2021 11th IEEE International Conference on Control System, Computing and Engineering (ICCSCE) 2021
DOI: 10.1109/iccsce52189.2021.9530966
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of a Microcontroller-based Home Security Locking System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…It contains the project paper's core goal, which is to establish an online platform to help Soran University students clear courses at the end of the academic year. This section will go over the appropriate literature in order to determine the strengths and weaknesses of existing programs 2 .…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…It contains the project paper's core goal, which is to establish an online platform to help Soran University students clear courses at the end of the academic year. This section will go over the appropriate literature in order to determine the strengths and weaknesses of existing programs 2 .…”
Section: Literature Reviewmentioning
confidence: 99%
“…The Internet is a contemporary information relay system that links hundreds of thousands of telecommunications networks to create a framework. These applications open up a plethora of new research areas, causing the Internet to grow in popularity year after year 2 . In the past and now, student clearance procedures were carried out by moving from one office to the next and keeping paper records.…”
Section: Introductionmentioning
confidence: 99%
“…The perimeter layer is the most important element between an intruder and the protected assets, usually represented by static components, such as walls, ceilings, and floors, and openable components, such as windows and doors. The aforementioned assets whose protection is desired are usually placed inside a room or building [ 11 , 12 , 13 ]. Most of the typical perimeter layer is made of bricks, concrete, or wood, where the material is breakable only with a lot of force and noise.…”
Section: Introductionmentioning
confidence: 99%