Analysis and Automation of Security Management System for Remote Terminals Based on Advanced Finger Print Reorganization Algorithm

نویسنده

  • Sai Kumar
چکیده

Security Management at the industries or remote terminals like ATM centers is very essential. Security can be provided with man power but in practice this traditional methods are not up to the demand. As increasing number of people needs, number of ATMs increasing and there is no enough man power to monitor each and every terminal with this traditional way. So In this paper we analyzed the present day security policy and need of enhanced security management system for industries and remote terminals. With this analysis we automated the security management system. This system can perform critical task for the security people. Checking for the thefts, power failure, temperature range etc. To improve the security level by implantation of wireless embedded technology will resolve this problem. By dropping the manual power, at the site locations, and by improving the security level with the help of GSM based wireless technology which consist of transmitter (GSM modem) at the site location and receiver is the GSM mobile. Information transmitted by the GSM modem at the home location will be sent to the individual person’s mobile as a text message. The security people will take appropriate action according to the problem. For this we are used LPC2148 (ARM7) based microcontroller, which is the current dominant microcontroller in mobile based products.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Advanced State Estimation Method Using Virtual Meters

-  Power system state estimation is a central component in energy management systems of power system. The goal of state estimation is to determine the system status and power flow of transmission lines. This paper presents an advanced state estimation algorithm based on weighted least square (WLS) criteria by introducing virtual meters. For each bus of network, except slack bus, a virtual meter...

متن کامل

Detection of children's activities in smart home based on deep learning approach

 Monitoring behavior of children in the home is the extremely important to avoid the possible injuries. Therefore, an automated monitoring system for monitoring behavior of children by researchers has been considered. The first step for designing and executing an automated monitoring system on children's behavior in closed spaces is possible with recognize their activity by the sensors in the e...

متن کامل

Detection of children's activities in smart home based on deep learning approach

 Monitoring behavior of children in the home is the extremely important to avoid the possible injuries. Therefore, an automated monitoring system for monitoring behavior of children by researchers has been considered. The first step for designing and executing an automated monitoring system on children's behavior in closed spaces is possible with recognize their activity by the sensors in the e...

متن کامل

Optimal Energy Management and Feasibility Study of a Hybrid Energy System for a Remote Area

This paper investigates impacts of possible chances in energy policy and consumption behavior on optimal energy management and feasibility study of a hybrid energy system. The study was performed on a remote area near Esfarjan, a village located in Shahreza, Iran. In the main scenario, the current energy policy is applied while the consumption behavior of customers is studied by means of an inc...

متن کامل

Face Authentication using Euclidean Distance Model with PSO Algorithm

In recent technological world lot of devices are invented. Moreover the focused topic is on security system. Even with lot of security system like finger print based, eye-retina based, pin-code based systems are available, face recognition based security system has vital role of advanced technology. Feature based Face authentication requires feature extraction, feature selection and classificat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011