Search Results

1 - 10 of 18 items :

  • "access control system" x
Clear All
Development and Validation of Project Management Constructs of Security Door Access Control Systems: A Pilot Study in Macau

Abstract

A Security Door Access Control System (SDACS) project involves a number of teams from different organizations with diverse project goals. One of the main challenges of such projects is the lack of a standard approach or common understanding to achieve a common goal among project parties. This research examines various management concerns for SDACS projects, highlights the expected common understanding for project participants, develops the project management constructs, and emphasizes on the resulting value of the project to all participants. A two-stage process of scale development and validation was conducted. First, six generic constructs were identified based on the Security Access Control System Framework. Next, a multi-item scale for each construct was developed with reference to the Result-Oriented Management Framework. Expert judges were invited to conduct manual sorting of the items iteratively until reliability and validity was reached. In the next stage, further refinement and validation were carried out with a synthesized survey instrument and a series of statistical testing followed. The finalized SDACS project management constructs and the related findings help reinforce the importance of a standardized management practice for SDACS projects. The value of this research not only benefits SDACS project managers but everyone who works on the project.

Open access
Analisys of Access Points with the Queue Model for Biometric Access Control in Large Headcount Plants

REFERENCES 54/2014. (XII. 5.) BM Decree on the National Fire Protection Regulations (2014). Budapest: National Legislation. Berek, L. (2014). Security Systems . Budapest: National University of Public Service. Bunyitai, A. (2011). Location and role of access control systems in asset protection. Budapest: Hadmernok, VI.(4.), 17-25. Fishwick, P. A., & Hyungwook, P. (2008). Queue Modeling and Simulation. In Principles of Modeling and Simulation: A Multidisciplinary Approach. New Jersey, USA: John Wiley & Sons, Inc. Hanka, L

Open access
Arduino and Rapsberry Pi Based Hybrid RFID Access Control System with Mobile Platform

Abstract

Nowadays the ongoing trend of integrating everything into the cloud, connecting all sorts of gadgetry to the Internet (IoT) is omnipresent at this point, even in the industry, where small and medium sized companies alike can join this tendency. This is undoubtedly the result of the arrival of Industry 4.0, which caused an exponential growth in this field. This poses a new challenge for the IT field, since it needs in-depth knowledge of networking and routing, and formidable knowledge of the different devices and programming languages alike. Our project premises an RFID-based fully-fledged access control system, with a targeted market of small to large companies, and also individuals, as the result of ease of use, low price, and simplicity.

Open access
Design of a Horizontal Anaerobic Reactor

Abstract

Adequate security measures at schools are essential, not only in Vojvodina but in all secondary schools. This work outlines the opinion of secondary school teachers concerning the mechanical and electronic protection of secondary school institutions. The present research aims to shed light on the significance of school security, and problems caused by its lack, as well as to offer suggestions towards increased security and protection.

Open access
Consolidating The Control of Previously Automated Homes

Abstract

Nowadays, the number of smart homes is increasing steadily. People tend to try anything for better comfort for their family, or simply for themselves. We spend roughly half of our lives at home, so it’s only logical to focus and pursue higher comfort levels for our homes. This phenomenon opens enormous potential for automation, whether it is automatic garage doors, motorized shutters, access control systems, HVAC systems, or anything else that serves our well-being. This project looks at the implementation of some automation tasks, using a PLC (Programmable Logic Controller). This approach is different from conventional automation, thanks to the ability of the PLC to control everything in a building thus condensing three, or even four floors into one central unit.

Open access
Application of Motion Capture Attributes to Individual Identification under Corridor Surveillance

Abstract

Accurate and fast identification of a person from a security point of view is a key procedure. The most common technique of person identification uses identity cards. In contrary to the common approach we focus our research on identification based on the body movement such as the gait in this paper. The gait and the posture belong to the unique characteristics of the person that helps us to facilitate the identification. The proposed methodology allows us to incorporate personal characteristics into the access control systems using the color depth camera (RGBD). For the sake of gait analysis, the important task is to recognize the figure and extract the skeleton data from a video recording. Besides the usage of the mathematical statistics methods, we are opting to use computer animation and computer vision methods, which makes the research interdisciplinary. The main novelty of the paper is the definition and extraction of the feature vector from motion capture data, the analysis methodology and finally the selection of few statistically dominant motion attributes for the identification purposes. Besides the development of new approaches in this field, we validate proposed approaches from the perspective of accuracy.

Open access
Possible Cisco-based Fire Protection Solutions in Education Institutions

s-book/sec-cfg-vpn-ipsec.html [4] ITKommandó, Szigetvári Z.: About the VPN . 2014, (accssed: 2018.10.25.). https://www.itkommando.hu/site/a-vpn-rol/ [5] BravoGroup, VPN . 2017. (accessed: 2018.10.25). http://bravogroupoffice.hu/halozat/vpn [6] LAN computing, Firewall , IPS. UTM. 2016. (accssed: 2018.10.25.). https://www.lan.hu/tuzfal_IPS_UTM_1 [7] Cisco, Configurating Basic AAA on an Access Server . 2018. (accssed: 2018.10.25.). https://www.cisco.com/c/en/us/support/docs/security-vpn/terminal-access-controller-access-control-system

Open access
Analysis of the Electronic Device Exploitation Process – Research Results

interference. Eksploatacja i Niezawodność – Maintenance and Reliability, Vol. 19, No. 3, 2017 I, DOI 10.17531/ein.2017.3.8. 10. Paś J.: Analysis of exploitation access control system selected object. Przegląd Elektrotechniczny, No. 10, 2015. 11. Paś J.: Operation of electronic transportation systems. Publishing House University of Technology and Humanities, Radom 2015. 12. Paś J.: Selected methods for increases reliability the of electronic systems security, Journal of KONBiN, 3(35), 2015, DOI 10.1515/jok-2015-047. 13. Paszkowski S.: Podstawy teorii

Open access
A Generalized Multi Criteria Decision Making Method Based on Extension of ANP by Enhancing PAIR WISE Comparison Techniques

., Xiang-dong Wang. Greenhouse Parameter Control Strategy Based on the AHP (Analytical Hierarchy Process), 2013. IEEE, 978-1-4673-5534, pp. 6-13. 4. Azhar, A., M. Amin, M. Nauman, S. U. Shah. Efficient Selection of Access Control Systems through Multi Criteria Analytical Hierarchy Process, 2012. IEEE, 978-1-4673-4451, pp. 7-12. 5. Goepel, K. D. AHP and ANP Application, 2011. http://bpmsg.com/wpcontent/uploads/2011/07/BPMSG_AHP_ANP.pdf 6. Husain, F., N. A. Sulaiman, K. A. Hashim, A. M. Samad. Multi-Criteria Selection for TNB

Open access
Vibration-based Key Exchange among Multiple Smart Devices on the Desk

, H.T.T., Asokan, N. (2014, March). Drone to the rescue: Relay-resilient authentication using ambient multi-sensing. In International Conference on Financial Cryptography and Data Security (pp. 349–364). Springer Berlin Heidelberg [12] Shu, Y., Gu, Y.J., Chen, J. (2014). Dynamic authentication with sensory information for the access control systems. IEEE Transactions on Parallel and Distributed Systems , 25(2), 427–436 [13] Smart, N.P. (2002). Identity-based authenticated key agreement protocol based on Weil pairing. Electronics letters , 38(13), 630

Open access