Show simple item record

dc.contributor.advisorGuerrero Santander, César Daríospa
dc.contributor.authorOrtiz Cuadros, José Davidspa
dc.coverage.spatialBucaramanga (Santander, Colombia)spa
dc.date.accessioned2020-06-26T21:35:50Z
dc.date.available2020-06-26T21:35:50Z
dc.date.issued2018
dc.identifier.urihttp://hdl.handle.net/20.500.12749/3550
dc.description.abstractEn Colombia, la mayoría de las IES no cuentan con sistemas automatizados de control de acceso de ingreso a salones de clase. Esto impide se pueda tener información en tiempo real, que permita realizar una auditoría sobre asistencia de estudiantes a clase y cumplimiento por parte de los docentes con los horarios de clase establecidos. En la Universidad Autónoma de Bucaramanga - UNAB, dado que es una institución de puertas abiertas que no restringe el ingreso a ningún ciudadano, llevar esa auditoría de acceso se hace aún más difícil. El registro manual a través de bitácoras de acceso está expuesto a errores por fallos humanos, información desactualizada, mayor esfuerzo logístico y, falencias en cuanto a confiabilidad de la información reportada, entre otros aspectos. Un control de acceso IoT es un sistema automatizado, que permite obtener datos confiables, donde se elimina la intervención humana e interactúa de manera ubicua. En este trabajo de investigación se realizó un prototipo usando tecnología RFID, que permite llevar el control de acceso a un aula de clase en la UNAB. Esto permite que la información se pueda obtener en tiempo real, ayudando a mejorar procesos logísticos de las IES. Tras identificar los requerimientos básicos de este sistema y necesidades específicas de la UNAB, se continuó a la etapa del diseño del prototipo a implementar; luego se implementó en un aula de la universidad para evaluar su uso en el entorno universitario. Los resultados evidencian que un sistema IoT para control de asistencia y auditoría en IES, no solo posee un nivel de aceptación considerable, sino que permite reducir el tiempo que se requería; la velocidad al hacer uso de este sistema, permite usar el tiempo de clase para los temas de la misma y a su vez, cumple con los requisitos dados por el MEN.spa
dc.description.tableofcontentsCONTENIDO Pág. INTRODUCCIÓN….……………………………………………………………………..19 1. PLANTEAMIENTO DEL PROBLEMA, JUSTIFICACIÓN, PREGUNTA DE INVESTIGACIÓN E HIPÓTESIS 20 1.1 JUSTIFICACIÓN 22 1.2 PREGUNTA DE INVESTIGACIÓN 22 1.3 HIPÓTESIS 22 2. OBJETIVOS 23 2.1 OBJETIVO GENERAL 23 2.2 OBJETIVOS ESPECÍFICOS 23 3. ANTECEDENTES 24 4. MARCO REFERENCIAL 26 4.1 MARCO CONCEPTUAL 26 4.1.1 Control de acceso 26 4.1.2 Internet of Things - IoT 26 4.1.3 Institución de Educación Superior - IES 27 4.2 MARCO TEÓRICO 27 4.2.1 SISTEMAS DE CONTROL DE ACCESO 27 4.2.2 Internet of Things 28 4.2.3 Identificación por Radiofrecuencia - RFID 29 4.2.4 Sistemas embebidos 31 4.2.5 Biometría 35 4.2.6 Deserción escolar 36 4.3 ESTADO DEL ARTE 37 4.3.1 Revisión sistemática de la literatura 37 4.3.2 Control de acceso en la actualidad 41 4.4 MARCO LEGAL 46 4.4.1 Normas Colombianas 46 4.4.2 Normas Internacionales 48 5. DISEÑO METODOLÓGICO 51 5.1 FASES DEL PROYECTO DE INVESTIGACIÓN 51 5.2 POBLACIÓN 54 5.2 TÉCNICAS E INSTRUMENTACIÓN DE RECOLECCIÓN DE DATOS 54 6. RESULTADOS 56 6.1 ESTADO DEL ARTE SOBRE SISTEMAS DE CONTROL DE ACCESO BASADOS EN TECNOLOGÍAS DE INTERNET DE LAS COSAS 56 6.2 REQUERIMIENTOS GENERALES, FUNCIONALES Y NO FUNCIONALES, PARA INSTITUCIONES DE EDUCACIÓN SUPERIOR DE LOS SISTEMAS DE CONTROL DE ACCESO BASADOS EN IOT 56 6.2.1 Alcance de la solución 57 6.2.2 Especificación de requerimientos 57 6.3 DISEÑO A NIVEL DE HARDWARE Y SOFTWARE DE UN SISTEMA DE CONTROL DE ACCESO BASADO EN TECNOLOGÍAS IOT 73 6.3.1 Situación actual 73 6.3.2 Encuesta de percepción estudiantil 75 6.3.3 Diseño de hardware 80 6.3.4 Diseño de software 90 6.3.5 Diseño de red 97 6.3.6 Diseño físico del prototipo 101 6.3.7 Construcción del prototipo funcional 102 6.4 IMPLEMENTACIÓN A NIVEL DE HARDWARE Y SOFTWARE, DE UN PROTOTIPO FUNCIONAL DE SISTEMA DE CONTROL DE ACCESO BASADO EN TECNOLOGÍAS IOT 107 6.4.1 Sitio de instalación 107 6.4.2 Comunicación a internet 110 6.4.3 Plataforma web General 111 6.4.4 Datos capturados a partir de la implementación 114 6.5 PRUEBA PILOTO DEL PROTOTIPO IMPLEMENTADO EN UN AULA DE LA UNAB 114 6.5.1 Diseño y marca del producto 115 6.5.2 Ejecución de la prueba piloto 121 6.4.3 Datos capturados a partir de CLASS 125 6.5.4 Encuesta de aceptación de tecnologías en IES 125 7. OTROS RESULTADOS 130 8. CONCLUSIONES 131 LISTA DE ANEXOS 14 REFERENCIAS 133spa
dc.format.mimetypeapplication/pdfspa
dc.language.isospaspa
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/2.5/co/*
dc.subjectUniversidad Autónoma de Bucaramanga UNAB
dc.titleControl de acceso basado en tecnologías IOT en instituciones de educación superior, prototipo aplicado al control del ingreso a salones y auditoría en la Universidad Autónoma de Bucaramanga - UNAB (Colombia)spa
dc.title.translatedIOT based access control technology for higher education. prototype applied to access control and auditory to classrooms at Universidad Autónoma de Bucaramanga - UNAB (Colombia)eng
dc.degree.nameMagíster en Telemáticaspa
dc.coverageBucaramanga (Colombia)spa
dc.publisher.grantorUniversidad Autónoma de Bucaramanga UNABspa
dc.rights.localAbierto (Texto Completo)spa
dc.publisher.facultyFacultad Ingenieríaspa
dc.publisher.programMaestría en Telemáticaspa
dc.description.degreelevelMaestríaspa
dc.type.driverinfo:eu-repo/semantics/masterThesis
dc.type.localTesisspa
dc.type.coarhttp://purl.org/coar/resource_type/c_bdcc
dc.subject.keywordsSystems engineeringeng
dc.subject.keywordsTelematicseng
dc.subject.keywordsRadio frequency identification systemseng
dc.subject.keywordsIntelligent control systemseng
dc.subject.keywordsSoftware engineeringeng
dc.subject.keywordsDesigneng
dc.subject.keywordsInvestigationseng
dc.subject.keywordsAnalysiseng
dc.identifier.instnameinstname:Universidad Autónoma de Bucaramanga - UNABspa
dc.identifier.reponamereponame:Repositorio Institucional UNABspa
dc.type.hasversioninfo:eu-repo/semantics/acceptedVersion
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.rights.accessrightshttp://purl.org/coar/access_right/c_abf2spa
dc.relation.referencesOrtiz Cuadros, José David (2018). Control de acceso basado en tecnologías IOT en instituciones de educación superior, prototipo aplicado al control del ingreso a salones y auditoría en la Universidad Autónoma de Bucaramanga - UNAB (Colombia). Bucaramanga (Colombia) : Universidad Autónoma de Bucaramanga UNABspa
dc.relation.referencesAgencia Nacional del Espectro - ANE. (2016). Resolución No. 711 de 2016. Diario Oficial No. 50.061: Agencia Nacional del Espectro Retrieved from http://www.ane.gov.co/images/COMUNICACIONES2016/RESOLUCION_711_2016.pdf.spa
dc.relation.referencesAmbysoft. (2005). AUP, Agile Unified Process. from http://www.ambysoft.com/scottAmbler.htmlspa
dc.relation.referencesArmitage, R. (2014). Crime prevention through environmental design Encyclopedia of criminology and criminal justice (pp. 720-731): Springer.spa
dc.relation.referencesAshton, K. (2009). I could be wrong, but I'm fairly sure the phrase “Internet of Things” started life as the title of a presentation I made at Procter & Gamble (P&G) in 1999. RFID Journal, 22.spa
dc.relation.referencesAydın, K., & Yıldırım, S. (2012). Case study about RFID System in Library Services. Technology, 1, 2.spa
dc.relation.referencesBadamasi, Y. A. (2014). The working principle of an Arduino. Paper presented at the Electronics, computer and computation (icecco), 2014 11th international conference on.spa
dc.relation.referencesBagheri, M., & Movahed, S. H. (2016). The Effect of the Internet of Things (IoT) on Education Business Model. Paper presented at the Signal-Image Technology & Internet-Based Systems (SITIS), 2016 12th International Conference on.spa
dc.relation.referencesBanerjee, S. P., & Woodard, D. L. (2012). Biometric authentication and identification using keystroke dynamics: A survey. Journal of Pattern Recognition Research, 7(1), 116-139.spa
dc.relation.referencesBienestar Universitario UNAB. (2016). Informe de deserción estudiantil: Universidad Autónoma de Bucaramanga.spa
dc.relation.referencesBiswas, A. (2016). Applicability and usability of RFID technology in library. Learning Community: An International Journal of Educational and Social Development, 7(1), 53.spa
dc.relation.referencesBohn, J., & Mattern, F. (2004). Super-distributed RFID tag infrastructures. Paper presented at the European symposium on ambient intelligence.spa
dc.relation.referencesBrock, J. D., Bruce, R. F., & Reiser, S. L. (2009). Using Arduino for introductory programming courses. Journal of Computing Sciences in Colleges, 25(2), 129-130.spa
dc.relation.referencesCastillo, E. O., Rojas, H. E., & Gómez, E. J. (2016). Modulo RFID de Acceso para oficinas. Tekhnê, 13(2), 19-26.spa
dc.relation.referencesCEA IoT. (2016). CEA-IoT | Centro de Excelencia y Apropiación en Internet de las Cosas. Retrieved 06/06/2017, 2017, from http://www.cea-iot.org/spa
dc.relation.referencesCEA IoT. (2016). CEA-IoT | Centro de Excelencia y Apropiación en Internet de las Cosas. Retrieved 06/06/2017, 2017, from http://www.cea-iot.org/spa
dc.relation.referencesCongreso de Colombia. (2012). LEY ESTATUTARIA 1581 DE 2012. Diario Oficial de la Republica de Colombia: Diario Oficial 48587 Retrieved from http://wsp.presidencia.gov.co/Normativa/Leyes/Documents/LEY%201581%20DEL%2017%20DE%20OCTUBRE%20DE%202012.pdf.spa
dc.relation.referencesCongreso de la República de Colombia. (2009). LEY 1341 DE 2009. MINTIC: Diario Oficial 47426 Retrieved from http://www.mintic.gov.co/portal/604/articles-3707_documento.pdf.spa
dc.relation.referencesCongreso de la República de Colombia. (2009). LEY 1341 DE 2009. MINTIC: Diario Oficial 47426 Retrieved from http://www.mintic.gov.co/portal/604/articles-3707_documento.pdf.spa
dc.relation.referencesChandra, P., Soni, P., & Keshari, R. K. (2014). RFID-based Ticketing for Public Transport System: Perspective Megacity. International Journal of Advance Research in Computer Science and Management Studies, 2(5).spa
dc.relation.referencesChuu, S.-J. (2014). An investment evaluation of supply chain RFID technologies: A group decision-making model with multiple information sources. Knowledge-Based Systems, 66, 210-220.spa
dc.relation.referencesD’Ausilio, A. (2012). Arduino: A low-cost multipurpose lab equipment. Behavior research methods, 44(2), 305-313.spa
dc.relation.referencesDe Marco, A., Cagliano, A. C., Nervo, M., & Rafele, C. (2014). Modeling the effectiveness of radio frequency identification (RFID) technologies in improving sales performance in fashion retail outlets. Fashion Supply Chain Management Using Radio Frequency Identification (RFID) Technologies, 203.spa
dc.relation.referencesDoukas, C. (2012). Building Internet of Things with the ARDUINO: CreateSpace Independent Publishing Platform.spa
dc.relation.referencesDubey, H., Yang, J., Constant, N., Amiri, A. M., Yang, Q., & Makodiya, K. (2015). Fog data: Enhancing telehealth big data through fog computing. Paper presented at the Proceedings of the ASE BigData & SocialInformatics 2015.spa
dc.relation.referencesEdwards, E., & Orukpe, P. (2014). Development of a RFID based library management system and user access control. Nigerian Journal of Technology, 33(4), 574-584.spa
dc.relation.referencesEvans, D. (2011). The internet of things: How the next evolution of the internet is changing everything. CISCO white paper, 1(2011), 1-11.spa
dc.relation.referencesFarooq, U., ul Hasan, M., Amar, M., Hanif, A., & Asad, M. U. (2014). RFID based security and access control system. International Journal of Engineering and Technology, 6(4), 309.spa
dc.relation.referencesGlidden, R., Bockorick, C., Cooper, S., Diorio, C., Dressler, D., Gutnik, V., . . . Humes, T. (2004). Design of ultra-low-cost UHF RFID tags for supply chain applications. IEEE Communications Magazine, 42(8), 140-151.spa
dc.relation.referencesGluck, A. (2015). Multi-purpose credit card reader apparatus: Google Patents. Gordón Díaz, N. Y. (2009). Control de acceso en la entrada del Instituto Geofísico utilizando tecnología RFID. QUITO/EPN/2009.spa
dc.relation.referencesGubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660spa
dc.relation.referencesGuillemin, P., & Friess, P. (2009). Internet of things strategic research roadmap. The Cluster of European Research Projects, Tech. Rep.spa
dc.relation.referencesGul, M. S., & Patidar, S. (2015). Understanding the energy consumption and occupancy of a multi-purpose academic building. Energy and Buildings, 87, 155-165.spa
dc.relation.referencesHernández, J. L. H., Valencia, R. E. C., & Morales, A. F. ADMINISTRACIÓN DE ARCHIVOS.spa
dc.relation.referencesInstitute of Electrical and Electronics Engineers - IEEE. (2015). IEEE 802.3: Standard for Ethernet. IEEE Standards Association.spa
dc.relation.referencesInstitute of Electrical and Electronics Engineers - IEEE. (2016). IEEE 802.11: Wireless LANs. IEEE: IEEE Standards Association,.spa
dc.relation.referencesInternational Organization for Standardization - ISO. (2016). ISO/IEC 14443-1. ISO. International Organization for Standardization - ISO: ISO.spa
dc.relation.referencesInternational Telecommunication Union - ITU. (2012). SERIE Y: INFRAESTRUCTURA MUNDIAL DE LA INFORMACIÓN, ASPECTOS DEL PROTOCOLO INTERNET Y REDES DE LA PRÓXIMA GENERACIÓN. ITU.spa
dc.relation.referencesJain, A., Hong, L., & Pankanti, S. (2000). Biometric identification. Communications of the ACM, 43(2), 90-98.spa
dc.relation.referencesJang, J. J., Moon, J., & Jung, I. Y. (2015). A Personalized Access Control Based on IoT. Paper presented at the Dependable Computing (PRDC), 2015 IEEE 21st Pacific Rim International Symposium on.spa
dc.relation.referencesJia, X., Feng, Q., Fan, T., & Lei, Q. (2012). RFID technology and its applications in Internet of Things (IoT). Paper presented at the Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference onspa
dc.relation.referencesJuels, A. (2006). RFID security and privacy: A research survey. IEEE journal on selected areas in communications, 24(2), 381-394.spa
dc.relation.referencesLee, C.-T., Wu, C.-C., Su, B.-R., & Shen, T.-C. (2016). A novel electronic lock using ultrasound Morse code based on FIR filter. Paper presented at the Advanced Materials for Science and Engineering (ICAMSE), International Conference on.spa
dc.relation.referencesLozano Segura, J. A. (2013). Estudio documental del aporte de la tecnología para la generación de ambientes seguros en las instituciones de educación superior (IES) colombianas.spa
dc.relation.referencesMasek, L. (2003). Recognition of human iris patterns for biometric identification. Meli, M., Gysel, M., Würms, M., & Meli, M. Low cost solutions to pairing issues in IEEE 802.15. 4 networks.spa
dc.relation.referencesMeng, W., Wong, D. S., Furnell, S., & Zhou, J. (2015). Surveying the development of biometric user authentication on mobile phones. IEEE Communications Surveys & Tutorials, 17(3), 1268-1293.spa
dc.relation.referencesMinisterio de Comercio Industria y Turismo. (2013). DECRETO 1377 DE 2013. Diario Oficial de la Republica de Colombia: Diario Oficial 48834 Retrieved from http://wsp.presidencia.gov.co/Normativa/Decretos/2013/Documents/JUNIO/27/DECRETO%201377%20DEL%2027%20DE%20JUNIO%20DE%202013.pdf.spa
dc.relation.referencesMinisterio de Comercio Industria y Turismo. (2014). Decreto número 886 de 2014. Diario Oficial de la Republica de Colombia: Diario Oficial 49150 Retrieved from http://wsp.presidencia.gov.co/Normativa/Decretos/2014/Documents/MAYO/13/DECRETO%20886%20DEL%2013%20DE%20MAYO%20DE%202014.pdf.spa
dc.relation.referencesMinisterio de Educación Nacional de Colombia- MEN. (2009). Deserción estudiantil en la educación superior colombiana.spa
dc.relation.referencesMinisterio de Educación Nacional de Colombia- MEN. (2010). Instituciones de Educación Superior (IES). Retrieved from https://www.mineducacion.gov.co/1621/article-217744.htmlspa
dc.relation.referencesMinisterio de Educación Nacional de Colombia- MEN. (2015). Decreto Único Reglamentario 1075 de 2015. Ministerio de Educación Nacional de Colombia- MEN: Ministerio de Educación Nacional de Colombia- MEN, Retrieved from https://www.mineducacion.gov.co/1759/w3-article-351080.html.spa
dc.relation.referencesMinisterio de Educación Nacional de Colombia - MEN. (2011). El ABC de la Deserción. Retrieved 25/05/2017, 2017, from http://www.mineducacion.gov.co/1621/articles-293659_archivo_pdf_abc.pdfspa
dc.relation.referencesMy Com Kits. (2008). Songle SRD Relay. Retrieved 01/02/2018, 2018, from http://www.mycomkits.com/reference/Songle_SRD(T73)_Relay.pdfspa
dc.relation.referencesNainan, S., Parekh, R., & Shah, T. (2013). RFID technology based attendance management system. arXiv preprint arXiv:1306.5381.spa
dc.relation.referencesNi, L. M., Liu, Y., Lau, Y. C., & Patil, A. P. (2004). LANDMARC: indoor location sensing using active RFID. Wireless networks, 10(6), 701-710.spa
dc.relation.referencesNXP Semiconductors. (2016). MFRC522 - Standard performance MIFARE and NTAG frontend. Retrieved 02/02/2018, 2018, from https://www.nxp.com/docs/en/data-sheet/MFRC522.pdfspa
dc.relation.referencesPalma, D., Agudo, J. E., Sánchez, H., & Macías, M. M. (2014). An Internet of Things example: Classrooms access control over near field communication. Sensors, 14(4), 6998-7012.spa
dc.relation.referencesPandey, P., & Mahajan, K. (2012). Application of RFID technology in libraries and role of librarian. Paper presented at the 12th MANLIBNET Convention 2010, Jaipur.spa
dc.relation.referencesPatino, J. M., Moreno, F. I., Figueroa, M. A. H., Garcia, J. M. L., & Martin, H. G. (2017). A modified analysis of electrical energy consumption in University buildings. IEEE Latin America Transactions, 15(3), 408-414.spa
dc.relation.referencesPosamentier, J. (2005). RFID tag with separate transmit and receive clocks and related method: Google Patents.spa
dc.relation.referencesPouryayevali, S., Wahabi, S., Hari, S., & Hatzinakos, D. (2014). On establishing evaluation standards for ECG biometrics. Paper presented at the Acoustics, speech and signal processing (icassp), 2014 ieee international conference on.spa
dc.relation.referencesQiu, Y., Chen, J., & Zhu, Q. (2012). Campus access control system based on RFID. Paper presented at the Software Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference on.spa
dc.relation.referencesRaghavendra, R., Raja, K. B., Surbiryala, J., & Busch, C. (2014). A low-cost multimodal biometric sensor to capture finger vein and fingerprint. Paper presented at the Biometrics (IJCB), 2014 IEEE International Joint Conference on.spa
dc.relation.referencesRaza, A., Ikram, A. A., Amin, A., & Ikram, A. J. (2016). A review of low cost and power efficient development boards for IoT applications. Paper presented at the Future Technologies Conference (FTC).spa
dc.relation.referencesRaza, N., Bradshaw, V., & Hague, M. (1999). Applications of RFID technology.spa
dc.relation.referencesRichardson, M., & Wallace, S. (2012). Getting started with raspberry PI: " O'Reilly Media, Inc.".spa
dc.relation.referencesRisalat, N. A. M., Hasan, M. T., Hossain, M. S., & Rahman, M. M. (2017). Advanced real time RFID mutual authentication protocol using dynamically updated secret value through encryption and decryption process. Paper presented at the Electrical, Computer and Communication Engineering (ECCE), International Conference on.spa
dc.relation.referencesRodríguez Mederos, M., Montes de Oca Sánchez de Bustamante, A., & Dorta Héctor, J. (2002). Utilización y conservación de los soportes electrónicos. Acimed, 10(6), 7-8.spa
dc.relation.referencesRogers, A., Jones, E., & Oleynikov, D. (2007). Radio frequency identification (RFID) applied to surgical sponges. Surgical endoscopy, 21(7), 1235-1237.spa
dc.relation.referencesRoper, K. O., Sedehi, A., & Ashuri, B. (2015). A cost-benefit case for RFID implementation in hospitals: adapting to industry reform. Facilities, 33(5/6), 367-388.spa
dc.relation.referencesSabol, C., Nick, W., Earl, M., Shelton, J., & Esterline, A. (2016). The WebID Protocol Enhanced With Group Access, Biometrics, and Access Policies.spa
dc.relation.referencesSaib, J., & Suzuki, A. (2002). GUI resource editor for an embedded system: Google Patents.spa
dc.relation.referencesSampieri, R. H., Collado, C. F., & Lucio, P. B. (2014). Metodología de la investigación (Vol. 5): Mcgraw-hill México.spa
dc.relation.referencesSays, G. (2015). 6.4 billion connected “Things” will be in use in 2016, up 30 percent from 2015. Gart. Inc.spa
dc.relation.referencesSchoeberl, M. (2008). Jop: A java optimized processor for embedded real-time systems: VDM Publishing.spa
dc.relation.referencesSerratosa, F. (2008). La biometría para la identificación de las personas. Universitat Oberta de Catalunya, 8-20.spa
dc.relation.referencesShankar, S., & Udupi, V. (2016). Recognition of Faces–An Optimized Algorithmic Chain. Procedia Computer Science, 89, 597-606.spa
dc.relation.referencesSharma, R., Agarwal, A. K., & Singh, P. (2017). Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis. Journal of Network Communications and Emerging Technologies (JNCET) www. jncet. org, 7(1).spa
dc.relation.referencesSheela, S., & Vijaya, P. (2010). Iris recognition methods-survey. International Journal of Computer Applications, 3(5), 19-25.spa
dc.relation.referencesShen, X., Xu, K., Sun, X., Wu, J., & Lin, J. (2011). Optimized indoor wireless propagation model in WiFi-RoF network architecture for RSS-based localization in the Internet of Things. Paper presented at the Microwave Photonics, 2011 International Topical Meeting on & Microwave Photonics Conference, 2011 Asia-Pacific, MWP/APMP.spa
dc.relation.referencesShu, Y., Gu, Y. J., & Chen, J. (2014). Dynamic authentication with sensory information for the access control systems. IEEE Transactions on Parallel and Distributed Systems, 25(2), 427-436.spa
dc.relation.referencesSilva, F., Filipe, V., & Pereira, A. (2008). Automatic control of students' attendance in classrooms using RFID. Paper presented at the Systems and Networks Communications, 2008. ICSNC'08. 3rd International Conference on.spa
dc.relation.referencesSousa, P. J., Tavares, R., Abreu, P., Quintas, M., Reis, A., & Restivo, M. T. (2015). Wireless control and network management of door locks. Paper presented at the Experiment@ International Conference (exp. at'15), 2015 3rd.spa
dc.relation.referencesSowjanya, G., & Nagaraju, S. (2016). Design and implementation of door access control and security system based on IOT. Paper presented at the Inventive Computation Technologies (ICICT), International Conference on.spa
dc.relation.referencesSPADIES. (2016). Tabla de deserción estudiantil. Retrieved 06/06/2017, 2017, from https://spadies.mineducacion.gov.co/spadies/JSON.htmlspa
dc.relation.referencesStrauss, K. F., & Daud, T. (2000). Overview of radiation tolerant unlimited write cycle non-volatile memory. Paper presented at the Aerospace Conference Proceedings, 2000 IEEE.spa
dc.relation.referencesStrong Link. (2002). Standard 4 kByte Card IC MF1 IC S70 - Data Sheet. Retrieved 26/01/2018, 2018, from http://www.stronglink-rfid.com/download/M043531.pdfspa
dc.relation.referencesUnión Internacional de Telecomunicaciones - UIT. (2012). Reglamento de Radiocomunicaciones. ITU: Unión Internacional de Telecomunicaciones - UIT.spa
dc.relation.referencesUniversidad Autónoma de Bucaramanga - UNAB. (2017). UNAB en cifras 2016. UNAB: Universidad Autónoma de Bucaramanga - UNAB.spa
dc.relation.referencesUniversidad Autónoma de Bucaramanga - UNAB. (2018). Sistema de Préstamos y Reservas. Retrieved 03/03/2018, 2018spa
dc.relation.referencesVidela, C., & A, O. (2016). Adermatoglifia: Una mutación genética que impide la formación de huellas dactilares. Archivos de Criminología, Criminalística y Seguridad Privada, 6.spa
dc.relation.referencesVujovic, V., & Maksimovic, M. (2014). Raspberry Pi as a wireless sensor node: performances and constraints. Paper presented at the Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2014 37th International Convention on.spa
dc.relation.referencesWang, K. C., Wang, T. T., Jia, Z. F., & Zong, M. K. (2012). Research of RFID Intelligent Access Control System in the Internet of Things. Paper presented at the Advanced Materials Research.spa
dc.relation.referencesWang, W., Krishna, A., & McFerran, B. (2017). Turning Off the Lights: Consumers’ Environmental Efforts Depend on Visible Efforts of Firms. Journal of Marketing Research, 54(3), 478-494.spa
dc.relation.referencesWant, R. (2006). An introduction to RFID technology. IEEE pervasive computing, 5(1), 25-33.spa
dc.relation.referencesYale Colombia. (2011). Cantonera Eléctrica. Retrieved 06/02/2018, 2018, from https://www.yalecolombia.com/es/yale/yale/productos/cerraduras-electromecanicas/contra-larga/spa
dc.relation.referencesZhang, L. J. (2014). Design of a Novel Automatic Access Control System. Paper presented at the Advanced Materials Research.spa
dc.contributor.cvlachttps://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0000809357*
dc.contributor.googlescholarhttps://scholar.google.es/citations?hl=es#user=_YgBOOcAAAAJ*
dc.contributor.scopushttps://www.scopus.com/authid/detail.uri?authorId=23094317500*
dc.subject.lembIngeniería de sistemasspa
dc.subject.lembTelemáticaspa
dc.subject.lembSistemas de identificación de radiofrecuenciaspa
dc.subject.lembSistemas de control inteligentespa
dc.subject.lembIngeniería de softwarespa
dc.subject.lembDiseñospa
dc.subject.lembInvestigacionesspa
dc.subject.lembAnálisisspa
dc.description.abstractenglishIn Colombia, the majority of Higher Education Institutions do not have automated access control systems for classrooms. This prevents to get information in real-time that allows audit of student attendance to class and compliance by teachers with established class schedules. At the Autonomous University of Bucaramanga - UNAB, given that it is an open-door institution that does not restrict entry to any citizen, carrying that access audit becomes even more difficult. The manual registry through access binnacle is exposed to errors in the capture of data due to human failures, outdated information, greater logistical effort, and shortcomings in terms of the reliability of the reported information, among other aspects. Access control based on IoT is an automated system, which allows obtaining reliable data, where human intervention is eliminated and interacts with people in a ubiquitous manner. In this research work, a prototype was made using RFID technology, which allows the control of access to a classroom in the UNAB. This allows the information to be obtained in real time, helping to improve IES logistics processes. After identifying the basic requirements of this system, the specific needs of the UNAB were evaluated and so, moving on to the design stage of the prototype to be implemented; then the implementation of the same in a classroom of the university was carried out together with the tests to evaluate its use in the university environment. The results show that the use of IoT systems for the control of assistance and audit in IES, not only has a considerable level of acceptance, but also allows to reduce the time that was required; the speed when using this system, allows to use class time for the topics of the same and in turn, meets the requirements given by the MEN.eng
dc.subject.proposalControl de acceso
dc.subject.proposalRFIDspa
dc.subject.proposalEducación superiorspa
dc.subject.proposalIoTspa
dc.subject.proposalAccess controleng
dc.subject.proposalHigher educationeng
dc.type.redcolhttp://purl.org/redcol/resource_type/TM
dc.rights.creativecommonsAtribución-NoComercial-SinDerivadas 2.5 Colombia*


Files in this item

Thumbnail
Thumbnail
Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Atribución-NoComercial-SinDerivadas 2.5 Colombia
Except where otherwise noted, this item's license is described as Atribución-NoComercial-SinDerivadas 2.5 Colombia