Smart Gate Pass Security Management System Using Random Key Generation

Authors

  • Richita Rodrigues Student (Under Graduate), Department of Computer Science & Engineering, St. Francis Institute of Technology College of Engineering, Mumbai , Maharashtra, India Author
  • Aruna Pavate Assistant Professor, Department of Computer Science & Engineering, St. Francis Institute of Technology College of Engineering, Mumbai , Maharashtra, India Author
  • Rujuta Sawant Student (Under Graduate), Department of Computer Science & Engineering, St. Francis Institute of Technology College of Engineering, Mumbai , Maharashtra, India Author
  • Nehal Lopes Student (Under Graduate), Department of Computer Science & Engineering, St. Francis Institute of Technology College of Engineering, Mumbai , Maharashtra, India Author

Keywords:

OTP, Android Application, Web Application, Gate, Admin and Visitor

Abstract

Gate pass management system relates to  the act of security. This system can be used to speed up the  visitor registration which will notify the presence of visitors  in the organisation. This can be used to replace the  traditional visitor registration process. This reduces the  problem of appointments and gathering information about  the visitor via web and android application and this  information is recorded in the database that manages the  data. The Gate pass Management System (GMS) organises  the visitor record and reduces the time of management and  enhances the level of security. 

Downloads

Download data is not yet available.

References

H. Gunawan and E. A. Kadir, ”Integration protocol student academic information to campus RFID gate pass system,” 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI, Yogyakarta, 2017, pp. 1-6.

Harish Rapartiwar, Pushpanjali Shivratri, Omkar Sonakul, Prof. Ashwini Bhugul Computer Engineering, Marathwada Mitra Mandal’s College of Engineering, Pune, India, Visitor Gate Pass Management System : IJCSMC, Vol. 6, Issue. 2, February 2017.

Prof. Abhay Gaidhani1, Suraj Sahijwani2, Parag Jain3, Shantanu Jadhav4, Ankush Jain5 1,2,3,4,5 Department of Computer Engineering, Sandip Institute of Engineering Management, Nashik, Volume 02, Issue 10, [October – 2015].

Mallesham Yerragolla, Kamalakar Pallela, Indira Priyadarshini Gera, “ 2016 IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering (UPCON) Indian Institute of Technology (Banaras Hindu University) Varanasi, India, Dec 9-11, 2016.

R. Halemani and A. Rajagopal, ”Building automationsecurity using can and IoT,” 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Davangere, 2015, pp. 471-476.

S. Sivathasan, ”RF/FSO and LEACH wireless sensor networks: A case study comparing network performance,” 2009 IFIP International Conference on Wireless and Optical Communications Networks,Cairo, 2009.

IEEE Health informatics–PoC medical device communication Part 00101: Guide– Guidelines for the use of RF wireless technology,” in IEEE Std 11073-00101-2008 ,vol., no., pp.1-125, 26 Dec. 2008.

H. Tsai, G. Chen and H. Lee, ”Poster Abstract: Using Low Cost, Non-Sensor-Equipped BLE Beacons to Track People’s Movements,” 2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), Pittsburgh, PA, 2017, pp. 291-292.

R. C. Jisha, M. V. Ramesh and G. S. Lekshmi, ”Intruder tracking using wireless sensor network,” 2010 IEEE International Conference on Computational Intelligence and Computing Research, Coimbatore, 2010, pp. 1-5.

M. Zank, T. Nescher and A. Kunz, ”Tracking human locomotion by relative positional feet tracking,” 2015 IEEE Virtual Reality (VR), Arles, 2015, pp. 317-318.

Published

2021-05-30

How to Cite

Smart Gate Pass Security Management System Using Random Key Generation . (2021). International Journal of Innovative Research in Computer Science & Technology, 9(3), 60–65. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/11488