Control and Surveillance Secure System on Entrance Gate Based on Wireless Control and Internet
|
|
|
- Bertha Bond
- 10 years ago
- Views:
Transcription
1 Research Journal of Applied Sciences, Engineering and Technology 10(4): , 2015 ISSN: ; e-issn: Maxwell Scientific Organization, 2015 Submitted: February 13, 2015 Accepted: March 1, 2015 Published: June 05, 2015 Control and Surveillance Secure System on Entrance Gate Based on Wireless Control and Internet Mahmoud Shaker Nasr and Ahmed Al-Baghdadi Department of Electrical Engineering, University of Babylon, Hilla, Iraq Abstract: Recently, Iraq suffering a lot of security problem because the traditional methods are applied in security systems in Iraq such as using manual inspection. This method is easy to cheat and breach the security systems which lead to passing cars illegally. Radio frequency identification system technology is employed to increase the accuracy as possible. The proposed system involves two aspects which are hardware and software. The hardware consists of readers, tags, cameras, micro controller, router, four computers, loop detector, traffic light, transmitter and the barrier gate. The software consists of main station program, micro controller program, secondary storage program, secondary display program and website program. The codes are written using C#.NET. Hardware and software work together to support system features. Firstly to increase the security of the system we used double tags (one for driver and another for car). In addition the system is characterized by features like anti-hacker, achieve contact with the traffic police website, record daily reports about each car passing through the gate, monitoring ability via internet, storage all information via internet and mixing between human ability and automatic system by display all information on the computer screen to give human ability to take decision at emergency. The proposed system is implemented practically and tested; the presented results obtained demonstrate that the system has a high reliability. Keywords: Barrier controller, car radio frequency identification, loop detector, passive tag, RFID security system, UHF reader INTRODUCTION Radio Frequency Identification (RFID) is one of important technologies that is used to detect and identify any thing depends on the using tags. The tag is used to transmit information over RFID reader inquiries. RFID tags provide a unique identifier to the reader query by transmit its fixed unique serial number. Each new tag carries only its ID in disguise to avoid eavesdropping and clandestine tracking. On the other hand, the program is responsible for protecting the database information (Cristina, 2009). There are two types of RFID tags: passive and active. Passive tags are powered by the current that the reader s signal induces in their antennas. In an active RFID, the tag has its own power supply. Active systems can transmit for a much longer range than passive and are less error-prone. They are also much more expensive (Tom, 2012). Graphic operations (including public key operations) motivate new RFID applications, including payment instruments and electronic travel documents, (Rishab, 2010). Xiaolong and Uma (2009) write about digital vehicle management system using Radio Frequency Identification (RFID) technology. The digital vehicle management system enhance the utilization of parking space and help user check the availability of the parking space remotely since the system connected with the Internet. There are four stages can describe paper, the first stage consists of embedding the code into a tag and assigning the same to a car. The second stage is reading the RFID tag ID to the microcontroller. In the third stage, the data is uploaded from microcontroller to the Ethernet. The final stage is to keep a track of vacancies of the parking spaces. Pala and Inanc (2007) proposed connection of all parking of the city together by using SQL data base to reduce transaction costs by use of Radio Frequency Identification (RFID) technology in automation. Also each parking make check about the car before give permission to pass. Weinstein (2005) studies the types of RFID systems and applications so offers an RFID tutorial that answers the following questions: What is RFID and how does it work, What are some applications of RFID, What are challenges and problems in RFID technology, How have some organizations implemented RFID. After reviewing the previous papers and research, it is very clear there is a wide different between the theoretical and practical sides were the theoretical side is mostly considered. While in this study the practical side is strongly considered, especially in the field of security. Building a security system has a high efficiency, accuracy and a lot of features. Corresponding Author: Mahmoud Shaker Nasr, Department of Electrical Engineering, University of Babylon, Hilla, Iraq 443
2 In our case study at the University of Babylon, badge checks the information about each car depend on the badge carried by the driver. But this method cause some disadvantage such as high probability of breach it and make crowd of cars because delay of processing also it need a large number policemen to control this process. So it's necessary to find out security system have to become secure, accuracy and fast in processing. Most of these features are existed in RFID technology. The preserve paper introduces an automatic security system for control of car entrance through the main gate of University of Babylon main campus based on RFID technology which is well known one of the new technologies of the identification field. The proposed system mainly consists of two tags one for the car and the other for the driver, barrier gate, loop detector, traffic light, Reader, router, base station (computer), two camera, microcontroller, transmitter unit, website page (msc-rfid.com) and three other computer for better service. Ones the car enter the reading range of reader, the reader send Inquire to the tags in order to read its information, the system decided whether to open the gate or not after check security aspect such as matching between driver tag and car tag. The system takes considerations of security features in order to the entrance of unlicensed prohibit cars. SYSTEM DESIGN AND IMPLEMENTATION Taking Fig. 1 in consideration, the designed system presentation is grouped functionally into five units which are (under observation unit, observing and data transmitting unit, main control unit, transmitting unit and the barrier unit). The details of each unit in two aspects (hardware and software) are presented in the following. Observing and data transmitting unit: The basic function of this unit is to provide interface environment between internet and this security system as described in the following steps. In the first step the information (ID) of each tag exist in the reading rang of the reader is received. The second step involves retransmitting IDs that's received previously to the base station in main control unit. The third step involve share information with the internet for other processing, the information such as name of driver, date of entry, picture of car, picture of driver and other information about car number. Figure 2 represents the interface environment that provides (Observing and data transmitting unit). This unit contains two main part which are Gateway (Router) and Reader. UHF Long Range Integrated Reader was used, it placed on the entrance gate of University. UHF Long Range Integrated Reader reads all identification numbers of tags and sent it again to the base station in the main control unit to complete the sequence of processing. The MR6111E UHF long range integrated reader is used in this security system because it has suitable Features. The reading range was tested according to the specific criteria, height of tag around 1m and height of antenna around 2.3 m. The reading range of tag is around 9 m. This reading range is enough to communicate between tags and reader without need to hang tag outside the car window. So the reader is responsible for provides the link between the tags and the base station of main control unit. The Fig. 1: Proposed RFID security system 444
3 Fig. 2: Observing and data transmitting unit communication between the reader and base station is fully controlled by the base station. The reader receives commands from base station and implements it then returns response to the base station. Aims of the Gateway (Router) are provide wireless connection between reader and base station also provide connection with the internet through the created a global network WAN. The TL-WR940N router from TP-Link Company is used in this system because it has the suitable features. The Ethernet cables are used to connect the parts of observing and data transmitting unit. The first step is connecting the router to the Internet by the Ethernet connecting cable to the WAN slot Input, The second step connect the reader with the router through the pin No. 2 or any other pins in the gateway (Fig. 2). Main control unit: It is the main unit in this security system, it's responsible to control the other parts of system and make most processing that system need. The operation of this unit explained in the following steps, referring to Fig. 3. The first step is receiving the ID of each tag exist in the reading range of the reader, the second step involve make comparison among IDs of the tags and data base, The results of comparisons go to data base in third step in order to fetch information of the car and the driver (such as name of driver, picture of car and picture of car) and fourth step displaying those information on the base station (computer screen). The fifth step involves storage of that information in another computer through internet and my website by using FTP protocol. The sixth step involves take a picture and open the gate. At seventh step that information are displayed on another computer (may be the head of security in university). Generally the main control unit operate on transmit the information to the internet web site, receive information from the internet, transmit data to transmitting unit, process all this information and display the information on two screen (computer screen and other screen via internet) this operation is carried out by the subunit's that will be discussed in details. Cameras: There are two cameras used in this system. The aim of the first one is to monitor the gate region and take a picture to each car passage through the gate. This method of monitoring save a large storage capacity, this lead to storage historical report about each car may reach to dozens of years. The second camera used in control room in order to monitor the in charge person when he decided to open the gate manually (without need tags) because this option is very important. Base station (the computer): It is considered as the heart of the main control unit and all system. The program of base station designed to achieve all the expected security aims. The final shape of the program consists of six tab page (five visible and one hidden). We will describe aim and operation of each page. The first page called HOME page is shown in Fig. 4. The "HOME" page is responsible for some action such as join the system by insert the port number, IP of reader and password. Also the reader start reading state Fig. 3: The operation of main control unit 445
4 Fig. 4: Graphical interface of "HOME" page Fig. 5: View of "SINGLE" page by click on "START" button belongs to this page. The list in the left side used to inform in charge person about what happen in the system (such as success or failure of the process or warning for penetration of the system). In addition to that, the in charge person can open the gate manually by click on "OPEN THE GATE" button after insert right password. "EDIT" button use to showing hidden page (Edit) that will be explained later. At first the password must be entered 446 correctly, if the password is entered incorrectly five consecutive times, the system will be shut down to avoid the process of trial. finally when the car passing through the gate some information appear on this page such as driver's name, Image of car number, Image of car, Image of driver, Identification number of the driver, The phone number of the driver. The second page called "SINGLE" page as shown in Fig. 5. This page responsible for some task which is:
5 Fig. 6: GUI of "SETTING" page read the ID from the single tag present in the reading range of the reader, write the ID to the single tag present in the reading range of the reader, lock any tag by inserts the EPC and unlock any tag by insert the EPC. The third page called "SETTING" page as shown in Fig. 6. This page is responsible for some tasks which are: Identify the version of the reader (It's a way to test data transfer between reader and base station and Identify and set the used power of the antenna (0-31 db). Whenever increases power the reading range of the reader will increase. Some of the registers in the computer is used for the purpose of in-creased speed in system performance. Using these registers increases the processing speed of the data which leads to increase the efficiency of the system but the problem is when formatting computer system and removes all information stored in it causes the loss of stability of the security system. Since the main objective of this study is to implement an integrated security system must solve this problem. We proposed that the collection of all information from the computer and save them in a single file and then be redistributed after the format by click "SET UP REG" button. The security system must be strong in all aspects of security, including protection against hacking, hacking is a process carried out by a person unauthorized to enter into the system and the acts of surveillance and delete files. There is a large number of ways to the process of hacking but all these 447 methods do not work unless there is a file in a computer called hacking file. Hacking file is a file is hiding in certain areas of computer. The hacker can communicate with it for the purpose of control of the computer and control system. When click "SCAN" button, the program searches for a hacking file in the computer, found it and kill it. In case when system is unable to kill the hacking file, it will send sound alarm and text alarm to in charge person. The fourth page called "CHAT" page as shown in Fig. 7. This page is the easiest way of communication between the user and the designer. Writes the problem or whatever he wants to say and then presses Send button, the message goes to the website, This website is designed for the purpose of communicating with the user and helps to solve problems. Web designed by asp.net 2012 language. This website contains a high security features that distinguish it from other websites. asp.net 2012 is advanced language designed by the Microsoft Corporation. This language is used in the design of most of the global government websites at the present time, you can visit our website on the link mentioned above. The fifth page called "REPORT" page as shown in Fig. 8. Here is a presented daily reports on all cars entering and leaving the university with a time of entry and exit of every car as well as provides reports about the person who control the system (the time of entry
6 Fig. 7: Screen of "CHAT" page Fig. 8: View of "REPOTR" page and exit time). All reports are sent to the Website at every change in them. Preview of reports for days of the previous months and years by clicking on the desired date. These reports provide a number of services, security and administrative such as known 448 time entry and exit of each employee. These reports can be printed by clicking the Print button. Page Six is "EDIT" page as shown in Fig. 9. This page appears only if the correct password is entered. Password protected from any operation lead to detect it.
7 Fig. 9: Shows the "EDIT" page Fig. 10: Screen of running the surveillance program Entering the password for five consecutive times cause shut down the system. There are three steps to join a new car with the system. At first chooses the sequence of the car; the second step is insert personal information and car information, the third step Click on "OK". By repeating these three steps, unlimited number of cars can be added. Secondary display subunit: This subunit provides the ability to watch each car passing through the gate and watch daily reports of all cars entering the university. This unit connects with base station via internet so it can works anywhere in the world. The display unit is programmed using c#. Net language as shown in Fig. 10. This program receives images and reports and update automatically in real time and displays it on the screen. The aims of this unit are to monitor the events by the head of security at the university over the Internet. 449 Website: There are three goals of this subunit which make a chat with the base station and receive the reports and pictures to save it for the purpose of storage subunit and control on several systems in same time by lock and unlock the EPC of any car quickly, this point is very important spicily in sensitive time when somebody try to enter University by illegal case. The link of website is User name, password and captcha are needed to open this page as demonstrated in Fig. 11. Storage subunit: The operation of this proposed subunit involves down-loading information from a website, saves it and deletes the data from the Website. The "START" button uses to start the operation of this unit while "STOP" button uses to stop the operation of this unit. The aims of this subunit is to save all the information, images and reports in other computers for
8 Fig. 11: Shows website page Fig. 12: Transmitting unit Fig. 13: Photo of the barrier the purpose of uses it instead of the original information in case of cleared or falsify or destroy the main computer information, also prevent fill the storage capacity of the website. parts which are processor (MCU) and transmitter subunit. The processor subunit used in this system is the Atmel MCU (ATmega328), Command transmitting subunit is used for transmit the command of open gate from the main control unit to gate control unit after making some procedures by the processor. 418 MHZ is used for remote control with distance about 30 m. Figure 12 shows the Transmitting unit. The aim of using coil Loop sensor is to prevent any hit-ting accident between car and barrier arm. If the Coil Loop sensor detects any vehicle under the gate, the barrier arm will go back to vertical position immediately. The barrier and loop detector: The barrier used in this proposed system as shown in Fig. 13. We use this type because it has suitable feathers which are rail lifting time is three second, rail length is three meter, working temperature from -40~70 C, relative humidity 90%, dimension: 350*300*1050 mm and rail material is aluminum alloy. The loop detector put under the street in the gate area to detect the cars and prevent any hitting accident between barrier and car. SYSTEM OPERATION Transmitting unit: The aim of this unit is transmit order to open the gate according to the order from the main control unit. The transmitting unit consists of two 450 Once the car enters the reading range of the reader, some reaction will activate by the system. The system operation can be summarized by the following steps:
9 Reading the information of each tag by the reader and sends this information to the base station (PC). The information about car and its driver appear on the computer screen. Send that information to our website "mscrfid.com" via internet. Display that information on the website page and another computer connected with website. Take a photo of the car and save it with the date of capture. Open the gate and change the color of traffic light to green. Closing the gate after passing the car immediately and change the color of traffic light to red. ILLEGAL EXPECTED SCENARIOS Some of expected illegal scenarios may happen. We will display it in the following and the reaction of our system: If any visitor coming to the university without tags so the in charge person can open the gate manually. If someone stole the tag from the car and try passing through the gate by using the stolen tag, the gate will never open. In other hand when someone stole the two tags one from car and another from the car owner and try to passing, the gate never open because these tags inserted in the black list when the car owner inform the in charge of the system. In special case when the car owner doesn t inform in charge person so the in charge person can notice the information and pictures on the computer screen so he can prevent the gate opening easily. The friendly GUI provides all information to detect any illegal case and give some option to stop that case. If someone try to hacking the computer in order to open the gate illegally. The anti-hacker of our system will work and prevent any external control on the system. In the case when some people get in same car and each one of them have a tag, the protocol programmed in the system can detect which of them is the car owner and record him in the daily report. If someone try to detect the signal connection between the tags and reader and try to make cheat to open the gate. He will never succeed because we are used frequency hopping separate spectrum technology. This technology considered one of the most difficult methods to make communication also it is very secure. SYSTEM FEATURES The proposed system is characterized by the following features: Res. J. Appl. Sci. Eng. Technol., 10(4): , High precision and security. The solution of all illegal expected case was developed Work in real time Friendly GUI system Unlimited number of cars can join the system Using the internet service in the monitoring, control and storage Alert system in the event of an attempt to penetrate the system Storage information about each car passing through the gate The system safe from Hacker attack Check the validity of the car documentation by connection online with the police office via the internet Double tag (one for driver and another for car) System allows five people to control it through five passwords, but watching the periods of entry and exit of every person to the system is to determine the responsibility of each person during the period of his stay RESULTS In this section the results which have been collected from several tests will offered also these results to be discussed from a different aspect in order to explain the advantages of this study. Normal operation test results: When legal car (which carry two matched tags) become near the reader as shown in Fig. 14a, The information on car is showing on the computer screen as shown in Fig. 14b then the gate was opened and the traffic light become green as shown in Fig. 14c, after the car passes completely over the vehicle sensor the gate was closed automatically and the traffic light become red, waiting for another car as shown in Fig. 14d. Illegal cases results: There are two technical reasons to prevent a car from passing through the gate. In relation two cases are presented. Case one (car without tag): When the car doesn't have any tag on it or it has two tags but does not match, the system will not open the gate as shown in Fig. 15. Case two (car in the black list): In this case the car is prevented from passing through the gate because its ID exists in the black list (for example because of security reasons, tag expired, or other reasons). In this case, sound alarm and text alarm appear to alert the in charge person like the test in Fig. 16. Daily report result: Figure 17 shows a photo of the obtained result for the daily report in which all the information of the events in the gate are listed.
10 (a) (b) (c) (d) Fig. 14: Normal operation tests (a) legal car, (b) information of car, (c) opened gate, (d) closed gate and red traffic light Fig. 15: Illegal case result for a car without tag Fig. 16: Illegal case result because of locked ID car (black list) 452
11 Fig. 17: Daily reports CONCLUSION The presented secure system uses two matched tags which increase the security and reliability of the system, while in other systems one tag is used. The proposed system is flexible for any new requirements such as adding new readers, changing the network topology, or updating the GUI. The presented system provides a connection with police office website which adds another level of security to increase overall protection. Also the university head of security can monitor online all the events at gate via the internet. The system provides the necessary reports for security requirements such as a list of the entry cars for the selected date. According to the obtained results, the presented security system is very useful and applicable for the University or other site. The system is implemented practically for the gate in the University of Babylon and tested for different cases. The obtained results demonstrate that the system operates with high reliability. REFERENCES Cristina, T., Development and Implementation of RFID Technology. In-Teh, Vienna, Austria, ISBN: Pala, Z. and N. Inanc, Smart parking applications using RFID technology. Proceeding of the 1st Annual RFID Eurasia. Istanbul, Turkey, pp: 1-3. Rishab, N., Securing personal RFID tags and infrastructures. M.Sc. Thesis, University of California, Irvine. Tom, I., Getting Started with RFID. In: Brian, J. (Ed.), 1st Edn., O'Reilly, Beijing, Köln. Weinstein, R., RFID: A technical overview and its application to the enterprise. IT Professional, 7(3): Xiaolong, L. and K.R. Uma, Design and implementation of a digital parking lot management system. Technol. Interf. J., 10(1):
OPEN PARK. Automatic Number Plate Recognition that works worldwide including Egypt Number plates
Automatic Number Plate Recognition that works worldwide including Egypt Number plates Free subscription lane, ticket dispenser for nonmembers, ticket readers, e- payment with NFC OPEN PARK INTEGRATED PARKING
STATUS POWER MONITOR ALARM SOS DISARM
STATUS POWER MONITOR ALARM SOS DISARM I. Features II. Preparation before use III. Host 1.LED status explanation 2. Host panel IV. System Settings 1. Coding of wireless sensors 2. Exit coding 3. Settings
Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader
Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker
International Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of
WAMLocal. Wireless Asset Monitoring - Local Food Safety Software. Software Installation and User Guide BA/WAM-L-F
Wireless Asset Monitoring - Local Food Safety Software BA/WAM-L-F Software Installation and User Guide System Overview The BAPI Wireless Asset Monitoring Local (WAM Local) Software receives temperature
GPS/SMS/GPRS TRACKER TK103A VEHICLE CAR REALTIME TRACKING DEVICE SYSTEM
GPS/SMS/GPRS TRACKER TK103A VEHICLE CAR REALTIME TRACKING DEVICE SYSTEM This GPS Tracker was specially made for vehicles. It's a new product based on the GSM/GPRS (850, 900, 1800, 1900MHz) network and
www.smarcom.biz BARCODE TICKET SOLUTION RF CARD SOLUTION MAGNETIC TICKET SOLUTION
BARCODE TICKET SOLUTION RF CARD SOLUTION MAGNETIC TICKET SOLUTION C A R PA R K M A N A G E M E N T S Y S T E M C A R Barcode ticket application PA R K M A N A G E M E N T S Y S T E M RF card application
Business/Home GSM Alarm System. Installation and User Manual
Business/Home GSM Alarm System Installation and User Manual Brief Introduction: GSM 900/1800/1900 bands, can be used in most parts of the world Full duplex communication with the host Monitor the scene
A Review of Security System for Smart Home Applications
Journal of Computer Science 8 (7): 1165-1170, 2012 ISSN 1549-3636 2012 Science Publications A Review of Security System for Smart Home Applications Mohammad Syuhaimi Ab-Rahman and Mohd Ariff Razaly Department
Wireless Router Setup Manual
Wireless Router Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA 208-10082-02 2006-04 2006 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR is a trademark of Netgear,
Wireless Alarm system s manual
MOUNTVIEW TECH AUSTRALIA PTY LTD Wireless Alarm system s manual ADS A180 Series ADS Security 1/11/2011 1. Before You Begin For your safety and the safety of others, and to ensure that you get the most
GPS Vehicle and personal location tracker. User manual
GPS Vehicle and personal location tracker User manual 1 Contents 1. Product overview... 2 2. Safety instruction... 3 3. Specification and parameters... 3 4. Getting started... 4 4.1 Hardware and accessories...
mysensors mysensors Wireless Sensors and Ethernet Gateway Quick Start Guide Information to Users Inside the Box mysensors Ethernet Gateway Quick Start
mysensors Information to Users mysensors Wireless Sensors and Ethernet Gateway Quick Start Guide This equipment has been tested and found to comply with the limits for a Class B digital devices, pursuant
Intelligent Home Automation and Security System
Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology
User Manual. Genius GPS / GSM 810 Real Time GPS Tracker. Android App Download. Iphone App Download ENGLISH. Genius Advanced Technologies
Genius GPS / GSM 810 Real Time GPS Tracker User Manual Android App Download Iphone App Download www.geniuscaralarm.com 1 Genius GPS / GSM 810 Real Time GPS Tracker Welcome to use this real time car GPS
Major Risks and Recommended Solutions
Major Risks and Recommended Solutions www.icdsecurity.com OVERVIEW Are you familiar with the main security risks that threaten data centers? This paper provides an overview of the most common and major
Technical Notes TN 1 - ETG 3000. FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?
FactoryCast Gateway TSX ETG 3021 / 3022 modules How to Setup a GPRS Connection? 1 2 Table of Contents 1- GPRS Overview... 4 Introduction... 4 GPRS overview... 4 GPRS communications... 4 GPRS connections...
125 8880 telstra.com/ppmbb visit a telstra store or partner GETTING TO KNOW YOUR
FOR MORE INFORMATIoN: 125 8880 telstra.com/ppmbb visit a telstra store or partner GETTING TO KNOW YOUR Telstra PRE-paid 4G wi-fi LET S GET THIS SHOW ON THE ROad WHAT S INSIDE Your Telstra Pre-Paid 4G Wi-Fi
IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited
(Rev. 1.0) China Aerospace Telecommunications Limited Contents 1. Introduction......3 2. Specifications...4 2.1 External Interface... 4 2.2 Status Indicator...... 5 2.3 Technical Parameters... 6 3. Device
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
Wireless AUTODIAL GSM SMS Home Alarm Security System 900/ 1800/ 1900Mhz(CK-GSM-9003)
CN2HK LIMITED Wireless AUTODIAL GSM SMS Home Alarm Security System 900/ 1800/ 1900Mhz(CK-GSM-9003) User Manual Please read this manual before operating this product. After you finish reading this manual,
Additional Instruction
Additional Instruction Note: a. Please connect the camera with 2.4G WIFI router or Ethernet cable, can t support 5G router. b. For first time wifi connection, please put your mobile close to camera within
Business/Home GSM Alarm systems. Installation and User Manual
Business/Home GSM Alarm systems Installation and User Manual Profile For a better understanding of this product, please read this user manual thoroughly before using it. Business/Home GSM alarm system
GPS GPRS Tracking System
GPS GPRS Tracking System Main Features on GPS device 1. Positioning and Tracking: Locate vehicles and get working status by on-line Positioning Platform or the cell phone at times. You can choose the Positioning
Raghavendra Reddy D 1, G Kumara Swamy 2
Car Accident Detection, Communication And Tracking Using ARM7 Controller Raghavendra Reddy D 1, G Kumara Swamy 2 1 PG Scholar, Dept of ECE, Malla Reddy Engineering College (Autonomous), Hyderabad, India.
Application of Tracking Technology to Access-control System
Hitachi Review Vol. 53 (2004),. 2 83 Application of Tracking Technology to Access-control System OVERVIEW: An access-control system that applies tracking technology to control the movement of people and
USER MANUAL V5.0 VT300
GPS Vehicle Tracker USER MANUAL V5.0 VT300 Updated on 26/12/2008 Contents 1 Product Overview 3 2 For Your Safety 3 3 VT300 Parameters 3 4 Getting Started 4 4.1 Hardware and Accessories 4 4.2 Light and
Automated Security System using ZigBee
IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 01 June 2015 ISSN (online): 2349-6010 Automated Security System using ZigBee Sneha Susan Abraham Saveetha School
Business/Home GSM. Alarm System(III) Installation and Users guide
Business/Home GSM Alarm System(III) Installation and Users guide I. General information: GSM 900/1800/1900 bands, can be used all over the world. Full duplex communication with the base. Monitor environment
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
Are apps available for Virtual Water Assistant? No. We use a mobile website.
What is a battery backup unit (BBU) sump pump? A battery backup unit (BBU) sump pump is a secondary sump pump powered by a 12V deep cycle battery that automatically protects your basement if power goes
TX GSM SMS Auto-dial Alarm System. Installation and User Manual
TX GSM SMS Auto-dial Alarm System Installation and User Manual Product Features: 1. 16 wireless zones, 3 wired zones alarm system, suitable for small to medium size offices and homes. 2. The system uses
DOMUSBOX. User guide. Index
DOMUSBOX User guide Index Introduction... 2 1. Installing SEAV DOMUS... 4 1.1 Activating DomusBox... 4 1.2Drawing the environments in DomusWeb... 5 1.3Connecting DomusBox to the devices...9 1.4Configuration
Enabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
Large residential complex adopts RFID-based VEHICLE TRACKING SYSTEM
Large residential complex adopts RFID-based VEHICLE TRACKING SYSTEM Independent, non-stop system for security, parking and access control Accurate identification of authorized vehicles Automated entry
Users Manual of GSM Home Alarm System with Photo-taken
GSM-IV REMOTE CAMERA MANNAL The Excellent GSM + Camera alarm system bases on the GSM network, integrates the communication technology, can automatic screen a photo with the intruder or burglar, and send
How To Use An Eyefi Card With A Wireless Network On A Iphone Or Ipad Or Ipa (For A Computer) With A Camera On A Blackberry Or Ipo (For An Ipo) With An Eyefi Card
Troubleshoot guide : Eye-Fi Introduction This document will provide information and guidelines to solve problems that may occur when using the wireless Eye-Fi connection. The Eye-Fi card is an SD card
Access Control Software Manual
CONTENTS 1. Function overview...1 2. Installation environment...2 3. Concept description...3 4. Installation and Uninstallation...4 4.1 Installation...4 4.2 Uninstallation...10 5. Function instroduction...11
REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY
Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,
GSM Gate Opener GSM Remote Switch RTU5015 User Manual
GSM Gate, Barrier, Shutter, Garage Door and Door opener Open gate or garage door with a FREE call from your mobile phone! Remote switching machines with a FREE call from your mobile phone! GSM Gate Opener
Privacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
Edge Metrics Data Center User Manual
Edge Metrics Data Center User Manual Introduction EMDC is an Internet based, Facility Access Control Solution for small to medium size businesses, property management firms, schools, religious facilities,
Computer Networking. Definitions. Introduction
Computer Networking Definitions DHCP Dynamic Host Configuration Protocol It assigns IP addresses to client devices, such as desktop computers, laptops, and phones, when they are plugged into Ethernet or
How To Use A Modem On A Pc Or Mac Or Ipad (For A Laptop)
CLEAR MODEM with Wi-Fi USER GUIDE GET TO KNOW YOUR CLEAR MODEM WITH WI-FI 3 WHAT S IN THE BOX? 3 INFORMATIVE LED INDICATORS 3 USE WITH CARE 3 SET UP THE MODEM 4 PLACE THE MODEM ON A FLAT, STABLE SURFACE
System Integration Software
System Integration Software Release Notes for Version 6.0.5 1.0 Compatibility Currently, PC9000 is compatible with the following Radionics control/communicators: D7212, D7412, D7412G D9112, D9412 and D9412G
Crow Limited Warranty. Print Version 017
Crow Limited Warranty (Crow) warrants this product to be free from defects in materials and workmanship under normal use and service for a period of one year from the last day of the week and year whose
PhoneWatch Smart Security System User Manual - Domonial
PW0002 10/13 Customer Support: 1850 753 753 PhoneWatch Ltd., Unit 3/4, Sandyford Park, Burton Hall Rd, Sandyford Industrial Estate, Dublin 18. Email: [email protected] PhoneWatch Smart Security System
HOSTED DESKTOP MANUAL
HOSTED DESKTOP MANUAL TABLE OF CONTENTS REMOTE DESKTOP MANUAL Last revision August 18, 2005 WHAT IS A REMOTE DESKTOP... 1 Security... 1 Terminals...2 SETTING UP YOUR REMOTE DESKTOP... 2 Installing Remote
MICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY
MICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY F. Shawki 1,2, M. El-Shahat. Dessouki 1,3, A. I. Elbasiouny 4, A.N. Almazroui 5, F. M. R. Albeladi 5 1 Assistant Professor, Electrical
Home Security and Control
Bright House Networks Home Security and Control Product Description Table of Contents Introduction... 3 Understanding Basic Security Terms and Functionality... 4 Security Zones... 4 Arming Modes... 4 Arm
GSM ALARM SYSTEM USER MANUAL
GSM ALARM SYSTEM USER MANUAL 1. Instruction The alarm system is based on GSM network. With a GSM SIM card, it can be used wherever you want and no need to connect any wire, which is convenient and easy
GETTING TO KNOW YOUR TELSTRA PRE-PAID 3G WI-FI
GETTING TO KNOW YOUR TELSTRA PRE-PAID 3G WI-FI LET S GET THIS SHOW ON THE ROAD You must be excited about your brand new Telstra Pre-Paid 3G Wi-Fi. This guide will help you get connected as quickly and
IP Wireless / Wired Camera NIGHT VISION & REMOTE PAN/TILT ROTATE. User Manual
IP Wireless / Wired Camera NIGHT VISION & REMOTE PAN/TILT ROTATE User Manual WELCOME This model IP Camera is an integrated wireless IP Camera solution. It combines a high quality digital Video Camera with
Chapter I Model801, Model802 Functions and Features
Chapter I Model801, Model802 Functions and Features 1. Completely Compatible with the Seventh Generation Control System The eighth generation is developed based on the seventh. Compared with the seventh,
FI8910W Quick Installation Guide. Indoor MJPEG Pan/Tilt Wireless IP Camera
Model: FI8910W Quick Installation Guide (For Windows OS) (For MAC OS please go to page 17) Indoor MJPEG Pan/Tilt Wireless IP Camera Black White Package Contents IP Camera FI8910W with IR-Cut.x 1 DC Power
Software version 1.1 Document version 1.0
Software version 1.1 Document version 1.0 1 RDNET PROTOCOL OVERVIEW... 2 1.1 Network description... 2 1.2 Connection topology... 2 2 SOFTWARE BASIC OPERATIONS... 3 2.1 Main View elements... 3 2.2 Scanning
LA-9011 GSM/GPS Tracker User Manual
LA-9011 GSM/GPS Tracker User Manual GSM/GPS Tracker A GSM and GPS Tracking solution to locate and track the whereabouts of your vehicle in real time via the Internet on a computer or Smart phone. The device
Knowledge Base Article. Integrating ISONAS Access Control System with TagMaster LR-series RFID Readers
Knowledge Base Article Integrating ISONAS Access Control System with TagMaster LR-series RFID Readers Copyright 2009-2012, ISONAS Security Systems All rights reserved Table of Contents 1: INTRODUCTION...
Collided Vehicle Position Detection using GPS & Reporting System through GSM
Collided Vehicle Position Detection using GPS & Reporting System through GSM M.M.Raghaveendra 1, N.Sahitya 2, N.Nikhila 3, S.Sravani 4 1 Asst.Professor ECE Department, 2 Student, 3 Student, 4 Student,
GSM Gate Opener GSM Remote Switch RTU5015. User Manual. Ver 1.3 Date Issued: 2010-08-18. All rights reserved by King Pigeon Hi-Tech. Co., Ltd.
GSM Gate, Barrier, Shutter, Garage Door and Door opener Open gate or garage door with a FREE call from your mobile phone! Remote switching machines with a FREE call from your mobile phone! GSM Gate Opener
«Intellect» software system
AxxonSoft «Intellect» software system Detector Pack: User s Manual Version 1.1 Moscow 2012 1 Contents CONTENTS... 2 1 INTRODUCTION... 3 1.1 General information... 3 1.2 Purpose of the document... 3 1.3
AEI RAIL NETWORK SERVER User Manual
AEI RAIL NETWORK SERVER User Manual Copyright 2000 Signal Computer Consultants All rights reserved Signal Computer Consultants P.O. Box 18445 Pittsburgh, PA 15236 Tel. 888 872-4612 (toll free US and Canada
Home alarm system. User s manual. Profile To better understand this product, please read the user s manual carefully before using.
Home alarm system User s manual Profile To better understand this product, please read the user s manual carefully before using. Features; 1. 1-99 LED wireless defense zone, with digital number to show
APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS
APPLICATION NOTE Contents The DMP Software Family... 1 Stand-Alone Link Software... 1 Add-on Modules for Link Software... 1 System Link End-User Panel Management Software... 2 Simple Registration and Activation...
FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS
FLEET MANAGEMENT & CAR SECURITY SYSTEM FOR PROVIDERS AND CUSTOMERS The Tracker Server Communication Program for data collection The Tracker Client Map Program intended for dispatching desks The GSM/GPRS
Ticket Reader with real time clock and magnetic encoding
Ticket Reader with real time clock and magnetic encoding Order number: TL-31 The Ticket Reader TL 31 consists of the multifunctional MODPARK ticket modules integrated into a housing, which is well suited
CDW Advanced Image Deployment Service Customer Guide
CDW Advanced Image Deployment Service Customer Guide Contents Service Description... 2 Image Deployment Solutions... 2 Why would my organization use this service?... 2 Benefits of Advanced Imaging over
Business/ Home GSM Alarm System
Business/ Home GSM Alarm System BUSINESS/HOME GSM ALARM SYSTEM POWER STATUS RECORD SIGNAL User Manual Profile For a better understanding of this product, please read this user manual thoroughly before
Networking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples
Networking General networking Networking overview A network is a collection of devices such as computers, printers, Ethernet hubs, wireless access points, and routers connected together for communication
1. Make sure that no client accounts are open. 2. Click on Setup, then click Modem. The Modem Setup window will appear.
SECURITY SYSTEM MANAGEMENT SOFTWARE FOR WINDOWS WINLOAD MODEM SETUP The modem setup is a very important step in the connection process. If the modem setup is not properly completed communication between
Error! Bookmark not defined. Error! Bookmark not defined. Error! Bookmark not defined.
Remote Lighting Kit Table of Contents Lighting Kit Overview 2 System Requirements 3 Basic Concepts of Wireless Routers and Networks 4 Basic Concepts of Network Light Bulbs 8 Planning Your Lighting Network
USER MANUAL V5.0 ST100
GPS Vehicle Tracker USER MANUAL V5.0 ST100 Updated on 15 September 2009-1 - Contents 1 Product Overview 3 2 For Your Safety 3 3 ST100 Parameters 3 4 Getting Started 4 4.1 Hardware and Accessories 4 4.2
WUA-1610, WUA-1610H. 300Mbps Wireless USB Adapter. User Manual V1.0
WUA-1610, WUA-1610H 300Mbps Wireless USB Adapter User Manual V1.0 Table of Contents Chapter 1 Introduction... 1 1.1 PACKAGE CONTENTS... 1 1.2 PRODUCT FEATURES... 1 1.3 LED INDICATOR DESCRIPTION... 2 1.4
GETTING TO KNOW YOUR PRE-PAID TELSTRA WI-FI 4G
GETTING TO KNOW YOUR PRE-PAID TELSTRA WI-FI 4G LET S GET THIS SHOW ON THE ROAD You must be excited about your brand new Pre-Paid Telstra Wi-Fi 4G. This guide will help you get connected as quickly and
Parking. Management System: Our Strengths are: Advanced Technology Excellent Versatility Great Simplicity Wide Range Local Maintenance
Parking Management Systems For more than 20 years Somfy SACS has car park automation. We design and produce advanced systems for automatic management of all types of car parks offering end to end services.
High-speed mobile Surveillance in outdoor WiFi Mesh network transmission system planning description
High-speed mobile Surveillance in outdoor WiFi Mesh network transmission system planning description --Applied to the important places (places of demonstration) / abnormal sexual activity area / temporary
A guide to access control for manufacturing sites
A guide to access control for manufacturing sites What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round
Ultra Thin Client TC-401 TC-402. Users s Guide
Ultra Thin Client TC-401 TC-402 Users s Guide CONTENT 1. OVERVIEW... 3 1.1 HARDWARE SPECIFICATION... 3 1.2 SOFTWARE OVERVIEW... 4 1.3 HARDWARE OVERVIEW...5 1.4 NETWORK CONNECTION... 7 2. INSTALLING THE
International Journal of Software and Web Sciences (IJSWS) www.iasir.net. GPS and GSM Based Database Systems for User Access
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
Version:G300 V2.0 11.04. Business/Home GSM Alarm System. Installation and Users' Guide. ( 99 wireless zones)
Version:G300 V2.0 11.04 Business/Home GSM Alarm System Installation and Users' Guide ( 99 wireless zones) Brief Introduction: GSM 850/900/1800/1900 bands, can be used in most parts of the world Full duplex
SA-9600 Surface Area Software Manual
SA-9600 Surface Area Software Manual Version 4.0 Introduction The operation and data Presentation of the SA-9600 Surface Area analyzer is performed using a Microsoft Windows based software package. The
RX-6 Six In - One Out All in One Receive Antenna Switch Local and Remote Control System RX6ACI User Manual Version 2.1
Universal Device Control Systems www.udcsys.com RX-6 Six In - One Out All in One Receive Antenna Switch Local and Remote Control System RX6ACI User Manual Version 2.1 May, 2014 Universal Device Control
Quick Installation Guide
V2.01 Model: FI9821W Quick Installation Guide Indoor HD Pan/Tilt Wireless IP Camera Black White For Windows OS ------- Page 1 For MAC OS ------- Page 16 ShenZhen Foscam Intelligent Technology Co., Ltd
Access Control in Surveillance Station 7.0
Access Control in Surveillance Station 7.0 With Axis Network Door Controller A1001 Synology Inc. Synology_ACISS_20150305 Table of Contents Chapter 1: Introduction... 3 1.1 What Is Access Control?... 3
TRACKING AND SECURITY SYSTEM
TRACKING AND SECURITY SYSTEM WHAT IS PERGO? Pergo is the security system software and hardware developed in Turkey by Turkish engineers, which has special capabilities to identify the location of any attached
1 ELGOTEAM ADVANCED SECURITY SYSTEMS Bi-directional spike barrier. Bi-directional spike barrier Customer Information packet
1 Customer Information packet For more information: [email protected] www.elgoteam.com 2 Chapter contents Subject Page number The company 3 Background 4 Applications 5 Advantages 6 Operating positions
Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.
Important Please read this User s Manual carefully to familiarize yourself with safe and effective usage. About This Manual This manual describes how to install and configure RadiNET Pro Gateway and RadiCS
V2.0 Attendance System Hardware Suite Guide Instructions Manual
CONTENTS TA920 V2.0 Attendance System Hardware Suite Guide Instructions Manual Chapter One - Introduction 1.1 Communication Port 5 1.2 Power Source Control. 5 1.3 Attendance Users. 6 1.4 Registering Ways..
Access Control and Audit Trail Software
Varian, Inc. 2700 Mitchell Drive Walnut Creek, CA 94598-1675/USA Access Control and Audit Trail Software Operation Manual Varian, Inc. 2002 03-914941-00:3 Table of Contents Introduction... 1 Access Control
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
Middleborough Police Electronic Security Narrative
Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of
How To Control A Car Alarm On A Car With A Remote Control System
MODEL CA100 REMOTE CONTROL AUTO ALARM SYSTEM INSTALLATION & OPERATION INSTRUCTIONS WIRING DIAGRAM Black Antenna Wire 6 Pin 6 Pin Mini Connector Valet Switch Blue LED Indicator Blue Wire: (-) 200mA Unlock
Car Alarm Tracker Manual-20150814
CCTR-922 Car Alarm Tracker Manual-20150814 Welcome to use this GSM car alarm with tracker function CCTR-922. this product use 2G GSM network (LBS locate) to locate the car, it has many new and unique functions,
WITURA CORPORATION SDN BHD
WT 1010SA Stand Alone GSM Alarm System User Manual and Installation Instructions Version: 1.2 Updated: 4 JAN 2012 WITURA CORPORATION SDN BHD Stand Alone GSM Alarm System Instruction Manual 1 Introduction:
(606) 785-3450 Knott County (606) 439-3167 Perry County (606) 633-0778 Letcher County. [email protected]
TVS CableNet Technical Support Guide Effective August 15, 2006 All materials 2006 TV Service, Inc. This material may not be reproduced in any form except for personal private use by TV Service Cable Internet
Installation Instructions
Installation Instructions For WiFi/LAN Video Intercom Manual Version 2 BFT Americas 6100 Broken Sound Parkway N.W. Suite 14, Boca Raton, FL 33487 www.bft-usa.com Toll Free: 877-995-8155 Office: 561-995-8155
PageR Enterprise Monitored Objects - AS/400-5
PageR Enterprise Monitored Objects - AS/400-5 The AS/400 server is widely used by organizations around the world. It is well known for its stability and around the clock availability. PageR can help users
MAGICAR M871A. Car alarm with two-way remote User s guide
MAGICAR M871A Car alarm with two-way remote User s guide EN MAGICAR M871A Car alarm with two-way remote User s guide TABLE OF CONTENTS Table of contents...2 1. Important notice...4 2. Introduction...4
