IT-Based Safety and Security Solutions for Schools
|
|
|
- Roland Morton
- 10 years ago
- Views:
Transcription
1 IT-Based Safety and Security Solutions for Schools V Atsushi Horiguchi V Kazuhisa Shibafuji V Kenichi Ota (Manuscript received December 8, 2006) The number of violent crimes against children has increased in recent years. Various measures have been taken by schools and communities, for example, the deployment of security sensors, surveillance cameras, guards, and local residents patrols; however, these measures have not been very effective. The key to protecting children is being able to quickly locate them. School administrators at least need to know the arrival and departure times of their students. In addition, rapid transmission of information about local areas, for example, the sighting of suspicious persons, and other messages from schools has become more important for ensuring a safe social environment. The demand for IT-based support for safety and security in society will continue to grow. This paper outlines the Students Arrival/Departure Notification Service, which is based on radio frequency identification (RFID) tags, and the School Communication Network Service, which is based on . It also describes how these services, which are currently available only in Japan, have been developed. 1. Introduction According to a report by the National Police Agency in Japan, the number of crimes that occurred at schools increased from in 2001 to in 2003, indicating a growth rate as high as 12%. This increase is expected to continue. 1) Particularly, several violent crimes against children, including fatal attacks have increased the demands for safety and security measures both inside and outside schools. Many kinds of measures have been taken, for example, guards posted on school grounds, monitoring of unauthorized entry by infrared sensors, and surveillance cameras. Accurate knowledge of the arrival and departure times of students and emergency communications with parents are crucial to preventing and responding to incidents. Currently, school staff meet these requirements through visual checks and telephone communication. However, the Act on the Protection of Personal Information went into effect in April 2005, and as a result, parents telephone numbers and addresses are now regarded as personal information under the law and it has become difficult to implement traditional telephone-contact networks. Therefore, to ensure efficient school operations and safety and security for parents, 2) we have developed two types of services, and these services are already in operation. The services are the Students Arrival/Departure Notification Service, 3) which uses active radio frequency identification (RFID) tags, and the School Communication Network Service, 4) which sends notifications to parents. This paper describes how these services were developed and gives an overview of them. 2. How the services were developed With the recent increase of fatal attacks FUJITSU Sci. Tech. J., 43,2,p (April 2007) 227
2 inside and outside of schools, it has become a big challenge to protect children commuting to and from school. One of the most important operations for school administrators is the monitoring of their students arrivals and departures. A sign that parents are more anxious about their children s secure arrival and departure is the greater number of inquiries they make to schools. These days, school staff have to spend a lot of time answering phone calls from worried parents. Since the enactment of the Act on the Protection of Personal Information, some parents have refused to make their phone numbers known to school staff. This causes various problems, for example, it takes a long time for schools to send information to every parent and information becomes inaccurate as it is passed between parents who cannot be directly contacted. It also takes a long time for the boards of education of local governments to distribute information to schools and parents under their jurisdiction because of their hierarchical structures. Against this background, the demand for rapid and accurate information distribution has increased. We interviewed parents and school staff on many occasions and found they have three main requests: 1) Teachers want to reduce administrative work and concentrate on children s education as much as possible. 2) Administrators want to monitor students arrival and departure times at the school gate. They also want to be able to send messages to parents and confirm they have received the messages. 3) Parents want to know their children s arrival and departure times in real-time. Usually, school staff members are busy and do not have much time to spend on system administration work. Installing a new system places a heavy workload on school staff. Also, it is necessary to provide installation spaces for equipment and train system operators, so there is a delay between installation and operation. 3. Features of services The Students Arrival/Departure Notification Service and the School Communication Network Service have the following features. 3.1 Students Arrival/Departure Notification Service 1) In this service, active RFID tags are attached to students bags or other personal items. The students can then be detected by the RFID reader just by walking past it without making physical contact. 2) The RFID reader can detect multiple students with tags simultaneously. 3) School staff can easily rewrite the ID information in cases of lost RFID tags and student transfers. 4) The tags use a readily available battery that has a 12-month life and can easily be replaced at home. 5) The RFID tags contain no information about the students. Therefore, lost or stolen tags do not represent a security threat. 6) Parents can check their children s arrival and departure times using a Website and School Communication Network Service 1) School staff can distribute information simultaneously to every parent. 2) Information distribution via speeds up communication. 3) Because message reception can be confirmed with reply s, school staff can determine which parents have not received or read a message. 4) Information distribution via enables communications to be handled by all mobile carriers. 5) Messages can be sent from not only an administrator s PC but also a mobile phone. 228 FUJITSU Sci. Tech. J., 43,2,(April 2007)
3 Both services can be provided via an application service provider (ASP), which allows users to reduce their system administration load. 4. Students Arrival/Departure Notification Service In the Students Arrival/Departure Notification Service, students carry active RFID tags to record the exact time when they enter and exit the school gate and a camera takes video images of them. Parents can receive the arrival and departure information for their children via (Figure 1). The service is outlined below. 1) RFID tag selection RFID is the generic name for wireless data identification technology. It can identify information about a person or object without the need for physical contact. Systems that use RFID tags consist of a tag that can store electronic information and a reader that can read and write information from and to the tags. Each RFID tag has a memory chip and a small built-in antenna for exchanging information with the reader. The communication range of an RFID tag system depends on the type of system and the operating frequency (Table 1). There are two types of RFID tags: passive and active. Passive RFID tags obtain their electrical power from the radio waves transmitted from the reader. Active RFID tags obtain their electrical power from a built-in battery. Passive RFID tags have a short communication range and therefore need to be held close to the reader to be scanned. Active RFID tags, on the other hand, have a communication range of up to 10m (Figure 2). We selected active RFID tags because 1) we considered that if students had to bring their tags School staff Elementary and junior high schools Security camera sees at a glance who has arrived or left or when a specific student arrived or left. Tag reader Arrival/departure information Arrival/departure data Records students who enter or exit school gate Security camera Fujitsu System Center Home Web Parent xxxxx xxxxx xxxxx Incoming mail 2004/04/09 From Elementary School Notification of school departure time Toru Fuji left school at 15:28:03. [Supported carriers] DoCoMo au SoftBank Tu-Ka WILLCOM Outside home Tag Detects students who enter or leave school gate Tag Confirms arrival or departure of their children Arrival/departure information Web Grade 6, Class 3 No. Name Arrival Departure Toru Fuji 07:34:15 15:28:03 Figure 1 Overview of Students Arrival/Departure Notification Service. FUJITSU Sci. Tech. J., 43,2,(April 2007) 229
4 Table 1 RFID tag features. Frequency band 135 khz or lower MHz 300/400 MHz 800/900 MHz 2.45 GHz Communication type Communication range Characteristics Remarks Electromagnetic induction Radio wave Several cm 70 cm 15 m 8 m 2 m No battery required but shorter communication range No battery required but shorter communication range Shorter communication range but transmission pattern is omnidirectional. Great flexibility in tag shape. 400 MHz system operates in ham radio band 3 m or less according to restriction to be established Interferes with wireless LANs Longer communication range Band adopted RFID tag communication method Passive tag Active tag Radio wave Built-in cell Tag Reader/writer Tag Reader/writer Generation of electricity Radio wave (information) Wireless wave (information) Uses radio wave from reader/writer as energy source instead of built-in battery and returns tag information to reader/writer. Emits radio wave using built-in battery and returns tag information to reader/writer. Communication range Short to medium (up to 60 cm) Communication range Long (up to 10 m) Battery or charge No Battery or charge Yes Downsizing Enabled Downsizing Limited due to built-in battery Read performance One data item at a time Read performance More than one data item at a time Price Low to medium Price High Example Edy card Example Car keyless entry system Figure 2 Passive and active tags. 230 FUJITSU Sci. Tech. J., 43,2,(April 2007)
5 close to the reader, they would regard it as an imposition, which would be detrimental to their education, and 2) it is necessary to be able to simultaneously scan multiple students with unpredictable movements. 2) Radio communication method Before implementing active RFID tags, we examined which was the most appropriate radio communication method for detecting the arrivals and departures of multiple students passing through a school gate. Active RFID tags use one of two modulation methods: frequency shift keying (FSK) or amplitude shift keying (ASK). While the FSK method has the advantages of good noise immunity, stable operation, and a predictable battery life, it has the disadvantage of high power consumption. The ASK method has a long battery life but poor noise immunity and an unpredictable battery life because its radio output power gradually decreases. The tag batteries must provide stable operation for more than a year because most schools have yearly entrance and graduation ceremonies and class recompositions. Therefore, the ASK method was selected. This method is more suitable for capturing students movements because it performs communications between the reader and tags more frequently. However, this shorter interval reduces the battery life and also places a heavier ID recognition load on the system. On the other hand, if the communication interval is too long, the system might not be able to capture the students movements, especially if they are running. Consequently, we chose an optimum communication interval based on the results of demonstration experiments. 3) Antenna installation The weak radio signals from the students tags are directional due to the students bodies. In addition, because 20 to 30 students might consecutively or concurrently pass through the school gate, the reader s antennas must be able to receive radio waves from all directions. The frames of school gates were investigated, and experiments were conducted to determine the optimum locations for antennas. Preliminary surveys are needed before installing the antennas because the installation conditions differ from school to school. The system is designed so it can detect 50 tags per second. We chose this level of performance after carefully considering the antennas, readers, and mode of use based on several in-depth preliminary surveys. 4) Notification to parents When students carrying RFID tags pass through a school gate with a reader, the information is reported to parents using . This information can be confirmed on a Website. Parents can access the Website with an ID and password to confirm the arrival and departure times of their children. Parents can specify up to three addresses to which information is sent and change them as required on the Website. This arrangement reduces the burden on school staff because it would be difficult for them to quickly update the address database if parents often change their addresses (e.g., to avoid spam). However, because the staff do not manage parents addresses, the parents must check for undelivered messages based on the send logs on the Website and then correct their addresses if they are incorrect. 5) Operation management at schools School staff can check the arrivals and departures of students on the Website. School staff can manually input the arrival times of students who have left their tags at home and send the information to parents using . Images taken by security cameras installed at the school gate are accumulated, and the images of several seconds or minutes before the students arrivals and departures can be displayed for confirmation. 6) Information security The RFID tags carry no information except a tag ID code, and the codes are matched to FUJITSU Sci. Tech. J., 43,2,(April 2007) 231
6 students within the database. The database servers include a mail server and a Web server to assure high security. Each tag is given a unique ID when it is manufactured, and if students report they have lost their tags, the school staff delete the tags IDs and give the students new tags. 5. School Communication Network Service The School Communication Network Service enables communication between a board of education and a school and between a school and parents as an alternative to telephone communication. This service provides interactive information exchange to confirm the reception of transmitted messages (Figure 3). 1) Setting user authorities There are various levels of user authority, for example, operations manager authority and parent authority. Operations managers manage all the information in the database, but parents can only view their own information. User authorities can be grouped according to the organization structures of schools and boards of education. For example, a school district, school, grade, class, or club can be selected depending on the information to be distributed. 2) Send operation Information can be sent using the PC or mobile phone Website (Figure 4). Users can set information using the same procedure as for entering messages. To avoid misunderstanding about messages, answer-selection type reply requests can be created. 3) Receipt confirmation with reply To confirm message reception, the receivers send a reply and the administrators manage the reply logs. School School staff Interactive Fujitsu System Center Parent Interactive Outside home Incoming mail 05/10/20 12:23 From School Notification of school closing Typhoon is coming. Afternoon classes will be cancelled. Students will concurrently go home. Outside school Outgoing mail 05/10/10 15:23 To School Confirmation of attendance of parent meeting Please reply to this message to confirm your attendance of parent meeting on October 25 (Tue.) School staff Notification of school events PTA meeting, classroom visits, athletic meet, etc. Confirmation of attendance via Emergency contact Contact at disaster Confirmation of safety Providing information about suspicious persons, etc. Home [Supported carriers] DoCoMo au SoftBank Tu-Ka WILLCOM Figure 3 Overview of School Communication Network Service. 232 FUJITSU Sci. Tech. J., 43,2,(April 2007)
7 Example of sending from PC Website Example of sending from mobile phone qselect with or without answer request. wselect fixed phrase. ecreate answer selection-type mail (optionally). UP to five items can be set. rselect destination group. Send mail 04/12/8 10:30 Title:anpi/A Communication network This is an urgent message. Please send a reply if everything is OK. Send a message if any. School, Grade, Class - end - Can be sent from outside qdestination address wspecified command etitle rmessage text tsender tset send count. ypress confirm button. Entering above items sends the same school communication network mails as those on PC Website. Figure 4 sending screen of School Communication Network Service. Because of the possibility of weak signals, non-functioning mobile phones, and changed addresses, the send logs alone cannot be used to confirm whether a message has been correctly sent and received. Therefore, the users can send a reply to confirm they have received an and also answer any questions the administrators may have asked in it. For example, when a sender distributes a message asking for attendance to a meeting, a receiver can enter text indicting, for example, that the receiver will attend but will be slightly late. This makes it easier for the sender to manage attendance. Message reception can be confirmed with reply mails on the PC or mobile phone Website (Figure 5). The PC Website displays a color-coded chart that indicates which receivers will attend and also displays the receivers reply s, which enables rapid confirmation of the communication status. It also provides the aggregate results for answer-selection type s, which reduces the aggregation load. 6. Provision as ASP services and implementation effects The systems for the Students Arrival/ Departure Notification Service and School Communication Network Service are hosted in the Fujitsu System Centers and are provided as ASP services. The need to protect personal and administrative information puts a great burden on school operations. Therefore, to ease this burden, the Fujitsu System Centers provide high-security services for managing this information. In one school, the Students Arrival/ Departure Notification Service has reduced administrative work by about 40 hours a month, and the staff greatly appreciate this improvement in efficiency. Many parents also appreciate the service because it allows them to confirm the arrival and departure times of their children in real time. 5) The School Communication Network Service is increasingly being used for regular communication as well as in emergency situations. This service has been effectively used as an applica- FUJITSU Sci. Tech. J., 43,2,(April 2007) 233
8 After communication is sent, the following screen appears. Receipt result confirmation screen on PC Website Send of search Automatic reflection of reply information Beginning at the top New reply received Receipt confirmed Entered by proxy No reply Proxy entry Reply message confirmation Status confirmation result Send 04/01/22 20:30 Title: anpi/s School, Grade, Class (blank) Sending search confirms reply information. Information search result screen Receipt 04/01/22 20:30 Title: Search result Class: School, Grade, Class Starting date: End date: Receipt status (2/3) Reply information Taro Fujitsu result Saburo Fujitsu Jiro Fujitsu Entry of confirmation of receipt with other than reply Confirmation of overall reply message CSV output Free edit and aggregation enabled ( : With reply of receipt, : Without reply of receipt) Figure 5 Screen of confirmation by reply for School Communication Network Service. tion service for broader purposes. 7. Conclusion This paper outlined the Students Arrival/ Departure Notification Service for increasing children s safety when they are commuting to and from school and the School Communication Network Service for supporting smooth communication. In the future, it will be essential to provide these services in conformity with the individual school environments and operation needs and also carefully consider safety and security. Above all, the key concept of IT-based support for safety and security will be further emphasized. Fujitsu supports various safety solutions other than the services described in this paper. We have provided many of them to clients from different industries and have had many excellent results. Fujitsu will continue to develop its safety and security solutions business as a solution vendor that supports the social infrastructure. References 1) National Police Agency : Criminal Statistics in (in Japanese), ) Fujitsu Website introducing safety measure solutions. (in Japanese). index.html 3) Fujitsu Website introducing the Students Arrival/Departure Notification Service. (in Japanese). service07.html 4) Fujitsu Website introducing the School Communication Network Service. (in Japanese). service06.html 5) M. Sato et al.: Safety Measure Systems for Monitoring Each Student Commuting to/from School.(in Japanese), FINIPED, 5, p (2004). 234 FUJITSU Sci. Tech. J., 43,2,(April 2007)
9 Atsushi Horiguchi, Fujitsu Ltd. Mr. Horiguchi received the B.E. degree in Architecture from Meiji University in He joined Fujitsu Ltd. in 1991, where he has been engaged in the planning and development of safety and security solutions. Kenichi Ota, Fujitsu Ltd. Mr. Ota received the B.E. degree in Electric Engineering from Tohoku Gakuin University in He joined Fujitsu Ltd. in 1993, where he has been engaged in the planning and development of safety and security solutions. Kazuhisa Shibafuji, Fujitsu Ltd. Mr. Shibafuji received the B.E. degree in Architecture from Kanagawa University in He joined Fujitsu Ltd. in 1980, where he has been engaged in the planning and development of safety and security solutions. FUJITSU Sci. Tech. J., 43,2,(April 2007) 235
Secure Active RFID Tag System
Secure Active RFID Tag System Isamu Yamada 1, Shinichi Shiotsu 1, Akira Itasaki 2, Satoshi Inano 1, Kouichi Yasaki 2, and Masahiko Takenaka 2 1 Fujitsu Laboratories Ltd. 64 Nishiwaki, Ohkubo-cho, Akashi
Application of Tracking Technology to Access-control System
Hitachi Review Vol. 53 (2004),. 2 83 Application of Tracking Technology to Access-control System OVERVIEW: An access-control system that applies tracking technology to control the movement of people and
Evolving Bar Codes. Y398 Internship. William Holmes
Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved
REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY
Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,
Technologies Supporting Smart Meter Networks
Technologies Supporting Smart Meter Networks Isamu Kitagawa Shinichi Sekiguchi The power crisis that Japan confronted in the wake of the Great East Japan Earthquake in 2011 underscored the need for managing
International Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
Wearable Finger-Braille Interface for Navigation of Deaf-Blind in Ubiquitous Barrier-Free Space
Wearable Finger-Braille Interface for Navigation of Deaf-Blind in Ubiquitous Barrier-Free Space Michitaka Hirose Research Center for Advanced Science and Technology, The University of Tokyo 4-6-1 Komaba
How To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
Using RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual
Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2 Instruction Manual Firmware version: 2.0.1 Issue: 0.6 Version of the GPRS transmitters configurator: 1.3.6.3 Date of issue: 07.03.2012 TABLE OF CONTENTS
Assets Location Management Solution Based on the Combination of SmartLocator and RFID
Assets Location Management Solution Based on the Combination of SmartLocator and RFID HASHIMOTO Naohisa, ISSHIKI Naoki, IGUCHI Masao, MORISAKI Mitsunori, ISHII Ken'ichi Abstract This paper introduces the
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
DT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch
DT3: RF On/Off Remote Control Technology Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch Agenda Radio Frequency Overview Frequency Selection Signals Methods Modulation Methods
Communication/Internet Operation Manual
Communication/Internet Operation Manual To ensure correct use of your camera, read this manual carefully before use. Keep the manual handy for future use. Introduction Thank you for purchasing a Ricoh
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
Vesta Visual Verification Alarm System - MJ Series. Keeping Home in Sight on Your Smartphone
Vesta Visual Verification Alarm System - MJ Series Keeping Home in Sight on Your Smartphone A paradigm of simplicity and convenience Climax s MJ control panel series sets up a complete security network
Introduction Ericsson Handheld Telephone 1341-B
Ericsson Handheld Telephone 1341-B 2 Contents General 5 The Mobile Telephone Network 6 Base Station and Cell 7 Radio Channels 7 Radio Coverage 8 Transmission Control and Communication 9 Quality Control
AUDIENCE MEASUREMENT SYSTEM BASED ON BLUETOOTH CORDLESS COMMUNICATION
21 22 September 2007, BULGARIA 113 Proceedings of the International Conference on Information Technologies (InfoTech-2007) 21 st 22 nd September 2007, Bulgaria vol. 2 AUDIENCE MEASUREMENT SYSTEM BASED
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/
Passive RFID Solutions for Asset Tracking and Inventory Management
Passive RFID Solutions for Asset Tracking and Inventory Management Introduction: In the present context of business, it is becoming essential for the business world to provide electronic commerce in addition
Data Transmission. Data Communications Model. CSE 3461 / 5461: Computer Networking & Internet Technologies. Presentation B
CSE 3461 / 5461: Computer Networking & Internet Technologies Data Transmission Presentation B Kannan Srinivasan 08/30/2012 Data Communications Model Figure 1.2 Studying Assignment: 3.1-3.4, 4.1 Presentation
Active RFID Solutions for Asset Tracking and Inventory Management
Active RFID Solutions for Asset Tracking and Inventory Management Introduction RFID (Radio Frequency Identification) technology is fast replacing ScanCode technology for asset tracking and inventory management.
AutoPay 80. Ticketer and paying machine
AutoPay 80 Ticketer and paying machine The exclusive-looking designed wall mounting ticketer and paying machine primarily used for the smooth service of clients at frequented service centres, the automatic
School Management Tracking Solutions Bus Fleet Management. www.geomama.com
School Management Tracking Solutions Bus Fleet Management GeoMama School Management System is developed for ensuring the highest standards of safety & ease for the school transportation sector. The proposed
Remote Monitoring of Livestock Wireless and the Wii Improving Livestock Welfare
Remote Monitoring of Livestock Wireless and the Wii Improving Livestock Welfare Ian McCauley Greg Cronin Michelle Watt Samantha Borg Future Farming Systems Research, DPI Vic Outline Wireless Technologies
EyeVision. Neo. General Guidance. Total Visual Communication System. Enwa Co.,Ltd IT Project Division アイ ビジョン
Total Visual Communication System. EyeVision アイ ビジョン General Guidance Neo ネオ ENWA Co., Ltd. Kuga North Bldg. 8F, 2-1-11 Kitahorie, Nishi-ku, Osaka, 550-0014 Japan TEL: +81-6-4390-3522, FAX: +81-6-4390-3523
Data Transfer Technology to Enable Communication between Displays and Smart Devices
Data Transfer Technology to Enable Communication between Displays and Smart Devices Kensuke Kuraki Shohei Nakagata Ryuta Tanaka Taizo Anan Recently, the chance to see videos in various places has increased
ÇANKAYA ÜNİVERSİTESİ ECE 491 SENIOR PROJECT I 11111 ERDİNÇ YILMAZ 200614038
ÇANKAYA ÜNİVERSİTESİ ECE 491 SENIOR PROJECT I 11111 200614038 1 Project Name : Sensor Network System Project company : ROBUTEL Contact : www.robutel.com Project instructor : Yrd. Doç. Dr. Orhan GAZİ Contact
Communication/Internet Operation Manual
Communication/Internet Operation Manual To ensure correct use of your camera, read this manual carefully before use. Keep the manual handy for future use. Introduction Thank you for purchasing a Ricoh
Using Hybrid RFID for Improved Asset Tracking
Using Hybrid RFID for Improved Asset Tracking Sponsored by: Presented by: Tom O Boyle Director of RFID, Barcoding, Inc. 2015 MHI Copyright claimed for audiovisual works and sound recordings of seminar
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience
BOARDING SCHOOL STUDENTS MONITORING SYSTEMS (E-ID) USING RFID
267 BOARDING SCHOOL STUDENTS MONITORING SYSTEMS (E-ID) USING RFID Herdawatie binti Abdul Kadir, Siti Nurul Aqmariah binti Mohd Kanafiah and Mohd Helmy bin Abd. Wahab Faculty of Electrical and Electronic
Large residential complex adopts RFID-based VEHICLE TRACKING SYSTEM
Large residential complex adopts RFID-based VEHICLE TRACKING SYSTEM Independent, non-stop system for security, parking and access control Accurate identification of authorized vehicles Automated entry
IS-TG501MS IS-TG100MS L-TG700 XS-PLINTH01
The Aspects ARTS system is a wireless tracking, audit and security system for works of art and people. The system operates 24/7, which from a security perspective is very important as perimeter or intruder
Major Risks and Recommended Solutions
Major Risks and Recommended Solutions www.icdsecurity.com OVERVIEW Are you familiar with the main security risks that threaten data centers? This paper provides an overview of the most common and major
SPYTEC 3000 The system for GSM communication monitoring
SPYTEC 3000 The system for GSM communication monitoring The SPYTEC 3000 system is intended for passive (if system encryption is absent of if A5.2 encryption is used) or semi-active (if A5.1 encryption
Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader
Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker
Voice mail Play messages Activate Deactivate. Voice mail. Activate? Voice mail. Play messages Activate Deactivate. Set ring time.
Regarding Use of This Guide This guide is intended for users of DOCOMO mobile phones with a DOCOMO UIM Card (or otherwise a FOMA Card or DOCOMO mini UIM Card. Hereinafter the same applies). If the SIM
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 [email protected],
A Review of Security System for Smart Home Applications
Journal of Computer Science 8 (7): 1165-1170, 2012 ISSN 1549-3636 2012 Science Publications A Review of Security System for Smart Home Applications Mohammad Syuhaimi Ab-Rahman and Mohd Ariff Razaly Department
Wireless Technologies take Personnel Safety in the Process Industries to a New Level
324808 Issue 3 Wireless Technologies take Personnel Safety in the Process Industries to a New Level October 2010 WHITE PAPER John Hartley Managing Director Copyright Extronics Ltd 2009 The information
GSM/GPRS/GPS TRACKER USER MANUAL
GSM/GPRS/GPS TRACKER USER MANUAL UPreface Thank you for purchasing the TK201. This manual shows how to operate the device smoothly and correctly. Make sure to read this manual carefully before using this
Achieving Integrated IT Service Management
Achieving Integrated IT Service Management V Akihiko Sakurai (Manuscript received January 22, 2007) Increasingly, IT Infrastructure Library (ITIL) practices are being adopted to improve the quality of
GSM/GPRS/GPS TRACKER USER MANUAL
GSM/GPRS/GPS TRACKER USER MANUAL UPreface Thank you for purchasing GPS Tracker. This manual shows how to operate the device smoothly and correctly. Make sure to read this manual carefully before using
GSM teknik. GPS Tracking System TK-06A. User Manual
GPS Tracking System TK-06A User Manual Thank you for purchasing the tracker. This manual shows how to operate the device smoothly and correctly. Make sure to read this manual carefully before using this
Cloud Computing Based on Service- Oriented Platform
Cloud Computing Based on Service- Oriented Platform Chiseki Sagawa Hiroshi Yoshida Riichiro Take Junichi Shimada (Manuscript received March 31, 2009) A new concept for using information and communications
NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro [email protected]
NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro [email protected] 1 Outlook About NFC Developing a NFC Device Test Challenges Test Solutions Q&A 2 What
ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)
ASSET TRACKING USING RFID BY SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3) OBJECTIVE Our main objective is to acquire an asset tracking system. This keeps track of all the assets you
Data Security 2. Implement Network Controls
UNIT 19 Data Security 2 STARTER Consider these examples of computer disasters. How could you prevent them or limit their effects? Compare answers within your group. 1 You open an email attachment which
User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection
User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Outline How do you protect your critical confidential data?
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,
GETTING TO KNOW YOUR TELSTRA PRE-PAID 3G WI-FI
GETTING TO KNOW YOUR TELSTRA PRE-PAID 3G WI-FI LET S GET THIS SHOW ON THE ROAD You must be excited about your brand new Telstra Pre-Paid 3G Wi-Fi. This guide will help you get connected as quickly and
1. What is the main difference between the X3 micro and other Bluetooth headsets? 3. How does the X3 micro use the Bluetooth technology?
X3 Micro FAQ X3 Micro General 1. What is the main difference between the X3 micro and other Bluetooth headsets? 2. What is included in the X3 micro package? 3. How does the X3 micro use the Bluetooth technology?
Asset Tracking System
Asset Tracking System System Description Asset & Person Tracking 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and
Synthetic Sensing: Proximity / Distance Sensors
Synthetic Sensing: Proximity / Distance Sensors MediaRobotics Lab, February 2010 Proximity detection is dependent on the object of interest. One size does not fit all For non-contact distance measurement,
Engineering Cloud: Flexible and Integrated Development Environment
Engineering Cloud: Flexible and Integrated Development Environment Seiichi Saito Akira Ito Hiromu Matsumoto Eiji Ohta Nowadays product development must be done speedily and in a way that can respond to
SETX SFX Dial-Up Program
SETX SFX Dial-Up Program PROGRAM EXPLANATIONS Introduction Thank you for purchasing SFX Dial-Up Software for SETX. Before using the instrument, please read this manual carefully. Some of the diagrams and
RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings
RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings Are You Missing Out On Huge Savings through Better Asset Management? Many schools around the country have implemented wireless networking
Procedure Title: TennDent HIPAA Security Awareness and Training
Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary
GNSS Anti-Jam Technology for the Mass Market
GNSS Anti-Jam Technology for the Mass Market Michael Jones, Senior Consultant Engineer, GNSS Protection Roke Manor Research Ltd Communications Sensors Information Systems Contract R&D Consultancy Specialist
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
How to Use Motion Detection in ACTi Cameras
ACTi Knowledge Base Category: Installation & Configuration Note Sub-category: Application Model: All Firmware: N/A Software: N/A Author: Ando.Meritee Published: 2010/11/19 Reviewed: 2011/03/02 How to Use
WIRELESS INSTRUMENTATION TECHNOLOGY
BS&B WIRELESS, L.L.C. BS&B WIRELESS, L.L.C. WIRELESS INSTRUMENTATION TECHNOLOGY Printed February 2004 BS&B WIRELESS, L.L.C. 7422-B East 46th Place, Tulsa, OK74145 Phone: 918-622-5950 Fax: 918-665-3904
RFID Design Principles
RFID Design Principles Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Introduction 2 2.1 2.1.1 2.1.2 2.1. 2.1.4 2.2 2.2.1 2.2.2 2. 2..1 2..2 2.4 2.4.1 2.4.2 2.5 2.5.1 2.5.2 Comparison
PhoneWatch Smart Security System User Manual - Domonial
PW0002 10/13 Customer Support: 1850 753 753 PhoneWatch Ltd., Unit 3/4, Sandyford Park, Burton Hall Rd, Sandyford Industrial Estate, Dublin 18. Email: [email protected] PhoneWatch Smart Security System
Features Reference. About Unified Communication System. Before Using This Machine. Starting a Meeting. What You Can Do During the Meeting
Features Reference About Unified Communication System Before Using This Machine Starting a Meeting What You Can Do During the Meeting Leaving a Meeting Managing Address Book Changing Network Configuration
Universal Form-factor. Wi Fi Troubleshooting Made Easy
AirMedic USB AirMedic USB is a powerful, easy-touse and affordable spectrum analysis tool that brings Wi-Fi troubleshooting to entry-level users. Built upon AirMagnet expertise in Wi-Fi troubleshooting,
Intelligent Fleet Management System Using Active RFID
Intelligent Fleet Management System Using Active RFID Ms. Rajeshri Prakash Mane 1 1 Student, Department of Electronics and Telecommunication Engineering, Rajarambapu Institute of Technology, Rajaramnagar,
WLAN Positioning Technology White Paper
WLAN Positioning Technology White Paper Issue 1.0 Date 2014-04-24 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
Radio Frequency Identification (RFID) An Overview
Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify
Integrated Physical Security and Incident Management
IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting
Instruction Manual Service Program ULTRA-PROG-IR
Instruction Manual Service Program ULTRA-PROG-IR Parameterizing Software for Ultrasonic Sensors with Infrared Interface Contents 1 Installation of the Software ULTRA-PROG-IR... 4 1.1 System Requirements...
Time & Access System An RFID based technology
Time & Access System An RFID based technology OpenWorks TIME Technical Specification V1.0.2 M. I. Suhile Ahamed KCP Technologies Limited 2, Dr. P. V. Cherian Crescent, Egmore, Chennai - 600 008, INDIA.
Unmatched RF Spectrum Analysis
Datasheet: AirMagnet Spectrum XT AirMagnet Spectrum XT is the industry s first professional spectrum analyzer solution that combines in-depth RF analysis with real-time WLAN information for quicker and
The ArubaOS Spectrum Analyzer Module
Tech Brief Enterprise The ArubaOS Spectrum Analyzer Module The ArubaOS Spectrum Analyzer Module Tech Brief Table of Contents Introduction... 2 Visibility into the non-802.11 Spectrum... 2 Features... 3
INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA
COMM.ENG INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA 9/6/2014 LECTURES 1 Objectives To give a background on Communication system components and channels (media) A distinction between analogue
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
Connectivity & File Backup
Connectivity & File Backup Connectivity & File Backup............................. -2 Infrared............................................ -3 Port Alignment......................................... -3
User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Data
User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Data Security Kit Outline How do you protect your critical
Middleborough Police Electronic Security Narrative
Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of
GeoVision Setup. Once all the settings for Windows are completed and you have all the hard drives setup you can install GeoVision.
GeoVision Setup Once all the settings for Windows are completed and you have all the hard drives setup you can install GeoVision. Start in order beginning with the drivers. When you install the drivers
Healthcare versus Biochemical Industries
RFID in Healthcare Healthcare versus Biochemical Industries Where is the infusion pump? Where is patient Brown? Has Mrs. Jones already left the department? I cannot find the device that needs maintenance!
What Does Communication (or Telecommunication) Mean?
What Does Communication (or Telecommunication) Mean? The term communication (or telecommunication) means the transfer of some form of information from one place (known as the source of information) to
How To Attack A Key Card With A Keycard With A Car Key (For A Car)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car
Two-way communication, keep checking the commnunication between the panel and accessories, make sure the system safer.
Innovative GSM & WIFI dual network operating platform. On WIFI network, the alarm system will work without any fee. If no WIFI, it will work on GSM automatically. With state-of-the-art WIFI network technology,
Introduction. Industry Changes
Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise
NSR TM. Open the Era of Embedded Security Integration Systems. Network Security Recorder. Integrated Security
Integrated Security Networ k Security Recorder NSR TM Network Security Recorder Open the Era of Embedded Security Integration Systems NSR (Network Security Recorder) is developed by Anson and will be promoted
Updating Software. N900iG Quick Guide for Updating Software
N900iG Quick Guide for Updating Software Check whether software in the FOMA terminal needs to be updated, and download a part of software to update the software by using the packet communication if necessary.
INSTRUCTION MANUAL PC5OO WITH PC5OORK KEYPAD
INSTRUCTION MANUAL PC5OO WITH PC5OORK KEYPAD TABLE OF CONTENTS SYSTEM INFORMATION 2 INTRODUCTION 3 Test Your System Regularly...3 Important Notice...3 Glossary...3 BASIC OPERATION 4 Arming Your System...4
