. Notably, the power generator can generate electricity more rapidly, while the needed time to receive the mobile device's security code is around 3.6 seconds.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

HERIANSYAH, HERIANSYAH, RAHMAN ECKY R, DIANA ANGGRAENI S y SWADEXI ISTIQPHARA. "Sistem Kunci Pintu Otomatis Kelas Perkuliahan Berbasis Android Terintegrasi Sistem Informasi Akademik". MIND Journal 5, n.º 2 (4 de julio de 2021): 121–34. http://dx.doi.org/10.26760/mindjournal.v5i2.121-134.

Texto completo
Resumen
AbstrakKunci pintu otomatis menawarkan kemudahan untuk mengakses ruangan dengan cara yang lebih efektif dan efisien dibandingkan dengan metode konvensional. Pada penelitian ini sistem kunci pintu otomatis menggunakan QR code dari aplikasi Pocket ITERA yang berbasis Android yang terintegrasi dengan Sistem Informasi Akademik (Siakad). Metode penelitian yang digunakan yaitu studi literatur mengenai kunci pintu otomatis, eksplorasi, dan spesifikasi alat. Adapun metode analisisnya yaitu analisis kebutuhan dan analisis operasional hardware dan software. Hasil implementasi rancangan menghasilkan sebuah perangkat kunci pintu otomatis berbasis IoT dan dapat dibuka dengan aplikasi Pocket ITERA di mana keduanya berkomunikasi secara realtime dengan database Siakad. Sistem ini berhasil dijalankan dengan baik sehingga pemanfaatan ruang kelas menjadi optimal dan berjalan sesuai jadwal yang telah ditentukan.Kata kunci: Android, Kunci Pintu Otomatis, QR Code, Sistem InformasiABSTRACTAutomatic door locks offer convenience to access the room in a more effective and efficient way compared to conventional methods. In this study, an automatic door lock system using a QR code from the Pocket ITERA application based on Android that is integrated with the Academic Information System (Siakad). The research method used is the study of literature on automatic door locks, exploration, and determining tool specifications. The methods of analysis are need and operational analysis of hardware & software. The results of the design implementation produce an IoT-based automatic door lock device and can be opened with the Pocket ITERA application where both communicate in real time with the Siakad database. Furthermore, this system successfully implemented, hence the utilization of the classrooms became optimal and runs according to a predetermined schedule.Keywords: Automatic Door Lock, Android, IoT, QR code, Infromation System
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Siallagan, Timbo Faritcan y Tita Tita. "Di Rancang Bangun Sistem Keamanan Terhadap Kunci Ruangan Berbasis Bot Telegram Menggunakan Mikrokontroler Esp8266". Journal of Information Technology 2, n.º 2 (24 de agosto de 2020): 45–54. http://dx.doi.org/10.47292/joint.v2i2.23.

Texto completo
Resumen
A building or a house is a shelter and gathering of a family or group of people. One of the requirements for a safe house or building is a good door lock security system. Conventional doors use locks as a lock. This method has many security risks in terms of reliability and use. Among its weaknesses is that access to open or close keys can only be done by key holders and directly on the spot. Thus it will be difficult if you do security control of the door remotely, there is a risk of delay in handling the crime of theft, therefore an appropriate technology is needed to overcome this problem, namely a security system for the room where this system can be made based on Telegram Bot which uses a microcontroller. With the creation of such a system, the tools needed are microcontroller ESP8266 model, notepad ++ editors and Bascom AVR, using assembler programming language.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Wu, Xiu Ting, Xiao Feng Yin, Xiao Hua Wu y Qi Chang Yang. "Modeling and Simulation of an Automotive Body Electronic Control System". Applied Mechanics and Materials 278-280 (enero de 2013): 1754–57. http://dx.doi.org/10.4028/www.scientific.net/amm.278-280.1754.

Texto completo
Resumen
To simplify the wiring harness of automotive body control system, the functional requirements of automotive door locks, window lifters, rearview mirrors, trunk lock, and lights were analyzed, and an architecture of automotive body electronic control system was put forward based on CAN bus technology. The application layer protocol referring SAE J1939 protocol specification was defined. And the door lock system was modeled and simulated as an example by using CANoe. The simulation results show that the proposed architecture of automotive body electronic control system works well, and the reliability of automotive body control system can be improved and the automotive weight and cost can be reduced.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Ihsan, Indah Purwitasari, Sukriyah Buwarda, Hilda Novianty y Ifsan Aditya Putra. "Voice Recognition Untuk Otomatisasi Sistem Pengakses Pintu". JSAI (Journal Scientific and Applied Informatics) 4, n.º 1 (31 de enero de 2021): 116–25. http://dx.doi.org/10.36085/jsai.v4i1.1318.

Texto completo
Resumen
Penggunaan kunci manual sebagai pembuka dan pengunci pintu masih belum optimal. Masalah yang sering terjadi adalah pemilik kunci sering kali lupa dimana menyimpan kunci bahkan hingga terjadi kehilangan kunci. Sistem biometrik pola suara memiliki ciri khas dan karakteristik yang berbeda pada setiap manusia, maka suara dapat dijadikan salah satu alternatif solusi, yaitu suara sebagai kunci untuk membuka pintu secara otomatis sehingga lebih efisien. Otomatisasi sistem pengunci pintu dibuat menggunakan Elechouse v3 yang berfungsi sebagai voice recognition serta Solenoid lock door sebagai pengunci otomatis pada pintu. Hasil pengujian fungsional menggunakan black box menunjukkan bahwa seluruh alat yang dirangkai berfungsi sesuai fungsinya. Pengujian tingkat keberhasilan sistem dilakukan menggunakan variable derau, non derau dan jarak. Pada data training tingkat keberhasilan sistem ini jika tanpa derau adalah 100%, sedangkan dengan derau 50.0 dB hingga 70 dB rata-rata tingkat keberhasilannya adalah 56,2%. Untuk jarak 30 cm sampai 180 cm rata-rata keberhasilannya sebesar 40,51%. Jarak terjauh adalah pada jarak 150 cm dengan presentase keberhasilan 5%. Pada data testing tingkat keberhasilannya jika tanpa derau adalah 0%, sedangkan dengan derau 50.0 dB hingga 70 dB rata-rata tingkat keberhasilannya adalah 1,9%. Untuk jarak 30 cm sampai 180 cm rata-rata keberhasilannya sebesar 0%.The use of manual locks as door openers and locks is still not optimal. The problem that often occurs is that the key owner often forgets where to store the key and even loses the key. The voice pattern biometric system has different characteristics for each human, so sound can be an alternative solution, namely voice as a key to open doors automatically so that it is more efficient. Door lock system automation is made using Elechouse v3 which functions as voice recognition and Solenoid door lock as automatic locking of doors. The results of functional testing using a black box show that all the tools assembled function according to their function. Testing the success rate of the system is carried out using noise, non-noise and distance variables. In the training data, the success rate of this system without noise is 100%, while with a noise of 50.0 dB to 70 dB the average success rate is 56.2%. For a distance of 30 cm to 180 cm the success rate is 40.51%. The farthest distance is at a distance of 150 cm with a success percentage of 5%. In the testing data, the success rate without noise is 0%, while with a noise of 50.0 dB to 70 dB the average success rate is 1.9%. For a distance of 30 cm to 180 cm the success rate is 0%.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Rothenberg, Ellen V. "GATA-3 locks the door to the B-cell option". Blood 121, n.º 10 (7 de marzo de 2013): 1673–74. http://dx.doi.org/10.1182/blood-2013-01-477737.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Mahali, Muhammad Izzuddin. "Smart Door Locks Based on Internet of Things Concept with mobile Backend as a Service". Elinvo (Electronics, Informatics, and Vocational Education) 1, n.º 3 (30 de mayo de 2017): 171–81. http://dx.doi.org/10.21831/elinvo.v1i3.14260.

Texto completo
Resumen
Smart Door Locks System Based on Internet of Things Concept with Mobile Backend as s Service is the smart door locks development are supported by cloud computing technology as data storage. Methods of development that exist in this system is to combine technology (1) ESP8266 (2) Firebase and (3) Android Apps. Firebase is one of cloud-based services that are used to store data online. ESP8266 able to communicate with firebase well to process the read and write data directly using internet communication channels. Android application used to direct communication to the firebase for monitoring and controlling simultaneously to the system. Android app can control / monitoring Indirectly to ESP8266 module via Firebase that serves as a mobile Backend as a Service to apply the rules of the Internet of Things
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Neforawati, Indri y Hoga Saragih. "SIMULASI KUNCI ELEKTRONIK DENGAN ENKRIPSI MELALUI BLUETOOTH PADA PONSEL". CommIT (Communication and Information Technology) Journal 2, n.º 2 (31 de octubre de 2008): 137. http://dx.doi.org/10.21512/commit.v2i2.504.

Texto completo
Resumen
Currently the facility provided by mobile phones is very diverse. Starting from the phone, SMS, camera, music player, all rolled into one. Obviously the phone can also be used as electronic keys to replace the existing analog key at this time. Usually, to open a door key one must use a key, so to access a lot of doors must have a lot of different keys. But if the phone is used as an electronic key access control must implement all the keys are not needed anymore, just with one phone can open many locks. Simulation of an electronic lock is designed to use the phone as a remote control, and the computer as a central controller. Communication between mobile phones and computers using Bluetooth. While functioning as a door lock which is connected via parallel port of computer. This electronic key system to apply Access Control using RC4 encryption and MD5 Hashing. Design modules are built using NetBeans IDE 4.1 and the MySQL database, with some additional libraries. Libraries that are mobility netbeans 4.1, mysql-connector-java-3.0.9, BlueCove, Bluelet-Benhui. Phones that use must support the Java MIDP 2.0 and JSR-82.Keywords: Hashing MD5, Enkripsi RC4, NetBeans IDE 4.1, mysql-connector-java-3.0.9
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Kim, Jungsun (Sunny), Pearl Brewer y Bo Bernhard. "Hotel Customer Perceptions of Biometric Door Locks: Convenience and Security Factors". Journal of Hospitality & Leisure Marketing 17, n.º 1-2 (19 de agosto de 2008): 162–83. http://dx.doi.org/10.1080/10507050801978323.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Strother, Z. S. y Pascal James Imperato. "Legends, Sorcerers, and Enchanted Lizards: Door Locks of the Bamana of Mali". Canadian Journal of African Studies / Revue Canadienne des Études Africaines 36, n.º 3 (2002): 596. http://dx.doi.org/10.2307/4107349.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Kone, Kassim y Pascal James Imperato. "Legends, Sorcerers, and Enchanted Lizards: Door Locks of the Bamana of Mali". African Studies Review 46, n.º 3 (diciembre de 2003): 163. http://dx.doi.org/10.2307/1515069.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Arnoldi, Mary Jo y Pascal James Imperato. "Legends, Sorcerers, and Enchanted Lizards: Door Locks of the Bamana of Mali". International Journal of African Historical Studies 34, n.º 3 (2001): 724. http://dx.doi.org/10.2307/3097602.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Quarcoopome, Nii O. "Legends, Sorcerers and Enchanted Lizards: Door Locks of the Bamana of Mali". African Arts 35, n.º 3 (1 de octubre de 2002): 78–80. http://dx.doi.org/10.1162/afar.2002.35.3.78.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Ariandi, Ahmad, Rolly Yesputra y Risnawati Risnawati. "Perancangan Smart Home Dengan Sistem Kendali Dari Android Di CV. Rifanta Tanjung Balai". JUTSI (Jurnal Teknologi dan Sistem Informasi) 1, n.º 1 (28 de enero de 2021): 51–60. http://dx.doi.org/10.33330/jutsi.v1i1.1036.

Texto completo
Resumen
Abstract:CV Rifanta is a business unit engaged in software engineering technology, computers, and mobile phones. CV Rifanta is on Jalan Sei Tualang, and is in a shop house (shop house). The problem that exists in CV Rifanta is the use of manual locks that can be damaged by irresponsible people, besides that the control system on electric loads still uses manual power, such as turning on lights and fans, and closing windows still manually. This research was conducted to design a smart home system and design a device that aims to automatically lock the shop doors using commands from android by utilizing a bluetooth network. The door lock will use a door lock solenoid, which can be directly stuck to the ground or the door lock of the shophouse. Loads in the form of lights, fans and windows will be controlled via Android because the appliance design system also applies the smart home system, so that the android application can also adjust the doorlock solenoid output, and lights with an active 5VDC LED supply relay and an active no-NC relay position. Whereas for the output relay output with a DC motor, supplied with a voltage of 3.3VDC, it finds M1 data clockwise, and M1 counterclockwise. While the window on the servo motor uses a voltage of 3.3VDC with a closed angle, turn 00 and the open corner is 900. Keywords:CV Rifanta,smart home, shop door security, solenoid door lock, android Abstrak:CV Rifanta merupakan unit usaha yang bergerak di bidang teknologi rekayasa software, komputer dan handphone. CV Rifanta berada di jalan Sei Tualang, dan berada di sebuah ruko (rumah toko). Masalah yang ada di CV Rifanta, yaitu penggunaan gembok manual yang bisa dirusak oleh orang yang tidak bertanggung jawab, selain itu sistem kendali pada beban listrik masih menggunakan tenaga manual, seperti menghidupkan lampu dan kipas, sertamenutup jendela masih dengan tenaga manual. Penelitian ini dilakukan untuk merancang sistem smart home dan merancang sebuah alat yang bertujuan untuk mengunci otomatis pintu ruko dengan menggunakan perintah dari android dengan memanfaatkan jaringan bluetooth. Pengunci pintu akan menggunakan solenoid doorlock, yangdapat langsung tertancap ketanah atau kelobang kunci pintu ruko. Beban berupa lampu, kipas dan jendela akan dikendalikan melalui android karena sistem rancangan alat juga mengaplikasikan sistem smart home, sehingga aplikasi android juga bisa mengatur output solenoid doorlock, dan lampudengan supply relay 5VDC led aktif dan posisi no-nc relay aktif. Sedangkan untuk keluaran output relay dengan motor DC, disupply dengan tegangan 3.3VDC mendapati data M1 searah jarum jam, dan M1 berlawanan arah jarum jam. Sedangkan jendela pada motor servo, maka menggunakan tegangan 3.3VDC dengan sudut tutup, putar 00 dan sudut buka, disudut 900. Kata kunci:CV Rifanta, smart home, pengaman pintu ruko,solenoid door lock, android
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Stroe, Sergiu, Constantin Onescu, Ștefan Tabacu y Inal Cagri. "Semi-Automatic Assembly Device for Car Stepped Door Stop". Applied Mechanics and Materials 808 (noviembre de 2015): 345–50. http://dx.doi.org/10.4028/www.scientific.net/amm.808.345.

Texto completo
Resumen
The paper shows a new approach of the assembly device design, as a combination of product complexity analysis, the level of automation imposed by the company business strategy and assembly device complexity analysis. The proposed assembly process flowchart contains a hybrid method to assembly balls, springs, plastic covers and safety locks into the box of the stepped mechanisms of car door. To increase the productivity correlated with costs reduction, it chooses a semi-automatic method based on the PLC automatics which commands with the help of pneumatics. The device assembly principles will be established and with the help CAD software the device model will be performed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Perdana Buana, FahrizaI Akbarlillah y Indah Sulistiyowati. "Keamanan Kunci Ruang Dosen Elektro UMSIDA Menggunakan Ketukan Berbasis Arduino". Jurnal Intake : Jurnal Penelitian Ilmu Teknik dan Terapan 11, n.º 2 (22 de octubre de 2020): 64–70. http://dx.doi.org/10.48056/jintake.v11i2.136.

Texto completo
Resumen
The development of modern technology now are much more advanced and it can make doing a job much easier such as security problems for door locks that are applied to the electrical lecturer room UMSIDA. This tool is designed to run a solenoid lock by using a knock code applied to the door locking system by using microcontroller and piezo electric sensor which will be seen with a security system with knock method. The purpose of this study was to determine the constraints of the door safety device using an electric piezo sensor based on the Atmega328 microcontroller and the system can correctly recognize the beat pattern received and process it. This tool system works when there is an input in the form of a password code through the beats detected by electric piezo if the password code is applied correctly then the microcontroller provides input on relay to activate the solenoid and stepper motor, so the door would open. The result of this research shows that it can identify the correct number of beats a maximum of 15 beats, if it is more than 15 times the beat is wrong. From the result of the trial, fast or not a knock is declared true if the beat time ratio is slow by 4 times knock and the door opens. If the knock pattern is different from what has been determined, then the knock is declared wrong and the door can not open. The test results indicated that it can be concluded that from the test or trial carried out by the object provides true overall results even though the results do not provide 100% results. The results of the analysis of the trial carried out by each objects for 15 times, which affects fast or slow beats, number of beats, the ratio of time between knock
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Juman Kundang K, Tjahjono B, Yulhendri y Apresia Kadek. "Design And Build A Room Security System Based On Internet Of Things (IOT)". International Journal of Science, Technology & Management 2, n.º 3 (28 de mayo de 2021): 710–17. http://dx.doi.org/10.46729/ijstm.v2i3.186.

Texto completo
Resumen
Workspace or home security systems required special attention, especially in the issue of locks for room security that must be unique, not easily opened by unauthorized people to enter the room. In this research, indoor security systems applied Internet of things (IoT), the use of MQTT Broker which functions as a getway for data transactions between publishers and subscribers, power supply and ESP8266. The method to building the smart doorlock was use prototype method, designed the system and design diagrams, used UML (Unified Manipulation Language), the analysing problem used the PIECES method. The use of the MQTT broker functions as a gateway to connect publishers, subscribers, power supplies and the ESP8266 wifi module which functions as a gateway between devices to the mobile. The result of this researched was prototype the smart door lock system using IoT.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Harris, Ella, Katherine Brickell y Mel Nowicki. "Door Locks, Wall Stickers, Fireplaces: Assemblage Theory and Home (Un)Making in Lewisham’s Temporary Accommodation". Antipode 52, n.º 5 (20 de junio de 2020): 1286–309. http://dx.doi.org/10.1111/anti.12639.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Rozi, Ilham Fahrul, Dolly Virgian Shaka Yudha Sakti, Safitri Juanita y Muhammad Anif. "Pengembangan Aplikasi Kunci Elektronik Brankas Berbasis Android dengan Mikrokontroler Berbasis Bluetooth". JURNAL MEDIA INFORMATIKA BUDIDARMA 4, n.º 3 (20 de julio de 2020): 693. http://dx.doi.org/10.30865/mib.v4i3.2189.

Texto completo
Resumen
Safety deposit box areusually used to protect valuables stuff from fire and theft using analog or digital keys or a combination of both. This research makes android based electronic lock application for safety deposit box to automate safe opening and closing keys with the help of a microcontroller using Bluetooth. The Workflow of these application is an Android application will activate Bluetooth on the cell phone and send input to the arduino network microcontroller to activate the Solenoid door lock so that it can open or lock safely. The purpose of this research is to design and build an Android application for electronic keys in a safety deposit box so that it has a high level of security and has a history (log) feature to find out the user's application activities. The system development life cycle that will be used to build this application is the Waterfall method. This application will be built using Java programming language with the Basic4Android editor, the database is stored using SQLite. The conclusion of this research is that after testing concluded that the integration of network microcontrollers such as Solenoid door locks, ATmega 328, Bluetooth HC-05 and testing Android applications as electronic keys into the application security system in safety deposit box has high security, simulation tools in safety deposit box can respond which is good for users when performing commands from Android via Bluetooth in less than 5 meters, the security system has high security because it has an authentication and LOG feature to find out the user's last activity (in and out)
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Конышев, Д. С. "МЕТОД ВИЗНАЧЕННЯ ОСНОВНИХ ПАРАМЕТРІВ ВАНТАЖНОГО ЛЮКА В ХВОСТОВІЙ ЧАСТИНІ ФЮЗЕЛЯЖУ ЛІТАКІВ ТРАНСПОРТНОЇ КАТЕГОРІЇ". Open Information and Computer Integrated Technologies, n.º 87 (30 de junio de 2020): 52–71. http://dx.doi.org/10.32620/oikit.2020.87.02.

Texto completo
Resumen
A method has been developed for determining principal parameters for aft cargo door of transport aircraft. A list of input data is given and a technique for finding them is described. An example based on an existing transport aircraft is considered. The following has been used as source data: basic cargo nomenclature to be transported by the designed aircraft, cargo overall dimensions and weight, methods of loading and mooring, loading facilities. More over the design, operational and regulatory parameters are needed, such as landing gear configuration, its bottoming system, extension of rails of the upper equipment for loading/unloading, cargo trajectories during loading and airdropping, codes of the international regulatory bodies such as FAR, CS, AP. Based on the source data, the principle of determining the dimensions of the cargo compartment, cargo floor and the loading sites in the form of a ramp with a pressure bridge, and air stairs is given. The relation between the ramp length and the cargo floor length is described taking into account the loading, unloading and air dropping operations. Correct calculation of these parameters is the most important task, because performance of the future transport aircraft directly depends on the solution. The technique of determining the cargo door opening, development of the load-bearing structure of the transport aircraft fuselage aft section, its main strong elements – the cargo door beam, the ramp, the attachment units, the ramp locks – is given. The interconnection of the ramp load-bearing structure with the load-bearing structure of the fuselage aft part, the options for transferring loads perceived by the ramp to the frame are described. Examples of two types – flat and volumetric – of the cargo door beams, as well as the method of their assignment are considered. Trajectories of the extreme points of the in-gauge load are determined using graphical method for loading, unloading, and airdropping operations. Taking into account the positions of these trajectories makes it possible to select the desired cutout in the fuselage aft section. While designing the aft cargo doors the main features are highlighted. These features when considered make it possible to determine the most optimal parameters of the cutout, the cargo door type and its components.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Kurniasih, Wahyuni, Abdul Rakhman y Irma Salamah. "Sistem Keamanan Pintu dan Jendela Rumah Berbasih IoT". Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) 5, n.º 2 (30 de julio de 2020): 266. http://dx.doi.org/10.30645/jurasik.v5i2.212.

Texto completo
Resumen
The house is the most valuable asset, therefore security at home is also very important. Therefore a home security system is created that combines a microcontroller with an Android smartphone application. The microcontroller used is the Raspberry Pi which is equipped with a camera as a home security monitoring system and various sensors as detectors such as magnetic, PIR sensors and solenoids as automatic door locks. So if the sensors that are installed detect something at home, then the homeowner will immediately get a notification sent by the database to the smartphone application, and the homeowner can monitor the state of the house right then through photos and videos recorded by cameras that have been installed at home.
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Eryawan, Bagus, Ari Endang Jayati y Sri Heranurweni. "RANCANG BANGUN PROTOTYPE SMART HOME DENGAN KONSEP INTERNET OF THINGS (IOT) MENGGUNAKAN RASPBERRY PI BERBASIS WEB". Elektrika 11, n.º 2 (8 de octubre de 2019): 1. http://dx.doi.org/10.26623/elektrika.v11i2.1691.

Texto completo
Resumen
High economic growth makes the demand for comfortable and safe houses increase and the application of technology that is most clearly seen is technology with automatic systems. With this technology, the use of electricity in the house can be minimized and offer convenience in controlling the house. Sometimes homeowners forget to turn off the lights when they are outside the house so they have to go back and do checks that are very inefficient both in terms of time and financially such as the cost of gasoline to return to the house. Based on this, the Smart Home Prototype was created with the concept of the Internet of Things (IoT) using Raspberry Pi Web-Based, which is a system that can remotely control electronic home appliances using Raspberry Pi as a base system, which is connected to Web Applications through the internet network. The electronic equipment used in this study is in the form of 5 lamps, 1 stepper motor to control the garage, 1 servo motor to control the door lock, and 1 brushless motor that functions as a fan. Blocking and overall test results on Bedroom Lights, Living Room Lights, Kitchen Lights, Bathroom Lights, Porch Lights, Garages, Door Locks, and Fans, all work well. The testing of the distance between cities against the Prototype Smart Home was successfully carried out, where the Prototype Smart Home in the City of Demak was successfully controlled by the User who at the time of testing was in the City of Semarang, Kudus, Japan, Surabaya, and Jakarta.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Miki, Yuko. "FLEEING INTO SLAVERY: The Insurgent Geographies of Brazilian Quilombolas (Maroons), 1880-1881". Americas 68, n.º 04 (abril de 2012): 495–528. http://dx.doi.org/10.1017/s0003161500001528.

Texto completo
Resumen
On July 26, 1880, Benedito, the most notorious quilombola, or maroon, in São Mateus, the northern region of Espírito Santo province, Brazil, disappeared from the public prison in a flamboyant escape. After his drunken guards fell asleep, Benedito placed a cleaning bucket on top of his cot and employed it as a stepping-stone in tandem with a rope made from his bedsheet to scale the back wall enclosing the cell. He leapt to the other side, opened the back door, and slipped out noiselessly. Rendering the situation even more preposterous to those who discovered him gone were the handcuffs that lay on the floor smeared with sheep fat, which he had used to slip his hands out without forcing the locks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Miki, Yuko. "FLEEING INTO SLAVERY: The Insurgent Geographies of Brazilian Quilombolas (Maroons), 1880-1881". Americas 68, n.º 4 (abril de 2012): 495–528. http://dx.doi.org/10.1353/tam.2012.0045.

Texto completo
Resumen
On July 26, 1880, Benedito, the most notorious quilombola, or maroon, in São Mateus, the northern region of Espírito Santo province, Brazil, disappeared from the public prison in a flamboyant escape. After his drunken guards fell asleep, Benedito placed a cleaning bucket on top of his cot and employed it as a stepping-stone in tandem with a rope made from his bedsheet to scale the back wall enclosing the cell. He leapt to the other side, opened the back door, and slipped out noiselessly. Rendering the situation even more preposterous to those who discovered him gone were the handcuffs that lay on the floor smeared with sheep fat, which he had used to slip his hands out without forcing the locks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Kurniawan, Tesar, Nursin Nursin, Muhamad Amin Bakrie y Seta Samsiana. "Rancang Bangun Sistem Kendali Berbasis Googlespeech Untuk Aktivasi Peralatan Listrik Rumah". JREC (Journal of Electrical and Electronics) 5, n.º 2 (27 de marzo de 2018): 83–98. http://dx.doi.org/10.33558/jrec.v5i2.459.

Texto completo
Resumen
App inventor adalah media pengembang perangkat lunak untuk sistem android, yang memudahkan para pengembangnya mengembangkan idenya, salah satunya aplikasi yang mampu mengendalikan peralatan listrik rumah menggunakan suara melalui telepon pintar yang dapat mengontrol aktivasi peralatan listrik rumah. Google Speech digunakan untuk pengenalan suara yang kemudian memberikan input ke Arduino untuk mengendalikan aktivasi peralatan listrik rumah, Peralatan listrik rumah seperti lampu, motor pompa akuarium, kipas, door lock dan motor servo yang memanfaatkan relay sebagai driver, kemudian dilakukanlah pengujian dan penelitian pada laporan ini berisi tentang pengujian akurasi pengenalan suara google Speech dan pengujian jarak koneksi Bluetooth. Tingkat keakurasian pada google Speech yang paling baik dari 3 bahasa yaitu Bahasa Indonesia disusulBahasa jawa dan terakhir Bahasa sunda, sedangkan untuk jarak koneksi pada Bluetooth dapat dioperasikan jarak maksimal pada ruang bebas adalah 20 m dan jarak maksimal pada ruang berhalangan adalah 13 m. App inventor is a software developer media for android systems, which makes it easy for developers to develop their ideas, i.e an application that is able to control home electrical appliances using voice over smart phones that can control the activation of home electrical appliances. Google Speech is used for voice recognition which then provides input to Arduino to control the activation of home electrical appliances, such as lamps, aquarium pump motors, fans, door locks. A servo motors is used as drivers, then test and research on this report Contains about Speech google speech recognition accuracy testing and Bluetooth connection distance testing. Level of accuracy on google Speech the best of 3 languages ie Indonesian followed by Java and last language Sundanese, while for the distance on the Bluetooth connection can be operated the maximum distance in free space is 20 m and the maximum distance in the absence room is 13 m.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Levy, Laura y Maribeth Gandy. "SUPPORTING AGING IN PLACE WITH THE INTERNET OF THINGS: MEETING CHALLENGES OF USE THROUGH AUGMENTED REALITY TOOLS". Innovation in Aging 3, Supplement_1 (noviembre de 2019): S759. http://dx.doi.org/10.1093/geroni/igz038.2789.

Texto completo
Resumen
Abstract Internet of Things (IoT) devices (including smart thermostats, lightbulbs, and door locks) have the potential to greatly enhance independence and promote aging-in-place among older adults with mobility disabilities. However, these devices require extensive information technology expertise to select, configure, use, and adapt to meet one’s needs and this creates considerable barriers to their adoption, acceptance, and utilization. Meanwhile, increasingly available consumer augmented reality (AR) technologies can enable individuals to experience how IoT function and are used within the context of one’s own abilities and home. This may provide potential users an effective means of overcoming barriers to adoption, acceptance, and utilization of IoT to support aging in place. We present preliminary results from a participatory design study of older adults with mobility disabilities on the use of AR on a smart phone device to support IoT understanding.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Moloughney, Brent W., Gayle E. Bursey, Rebecca B. Fortin, Maria G. Morais y Khanh Thi Dang. "A Multicomponent Intervention to Encourage Stair Use in Municipal Buildings". American Journal of Health Promotion 33, n.º 1 (17 de mayo de 2018): 57–69. http://dx.doi.org/10.1177/0890117118776893.

Texto completo
Resumen
Purpose: Evaluate the incremental impact of environmental stairwell enhancements on stair usage in addition to prompts. Design: Phased, nonrandomized, quasi-experimental intervention. Setting: Two 6-story and one 8-story municipal government office buildings—each with 2 stairwells. Participants: Approximately 2800 municipal employees and 1000 daily visitors. Intervention: All stairwells received door wraps and point-of-decision and wayfinding prompts. Environmental enhancements were installed in 1 stairwell in each of the 2 buildings: wall paint, upgraded stair treads and handrails, artwork, light-emitting diode (LED) lighting, fire-rated glass doors, and removal of security locks on at least the ground floor. Measures: Staff surveys and focus groups, electronic and direct measures of stair and elevator use occurred at baseline and over 3 years of phased implementation and follow-up. Analysis: Change in the proportion of vertical movement by stairs using χ2 analysis. Results: The prompts were associated with a significant increase in stair use (odds ratio [OR] = 1.36; 95% confidence interval [CI]: 1.31-1.41), with an average absolute increase of 3.2%. Environmental enhancements were associated with an additional significant increase in stair use (OR = 1.31; 95% CI: 1.25-1.37) beyond prompts alone with an average absolute increase of a further 3.5% that was sustained for 1 year. The initial increases in stair use with prompts alone were not sustained. Conclusion: Implementing environmental stairwell enhancements in office buildings increased stair usage in a sustained manner beyond that achieved by prompts alone.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Lonzetta, Angela, Peter Cope, Joseph Campbell, Bassam Mohd y Thaier Hayajneh. "Security Vulnerabilities in Bluetooth Technology as Used in IoT". Journal of Sensor and Actuator Networks 7, n.º 3 (19 de julio de 2018): 28. http://dx.doi.org/10.3390/jsan7030028.

Texto completo
Resumen
Bluetooth technology is a key component of wireless communications. It provides a low-energy and low-cost solution for short-range radio transmissions. Bluetooth, more specifically Bluetooth Low Energy (BLE) has become the predominant technology for connecting IoT (Internet of Things). It can be found in cell phones, headsets, speakers, printers, keyboards, automobiles, children’s toys, and medical devices, as well as many other devices. The technology can also be found in automated smart homes, to provide monitors and controls for lights, thermostats, door locks, appliances, security systems, and cameras. Bluetooth offers convenience and ease of use, but it lacks a centralized security infrastructure. As a result, it has serious security vulnerabilities, and the need for awareness of the security risks are increasing as the technology becomes more widespread. This paper presents an overview of Bluetooth technology in IoT including its security, vulnerabilities, threats, and risk mitigation solutions, as well as real-life examples of exploits. Our study highlights the importance of understanding attack risks and mitigation techniques involved with using Bluetooth technology on our devices. Real-life examples of recent Bluetooth exploits are presented. Several recommended security measures are discussed to secure Bluetooth communication.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Peltonen, Aleksi, Eduardo Inglés, Sampsa Latvala, Dan Garcia-Carrillo, Mohit Sethi y Tuomas Aura. "Enterprise Security for the Internet of Things (IoT): Lightweight Bootstrapping with EAP-NOOB". Sensors 20, n.º 21 (27 de octubre de 2020): 6101. http://dx.doi.org/10.3390/s20216101.

Texto completo
Resumen
The emergence of radio technologies, such as Zigbee, Z-Wave, and Bluetooth Mesh, has transformed simple physical devices into smart objects that can understand and react to their environment. Devices, such as light bulbs, door locks, and window blinds, can now be connected to, and remotely controlled from, the Internet. Given the resource-constrained nature of many of these devices, they have typically relied on the use of universal global shared secrets for the initial bootstrapping and commissioning phase. Such a scheme has obvious security weaknesses and it also creates undesirable walled-gardens where devices of one ecosystem do not inter-operate with the other. In this paper, we investigate whether the standard Extensible Authentication Protocol (EAP) framework can be used for secure bootstrapping of resource-constrained devices. EAP naturally provides the benefits of per-device individual credentials, straightforward revocation, and isolation of devices. In particular, we look at the Nimble out-of-band authentication for EAP (EAP-NOOB) as a candidate EAP authentication method. EAP-NOOB greatly simplifies deployment of such devices as it does not require them to be pre-provisioned with credentials of any sort. Based on our implementation experience on off-the-shelf hardware, we demonstrate that lightweight EAP-NOOB is indeed a way forward to securely bootstrap such devices.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Dewani, Amirita, Pirah Memon, Veena Kumari, Anum Arain, Ayaz Jiskani y Sania Bhatti. "Keyless Smart Home: An application of Home Security and Automation". Oriental journal of computer science and technology 11, n.º 2 (7 de mayo de 2018): 107–14. http://dx.doi.org/10.13005/ojcst11.02.06.

Texto completo
Resumen
The rapid and revolutionary advancement in technology has increased the demand for advanced ubiquitous mobile applications in our daily lives. Home automation system uses collective smart technology to elevate sphere of security and human living standards. Wireless Smart home systems have been prototyped by researchers to realize different applications in vast contexts. In this paper we propose a keyless smart home security system which uses Bluetooth as a communication protocol to automate door locks based on a security code and predefined user credentials. The system combines Android phone as a signal sender to dispatch the input signal from an end users side, Bluetooth communication module as signal receiver, ARDUINO microcontroller as CPU and servo motor and light emitting diodes as an output. The system integrates two modules: one of which is Arduino microcontroller which is responsible for authentication and verification of security code and allows servo motor to process the output according to the received input. The second is android Application which provides an interface to the user to set credentials and security code which is then transmitted to the Arduino microcontroller via Bluetooth technology. Since Arduino and Android are open source, hence implementation rate of the proposed system is inexpensive and feasible.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Tural, Elif, Danni Lu y D. Austin Cole. "Safely and Actively Aging in Place: Older Adults’ Attitudes and Intentions Toward Smart Home Technologies". Gerontology and Geriatric Medicine 7 (enero de 2021): 233372142110173. http://dx.doi.org/10.1177/23337214211017340.

Texto completo
Resumen
As smart technology use is growing in residential environments, research on how such technologies can provide opportunities for safely and actively aging in place by integrating physical activity into daily routines and reducing sedentariness is scarce. This study investigated older adults’ intentions to use and attitudes toward currently available smart home technologies that could contribute to safe and active lives in and around home. The focus was on four representative technologies: smart lighting, smart door locks, smart fire prevention devices, and smart home systems/home automation. This paper presents the results of a sequential mixed-methods study comprised of online and in-person surveys ( n = 129), and a focus group of community-dwelling older adults, aged 50+ ( n = 15). Ordinal regression analyses indicated that perceived usefulness consistently predicts older adults’ attitudes and willingness to use smart home products. While smart fire prevention devices were viewed most favorably due to their potential safety benefits, perceived affordability significantly influenced older adults’ intentions to use them in their homes. The focus group findings underscore technology skepticism, privacy concerns and return on investment as significant determinants of attitudes toward the smart design products. The study has implications of designers and manufacturers by providing insights on how to prioritize smart home technology integrations to homes.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Brody, Paul y Veena Pureswaran. "The next digital gold rush: how the internet of things will create liquid, transparent markets". Strategy & Leadership 43, n.º 1 (19 de enero de 2015): 36–41. http://dx.doi.org/10.1108/sl-11-2014-0094.

Texto completo
Resumen
Purpose – The article analyses the market changes that are likely to be produced by and Internet of Things comprised of hundreds of billions of connected devices. Design/methodology/approach – Based on an IBM study, the authors foresee an Internet of Things emerging as a low-cost, private-by-design “democracy of devices” that will enable new digital economies and create new value, while offering consumers and enterprises fundamentally better products and user experiences. Findings – The IoT creates the ability to digitize, sell and deliver physical assets as easily as with virtual goods today. Using everything from Bluetooth beacons to Wi-Fi-connected door locks to allow customer access, many physical assets will become digital services. Practical implications – In a device-driven democracy, conference rooms, hotel rooms, cars and warehouse bays can themselves report capacity, utilization and availability in real-time. By taking raw capacity and making it easy to be utilized commercially, the IoT can remove barriers to fractionalization of industries that would otherwise be impossible. Originality/value – The article paints a compelling picture of a future in which the Internet of Things initiates five vectors of disruption by: Unlocking excess capacity of physical assets. 2. Creating liquid, transparent marketplaces. 3. Radical re-pricing of credit and risk. 4. Improving operational efficiency. 5. Digitally integrating value chains.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Hlaing, Ni Ni San y San San Lwin. "Electronic Door Lock using RFID and Password Based on Arduino". International Journal of Trend in Scientific Research and Development Volume-3, Issue-3 (30 de abril de 2019): 799–802. http://dx.doi.org/10.31142/ijtsrd22875.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Schwarz, Franziska, Klaus Schwarz y Reiner Creutzburg. "New Methodology and Checklist of Wi-Fi Connected and App-Controlled IoT-Based Consumer Market Smart Home Devices". Electronic Imaging 2020, n.º 3 (26 de enero de 2020): 276–1. http://dx.doi.org/10.2352/issn.2470-1173.2020.3.mobmu-275.

Texto completo
Resumen
Since its invention, the Internet has changed the world, but above all, it has connected people. With the advent of the Internet of Things, the Internet connects things today much more than people do. A large part of the Internet of Things consists of IoT controlled Smart Home devices. The Internet of Things and the Smart Home have become an increasingly important topic in recent years. The growing popularity of Smart Home devices such as Smart TVs, Smart Door Locks, Smart Light Bulbs, and others is causing a rapid increase in vulnerable areas. In the future, many IoT devices could be just as many targets. The many new and inexperienced manufacturers and the absence of established uniform standards also contribute to the precarious situation. Therefore, new methods are needed to sensitize and detect these threats. In this paper, different existing approaches like those of the National Institute of Standards and Technology (NIST) and the Open Web Application Security Project (OWASP) are combined with concepts of this work like the Smart Home Device Life Cycle. In the context of this paper, a universal 31-page question-based test procedure is developed that can be applied to any Smart Home device. Based on this new, innovative security checklist, the communication between device, app, and the manufacturer's servers, as well as the firmware of IoT devices, can be analyzed and documented in detail. In the course of this paper, also a handout in the abbreviated form will be created, which serves the same purpose.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Karimi, Khaoula. "Secure Smart Door Lock System based on Arduino and Smartphone App". Journal of Advanced Research in Dynamical and Control Systems 12, n.º 01-Special Issue (13 de febrero de 2020): 407–14. http://dx.doi.org/10.5373/jardcs/v12sp1/20201088.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Samsugi, Selamet, Achmad Irvandi Yusuf y Fika Trisnawati. "SISTEM PENGAMAN PINTU OTOMATIS DENGAN MIKROKONTROLER ARDUINO DAN MODULE RF REMOTE". Jurnal Ilmiah Mahasiswa Kendali dan Listrik 1, n.º 1 (2 de julio de 2020): 1–6. http://dx.doi.org/10.33365/jimel.v1i1.188.

Texto completo
Resumen
This final task report aims to design and Meng-implementasikan a series that serves to security and follow technology installed on the security of the door and controlling the existing doors of the door such as the Module key of the RF Remote Arduino that is for opening and closing doors. And discussing about RF Remote which is used to detect a frequency that will be output and input for the Arduino microcontroller. To control the Arduino microcontroller used the C and Arduino programming languages by using the Arduino software. The way this tool works is when people want to be quick and concise in opening and closing its doors. The door that has been on the security of the RF Remote will not be in the process, if the RF Remote button does not press on the password that has been known on the microcontroller, if the existing door lock RF Remot will turn on the opening and closing doors. In the door there is also a sound mark when in the Sensor Switch does not get a hard enough clearance or emphasis, if the microcontroller does not GET the ID for 5 seconds and automatically instantly Sounds The buzzer or sound of the alarm tone if the door is forced to open or close. The RF Remote Module receives a frequency signal and is connected to the Solenoid door lock, and is processed by the Arduino and then to through the relay to connect the line current on the door lock Solenoid and Servo Motor
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Sunandar, Endang, Khanna Tiara y Mohamad Daud. "SYSTEM LOCK AND CONTROLLING CLASS ROOM DENGAN INTERFACE ANDROID BERBASIS ARDUINO UNO". CCIT Journal 9, n.º 2 (14 de enero de 2016): 157–67. http://dx.doi.org/10.33050/ccit.v9i2.495.

Texto completo
Resumen
In day-to-day environment, buildings that have a lot of room doors sometimes appears constraints when should lock and unlock all the room one by one, because the security guards had to lock and unlock the doors on each floor of the building space manually. There are several systems that can be tailored to these problems, one of which is a lock and controlling system with Bluetooth facility. In this system using the Bluetooth facility to give commands to the microcontroller used, the namely ATmega328-based ArduinoUno. Users simply open the Bluetooth Controller application and connect to the bluetooth Android smartphone which is mounted on the door, then enter the password "1234" and press "A" to open, "b" to close, "c" to unlock, "d" key to lock the door, then the officer can control the door electrically
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Ashibani, Yosef, Dylan Kauling y Qusay Mahmoud. "Design and Implementation of a Contextual-Based Continuous Authentication Framework for Smart Homes". Applied System Innovation 2, n.º 1 (17 de enero de 2019): 4. http://dx.doi.org/10.3390/asi2010004.

Texto completo
Resumen
There has been a rapid increase in the number of Internet of Things (IoT) devices in the last few years, providing a wide range of services such as camera feeds, light controls, and door locks for remote access. Access to IoT devices, whether within the same environment or remotely via the Internet, requires proper security mechanisms in order to avoid disclosing any secure information or access privileges. Authentication, on which other security classes are built, is the most important part of IoT security. Without ensuring that the authorized party is who it claims to be, other security factors would be useless. Additionally, with the increased mobility of IoT devices, traditional authentication mechanisms, such as a username and password, are less effective. Numerous security challenges in the IoT domain have resulted in the proposal of many different approaches to authentication. Many of these methods require either carrying an authentication token, such as a smartcard, or restricting access to a particular physical location. Considering that most IoT devices contain a wide array of sensors, a large amount of contextual information can be provided. Thus, real-time security mechanisms can protect user access by, for example, utilizing contextual information to validate requests. A variety of contextual information can be retrieved to strengthen the authentication process, both at the time of access request and throughout the entire access session, without requiring user interaction, which avoids the risk of being discovered by attackers of these features. In this paper, we introduce a continuous authentication framework that integrates contextual information for user authentication in smart homes. The implementation and evaluation show that the framework can protect smart devices against unauthorized access from both anonymous and known users, either, locally or remotely, in a flexible manner and without requiring additional user intervention.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Klyushina, Elena. "Fernand Khnopff’s Logogriphic Method: a Case Study of I Lock my Door upon Myself." Actual Problems of Theory and History of Art 6 (2016): 523–31. http://dx.doi.org/10.18688/aa166-6-56.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Sir Anderson. "Pembuatan Sistem Kontrol Sliding Door untuk Rumah Tinggal". Jurnal Ilmiah Poli Rekayasa 10, n.º 1 (15 de octubre de 2014): 73. http://dx.doi.org/10.30630/jipr.10.1.59.

Texto completo
Resumen
The sliding door is a type of door that works by sliding the door to the right or to the left. The sliding door is a type of door that is suitable for use in a room with small volume, because the sliding door does not require a large space. lack the sliding door when the door has been closed, lack the sliding door when the door has been closed, there still exists a gap between the open doors and walls so that air can be in and out freely. with the construction of the door using the hinge mechanism, can minimize these conditions. To make the sliding door works automatically, the authors make a set of control system that uses an analog system and the concept of open-loop control system. “dc motor” is used as drive for the door and “central lock actuator” as locking doors. On the control circuit voltage source used is equal to 12V. Control circuit components used are double circuit push button (NO and NC), 12V relay 8 feet, limits switches, motor DC of power windows, central lock actuator. The components were assembled for the purpose of changing the polarity of the DC motor is regulated by a relay mechanism. By changing the polarity of the dc motor, the motor can rotate to the left and to the right, so the door is connected to the motor would be moves to open and close according to the motor movement.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Saiyar, Hafdiarsya. "UTILIZATION OF BLUETOOTH CONNECTIONS FOR ARDUINO BASED DOOR LOCK SECURITY TOOLS". Jurnal Riset Informatika 2, n.º 4 (15 de septiembre de 2020): 213–18. http://dx.doi.org/10.34288/jri.v2i4.156.

Texto completo
Resumen
Home security is something that must be considered for every homeowner. Especially when you have to leave the house empty for work or even on vacation. You must be worried about thieves, lost jewelry, or the safety of other valuables. Therefore, the authors made a door lock security device by utilizing a Bluetooth connection with the Arduino Uno microcontroller. The research method used was direct observation of the selected object, namely the author's house, and conducting literature studies related to the Arduino Uno microcontroller. This door lock tool uses the Arduino Uno as a data processing center, because it is easy to use, and most importantly in the charging program, it does not require a download like a microcontroller in general. This Arduino Uno contains a special program that will give commands to the Servo Motor to open and open the door. Not only opening and opening doors, but this tool can also move the door without us holding or touching it but through a Smartphone. The purpose of this research is to produce a tool that can make it easier to manage or open doors using the Arduino via an Android smartphone using a Bluetooth connection.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Brimicombe, Michael. "Secure door lock". Electronics Education 1996, n.º 1 (1996): 21–25. http://dx.doi.org/10.1049/ee.1996.0009.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Mas Erwan, Athirah Nabihah, Mohamad Norul Hafiz Muzaffar Alfian y Mohamad Syafiq Mohamad Adenan. "Smart Door Lock". International Journal of Recent Technology and Applied Science 3, n.º 1 (18 de marzo de 2021): 1–15. http://dx.doi.org/10.36079/lamintang.ijortas-0301.194.

Texto completo
Resumen
Internet of Things (IoT) has become a phenomenon in many researchers. A smart digital automated system based on IoT plays major role which helps in reducing human work by applying interaction technology in daily life. This research introduces the IoT Smart Door Lock where smartphone uses Wireless Fidelity (Wi-Fi) to activate the door lock. By using Android software, the smartphone will automatically activate the door lock within a specific range. Data transmission will be done using Wi-Fi technology. So, the user does not have to worry whether the door has been locked or not because user can control it by using their smartphone within a specific range. The user also does not have to worry about losing the door key anymore because there is no device required except user’s smartphone. This project consists of hardware and software development. The main purpose on the design is to prevent the situation where the user is unable to unlock the door when the key is missing also to give a solution for users to monitor door status when they forget the door has been locked or not. This system aims to eliminate the use of keys to access the door, where the daily struggle faced to bring along a bunch of keys anywhere. Besides that, the door locking system must function efficiently. The prototype of this system is successfully done, the procedure and the software and hardware requirement has been compiled in this report.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Guo, Feng, Bo Tao Liu, Xiao Han, Yan Qi y Yi Zhang. "A Self-Alignment Sealing Hatch-Door System Updated for Airlock Chambers of KM6 Space Simulator". Applied Mechanics and Materials 390 (agosto de 2013): 606–10. http://dx.doi.org/10.4028/www.scientific.net/amm.390.606.

Texto completo
Resumen
KM6 space simulator built in 1990s is currently the largest thermal vacuum test facility for spaceships and satellites in China. In order to meet new requirements of ground test for outer-cabin space walk of astronauts under China Manned Space Project II, a hatch-door system with ten rectangular doors in auxiliary horizontal chamber of KM6 space simulator has been updated since 2006. For the sake of pressure balance, every hatch-door is upgraded with a pressure regulator, which enables easy close and open of every hatch-door under no pressure difference. To improve vacuum compatibility of rotating hatch-doors, single axis hinge mechanism is renewed as biaxial hinge mechanism with more degrees of freedom for door spindle, which is combined with coordinated lock mechanism and O-ring sealing structure to realize the self-alignment sealing of hatch-door flange structure. Up until now, three manned spaceships of SZ-5, SZ-6 and SZ-7 have successfully finish thermal vacuum tests in auxiliary horizontal chamber with high performance of the updated hatch-door system as results.
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Waworundeng, Jacquline M. S., Irfan Kusumah y Rival Gimon. "Prototipe Sistem Pengontrolan dan Monitoring Pintu Berbasis Mikrokontroler". Creative Information Technology Journal 3, n.º 2 (22 de septiembre de 2016): 149. http://dx.doi.org/10.24076/citec.2016v3i2.73.

Texto completo
Resumen
Penelitian ini bertujuan untuk membuat prototipe sistem pengontrolan dan monitoring pintu yang bermanfaat untuk keamanan pintu pada sebuah bangunan. Sistem ini mengintegrasikan perangkat keras berbasis mikrokontroler yang dikontrol melalui perangkat lunak aplikasi Smart Building. Perangkat keras dibangun dengan Arduino, Digital Analog Converter (DAC), door strike, dan motor DC. Aplikasi Smart Building dibangun dengan Microsoft Visual Studio dan Arduino IDE. Operator menjalankan fungsi pengontrolan dan monitoring melalui aplikasi Smart Building pada komputer yang kemudian mengirimkan signal digital ke mikrokontroler yang diteruskan ke DAC. DAC mengkonversi signal digital menjadi signal analog yang dikirim ke device door stike dan motor DC yang terpasang di pintu. Sistem dapat melakukan fungsi kontrol seperti mengunci pintu, membuka kunci pintu, membuka pintu, dan menutup pintu. Fungsi monitoring terpantau melalui aplikasi yang dapat menunjukkan status pintu terkunci, tidak terkunci, terbuka atau tertutup. Hasil yang diperoleh menujukkan sistem pengontrolan dan monitoring pintu berfungsi sesuai dengan tujuan.This study aims to create a Prototype System to control and monitoring the doors that useful for security doors in a building. This system-based on microcontroller integrated with software application Smart Building. Hardware built in with Arduino, Digital Analog Converter (DAC), door strike, and a DC motor. Smart Building applications built with Microsoft Visual Studio and the Arduino IDE. Operator control and monitoring function through Smart Building that installed on a computer which sends digital signals to a microcontroller that is forwarded to the DAC. DAC converts the digital signal into an analog signal that sent to the device door stike and DC motor mounted on the doors. The system can perform control functions such as door lock, door unlock, door open, and door close. Monitoring function monitored through applications that show the status of the doors weather locked, unlocked, open or closed. The results showed the door control system and monitoring function in accordance with the purpose.
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

DURRILL, WAYNE K. "SHAPING A SETTLER ELITE: STUDENTS, COMPETITION AND LEADERSHIP AT SOUTH AFRICAN COLLEGE, 1829–95". Journal of African History 41, n.º 2 (julio de 2000): 221–39. http://dx.doi.org/10.1017/s0021853799007665.

Texto completo
Resumen
Shortly after South African College, the predecessor of today's University of Cape Town, opened its doors in 1829 faculty members found that they had a problem. In one meeting of the Faculty Senate alone, four students were brought up on charges that one had been ‘fighting and noisy’, another ‘fighting – kicking open the door of the Messenger's Room’, another ‘writing on the Professor's desk with chalk’ the words ‘Ziervogel is a vagabond’ as well as ‘threatening the messenger with his fist’, and another ‘idle, insolent & insubordinate in writing class’ who, in replying to a reprimand from the writing master, said: ‘You may go to the Devil’. Several others were noted in the records as absent from class and lying about it. Moreover, the young college had only two dozen or so books, but already nine of them had been ‘mutilated by tearing out the leaves & c’. And virtually all the means for securing property from theft – ‘various locks, claps and staples’ – had been ‘broken in the College, apparently by some of the Students.’ So intractable had the students become, in fact, that the college authorities constructed a small one-room prison with no windows on campus, which they called the ‘Black Hole’, in which to confine offenders who could be identified and condemned. Students were regularly sentenced to terms of three or four hours per day without bread or water, usually in the early evening, the number of days depending on the severity of the offense.Students at South African College engaged in violence and intimidation of all sorts in the first half of the nineteenth century. They attacked professors and townspeople in Cape Town, preyed on each other, stole and destroyed property, and continually disrupted the operations of the college. These were not boys striving to become upstanding citizens, yet in the end they did for the most part, largely because in organizing campus violence some SAC students produced a reputation for leadership and a constituency that followed them. And that reputation proved useful later in securing positions in the city's merchant houses and in the colonial government. Later in the century, however, the violence subsided and was replaced with different means by which to produce a reputation for leadership, mainly structured competitions among students in a debating society, in sports and for high rankings in the examinations offered by the University of the Cape of Good Hope. What I wish to argue here is that the social relations created among students at South African College were important to forming elites in each successive generation. Moreover, it is important to know how these social relations were formed – mostly in competitions among students which centered around acts of violence, at first physical and later symbolic.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Asad, Muhammad Ridwan, Oky Dwi Nurhayati y Eko Didik Widianto. "Sistem Pengamanan Pintu Rumah Otomatis via SMS Berbasis Mikrokontroller ATMega328P". Jurnal Teknologi dan Sistem Komputer 3, n.º 1 (30 de enero de 2015): 1–7. http://dx.doi.org/10.14710/jtsiskom.3.1.2015.1-7.

Texto completo
Resumen
In this article, an automatic door security was designed used SMS, which serves as security for a microcontroller based door. This system was designed to facilitate the home user to lock the door and notice the condition of the house when the doors were left empty. The medium used is a phone by using SMS facility. This device consists of a sensor that is a “push button” that serves as input to inform the condition of the door to the microcontroller, microcontroller used is ATmega328P. Then Wavecom GSM Modem M1306B which serves as the sender and recipient SMS, using a solenoid to lock the door, and use the buzzer for alarm. The security system has been built with the working principles if there are people who want to try to enter and then numbers uninitialized on the microcontroller, the system will give a warning SMS notification to the user that "THERE ARE TRYING SIGN", and when the system is forcibly opened, the system will activate alarm as a warning sign and send SMS alert notification text of "alarm" to the phone number programmed into microcontroller.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía