SlideShare ist ein Scribd-Unternehmen logo
1 von 16
College in/out Access Control system
Flap Barrier with RFID or Biometric
Components of System
• RFID HF tags or Biometric.
• Flap barrier turnstile.
• RFID Fixed reader.
• Window application.
RFID High Frequency Tags
• The details of authorized student is mapped to Tags.
• They operate at 13.56 MHz with read ranges approximate 7cm.
• It experience moderate sensitivity to interference.
Fingerprint Biometric
• These are used to determine the uniqueness of the fingerprint.
• Once registered on the fingerprint scanner, the image of these
patterns is converted into a digital form.
• This is stored on a database for comparison which grants
authentication and access through the Flap barrier.
Flap barrier
• It is pedestrian barrier installed in conjunction with any access control
system provides valuable assistance to security personnel at any
monitored entrance.
• Its combine features like high throughput rate, user acceptance,
comfort and different levels of security to prevent unauthorized
access pedestrian safety has also been taken into account.
• They are compatible with most access control systems, such as
magnetic, biometric and proximity readers.
RFID Fixed reader
• It detects the authorized students.
• Allows Flap barrier to open/close.
Window Application
• It is an external control on flap barrier using desktop through Window
application.
• Uploads the data to server through LAN , Wi-Fi within campus range.
Features
• Attendance.
• Authorized Access.
• Prevention of Unauthorized visitor.
• Automation.
Working
• Normally Closed Working Mode (Default): after authorization by a
RFID reader or Biometric .
• Operate symbols on top of the unit changes from a red cross into a
green arrow.
• After passing finish, it will close immediately.
• To allow larger capacity through the Flap Barrier, the authorized
number can be memorized.
Normally Open Working Mode
• The arms will always open and only closes if an unauthorized visitor
steps into the Flap Barrier.
• After authorization the display on the top plate shows a green arrow
and the user can walk through the lane.
The visitors detection and alarming in
normally closed / Open mode
• Stand by.
• Following After Authorized Passage.
• Counter Direction Intrusion Alarming.
• Overtime Alarming.
• Stay Intrusion Alarming.
• Emergency Open / Close Mode.
• Degradation Mode.
Emergency Open / Close
Mode
• Emergency modes is used in special applications, such as fire alarm,
etc.
• In those modes, the authorization will be shield and arms remains
open/close till input any signal to change be other mode.
Degradation Mode
• This mode appears when the detection cell are broken or blocked
during initialization.
• authorization is valid but all of the detection cell are shield, the arms
will only close the after the valid time.
Asset Online Pvt.Ltd.
#388,Bluemoon x, Lnt. 9th main, sector 7, HSR layout, Bangalore-560102.
Name: Bharath Kumar
Mob number: 8277110064.

Weitere ähnliche Inhalte

Was ist angesagt?

rfid based check incheck-out only for laptops
rfid based check incheck-out only for laptopsrfid based check incheck-out only for laptops
rfid based check incheck-out only for laptopsAOPL
 
Rfid security and hospital applications
Rfid security and hospital applicationsRfid security and hospital applications
Rfid security and hospital applicationsFarhan sadiq Mullick
 
Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )Bhautik Vaghela
 
Rfid based attendance system
Rfid based attendance systemRfid based attendance system
Rfid based attendance systemA Jay Vardhan
 
Teamliftss rfid based_asset_management_system
Teamliftss rfid based_asset_management_system Teamliftss rfid based_asset_management_system
Teamliftss rfid based_asset_management_system Venkatesa Prasad
 
Web based attendance mgt system using RFID
Web based attendance mgt system using RFIDWeb based attendance mgt system using RFID
Web based attendance mgt system using RFIDprachi Saindane
 
Rfid and gsm based attendence system
Rfid and gsm based attendence systemRfid and gsm based attendence system
Rfid and gsm based attendence systemKarthik Kumar
 
Rfid based smart attendance system
Rfid based smart attendance systemRfid based smart attendance system
Rfid based smart attendance systemafserfec56
 
Teamliftss rfid student_tracking_system
Teamliftss rfid student_tracking_systemTeamliftss rfid student_tracking_system
Teamliftss rfid student_tracking_systemVenkatesa Prasad
 
Attendance management system using rfid or biomatric
Attendance management system using rfid or biomatricAttendance management system using rfid or biomatric
Attendance management system using rfid or biomatricShitalinfotech
 
Security access control system using rfid
Security access control system using rfidSecurity access control system using rfid
Security access control system using rfidEcwayt
 
Nimesh thakor
Nimesh thakorNimesh thakor
Nimesh thakornn7046
 
Rfid & its applications
Rfid & its applicationsRfid & its applications
Rfid & its applicationsYoonjo Lee
 
Smart Attendance System using RFID
Smart Attendance System using RFIDSmart Attendance System using RFID
Smart Attendance System using RFIDPratikdd
 
Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontrollerrajkanakaraj007
 
Automated attendance monitoring system
Automated attendance monitoring systemAutomated attendance monitoring system
Automated attendance monitoring systemSalem Awad
 
Door lock-using-rfid-technology
Door lock-using-rfid-technology Door lock-using-rfid-technology
Door lock-using-rfid-technology Ho Vu
 

Was ist angesagt? (20)

rfid based check incheck-out only for laptops
rfid based check incheck-out only for laptopsrfid based check incheck-out only for laptops
rfid based check incheck-out only for laptops
 
Rfid security and hospital applications
Rfid security and hospital applicationsRfid security and hospital applications
Rfid security and hospital applications
 
Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )
 
Rfid based attendance system
Rfid based attendance systemRfid based attendance system
Rfid based attendance system
 
Teamliftss rfid based_asset_management_system
Teamliftss rfid based_asset_management_system Teamliftss rfid based_asset_management_system
Teamliftss rfid based_asset_management_system
 
Web based attendance mgt system using RFID
Web based attendance mgt system using RFIDWeb based attendance mgt system using RFID
Web based attendance mgt system using RFID
 
Rfid and gsm based attendence system
Rfid and gsm based attendence systemRfid and gsm based attendence system
Rfid and gsm based attendence system
 
Rfid based smart attendance system
Rfid based smart attendance systemRfid based smart attendance system
Rfid based smart attendance system
 
Teamliftss rfid student_tracking_system
Teamliftss rfid student_tracking_systemTeamliftss rfid student_tracking_system
Teamliftss rfid student_tracking_system
 
Attendance management system using rfid or biomatric
Attendance management system using rfid or biomatricAttendance management system using rfid or biomatric
Attendance management system using rfid or biomatric
 
Security access control system using rfid
Security access control system using rfidSecurity access control system using rfid
Security access control system using rfid
 
13210440 pss7
13210440   pss713210440   pss7
13210440 pss7
 
Nimesh thakor
Nimesh thakorNimesh thakor
Nimesh thakor
 
Rfid & its applications
Rfid & its applicationsRfid & its applications
Rfid & its applications
 
Smart Attendance System using RFID
Smart Attendance System using RFIDSmart Attendance System using RFID
Smart Attendance System using RFID
 
Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontroller
 
Automated attendance monitoring system
Automated attendance monitoring systemAutomated attendance monitoring system
Automated attendance monitoring system
 
RFID Based Access Control And Proximity Security System.
RFID Based Access Control And Proximity Security System.RFID Based Access Control And Proximity Security System.
RFID Based Access Control And Proximity Security System.
 
PIA Internship P
PIA Internship PPIA Internship P
PIA Internship P
 
Door lock-using-rfid-technology
Door lock-using-rfid-technology Door lock-using-rfid-technology
Door lock-using-rfid-technology
 

Ähnlich wie College inout access control system with RFID technologies

Automatic car park system 2020
Automatic car park system 2020Automatic car park system 2020
Automatic car park system 2020hulas raj tonday
 
Matrix Security Solutions: COSEC - Access Control and Time-Attendance
Matrix Security Solutions: COSEC - Access Control and Time-AttendanceMatrix Security Solutions: COSEC - Access Control and Time-Attendance
Matrix Security Solutions: COSEC - Access Control and Time-AttendanceMatrix Comsec
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Niraj Kumar
 
BEA's LZR-WIDESCAN Technical Training
BEA's LZR-WIDESCAN Technical TrainingBEA's LZR-WIDESCAN Technical Training
BEA's LZR-WIDESCAN Technical TrainingBEA, Inc.
 
TEAMLIFTSS_RFID_Student_Tracking_System_V2
TEAMLIFTSS_RFID_Student_Tracking_System_V2TEAMLIFTSS_RFID_Student_Tracking_System_V2
TEAMLIFTSS_RFID_Student_Tracking_System_V2Venkatesa Prasad
 
RFID Library Automation DigiGlobeSys.pdf
RFID Library Automation DigiGlobeSys.pdfRFID Library Automation DigiGlobeSys.pdf
RFID Library Automation DigiGlobeSys.pdfJainyParikh
 
Electronic voting machine using RFID
Electronic voting machine using RFIDElectronic voting machine using RFID
Electronic voting machine using RFIDBharath Chapala
 
Few RFID security solutions concepts..
Few RFID security solutions concepts..Few RFID security solutions concepts..
Few RFID security solutions concepts..Vineet M Srivastav
 
Locker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsmLocker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsmSai Kumar
 
interrupt .pptx
interrupt .pptxinterrupt .pptx
interrupt .pptxxsuvra
 
TEAMLIFTSS_Library_Management_V2
TEAMLIFTSS_Library_Management_V2TEAMLIFTSS_Library_Management_V2
TEAMLIFTSS_Library_Management_V2Venkatesa Prasad
 
Teamliftss library management
Teamliftss library managementTeamliftss library management
Teamliftss library managementVenkatesa Prasad
 
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Moduleinventionjournals
 
RFID Forklift Management.pdf
RFID Forklift Management.pdfRFID Forklift Management.pdf
RFID Forklift Management.pdfRFGMivanta
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technologysweta dargad
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Galuh Yudha Mahardika
 

Ähnlich wie College inout access control system with RFID technologies (20)

Automatic car park system 2020
Automatic car park system 2020Automatic car park system 2020
Automatic car park system 2020
 
Matrix Security Solutions: COSEC - Access Control and Time-Attendance
Matrix Security Solutions: COSEC - Access Control and Time-AttendanceMatrix Security Solutions: COSEC - Access Control and Time-Attendance
Matrix Security Solutions: COSEC - Access Control and Time-Attendance
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
 
Physical security-system
Physical security-systemPhysical security-system
Physical security-system
 
BEA's LZR-WIDESCAN Technical Training
BEA's LZR-WIDESCAN Technical TrainingBEA's LZR-WIDESCAN Technical Training
BEA's LZR-WIDESCAN Technical Training
 
Access-control-system
Access-control-systemAccess-control-system
Access-control-system
 
TEAMLIFTSS_RFID_Student_Tracking_System_V2
TEAMLIFTSS_RFID_Student_Tracking_System_V2TEAMLIFTSS_RFID_Student_Tracking_System_V2
TEAMLIFTSS_RFID_Student_Tracking_System_V2
 
RFID Library Automation DigiGlobeSys.pdf
RFID Library Automation DigiGlobeSys.pdfRFID Library Automation DigiGlobeSys.pdf
RFID Library Automation DigiGlobeSys.pdf
 
Smart vault ppt
Smart vault pptSmart vault ppt
Smart vault ppt
 
Rfid security access control system
Rfid security access control systemRfid security access control system
Rfid security access control system
 
Electronic voting machine using RFID
Electronic voting machine using RFIDElectronic voting machine using RFID
Electronic voting machine using RFID
 
Few RFID security solutions concepts..
Few RFID security solutions concepts..Few RFID security solutions concepts..
Few RFID security solutions concepts..
 
Locker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsmLocker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsm
 
interrupt .pptx
interrupt .pptxinterrupt .pptx
interrupt .pptx
 
TEAMLIFTSS_Library_Management_V2
TEAMLIFTSS_Library_Management_V2TEAMLIFTSS_Library_Management_V2
TEAMLIFTSS_Library_Management_V2
 
Teamliftss library management
Teamliftss library managementTeamliftss library management
Teamliftss library management
 
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
 
RFID Forklift Management.pdf
RFID Forklift Management.pdfRFID Forklift Management.pdf
RFID Forklift Management.pdf
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
 

Kürzlich hochgeladen

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Kürzlich hochgeladen (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

College inout access control system with RFID technologies

  • 1. College in/out Access Control system
  • 2. Flap Barrier with RFID or Biometric
  • 3. Components of System • RFID HF tags or Biometric. • Flap barrier turnstile. • RFID Fixed reader. • Window application.
  • 4. RFID High Frequency Tags • The details of authorized student is mapped to Tags. • They operate at 13.56 MHz with read ranges approximate 7cm. • It experience moderate sensitivity to interference.
  • 5. Fingerprint Biometric • These are used to determine the uniqueness of the fingerprint. • Once registered on the fingerprint scanner, the image of these patterns is converted into a digital form. • This is stored on a database for comparison which grants authentication and access through the Flap barrier.
  • 6. Flap barrier • It is pedestrian barrier installed in conjunction with any access control system provides valuable assistance to security personnel at any monitored entrance. • Its combine features like high throughput rate, user acceptance, comfort and different levels of security to prevent unauthorized access pedestrian safety has also been taken into account. • They are compatible with most access control systems, such as magnetic, biometric and proximity readers.
  • 7. RFID Fixed reader • It detects the authorized students. • Allows Flap barrier to open/close.
  • 8. Window Application • It is an external control on flap barrier using desktop through Window application. • Uploads the data to server through LAN , Wi-Fi within campus range.
  • 9. Features • Attendance. • Authorized Access. • Prevention of Unauthorized visitor. • Automation.
  • 10. Working • Normally Closed Working Mode (Default): after authorization by a RFID reader or Biometric . • Operate symbols on top of the unit changes from a red cross into a green arrow. • After passing finish, it will close immediately. • To allow larger capacity through the Flap Barrier, the authorized number can be memorized.
  • 11. Normally Open Working Mode • The arms will always open and only closes if an unauthorized visitor steps into the Flap Barrier. • After authorization the display on the top plate shows a green arrow and the user can walk through the lane.
  • 12. The visitors detection and alarming in normally closed / Open mode • Stand by. • Following After Authorized Passage. • Counter Direction Intrusion Alarming.
  • 13. • Overtime Alarming. • Stay Intrusion Alarming. • Emergency Open / Close Mode. • Degradation Mode.
  • 14. Emergency Open / Close Mode • Emergency modes is used in special applications, such as fire alarm, etc. • In those modes, the authorization will be shield and arms remains open/close till input any signal to change be other mode.
  • 15. Degradation Mode • This mode appears when the detection cell are broken or blocked during initialization. • authorization is valid but all of the detection cell are shield, the arms will only close the after the valid time.
  • 16. Asset Online Pvt.Ltd. #388,Bluemoon x, Lnt. 9th main, sector 7, HSR layout, Bangalore-560102. Name: Bharath Kumar Mob number: 8277110064.