Professional Documents
Culture Documents
Automated Gate Pass System For Leads City University
Automated Gate Pass System For Leads City University
2011
AUTOMATED GATE PASS
SYSTEM.
ADETOLA OLANREWAJU .O
LEADS CITY UNIVERSITY.
11/28/2011
ADETOLA OLANREWAJU.O
Table of content
CHAPTER 1. INTRODUCTION
* Research Methodology
* Electronic Components
* Success Criteria
* Proposed system
*Functional Requirements
* Non-functional Requirements
*User Responsibilities
*Reliabilities
CHAPTER 4. IMPLEMENTATION
*Implementation
* User Training
*System Conversion
REFERENCES.
CHAPTER 1
INTRODUCTION
INTRODUCTION
RESEARCH METHODOLOGY
Collection of vital data to help me with the system analysis and design was acquired through
the following activities:-
Constant consultation with the project supervisor on how best to go about developing the
system and the LCU Electrical department.
Interviews with relevant officials from LCU who are responsible for the usage of the gate
such as security department, dean of student and the transport department.
Review of literature and documentation on similar projects from the LCU and other
libraries, encyclopedia etc.
Browsing the internet for any information concerning the system under consideration.
CHAPTER 2
LITERATURE REVIEW
The parallel port is used to generally manage printers. However, since this port has a group of
inputs and digital outputs, it can be used in making practical experimental reading of data and
controlling of devices. This work seeks to describe how the standard parallel port operates in
interfacing the computer and the system model.
Newer Parallel Ports are standardized under the IEEE 1284 standard first released in1994.This
standard defines 5 modes of operation which are as follows,
1. Compatibility Mode.
All the input and outputs use transistor logic (TTL) signal levels, where a low (logic 0) is
equivalent to 0 volts and a high (login 1) is equivalent to a voltage of 5 volts.
The input output ports constitute the means for which the microprocessor of a computer
communicates with its environment. The personal computer can address up to 64k ports of input
output. This project will allow the input of up to 9 bits or the output of 12 bits at any one given
time. The parallel port is commonly found on the back of the computer as a D-Type 25 Pin
female connector. This project makes use of the standard parallel port LPT1).The port is
composed of:
4 control lines,
8 data lines,
Figure 2.0: A 25- way female D-Type connector (printers parallel port)
ELECTRONIC COMPONENTS
RELAYS
Two twelve volts relays are used to interface the motors and the parallel port of the
computer. The twelve volts relays are used in the movements segment. The relay contains
two contacts, one normally open and the other normally closed. When coils of the relay are
energized, they will generate a magnetic field which will reverse the initial state of the
contacts, that is, the contact, which was normally open, becomes closed and that which was
normally closed becomes open rotating the motor in one direction. The change in directions
of the motor rotation is done by reversing connection of the other two relays. Address
Notes3BCh-3BFhUsual address for the parallel port378h-37Fh usual address for the
LPT1278h-27Fh usual address for the LPT2
LCU/UG/6978 BSc COMPUTER AND INFO SCIENCE 300L
ADETOLA OLANREWAJU.O
DIODES
The diodes are used to suck any remaining current in the coil when the relay is off. This
protects the motor from any damage which might be caused due to counteracting currents
when power flows in the opposite direction with the sending of a new signal.
RECTIFIER
The rectifier will be used in converting an alternating current (AC), which flows back and
forth in a circuit, to direct current (DC), which flows only in one direction. It will also
permit current to pass in only one direction, effectively blocking its flow in the other
direction, is inserted into the circuit for the purpose.
TRANSFORMER
The step down transformer is used to reduce the voltage from 240 volts to twelve (12)
volts to accommodate the relays which will be used.
CHAPTER 3
SUCCESS CRITERIA
SUCCESS CRITERIA
Success criterion is establishing the circumstances under which the work would be considered
successful. An outline of the functional and non-functional requirements of the system is given
herein.
EXISTING SYSTEM
There are a few existing gate systems which are only mechanized and use remote controls. But
these systems are insecure because in a situation where a remote control is a stolen or lost, it is
not easy to prevent someone using the stolen remote control from opening the gate. The only
solution is to either change the system or intensify security (by deploying security guards who
should keep track of who enters or leaves the premises) which would result in incurring
unnecessary expenses. The current gates pass system used at the leads City University is solely
manual and has no provision for the maintenance of an accurate and consistent record of gate
usage, and it has no capabilities for keeping track of the number of people who enter or leave the
premises. The current system is completely handled or managed by security guards and thus
security is compromised since these guards can easily be manipulated.
It is very costly to maintain. It involves the use of security guards, thus management incurs
some cost to pay security guards. At each gate there are at least two guards.
There is inconsistent and inaccuracy in the maintenance of records on gate usage. Guards are
the ones who are responsible for the maintenance of record. Records are kept in log books. These
records can easily be entered incorrectly.
It is very insecure. Human beings are used as a mode of security at the gate and it is a known
fact that human beings are open systems by nature, thus it is easy to bribe a security guard.
The opening and closing of the gate has is done physically which makes it cumbersome.
PROPOSED SYSTEM
Replace the physical handling of the gate with software that can do the same task efficiently
and effectively.
Gate opening and closing, which involves the opening of the gate once a legitimate user swabs
a valid card in the card reader. This replaces the physical handling of the gate with software that
can do the same task efficiently and effectively.
Accurate maintenance of accurate and consistent records on gate usage. The AGPS aim is to
improve consistence and accuracy of records on gate usage. The system keeps an accurate log of
who enters or leaves the premises and when. It will also keep a record of the number of people
who enters or leaves the premises on a particular day.
The system also reduces on the number of illegitimate people entering the organization
premises. Entrance is restricted to authorized personnel only.
Improved security. Humans are open systems which are affected by their environment, thus if
security guards are to be given sole responsibility for the handling of gate then definitely security
will be compromised. AGPS is a stable system which drastically improves security. The system
will provide a 24hour service security. In cases where a card is lost or stolen it is very easy to
prevent anyone using the stolen card from entering the premises. If a person tries to use the
stolen card to enter the premises the alarm is raised or rung instead of opening the gate.
CHAPTER4
IMPLEMENTATION
IMPLEMENTATION
This section gives the details of the activities that took place to convert from the old system to
the current system. Among the activities included in this implementation include:
i. Installation of the necessary software and hardware on which the system can run. This
also includes a server class machine to act as a central store of information. Software installation
was carried out as shown in the installation manual.
ii. System conversion in which a parallel arrangement was recommended. This approach
enables the user to operate the new system and the old system in parallel until the new system is
proved beyond doubt that it is reliable and that at least a good number of users are comfortable
with the systems output.
Among the interesting features of the program include the following modules.
Logon module: The code in this module was used to create the logon of the program. It includes
part of the code that was used to check if another user is logged on to the system using the same
account details.
The Visual Studio Platform for creating rich Windows applications and graphics include the
System. Windows Forms (SWF).The SWF contains classes for creating Windows-based
applications that take full advantage of the rich user interface features available in the Microsoft
Windows operating system. In this Visual Basic there is a class called form and many other
controls that can be added to applications to create user interfaces. The AGPS GUI unit is a
combination of a number of tools blended with animations and background pictures. Some tools
that link the user to the code include Labels, Combo boxes, Buttons, Group boxes, List boxes,
Tabs, Tab controls, Textboxes.
SYSTEM CONVERSION
The system was implemented via a Parallel conversion approach. The new system runs alongside
the old system. The advantage of using this approach instead of the others is that it allows users
to fall back to the old system in case of a system failure or crash. The disadvantage of this kind
of approach is that users dont really put in much effort to make the new system work because
they know that there is a fall back system.
CONCLUSION
The Automated Gate Pass System has been a very demanding project but there is
anticipation that it will save as a base for more research in Electronic and Programming. The
author of the project embanked on attempting to design, develop and implement an indigenous
Automated Gate Pass System, which can easily be used in any Organization in which security is
of higher consideration. From the analysis of system testing results, the author recommends that
the project has been successfully completed because most of the objectives as stated in the
project report have been fulfilled. The AGPS:
Replaces physical handling of the gate with software that can do the same task efficiently and
effectively.
Improves consistence and accuracy of records on gate usage. The system will keep an accurate
log of who enters or leaves the premises and when. It will also keep a record of the number of
people who enters or leaves the premises on a particular day.
Reduces on the number of illegitimate people entering the organization premises. Entrance will
be restricted to authorized personnel only.
Improves security. Humans are open systems which are affected by their environment, thus if
security guards are to be given sole responsibility for the handling of gate then definitely security
will be compromised. AGPS will be as table system which drastically improves security.
RECOMMENDATIONS
To ensure the smooth running and maximum utilization of the system, the author recommends
the following:
LCU/UG/6978 BSc COMPUTER AND INFO SCIENCE 300L
ADETOLA OLANREWAJU.O
i. The system should be continually improved to meet the changing needs of the users of
the systemic.
ii. Since the security features being used are very basic and that it is easy for a man in the
middle to intercept the data, I recommend that the leads City University comes up with
security features that cater for the security of information on the network as it is passed
from one computer to the other. This might include the use of encryption techniques.
iii. The system should be enhanced to allow one-way traffic only.
REFERENCES
No book was used for reference as the University has no material on parallel port programming.
The following sites where visited
ftp://ftp.rmii.com/pub2/hisys/parport
http://www.rmii.com/~hisys/parport.htmlx.
http://nyx10.cs.du.edu:8001/~zstewart/parport.html
www.conaito.com
www.logix4u.net
www.rentron.com
www.southwest.com.au/~jfuller/sio5.html