2021
DOI: 10.11591/ijres.v10.i3.pp176-185
|View full text |Cite
|
Sign up to set email alerts
|

ACCESS - IoT enabled smart lock

Abstract: <div class="abstract">ACCESS is a centrally controlled extensible security system - a system for enhancing accessibility and security methods. Security is an important matter of concern and everyone wants things easy and fast with the advancement of technology. Many IoT engineers are inclined towards home automation today. An area of recent interest is the automation of lock and key systems of homes and workplaces. This paper comprises mechanisms to view visitors of households, machinery, or any applianc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 32 publications
0
1
0
Order By: Relevance
“…Both tests are conducted in order to obtain information about the characteristics of the tools being used, and the purpose of data analysis is to extract this information. The percentage of success and errors of the compiled tools can be calculated using ( 1) and (2) [26], [27].…”
Section: Methodsmentioning
confidence: 99%
“…Both tests are conducted in order to obtain information about the characteristics of the tools being used, and the purpose of data analysis is to extract this information. The percentage of success and errors of the compiled tools can be calculated using ( 1) and (2) [26], [27].…”
Section: Methodsmentioning
confidence: 99%
“…Jika pada umumnya digunakan alarm untuk memberi tanda seseorang meminta akses masuk ke suatu pintu, maka pada sistem ini digunakan webcam sebagai pengganti alarm. Jika orang yang masuk kedalam tangkapan webcam dikenali, maka user atau pemilik rumah dapat membuka pintu yang diinginkan agar orang tersebut dapat masuk [7].…”
Section: Studi Literaturunclassified
“…Technology improves safety, but RFD tags must be physically worn. When a reader is nearby, false detection might happen [14]. The article demonstrates developing a simple home automation application on a Raspberry Pi using an algorithm created in the Python environment by scanning the subject of emails [15].…”
Section: Literature Reviewmentioning
confidence: 99%