Wednesday, 25 November 2015

Wi-Fi

Do you ever have a moment where you step back and think how something you use every day actually works?

Have you ever stopped to consider exactly how e-mail or streaming video gets into your smartphone or tablet so quickly?

More specifically have you ever wondered how the heck computers actually communicate wirelessly?

Well, that is exactly the question we are going to be tackling in today’s topic.

What is Wi-Fi?

Wi-Fi stands for Wireless Fidelity and is the same thing as saying WLAN which stands for Wireless Local Area Network. Wi-Fi is actually very similar to a radio signal. All sound and data sent over the air uses waves. Waves can have different frequencies (how close together they are), amplitudes (how big they are), and phases (how they are aligned in time).

Wi-Fi does the exact same thing as a radio by transmitting at a very different frequency. It uses radio frequencies to send signals between devices. The radio frequencies are completely different say from walky talkies, car radios, cell phone and weather radios. For example, your car stereo receives frequencies in Kilohertz and Megahertz range (AM and FM stations) and Wi-Fi transmits and receives data in the Gigahertz range.

How Does Wi-Fi Work?

As mentioned above, a Wi-Fi network makes use of radio waves to transmit information across a network. The computer should include a wireless adapter that will translate data sent into a radio signal. This same signal will be transmitted via an antenna to a decoder known as the router. Once decoded, the data will be sent to the internet through a wired Ethernet connection. As the wireless network will work as a two-way traffic, the data received from the internet will also pass through the router to be coded into a radio signal that will be receipt by the computer’s wireless adapter.

Wi-Fi can be said as convenience. This is because after a brief set-up, most devices connect to the network automatically. For example, when you go to work, your smartphone finds the office Wi-Fi network. When you arrive home, the phone finds the wireless network there. This happens without any effort on your part. However, Wi-Fi is limited with the range network. Much more than 200 feet from the router, the signal becomes too weak to be useful and your device will disconnect from the network. It also take some time to setting up a network and need your patience.


References 





Automatic Doors

Have you ever wondered how do automatic doors know when to open? You went to shopping mall and your hands are full of bags of groceries and your need to put down all your groceries to open the door. Suddenly the doors open by itself as it is like a magic!

What’s going on here? Is something mystic at work? Or is there a ghost standing nearby opening the doors for people leaving the supermarket? Would you believe it is pure science and technology?

The doors known as automatic doors technically open and close with the help of simple technology not magic. Automatic doors are one of the best modern inventions. All we have to do is walk up to the door and it magically open for us. An automatic door is a closing or opening structure that is used to an entrance through the use of automated technology. Doors consist of many types for instance swinging, rotating and sliding.

The primary purpose of automatic doors is to allow for objects to pass through an area. Automatic doors also are used to control the physical atmosphere such as blocking wind from entering the building or acting as a noise barrier. Besides, some automatic doors have locking mechanisms that automatically open the door when a card is scanned or by scanning a fingerprint.

Have you ever wondered how these automatic doors are able to magically detect you and open the door just as you approach it?

Automatic doors have many useful purposes. It can be found in many different types of places. From supermarket to airports and many types of large buildings, automatic doors make it easier for people to get into and out of buildings. Automatic doors operate with the help of sensors. They are many different types of sensors that can sense different types of things such as sound, light, weight and motion. Most automatic doors use motion detection or optical sensors to activate the closing or opening mechanism. The sensors are installed at the sides of the door to track motion. Automatic door sensors are used in industrial and commercial environments to allow easy access to a building especially for disabled people. This makes entry to a building safer and more efficient.

One type of sensor is the pressure sensor. Automatic doors that use a pressure sensor have a large area that is placed in front and behind the building. The large area acts a weighing scale. If the weight limit that is set, then the door will open. Pressure sensors can also be used as secondary sensor. If the primary sensor were to fail, then the pressure sensor will activate.

Another type of sensor is the infra-red sensor. Infra-red sensors are usually used as the primary sensor in automatic door system. Infra-red sensor use infra-red technology to open automatic doors. The infra-red sensors are able to detect a change in temperature. When the sensors detect a temperature that is warmer, it will activate the opening and closing mechanism of the door. 

Similar to resolving doors, automatic doors also help to save energy since they limit the amount of time that doors are open to only those times people are entering or exiting a building. If you have ever shopped until your hands are full of bags, you know how handy automatic doors can be when it is time to head to the car.



Examples of automatic doors
The sensors detect an object


References


Saturday, 21 November 2015

Home Security System

What is a security system?

Security system is literally a means or method by which something is secured through a system of interworking components and devices. When we talk about home security system, it can be said that it is network of integrated electronic devices working together with a central control panel to protect against thieves and other potential home intruders.

A typical home security system includes:
  • A control panels which is the primary controller of home’s security system
  • Door and window sensors
  • Motion sensors
  • Wired or wireless security cameras
  • A high-decibel siren or alarm
  • A yard sign and window stickers

How does a security system work?

Home security systems work on the simple concept of securing entry points into a home with sensors that communicate with a control panel installed in a convenient location somewhere in the home. The sensors are typically placed in doors that lead to and from a house as well as easily accessible windows, particularly any that open, especially those at ground level. Open spaces inside of homes can be secured with motion sensors.

            1) Control Panel
The control panel is the computer that arms and disarms the security systems, communicates with each installed component, sounds the alarm when a security zone is breached, and communicates with an alarm monitoring company. They typically feature a touch pad for easy programming and interaction is where pass codes are entered to arm and disarm the system, can work on voice commands, and can be programmed to work with wireless remote controls called key fobs.

2)  Door and Window Sensors
 Door and window sensors are contained of two parts installed together to each other. One part of the device is installed on the door or window and the other on the door frame or window sill. When a door or window is closed, the two parts of the sensor are joined together and creating a security circuit.
                                               
When the security system is armed at the control panel, these sensors communicate with it by reporting that the point of entry is secure. When monitored door or window opened, the security circuit is broken and the control panel interprets this as a breach of a secured zone. A high-decibel alarm is sounded and in most cases the alarm monitoring company is automatically notified.

3) Motion Sensors
These security components protect a given space by creating an invisible zone that cannot be breached without sounding an alarm. Motion sensors are used to protect rooms comprising valuables as well as area less visited in larger home.

4) Surveillance Cameras
It is available in wired and wireless configuration. These cameras can be used in several different ways as part of an overall security system. Surveillance cameras can be accessed remotely on computers, smartphones and tablets. The home owners usually used in this method when they not at home. They can also be used to record any security breaches which could result in having footage of a home attack.

5) High-decibel Alarm
This alarm is loud enough to be heard by our neighbours. Besides, this home security alarm serves a few different purposes. This alarm alert the people inside the house when there is a problem happen. This alarm also shrills enough to send a burglar running while also notifying nearby neighbours to the situation.

6) Yard Sign and Yellow Stickers
These items play an important role in home security. When you place a security company’s sticker in front of window and plant their sign in your front yard, it means you are telling the burglars your home is protected and not wise choice for a struggled burglary. They are effective at conveying this message and should be used as recommended by the security company.

As a conclusion, by having a home security system professionally monitored and advertised this by displaying window stickers and yard sign it means you are letting burglars know likelihood they will fail and be caught are very high. Home security system also has the ability to remotely manage your house. You can typically arm and disarm your security system from anywhere in the world via a web-enable device which is good for your home safety.





Reference:



Sunday, 8 November 2015

E-ticket

E-ticket is an electronic ticket or electronic record of the traveller's airline reservation, containing information such as time, date and place of the flight, airport, seat assignment and travel class. An e-ticket carries the same information as a paper ticket but the major difference is an e-ticket is located in an airline's computer database instead of passenger's suitcase. In order to issue for e-ticket, airlines must have a database that is integrated with an airline's passenger service system. It  must be connected to all other partner which are airlines, airports, ground transport and travel agencies. 


However, if the travellers want to book by their own, they can visit any number of web-based ticketing sites. They can view the options available and use a credit or debit card to pay for their ticket. After placing an order, the electronic record of the ticket goes into the airline's database where it holds the passenger's spot.

Advantages of e-ticket

  • No more waiting for tickets to arrive in the post. Passengers just can check their e-mail and print them out.
  • No extra fees for special delivery or for arranging ticket to be collected at the airport.
  • If changes are made, passengers do not have to worry about returning a ticket to be issued. Passengers just can simply go on-line and print a new receipt for their itinerary.
  • Passengers can simply go on-line and print another one if they lose their ticket.
Disadvantages of e-ticket

  • A computer crash could cause a passenger's reservation and other information to simply vanish.
  • Frequent flyers such as business travellers might make last minute changes to their plans and forget to use the original e-ticket or apply their value to another flight. The old paper ticket might serve as a simple reminder.
  • E-ticketing could make some jobs such as those at travel agencies and airline reservations desks obsolete, adding to unemployment.
  • Some experts argue e-ticket and the procedures  associated with purchasing and using them it harder to detect risk.




How to use e-ticket

  1. Travellers can issue e-ticket in a number of ways. They can whether contact the travel agency to make arrangement or contact airline directly or use an on-line site. Travellers are compulsory to provide standard biographical and ticketing information for instance name, phone number, address and e-mail address as well as their destination and travel date.. Mostly, credit card or debit card is required for the actual purchase.
  2. The agency will send an e-mail to the purchaser's account, confirming the purchase and details of the trip. Sometimes, agency will send them e-ticket or a link to an airline web site where the passenger can view or download the e-ticket and travel itinerary. Passengers  need to save the e-mail and print them out as it helps as confirmation for the ticket purchase.
  3. Some on-line e-ticketing service will save a traveller's flight information on-line which enable a person to access it at any time from different locations by logging on the site and entering a password.
  4. Airport security procedures usually call for e-ticket flyers to present government issued identification to claim their ticket and receive a boarding pass. Passengers should check with individual airline for appropriate documentation requirements.
  5. It is recommended to check in at the airport whether using self-serve kiosk or at the airline counter. However, e-ticket holders can check in for their flight from their home computers.
  6. Once the e-ticket holder satisfies the requirements, the airline will issue a boarding pass. It will allows them through other security checkpoints and onto the aircraft.

References

Hotel Card Key System

A key card lock is a lock operated by a key card, a flat, rectangular plastic card with identical dimension to that credit card. Nowadays, most of hotel use Radio Frequency Identification Cards (RFID) or key card for door locks as the replacement for traditional keys.The hotel card key system was designed in the principal to enhance hotel security and upgrade hotel services. By using magnetic stripe card, guest are able to open their door room by inserting card to omit inconvenience by using traditional keys and it is unable to copy. 


Benefits of using key card

  1. Set the time frame of use. Let say a guest has paid for a night and is due to checkout the next day at 1pm. Even if he manages to evade the front desk employee after check out, his card would not work and he has to renew and pay for another night at reception.
  2. Prevent key duplication. No doubt RFID can be hacked. However, with a physical key, a visit to a nearby key duplicating service will get you the key for the room.
  3. User management (permission). Housekeeping can only open the doors for certain hours. However, for the bigger hotels, only floor managers and above have the right to open guest room doors. Each door opening is registered into the system (the memory in the door slot) and if there is missing objects happen, the hotels can call up the time stamp and reconfirm with CCTV.
  4. Power management. Newer systems which only allows the specific room key to power that said room can save electricity.

Store the room number




How does the wireless hotel key card room locks communicate?

In general, the doors are not communicating with the server. It means there is no wireless technology involved. The room number is stored on a chip within the battery-powered lock set itself. Every lock has a specific ID that can only be changed with special device that is connected to the lock directly. The cards are only programmed that way that there is a date until they are valid for being used as key. If someone steal and try to use the card after the time of booking, the lock denies access even if the card has worked before simply because the date passed until it has been declared as being valid.



References



Toll Network Automatic Payment System @ SmartTAG

SmartTAG or 'Toll Network Automatic Payment System' (Sistem Membayar Automatik Rangkaian Tol) is an on-board unit vehicle based device used as an electronic toll collection system over long distances (maximum 15 metres) to complement Touch 'n Go which is a card-based system. It has been introduced in Malaysia since 1999 and it also used as an Entrance Access Security. SmartTAG was designed and manufactured by Teras Tekonologi Sdn Bhd as an extension of the Touch 'n Go system, initially as a replacement of Plus Tag. 

The intellectual property rights to the SmartTAG belong to as Austrian company known as EFKON. The president of EFKON, Dr Gelmut Rieder, was the one who set up a joint venture with UEM to form infra-red advance Technology Sdn Bhd (IRAT).


The SmartTAG is currently prices at RM130 per unit included of free Touch 'n Go card with RM10 reload value. This is a subsidised price as UEM has to pay royalty to EFKON for each SmartTAG assembled by Irat. Built on a non-stop Electronic Toll Collection (ETC) philosophy, SmartTAG incorporated infra-red communication that communicated with infra-red transceivers mounted at the ceilings of toll plazas to allow vehicle drivers to drive through SmartTAG dedicated lanes and pay toll without stopping. It is designed to process up to 1200 vehicles per hour. 


Prior to the introduction of SmartTAG, several different type of non-stop ETC were already being used in Malaysia. SmartTAG was officially launched in 1999 over 20 plazas of Projek Lebuhraya Utasa Selatan (PLUS). However, in 2004, to diversify the usages and attract further subscription of SmartTAG, Teras Teknologi with co-operation from Nusajaya Land Sdn Bhd has implemented a secure Entrance Access Security for residential area. It first implemented at Ledang Height Bungalow Park. SmartTAG offers both security and convenience. Security is provided by two layers of electronic recognition required to access the perimeter. The layers are a SmartTAG unit and an assigned smart card registered to the security department. These units have to be detected simultaneously on authorised vehicles to gain entry into Ledang Heights.


Specialised SmartTAG lanes are provided at major exit or entry of toll plazas


Guidelines for Users




Always remember to: 
  • Ensure sufficient card balance by referring to the toll fare indicator screen and check your balance card when driving through the SmartTAG lane.
  • Check the SmartTAG battery level. Low battery will cause the failure of the the transaction. Therefore, please change your battery when you hear continuous beeping sound.

Reference

Fingerprint EPF Smart Kiosk

Fingerprint-based smart kiosk is an interactive self-service kiosk which need the users to insert their identity card into the slot and subsequently validate the identity card by placing their thumb on the fingerprint scanner. It takes merely two minutes for an authentication to be successfully validated. Fingerprint-based smart kiosk consists of two functions. Upon successful identifying and verifying via fingerprint system, members could obtain the activation code to create an i-Akaun to access myEPF portal. Besides, members are able to print out the latest update on the fund. This fingerprint-based greatly enhanced the effectiveness and the efficiency of EPF services. With the basic services redundant out of the way, officers can focus their tasks on more complex human interactions. Therefore, the number of people physically visiting the counters reveals the number of complaints received decreased distinctively.


This electronic service offering members the convenience of retrieving their latest statements in a matter of second. It recorded a total of 1.04 million transaction in quarter one 2008 which up 20.4 per cent from 865, 320 transactions in the fourth quarter of 2007. The EPF has introduced 136 smart kiosk at EPF offices nationwide, with another 32 at other strategic locations such as Institute Jantung Negara, RHB Bank, CIMB Bank and others and the amount of this smart kiosk will be increased at other convenient locations in the near future.


How smart kiosk works :

  1. Touch the screen and select the languages
  2. Insert your identity card at the left of the card reader
  3. Put your right thumb print
  4. Select the services wanted whether to activate your i-Akaun or print the statement
  5. Choose to print the statement
  6. Smart kiosk will print your statement 
  7. Do not forget to take your identity card




References