Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Report on Designing a securable city house Access Control System through ID Card

Category: Computer Sciences Paper Type: Report Writing Reference: CHICAGO Words: 3900

1-      Introduction of Designing a securable city house Access Control System through ID Card:

With the rising of human population. The number of houses and cities has increased significantly. It is, however, important to note that houses have limited entrances. At present, with cities having been expanded and developed, the aspect of entrance into houses has become quite important. This study provides a detailed description of how the system of access to an entrance by ID card can be designed [1].

Identify every people of the facility above 18 years by their (ID card) to entrance from the main gate. If they are by car or by walking the put ID card to card reader then database will match the data obtained from the person who wants entrance to the city with his/her ID card and if the data matches, the device will allow entrance. After that, the time will be recorded in the database. This card will be capable of being used for a year [2].

This project is aimed to enable entrance to a city or house with the use of ID card from people. Therefore, in order to secure a facility or house, only authorized people or residents can gain an access to it while unauthorized people cannot gain entrance to it.

This paper also focuses on designing a system in the form of Web-Application with the use of PHP and MySQLi for entrance to house from registered locations. Every person of house has a username and password to the login database.

If a relative or a friend wants to visit someone, he has to open his account and add name, car number, date, and time to the list of visitors through control point to know where is he going, which house he goes to, what is the number of the house, and who he is visiting. Then, the control point will give him permission. It will ensure residents about their security and protection [3]. This project helps every house in various ways. It helps a lot in creating and renewing the ID card, and gathering service payment at the desired timings.

 Entrance by ID Card System describes a technique used to control entrance from main gate into a house.  The area has a limited entrance. For maintaining access control to a plurality of high-security zones by at least one controlled door, RFID card can be used to access control system through ID card to entrance from main gate by authorized users. It helps in finding easily any events in this area because information is recorded about any person who wants to be checked in. So, for the quick completion of their entrance without standing in long queues and waiting for checking control officer, this method can be utilized.

In my country because there is an increase of foreign peoples and mixed peoples in the cities, I have created a database to control all people at entrance to this area and record information detail about any person and match data.  To avoid and decrease any unwanted accident like a crime or burglary and finding them out easily to decrease and less events such as killing and accidents, we need to support more safety for people in this area and make the people of this area feel safer.

Everyone can enter the city and that is not good for their security. Hence, if anything has happened, it is not possible to find the person responsible for it. When the database was not being utilized, it took a significant amount of time in warning the people. Therefore, collecting the money for the service was quite difficult. In addition to it, notification was difficult as well. Anyone could enter the city and gain access to a specific house and control unit wouldn’t even know about it.

The System is very flexible when it is implemented and it manipulates data about (Members, Houses or Accomodation , Persons, Payments, Entrance, Send Notification (Send SMS to Mobile), Visitors, Settings, find person by ID Card or House Number, renew ID card, create new ID card, view report, view due date of ID card, Find by ID card. house number, car number , every house how many ID Card using to entrance and Insert, edit, delete , view).

1.1 Existing System of Designing a securable city house Access Control System through ID Card

Manual processes are utilized in the existing system as manual records are used for receiving data and information from individuals. Records are filled manually as well and there are separate workers that maintain the databases.  In the manual system, searching for some specific information is the time-consuming exercise. A number of registers are being maintained. 

A detailed study of the existing system function, current system structure, and user requirements are determined by studying the system.

Today, we have different access control systems available in which RFID technology is one of the systems being used worldwide. Radio frequency identification (RFID) technology is a smart tracking system. Previously, ID card were used for access control system. But there were some drawbacks in the methods mentioned above. For instance, keys, tokens, and cards can be forgotten, misplaced, and even duplicated.

But I am using ID card, house number, and image of the persons. Any person that has been checked-in either by ID card, house number will be matched data by security gates with City House Access Control System through Identity card. So, I am using SMS API to send SMS to mobile for notifying people.

 I write by myself      of Designing a securable city house Access Control System through ID Card

If a person has lost his ID card, a notification will be sent to the administrator who will be deactivate the ID card from the database.  If the ID card is broken or damaged, the card will not be able to function properly. Thus, a new ID card will be created by the admin. If the person is wanted by police then he will not be capable of entering the city.

If the ID card is expired or it is due date, the person cannot gain entrance from main gate to the city.

In this project, I add a list of visitors, you can add a person to the list of visitors online before visiting the admin.

You can use more than one ID card for a house and bring payment of services.

An important role will be played by this system in decreasing the time needed for retrieving, processing, and storing in a much quicker and more efficient manner.

1.2  Proposed System  of Designing a securable city house Access Control System through ID Card

The manual system will be replaced by the computerized system utilized in the entrance running. The time required in processing and storing will be decreased by this system. So, identifying every people of the city will become easier.

The main objective of the existing system is concerned with providing a convenient and quick access to authorized people while restricting access to people who are not authorized with the use of ID card and for improving the purchase speed with the use of ID card. The system, which is proposed, now computerizes all the details that are maintained manually. It is cost saving and offers increased efficiency, updated data, minimizes losses, no data manipulation, and flexible fee structure.

1.3 The Aim of Access Control System through Identity card

For facilitating people to complete the entry process through ID card and bring payment of services, send SMS directly from the database to someone who doesn’t renew their cards and tell them that they need to renew their cards, setting (change main labels, city name, mobile number, email, address, and text of SMS), generate report, invoices. Database security, we are using some ways to secure database from attacks and hacks. Implement strong electronic visitor registration with list database checks. 

1.4 Advantage  of Designing a securable city house Access Control System through ID Card

1        ID card help us to identify each person in every house and ease the entry and exit process for people of this place.

2        Creating new ID card for every person in house and for house with the use of a unique number to entrance in the gate.

3        Gathering payment service cycle and renewing ID card yearly. When renewing an ID card of a house, renew all ID cards of a house.

4        If a person his ID card invalid, and will be show all persons the ID card is invalid and send SMS to his/her mobile to renew his/her ID card.

5        Keep and saving all records on the database are maintained safely, and encrypted data safe where attackers can’t get access to it

6        Generate invoice and view reports for every house how many ID card using to entrance? and how many times entrance to city house every day

7        Easy attendance recording and send notification when the ID card is invalid.

8        Very easy to modify to substitute your logo’s, main labels, city name, mobile number, email, address and text of SMS and settings

9        Is incredibly quick and easy to use and no fear of losing the data.

10    Lets you use photos and provides one button to export all of the data to Excel [4] 

3- RFID card as an entrance card

RDIF or Radio-frequency identification is actually a technology which utilizes radio waves for transferring data through a reader for the objective of tracking and identifying the objected from an electronic tag.

·         Contactless RFID cards are mostly utilized in entrance systems. In comparison with an RFID card,

·         There are many users and they are changing at a significant pace.

·         The importance of security is high: quite different from the RFID cards. It is not possible to copy the ID cards.

·         In comparison with a manual system, RFID is more efficient and superior.

·         With the use of RFID readers, RFID tags can be read and interrogated quickly [5].

 

This database comprises of three parts Admin and User.

1-    Admin Login of Designing a securable city house Access Control System through ID Card

Is responsible for security and integrity of data and allows creating users, assigning passwords. The main admin can login to database and can access to insert , Edit , delete , view for table  (city, Project name, zones , Accommodation type , Tower Name, Floor , Accommodation Number , Add Person for Accommodation , status ID card) and (view entrance from main gate  for every user per house or per apartment , view reports  , send notification or send SMS, change Setting  and import and export data to Excel Files , find by ID card and house number, create invoice to payment services, how many houses are now is empty? ) 

2- User Login of Designing a securable city house Access Control System through ID Card

Can access anywhere anytime login to self-account, can easily add record to database want to visit him and write to taxi service to come and enter city by ID card.

When you create new account from admin and create user name and password, you receive email from the database and you must confirm to Active the account.

When you login to your account you can,

-          Send notification when you lost or damage ID card.

-          view notification from admin

-          view payment service

-          add visitor name and date and time

-          add notification when move (change) your house or accommodation

3- Control Point (Entrance from (Main Gate )

Manage unlimited gate (door) and share or revoke access.

Make sure that people with authorization gain access to different facility areas. In this manner, security can be ensured and it can be monitored who is accessing which part of the facility. It is widely used in specific area or zones, Airports etc. Access control systems were typically administered in a central location.

- Every people or user entrance to the zone or city house by his ID card,

So every people or user live in the city or accommodation can entrance (check in ) by using his ID Card , when  check in to the  city , records information  about (full name  , accommodation number , date and time and gate number)

- With an access control system in place, you are able to control who is allowed to enter designated areas and closing that off to only a few people also limits the ability to get into any unwanted accidents.

-           display image of username and view notification and view how many time send SMS to this person

1- City Name of Designing a securable city house Access Control System through ID Card:

Generally, a city refers to human settlement in a specific boundary. In other words, it is a densely and permanently settled place with defined boundaries who people and members work on non-agricultural basis on a primarily basis. Usually, cities have detailed and extensive systems of communication, land use, utilities, sanitation, transportation, and housing.

2- Project Name  of Designing a securable city house Access Control System through ID Card

It can be said that a project name is an identification form for scratch projects. People are able to understand it easily. Then, associated with that number is the project name. A project's number is used for identification. Project Name such as (Italy City, Korean Village, English Village, Warin City ..........)

3- Zone

Is an area, region or section or stretch of land which is used or restricted for a specified purpose? Usage a space between two areas. Zone is used to mean any area that is separated from another. An example of a zone is an area where the typical accommodation and towers to grow well there where construction is happening. Zone such as (Zone A, Zone B, Zone C, Zone D ……….)

As adjectives the difference between zonal and regional

is that zonal is divided into zones while regional is of, or pertaining to, a specific region or district.

4- Types of accommodation 

It wouldn’t be wrong to say that making a room refers to accommodation. In other words, it refers to a place or room where a person will stay or share it with someone. Always remember that accommodation is an accommodating word. There are many different types of accommodation with each providing various and facilities and different experience such as (House, Villa, Apartments, Hotel, and Hostel).

 Private Home

In general, a private home is not dedicated for the occupation of different people such as guests. However, it is available temporarily for being rented out by tourists. Basically you stay in someone else’s house.

5- Tower Name   of Designing a securable city house Access Control System through ID Card

Meanwhile, a tower refers to a tall structure. Its length is more than its width and its masts distinguishes it which has a lack of guy-wires. Therefore, they are self-supporting structures other than being tall buildings. Tower Name such as (Tower A, Tower B, Tower C …..) 

6- Floor of Designing a securable city house Access Control System through ID Card

Every tower includes some floors. Generally, a floor refers to a room’s bottom surface. Floors also refers to building levels. The ground floor refers to the floor at the level of surrounding ground or level in BrE.  The highest level of a building: The penthouse apartment is on the top floor

7- Apartments  of Designing a securable city house Access Control System through ID Card

In general, an apartment house or apartment block contains more than an individual dwelling unit. The majority of them are created for domestic use. And it can be applied generally to any residential unit present within a building. A house can be a building as well.

 Self-Made Figure

This project we can use for accommodation in zones or specific area in the city of society

Designing a database is very easy and relationship between six drop dawn combox box,

First time choose city name in combox box like (Erbil, Duhok, Elazig,Trbzon,  ……………) 

When you select any city view relatives project names of this city in second combox box like (Nobel City, Italian City, English Village………..)

When you select any project name view relatives zones of this project name in third combox box like (A, B, C,…….)

When you select any zones view relatives type accommodation of this zones in fourth combox box   like (House, Apartment , Villa )

When you select any type accommodation view relatives tower name of this type accommodation in fifth   combox box   like (A1, B1, C1, ………… )

When you select any tower name view relatives floor number of this tower name in six   combox box   like (1, 2, 3, 4, …………)

------------------------------------------------------------------------

State of the Industry of Designing a securable city house Access Control System through ID Card

Generally, it is considered very important control access within and to the manufacturing plant while securing the automation systems and information from external breaches whether they are logical or physical. The development of automation systems serves to stabilize the lighting and climate of a facility while processes and machines are controlled by equipment automation systems. 
When it comes to the management of access, every single person is a stakeholder from security managers and facility to personnel in corporate suite, IT, training, purchasing, inventory, engineering, maintenance, and operations. 

Part 1,

In general, new developments and innovations in Industrial Access Identification and Control involves arguments and discussions of new trends in the control of access which are changing the role of authority played within a firm. The ways are also highlighted by it in which access control processes are being streamlined by employee badge solutions along with improvements in risk management.
Part 2,

When it comes to choosing the right solution for Industrial Access Control, key considerations offer a practical guide for the evaluation of four important methodologies of access control which are being utilized at present including discussions about drawbacks and benefits of each methodology. With an introduction to readers and badges associated with RFID access control, this paper is concluded.

What is the ID number?

Some e-services will ask you to enter a personal code or a national identification number when you want to log in using Smart-ID. The identity number is printed on all of your national identification documents, such as your ID-card, passport, and residents permit etc. It is usually either next to or below your name or your birth date. Its objective was concerned with identifying people for social security purposes. However, it is utilized for tracking people with the purpose of taxation.

ID cards of Designing a securable city house Access Control System through ID Card

Id card is the unique identity of that particular person which a person holds. A card identifying data about a person and ID cards typically include an name, photograph, date of birth, job title, address. It has made it easier to identify employees and visitors while enhancing the security and integrity of an organization. for use as identification at a place of employment, access control system to provide entrance to a location , students in school and colleges, etc. to making quick personal identification a snap.

Benefits of ID card

Identification cards is a great benefit. ID card systems can help you create personalized badges and cards for employees, students, attendees, visitors, and anyone else you can think of. The ability to create on-the-spot ID cards allows your organization to have a greater sense of security, accountability, and efficiency.  Customer services and response can be improved by an ID card if it is utilized in organizing and accessing customer information. When customers and business have familiarized with each other, the trust level allows transactions to be completed in a smooth and quick manner.

Following are some benefits which can be experienced by a person if ID card system is set at the location’s entrance.

1.     Increased Security 

2.    Ease of Use 

3.    No Guesswork 

4.    Easy to Replace Cards 

5.    Great Option for Rewards Programs 

What is the full form of ID?

ID stands for Identity document, any document used to verify a person's identity. Identifier, a symbol which uniquely identifies an object or record.  

Identity documents in the United States are typically the regional state-issued driver's license or identity card, while also the Social Security card and the United States Passport Card may serve as national identification.

Why do we need ID cards?

The most common use of an ID card is to verify that the person holding it is indeed who he claims to be. You can then use it to match any additional information he gives you such as the address on an application form. These cards typically identify the issuing body and include a picture of the holder, so you can visually match his face.  

1.    Some corporate ID card solutions use ID cards that work as smart cards are also used to control access to certain buildings.

2.    Some of the most important government ID card solutions include driver’s licenses, national IDs, Military badges, community center ID’s.

3.    Education ID card solutions in universities usually consist of using student and staff ID’s as smart cards for cash-free transactions.

4.    Though most public transportation options allow customers to pay with cash, many of them have introduced transit ID cards that can have cash loaded onto them. 

5.    Healthcare ID card solutions can include ID cards and smart cards that have a wide range of purposes including: speeding up the patient registration process, tracking patient billing, and accurate record keeping.

How to protect of hack database

The utilization of VPN is recommended as it implements another security layer.

When a VPN is used for sharing a database, a network is made among the connection of computers. A virtual network is made by them when computer connect through the internet and with security of that connection, a VPN is established. It can be said that VPN is similar to a LAN in several ways.

The utilization of an offshore VPN is capable of helping the user in hiding his real identity. You will see the VPN server’s IP instead of your own IP address whenever you visit a website. And in most of the VPN services, there is sharing among users which makes it quite difficult for your identity to be disclosed.

1-     install an anti-virus, anti-malware, and firewall

2-      you should make sure port 3306 is blocked in your firewall,

3-     Change database root password and edit that file accordingly.

4-     I encrypt password of user

5-     Backup data in MySQL database automatically every day. Backups will save you from any of the problems mentioned above

If your site stores its sensitive data in a MySQL database, you will most definitely want to backup that information so that it can be restored in case of any disaster. There are many tools that you can use to sync backups to a network location.

-----------------------------------------------------------------

If the database is hacked we Recovery Backups as soon as possible

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Rated Expert

ONLINE

Top Rated Expert

1869 Orders Completed

ECFX Market

ONLINE

Ecfx Market

63 Orders Completed

Assignments Hut

ONLINE

Assignments Hut

1428 Orders Completed