Preview

jail security automation using android mobile

Good Essays
Open Document
Open Document
963 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
jail security automation using android mobile
Wi-Fi based Wireless advanced
JAIL Security Automation

ABSTRACT: -
Now a day’s automation is playing important role in each and every field such as Industrial, Home, Rural, Agriculture and Security Areas. Usually we use to control & monitor the jail by human interference, which will have low security and even requires more human intervention. In order to overcome this problem, the advance Jail security automation concept can be employed which increases the security level and reduces human intervention.
Mobile devices have been a part of our everyday life. Consequently, Security is becoming increasingly prominent features on mobile devices. In this project we will develop a jail security system that interface with an Android mobile device. The mobile device and jail security system communicate via WI-FI. The mobile application can be interface with the security system. Commands to lock, unlock, or check the status of the door, to turn on/off the alarm, to increase/decrease the fencing power supply, control of surveillance to which the security system is installed can be sent quickly from the mobile device via a simple, easy to use GUI. The security system that acts on these commands taking the appropriate action and sending a confirmation back to the mobile device. The security system also incorporates a traditional lock and key interface in case lose the mobile device.
PURPOSE: -
The purpose of the project is to implement a wireless communication system in implementing a jail security system. Safety is the most important requirement of Jail control. With the development of IT technology, network and automatic control technology, an Android Jail security monitoring and controlling system becomes more practicable today. By combining wireless sensor network, relay logic and WI-FI technology, this project designs low power consumption Android mobile devices for Jail security monitoring and controlling system that can detect fire and can open or close the

You May Also Find These Documents Helpful

  • Better Essays

    Technologic advances occur at a rapid pace, with new devices coming out at frequent intervals. These new devices are appealing to college students who want to do everything as quickly and easily as possible. Because of the numerous smartphones, tablets, and laptops used by students and employees, college campuses face various security issues from mobile devices that connect to the network, often unintentionally.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    An access control system is fundamental in reducing security issues as well as controlling the personnel allowed to access a given place. Its main objective is to ensure limited persons are granted the rights of access. This access can be granted by checking on criteria such as workplace, home or any other specified locations. The access control system may consist of diverse components that collaborate to ensure the main objective is achieved. An effective control system would ensure privileges for the different users vary according to their access rights or levels; the system under research can monitor and record all activities of access, lock and unlock the doors, cancel privileges when a pass card is lost as well as detect usage of canceled cards (Benantar, 2006).…

    • 1220 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Automated Locks: ¿Forgot to lock your door? No problem. Just by touching an icon on your smartphone’s screen, you can make sure all your doors are properly locked… and you can do it from anywhere in the world. Moreover, crooks won’t be able to open your door by using a credit card.…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Term paper

    • 1329 Words
    • 6 Pages

    A physical model and steps of building the security system will be discussed as well as its set up and mode of operation. System testing showed a quick and efficient operation of the system, where in case of smoke or fire detection, light and siren are triggered and fire department is called, and in case of break-in police is called as well as siren is triggered.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Starbucks/Itunes Partnership

    • 4719 Words
    • 19 Pages

    Mobile Technology is expanding daily. It seems to be one of the fastest growing kinds of technologies in the news today. With the advancements in Personal Area Networks (PAN) and Wireless Access Protocols (WPA) mobile devices of today can be developed that are more secure than ever. They can be more accessible than ever before and provide faster and more accurate data transfer. The uses for the mobile devices have begun to expand into more and more areas of daily life. The iPhone mobile phone developed by Apple, Inc. is one of the most popular and bestselling mobile phones on the market today. In order for the iPhone to be at the head of the industry several of the most important technological features are…

    • 4719 Words
    • 19 Pages
    Best Essays
  • Good Essays

    Technology affects communication capabilities of specialized databases in the criminal justice system by different systems such as Live Scan, Automated Finger Identification System that is also known as AFIS database, and Mobile data terminal. All these systems were created over the recent years and were made with many modern technological features.…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The advent of wireless technology is due in part to the ever increasing demands for mobility and flexibility in our daily lives. A wireless LAN (WLAN) is based on cellular architecture where the system is subdivided into cells,…

    • 929 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Now days, wireless communication and devices are very flexible, convenient, and easy to use everywhere. With the introduction of wireless local area network (WLAN) many users find it very flexible to move laptops from one place to another within the office while maintaining connectivity with the network, sharing data and applications with network system and other users with compatible devices without been tied to printer cables and other peripheral device connection. This is very important in a doctor’s office because patients and doctors move from room to room depends on the type of test they are doing. Having mobile device makes it easier for them to do their jobs easier and it can even help cut wiring costs. In the other hand there are many risks inherent in using wireless and mobile technologies. Wireless networks face the same threats as conventional wired network because intruders who gain access to information systems via wireless communication can bypass firewall protection and expose patient’s information and data. Besides lunching denial of service attacks, insert viruses or malicious code, disable operations, most importantly they can violate the privacy of patients and even steal their identities.…

    • 610 Words
    • 3 Pages
    Good Essays
  • Good Essays

    “They have an app for that” is the mantra of most smartphone users, but an improperly configured smartphone can be an open invitation to hackers looking for easy information. Today’s modern smartphone can do anything from controlling your home computer to handling your online banking to watching TV to making video calls. With all the features included in them, they are very easy to stockpile important (and sometimes sensitive) information about the user. Since smartphones are essentially tiny computers, they suffer the same vulnerabilities of PC’s, including viruses, malicious applications, and hacking. If there is the tiniest flaw in the smartphone’s armor, hackers can gain access and take an enormous amount of data from it.…

    • 913 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The standard for wireless personal area networks (WPANs) is IEEE 802.15. The two significant technologies in WPANs are Bluetooth and Infrared data association. The operating frequency of WPANs is 2.4 GHz. The main target of WPAN is to provide a faultless connection among the interconnected devices. In the WPAN each and every device capable to plug into any other device and easily communicate with other devices. The other significant feature of every device is capability to lock out other devices selectively, so that it avoids the interference and permits the unauthorized persons. The important technology of wireless personal area network is Bluetooth and Zigbee. Bluetooth is a short range communication wireless technology, which is used to transfer the data. The communication range of Bluetooth is 10 meters. Bluetooth devices are pointing devices, printers connected to personal digital assistants, cell phones and computers are connected…

    • 3178 Words
    • 13 Pages
    Good Essays
  • Good Essays

    Bluetooth Door Lock

    • 2263 Words
    • 10 Pages

    It has been known for some time now that mechanical locks are becoming outdated. Mechanical locks are notoriously easy to lock pick, the quantity of keys limits their use, and they are not convenient to use. The goal of Team Open Sesame is to create a door that is safer and more convenient to use than the conventional mechanical door. Team Open Sesame’s design gives people limited access to a door through their android smartphone’s Bluetooth in the form of a digital key code. The use of a digital key provides more safety than the traditional locking mechanism, as it takes more experience to hack into a password encrypted system than to pick a lock. This design also provides the security of always being locked, until given a quick command to unlock. The goal of almost any piece of technology is to improve on what has been done before. Team Open Sesame’s door is easier to use, is more secure, and has infinite keys.…

    • 2263 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    This mobile application only works on android phones. Student has to own an android phone to be able to download the SecurityApp from google play store. The app also uses data bundles or Wi-Fi connection in order to login and send a burglary report to a security system through a network. If the witness does not have bundle or not connected to the Wi-Fi network, security alert will not be sent.…

    • 1612 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    “There is no place like home”, that is one of our favorite quotations right now. From the very start, home is really our comfort zone, a place where we can be worry free, a place where we can relax and a place that is far from harm. A house plays a big role in our lives, but what will happen if criminal such as burglar tries to take advantage while we are far away from our home? They might steal very important and valuable things that we have and things that we’ve produced from our hard work. To prevent those things from occurring, we are introducing this project, “Door Access using Numeric Keypad”. This project is proposed for the home-owners not to be worried whenever they are not in their homes. Most of the time whenever we go to some places and no one is left in our house, we are very worried if what will happen in it, and will came to a point that we will not enjoy some moments with our family outside our house because of thinking too much. That’s why we decided to pursue this project. Burglars are everywhere, but with the help of “Door Access using Numeric Keypad” burglars has less chance in intruding houses.…

    • 1551 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    In the field of computing, few inventions, innovations or technological improvements, have been moving quite like wireless technology. With the advent of fourth generation cell phones and networks (4G), there have literally been leaps and bounds made in the realm of personal computing, productivity and data sharing. It is this increased connectivity both in our personal and business lives that introduce risks to intrusion, corruption or theft of data, or in the worst case, access to personal data that would lead to identity theft. In the business realm, this translates to problems for firm infrastructure and exposure to proprietary leaks, loss of customer data, or damage to the reputation of the business entity. Therefore, it is important that adequate measures are taken to evaluate risks and take steps both personally and professionally to minimize those risks. We present several advantages and disadvantages of the Android OS platform with very high visibility right now in the wireless arena. Both for the flexibility and open architecture, this platform presents some unique challenges in terms of security.…

    • 2941 Words
    • 12 Pages
    Good Essays
  • Good Essays

    An electronic lock or digital lock is a device which has an electronic control assembly attached to it. They are provided with an access control system. This system allows the user to unlock the device with a password. The password is entered by making use of a keypad. The user can also set his password to ensure better protection. The major components include akeypad, LCD and the controller AT89C51 which belongs to the 8051 series of microcontrollers. This article describes the making of an electronic code lock using the 8051 microcontroller.…

    • 569 Words
    • 3 Pages
    Good Essays