Smart Door Locking System using RFID Reader in IoT Environment
Anuradha T1
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-5 , Page no. 801-805, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.801805
Online published on May 31, 2019
Copyright © Anuradha T . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Anuradha T, “Smart Door Locking System using RFID Reader in IoT Environment,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.801-805, 2019.
MLA Style Citation: Anuradha T "Smart Door Locking System using RFID Reader in IoT Environment." International Journal of Computer Sciences and Engineering 7.5 (2019): 801-805.
APA Style Citation: Anuradha T, (2019). Smart Door Locking System using RFID Reader in IoT Environment. International Journal of Computer Sciences and Engineering, 7(5), 801-805.
BibTex Style Citation:
@article{T_2019,
author = {Anuradha T},
title = {Smart Door Locking System using RFID Reader in IoT Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {801-805},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4316},
doi = {https://doi.org/10.26438/ijcse/v7i5.801805}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.801805}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4316
TI - Smart Door Locking System using RFID Reader in IoT Environment
T2 - International Journal of Computer Sciences and Engineering
AU - Anuradha T
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 801-805
IS - 5
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
483 | 319 downloads | 154 downloads |
Abstract
RFID tagging is an ID system that uses small radio frequency identification devices for identification and tracking purpose. An RFID tagging system includes the tag itself, a read/write device, and a host application for data collection, processing, and transmission .In simple words an RFID uses electromagnetic fields to transfer data over short distances. RFID is useful to identify people, to make transactions.
Key-Words / Index Term
Arduino Uno, RFID Reader, two RFID tags, Arduino Uno cable, Jumper wires, CD driver,Battery,IoT(Internet of things technology)
References
[1]. D. L. Wu, Wing W. Y. NG, D. S. Yeung, and H. L. Ding, “A brief survey on current RFID applications,” in Proc. International Conference on Machine Learning and Cybernatics, Baoding, July 12-15, 2009, pp. 2330-2334.
[2]. B. Yan and D. Y. Lee, “Design of spot ticket management system based on RFID,” in Proc. International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009, pp. 496-499.
[3]. G. Ostojic, S. Stankovski, and M. Lazarevic, “Implementation of RFID technology in parking lot access control system,” in Proc. Annual RFID Eurasia Conference, 2007, pp. 1-5.
[4]. N. Ahmad, S. Butler, and U. Ramachandran, “GuardianAngel: An RFID based indoor guidance and monitoring system,” 2010, pp. 546-551.
[5]. K. S. Huang and S. M. Tang, “RFID applications strategy and deployment in bike renting system,” in Proc. ICACT 2008, pp. 660-663.
[6]. S. Lahiri, RFID sourcebook, IBM Press, Westford, Massachusetts, 2006
[7]. F. Lourenco and C. Almeida, “RFID based monitoring and access control system,” in Proc. INFORUM, 2009.
[8]. R. Weinstein, “RFID: A technical overview and its application to the enterprise,” IT Professional, vol. 7, no. 3, May-June 2005, pp. 27-33.
[9]. X. L. Meng, Z. W. Song, and X. Y. Li, “RFID-Based security authentication system based on a novel face-recognition structure,” in Proc. WASE International Conference on Information Engineering, 2010, pp. 97-100.
[10]. D. L. Wu, Wing W. Y. NG, Patrick P. K. Chan, H. L. Ding, B. Z. Jing, and D. S. Yeung, “Access control by RFID and face recognition based on neural network,” in Proc. International Conference on Machine Learning and Cybernatics, July 11-14, 2010, pp. 675-680.
[11]. M. A. Mazidi, J. C. Mazidi, and R. D. Mckinaly, The 8051 Microcontroller and Embedded Systems, Pearson Education, 2006.