• Title/Summary/Keyword: smart door

Search Result 97, Processing Time 0.02 seconds

Implementation of Home Security System using a Mobile App (모바일 앱을 이용한 홈 시큐리티 시스템 구현)

  • Kwon, Young-Il;Jeong, Sam-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.4
    • /
    • pp.91-96
    • /
    • 2017
  • In this paper, we aim to respond efficiently to crime by using Arduino and smartphone apps in response to increasing number of house-breaking crimes. It receives the signal of the sensor installed in the house and connects it with the app of the smartphone. To use the app, you can download the app from the user's smartphone, launch the app, and operate the operation outside the home, not only inside the house, by linking the executed app. Among the sensors installed in the house, the movement detection sensor is used to enhance the security, and the gas leakage sensor and the flame detection sensor can be used to easily detect the risk of fire and to prevent the fire early. Security is further enhanced by the ability to remotely control the front door with a smartphone. After that, various sensors can be added and it can be developed as a WiFi module in addition to the Bluetooth module.

Establishment of electronic attendance using PCA face recognition (PCA 얼굴인식을 활용한 전자출결 환경 구축)

  • Park, Bu-Yeol;Jin, Eun-Jeong;Lee, Boon-Giin;Lee, Su-Min
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.19 no.4
    • /
    • pp.174-179
    • /
    • 2018
  • Currently, various security technologies such as fingerprint recognition and face recognition are being developed. However, although many technologies have been developed, the field of incorporating technologies is quite limited. In particular, it is easy to adapt modern security technologies into existing digital systems, but it is difficult to introduce new digital technologies in systems using analog systems. However, if the system can be widely used, it is worth replacing the analog system with the digital system. Therefore, the selected topic is the electronic attendance system. In this paper, a camera is installed to a door to perform a Haar-like feature training for face detecting and real-time face recognition with a Eigenface in principal component analysis(PCA) based face recognition using raspberry pi. The collected data was transmitted to the smartphone using wireless communication, and the application for the viewer who can receive and manage the information on the smartphone was completed.

Dynamic characteristics of single door electrical cabinet under rocking: Source reconciliation of experimental and numerical findings

  • Jeon, Bub-Gyu;Son, Ho-Young;Eem, Seung-Hyun;Choi, In-Kil;Ju, Bu-Seog
    • Nuclear Engineering and Technology
    • /
    • v.53 no.7
    • /
    • pp.2387-2395
    • /
    • 2021
  • Seismic qualifications of electrical equipment, such as cabinet systems, have been emerging as the key area of nuclear power plants in Korea since the 2016 Gyeongju earthquake, including the high-frequency domain. In addition, electrical equipment was sensitive to the high-frequency ground motions during the past earthquake. Therefore, this paper presents the rocking behavior of the electrical cabinet system subjected to Reg. 1.60 and UHS. The high fidelity finite element (FE) model of the cabinet related to the shaking table test data was developed. In particular, the first two global modes of the cabinet from the experimental test were 16 Hz and 24 Hz, respectively. In addition, 30.05 Hz and 37.5 Hz were determined to be the first two local modes in the cabinet. The high fidelity FE model of the cabinet using the ABAQUS platform was extremely reconciled with shaking table tests. As a result, the dynamic properties of the cabinet were sensitive to electrical instruments, such as relays and switchboards, during the shaking table test. In addition, the amplification with respect to the vibration transfer function of the cabinet was observed on the third floor in the cabinet due to localized impact corresponding to the rocking phenomenon of the cabinet under Reg.1.60 and UHS. Overall, the rocking of the cabinet system can be caused by the low-frequency oscillations and higher peak horizontal acceleration.

An Input Method for Decimal Password Based on Eyeblink Patterns (눈깜빡임 패턴에 기반한 십진 패스워드 입력 방법)

  • Lee, Seung Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.656-661
    • /
    • 2022
  • Password with a combination of 4-digit numbers has been widely adopted for various authentication systems (such as credit card authentication, digital door lock systems and so on). However, this system could not be safe because the 4-digit password can easily be stolen by predicting it from the fingermarks on the keypad or display screen. Furthermore, due to the prolonged COVID-19 pandemic, contactless method has been preferred over contact method in authentication. This paper suggests a new password input method based on eyeblink pattern analysis in video sequence. In the proposed method, when someone stands in front of a camera, the sequence of eyeblink motions is captured (according to counting signal from 0 to 9 or 9 to 0), analyzed and encoded, producing the desired 4-digit decimal numbers. One does not need to touch something like keypad or perform an exaggerated action, which can become a very important clue for intruders to predict the password.

Design of Small Space Convergence Locking device Using IoT (IOT를 이용한 소규모 공간의 융합 잠금 장치 제안)

  • Park, Hyun-Joo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.2
    • /
    • pp.45-50
    • /
    • 2021
  • In this paper, we propose the development of a smart space security device that can be opened and closed remotely using IoT. Existing space security devices can control opening and closing by breaking hardware or only using button devices or replicated keys. The recent COVID-19 crisis has created several applications for non-contact devices. In this study, we propose the development of a small space security device that has the function of unlocking through an app without touching the device. By transferring the control authority to a smartphone, device that cannot be opened or closed by only operating hardware at the user's option. It is convenient and hygienic because it can be opened and closed using an app without touching the locking device. Multiple security is possible because security can be released using an app after user authentication by fingerprint recognition and pattern input on a smartphone. If the user wishes, after using the app security, the security is released by directly touching a button installed in the safe or space or opening it with a key. In addition, by adding an inactive function to the app, it is designed so that the door of the safe cannot be opened when the key is lost or the small safe is lost. This study is expected to be able to effectively expand the security system by applying variously to objects that require security.

Study on a New Method for Precise Stop Control of Metro Trains: In Case of Large Speed Error (도시철도 열차 정위치 정차제어의 새로운 방안에 대한 연구: 속도 오차가 큰 경우)

  • Kim, Jungtai
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.591-598
    • /
    • 2021
  • One of the requirements of metro trains is to stop with precision to ensure that the train can stop precisely at the designated location on the platform. If this is not satisfied, interference with the screen door occurs, causing inconvenience to passengers and delays in operation. In the case of an automatic operated train, the current position is determined by the current speed information of the train, and control is performed by issuing an acceleration/deceleration command. Therefore, accurate control becomes impossible if the error of the speed information is large. In metro railroads, a Precision Stop Marker (PSM) is used to correct the position error, so that the error of stop control can be reduced by correcting the position error at a specific point. On the other hand, because the PSM itself has only position information, it does not compensate for the speed error. This paper proposes a method for performing in-place stop control by estimating the speed with the PSM progress information. The speed can be estimated when the train is operated at a constant deceleration speed, and the target deceleration can be obtained to perform stop control. The feasibility and excellence of the proposed method are shown through a numerical simulation.

Privacy protection of seizure and search system (압수수색과 개인정보 보호의 문제)

  • Kim, Woon-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.123-131
    • /
    • 2015
  • Bright development of information communication is caused by usabilities and another case to our society. That is, the surveillance which is unlimited to electronic equipment is becoming a transfiguration to a possible society, and there is case that was able to lay in another disasters if manage early error. Be what is living on at traps of surveillance through the Smart phones which a door of domicile is built, and the plane western part chaps, and we who live on in these societies are installed to several places, and closed-circuit cameras (CCTV-Closed Circuit Television) and individual use. On one hand, while the asset value which was special of enterprise for marketing to enterprise became while a collection was easily stored development of information communication and individual information, the early body which would collect illegally was increased, and affair actually very occurred related to this. An investigation agency is endeavored to be considered the digital trace that inquiry is happened by commission act to the how small extent which can take aim at a duty successful of the inquiry whether you can detect in this information society in order to look this up. Therefore, procedures to be essential now became while investigating affair that confiscation search regarding employment trace of a computer or the telephone which delinquent used was procedural, and decisive element became that dividing did success or failure of inquiry whether you can collect the act and deed which was these electronic enemy. By the way, at this time a lot of, in the investigation agencies the case which is performed comprehensively blooms attachment while rummaging, and attachment is trend apprehension to infringe discretion own arbitrary information rising. Therefore, a lot of nation is letting you come into being until language called exile 'cyber' while anxiety is exposed about comprehensive confiscation search of the former information which an investigation agency does. Will review whether or not there is to have to set up confiscation search ambit of electronic information at this respect how.