Preview

jail security automation using android mobile

Good Essays
Open Document
Open Document
963 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
jail security automation using android mobile
Wi-Fi based Wireless advanced
JAIL Security Automation

ABSTRACT: -
Now a day’s automation is playing important role in each and every field such as Industrial, Home, Rural, Agriculture and Security Areas. Usually we use to control & monitor the jail by human interference, which will have low security and even requires more human intervention. In order to overcome this problem, the advance Jail security automation concept can be employed which increases the security level and reduces human intervention.
Mobile devices have been a part of our everyday life. Consequently, Security is becoming increasingly prominent features on mobile devices. In this project we will develop a jail security system that interface with an Android mobile device. The mobile device and jail security system communicate via WI-FI. The mobile application can be interface with the security system. Commands to lock, unlock, or check the status of the door, to turn on/off the alarm, to increase/decrease the fencing power supply, control of surveillance to which the security system is installed can be sent quickly from the mobile device via a simple, easy to use GUI. The security system that acts on these commands taking the appropriate action and sending a confirmation back to the mobile device. The security system also incorporates a traditional lock and key interface in case lose the mobile device.
PURPOSE: -
The purpose of the project is to implement a wireless communication system in implementing a jail security system. Safety is the most important requirement of Jail control. With the development of IT technology, network and automatic control technology, an Android Jail security monitoring and controlling system becomes more practicable today. By combining wireless sensor network, relay logic and WI-FI technology, this project designs low power consumption Android mobile devices for Jail security monitoring and controlling system that can detect fire and can open or close the

You May Also Find These Documents Helpful

  • Good Essays

    Technology affects communication capabilities of specialized databases in the criminal justice system by different systems such as Live Scan, Automated Finger Identification System that is also known as AFIS database, and Mobile data terminal. All these systems were created over the recent years and were made with many modern technological features.…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The advent of wireless technology is due in part to the ever increasing demands for mobility and flexibility in our daily lives. A wireless LAN (WLAN) is based on cellular architecture where the system is subdivided into cells,…

    • 929 Words
    • 4 Pages
    Good Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Term paper

    • 1329 Words
    • 6 Pages

    A physical model and steps of building the security system will be discussed as well as its set up and mode of operation. System testing showed a quick and efficient operation of the system, where in case of smoke or fire detection, light and siren are triggered and fire department is called, and in case of break-in police is called as well as siren is triggered.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Technologic advances occur at a rapid pace, with new devices coming out at frequent intervals. These new devices are appealing to college students who want to do everything as quickly and easily as possible. Because of the numerous smartphones, tablets, and laptops used by students and employees, college campuses face various security issues from mobile devices that connect to the network, often unintentionally.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Starbucks/Itunes Partnership

    • 4719 Words
    • 19 Pages

    Mobile Technology is expanding daily. It seems to be one of the fastest growing kinds of technologies in the news today. With the advancements in Personal Area Networks (PAN) and Wireless Access Protocols (WPA) mobile devices of today can be developed that are more secure than ever. They can be more accessible than ever before and provide faster and more accurate data transfer. The uses for the mobile devices have begun to expand into more and more areas of daily life. The iPhone mobile phone developed by Apple, Inc. is one of the most popular and bestselling mobile phones on the market today. In order for the iPhone to be at the head of the industry several of the most important technological features are…

    • 4719 Words
    • 19 Pages
    Best Essays
  • Satisfactory Essays

    Automated Locks: ¿Forgot to lock your door? No problem. Just by touching an icon on your smartphone’s screen, you can make sure all your doors are properly locked… and you can do it from anywhere in the world. Moreover, crooks won’t be able to open your door by using a credit card.…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ruff Ryders

    • 724 Words
    • 3 Pages

    The most popular electronic device that is found in almost every single individuals hand in North America is a cell phone. People are dependent on it for almost every minute of the day, since technology has reached to a point where we can do absolutely anything with this magical wonder. They are used in urgent situations, along with helping people keep in touch with their loved ones. Overall, this is a remarkable device with many of its features to come in handy in everyone’s life.…

    • 724 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Week 7 Research Paper Sun

    • 1241 Words
    • 4 Pages

    M.A. Badamas, (2001),"Mobile computer systems - security considerations", Information Management & Computer Security, Vol. 9 Iss: 3 pp. 134 – 136…

    • 1241 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Fire Truck Crash

    • 318 Words
    • 2 Pages

    safeguard personal and business data. Mobile security apps can lock a mobile device remotely, erase its…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., & Moller, S. (2011). On the need for different security methods on mobile phones. Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, Stockholm, Sweden. 465-473. doi: 10.1145/2037373.2037442…

    • 781 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Over the past two decades, we have witnessed significant technology advances in mobile devices, from the personal data assistants (PDAs) of the late 1990s and early 2000s to the ubiquitous and multifunctional smartphones of today. These advances have extended the virtual boundaries of the enterprise, blurring the lines between home and office and coworker and competitor by providing constant access to email, enabling new mobile business applications and allowing the access to, and storing of, sensitive company data.…

    • 1193 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Jailbreaking

    • 1713 Words
    • 5 Pages

    Jail breaking, a concept that can offer you complete freedom, but not in the way most would think, instead of freeing you from a 12x12 confined space, jailbreaking frees a technological device’s firmware from its locks and limitations letting the device reach its full potential. Although the process of jailbreaking could be used on a vast variety of devices, throughout this essay we will be examining the jailbreaking of iTouch’s, iPhone’s, and iPad’s. When Apple designs these products, they come with a predesigned firmware that restricts certain capabilities that otherwise the device would be able to do, such as wifi mobile hotspots, direct downloading capabilities, and more insignificant features, like moving screen savers. Along with the understandable, “disserved” capabilities jailbreaking offers, it also enables the ability for the user to access and download apps, and settings that Apple’s firmware protected against due to their illegal content. Thus the question on the topic is if jailbreaking is the “right” thing for a user to do with his/her device. Due to the fact that the user purchases the device outright, they should have the right to do whatever they please with the firmware and device itself even if it enables illegal activities, the user should be able to decide whether or not to obey the law, and the user should have full control of their apple device. When someone purchases any material object, it is the assumption that the buyer has the right to do as he/she pleases with the purchased object, and the situation should not be any different for the iTouch, Phone, or Pad, Thus making the process of jailbreaking morally acceptable, as well as legally just.…

    • 1713 Words
    • 5 Pages
    Better Essays