Professional Documents
Culture Documents
By
Supervised by
…..
I certify that project entitled “Design and implement a RFID system for
Information Technology.
Signature:
Data:
The Head of Department Certification
Signature:
Date:
(سورة زمزم » اآلية) 36 -
Dedication
1.1 Introduction.........................................................................................1
1.2 Background.........................................................................................2
1.5 Outline.................................................................................................3
2.1 Introduction....................................................................................23
2.3 IOT....................................................................................................27
2.4 RFID..................................................................................................28
1.1 Introduction
The project that we will be working on is an RFID door lock that will be
available to the general public at an affordable price. The goal of this project
is to create a more convenient way to unlock your door than the traditional
key. In the key’s place is an RFID tag that will unlock the door by proximity.
However, the improvements of this RFID door lock must outweigh the
complications of implementation. The list of customer needs (in the
Requirements and Specifications section) was constructed with that
fundamental goal in mind. The design consists of two components. The first
component is the actual door lock that must be installed in the doorframe.
This will be controlled by a magnetic lock and will need to be powered. The
second component is a relatively small module that you can install anywhere
near the door. This module is responsible for the RFID sensing. Chapter 2
goes over the requirements and specifications determined for the RFID door
lock. The requirements are inspired by surveys of various groups as well as
personal interest. The specifications are designed in order to meet these
requirements. These are created before the actual design of the RFID door
lock had been created so the requirements and specifications may not exactly
meet the final product. However, the final product is still designed with these
ideas in mind. In the Functional Decomposition (Chapter 3), the design of
the final product is shown and explained. This chapter also documents the
tests and complications confronted throughout the design. The design is split
into 5 modules which were tackled individually until finally bringing the
whole product together. The necessity of each module is included.
1.2 Background
An RFID lock, also called the IC card lock, is the electronic lock adopting
the radio frequency card as the key. With the RFID technology, the radio
frequency card can be contactless to open the lock while the old-style
contactable card requires the physical contact with a reader.
The Arduino is an open-source electronics platform based on easy-to-use
hardware and software. Arduino boards are able to read inputs - light on a
sensor, a finger on a button, or a Twitter message - and turn it into an output
- activating a motor, turning on an LED, publishing something online. You
can tell the board what to do by sending a set of instructions to the
microcontroller on the board.
(Arduino RFID Solenoid Lock , Rohan Ahlawat 2013)
problem, research benefit and the purpose of this system to do this study and
Chapter Two: literature review is made for the research. The background of
works to know better of this project was conducted the interface, security and
about the system, its function, and operation. The permission level and
Chapter Four: as the last chapter of this project, the conclusion was made
in this chapter, the researcher makes a review to see whether this project has
reached the research objectives. The researcher concludes the project and the
that can be solved with it, brief description about similar projects and lastly
this work. We discussed all platforms and software used in this project, in
addition to some important terms with the definition of the web application
door lock that will be available to the general public at an affordable price.
The goal of this project is to create a more convenient way to unlock your
door than the traditional key. In the key’s place is an RFID tag that will
unlock the door by proximity. However, the improvements of this RFID door
constructed with that fundamental goal in mind. The design consists of two
components. The first component is the actual door lock that must be
installed in the doorframe. This will be controlled by a magnetic lock and
that you can install anywhere near the door. This module is responsible for
the RFID sensing. Chapter 2 goes over the requirements and specifications
determined for the RFID door lock. The requirements are inspired by surveys
designed in order to meet these requirements. These are created before the
actual design of the RFID door lock had been created so the requirements
and specifications may not exactly meet the final product. However, the final
Decomposition (Chapter 3), the design of the final product is shown and
confronted throughout the design. The design is split into 5 modules which
were tackled individually until finally bringing the whole product together.
(RFID Door Lock by Ralph Ting Mackenzie Keane Senior Project Electrical
Engineering Department California Polytechnic State University San Luis
Obispo 2014)
2.3 IOT
Internet of Things, commonly abbreviated "IoT," is an umbrella term that
refers to anything connected to the Internet. It includes traditional computing
devices, such as laptops, tablets, and smartphones, but also includes a
growing list of other devices that have recently become Internet enabled.
Examples include home appliances, automobiles, wearable electronics,
security cameras, and many other things.
IoT devices are commonly called "smart devices," since they are able to
communicate with other things. For example, you can't control a traditional
oven when you are away from home. However, a smart oven that is
connected to the cloud can be accessed remotely via a web interface or an
app. You can check the status of the oven and start preheating it before you
get home. Other smart home devices, such as smart thermostats, light
fixtures, wall outlets, and window treatments are considered part of the IoT
since they can be accessed and controlled over the Internet.
Along with the capacity to communicate, many IoT devices also include an
array of sensors that provide useful information. For example, a wearable
device may include sensors that track your heart rate and activity level. It can
automatically upload your data to your personal account on the Internet. A
security system might include motion detectors that send you an alert if any
suspicious activity is recorded. Lighting systems can be automated using
sensors that detect how dark it is outside.
2.4 RFID
Stands for "Radio-Frequency Identification." RFID is a system used to track
objects, people, or animals using tags that respond to radio waves. RFID tags
are integrated circuits that include a small antenna. The are typically small
enough that they are not easily noticeable and therefore can be placed on
many types of objects.
Like UPC labels, RFID tags are often used to uniquely identify the object
they are attached to. However, unlike UPCs, RFID tags don't need to be
scanned directly with a laser scanner. Instead, they can be recorded by
simply placing the tag within the range of an RFID radio transmitter. This
makes it possible to quickly scan several items or to locate a specific product
surrounded by many other items.
This solenoid in particular is nice and strong, and has a slug with a slanted
cut and a good mounting bracket. It's basically an electronic lock, designed
for a basic cabinet or safe or door. Normally the lock is active so you can't
open the door because the solenoid slug is in the way. It does not use any
power in this state. When 9-12VDC is applied, the slug pulls in so it doesn't
stick out anymore and the door can be opened.
The solenoids come with the slanted slug as shown above, but you can open
it with the two Phillips-head screws and turn it around so its rotated 90, 180
or 270 degrees so that it matches the door you want to use it with.
To drive a solenoid you will a power transistor and a diode, check this
diagram for how to wire it to an Arduino or other microcontroller. You will
need a fairly good power supply to drive a solenoid, as a lot of current will
rush into the solenoid to charge up the electro-magnet, about 500mA, so
don't try to power it with a 9V battery! (https://circuit.rocks/solenoid-lock-
style-12v-dc) 2015 Preston Lauterbach's
NET Core is the .NET runtime that can be installed on Windows, Mac, or
Linux. It implements the APIs defined in the .NET Standard interface with
the appropriate platform-specific code on each operating system. This is
what you'll install on your own machine to build and run ASP.NET Core
applications.
e .NET Core SDK. Regardless of the editor or platform you're using, you'll
need to install the .NET Core SDK, which includes the runtime, base
libraries, and command line tools you need for building ASP.NET Core
applications. The SDK can be installed on Windows, Mac, or Linux.
Arrays in C++ are pointers, while in C#, they are objects that may include
methods and properties. The bool (boolean) data type is not recognized as an
integer as it is in C++. The keywords typedef, extern, and static all have
different meanings in C# than they do in C++. C# switch statements do not
support fall-through from one case to another. Global methods and variables
are not supported in C#, while they are in C++.Most importantly, C# is
designed specifically for Microsoft's .NET Framework. This allows
developers to take advantage of all the features offered by the .NET API.
However, it also means C# applications can only run on platforms that
support .NET runtime, such as Windows, Windows Server, and Windows
Phone. In order for programs written in C# to run on other platforms, the
code must be compiled using a conversion tool like Microsoft .NET Native.
NOTE: The name "C#" comes from the musical note "C♯," implying it is a
step up from the original version of C. The ♯ symbol is also comprised of
four plus signs, which may imply C# is more advanced than C++ as well.
Practical Part
Chapter Three ……………………………………… Practical
Part
Chapter Three
Practical Part
3.1 Main design
The main interface of the project is to display all the data uploaded by a
program designed in the language of "" "the function of this program is to
send the employee's personal card information with the date and time that the
registration was made with this card as in the figure below(3.1).
In this interface, the program will be in contact with Arduino and RFID as
shown in the figure below (3.4).
In this interface, the program will be in contact with Arduino and RFID And
then where the employee can pass his card to the card sensor, and after
passing it on RFID sensor, the program will withdraw the information about
the employee card with the time and date that the entry process was
completed, as shown in the figure below (3.5).
The site that was uploaded to the electronic cloud can be opened through the
mobile phone as shown in the figure below (3.6).
Chapter Three ……………………………………… Practical
Part
-In the first step, all the equipment through which the project will work
properly will be assembled, represented by the following. Arduino device, a
RFID sensor, a card through which the door lock is opened, and a cable.
-In the third step, a connection is made with the equipment mentioned in the
first step through the USB port.
-In the fourth step, all data is withdrawn from the program, as this data is
uploaded to the site via a server located in the electronic cloud, after which
this data is displayed in the site designed by the programmer.
Chapter Three ……………………………………… Practical
Part
Chapter four
Conclusion and Future
work
Chapter Three ……………………………………… Practical
Part
4.1 Conclusion
The Basic necessity of security can be attained by designing various door
locks such as mechanical locks or electrical locks. These kind of door locks
are designed with one or more keys, but for locking a large area various
locks are needed. Generally, traditional locks are heavy and that are not
strong as they can damage simply by using some tools. Electronic locks are
better over mechanical locks, to resolve the security problems that are
connected with the mechanical locks. In recent days every device uses digital
technology. For example, identification of digital device using token, door
lock system using digital technology, automatic door opening and closing,
automatic door lock systems, etc. These kind of systems is used for
controlling the movement of a door without using a key.
storage to facilitate the process of recovering employee data, where data can
be modified and deleted in the event that the employee's service ends the
Chapter Three ……………………………………… Practical
Part
work assigned to him Adding a warning page shows a warning when the use
of an identification card is not authorized, that is, it was not added by the
administrator.
References
Chapter Three ……………………………………… Practical
Part
الخالصة
قفل باب RFIDسهل التثبيت ويسمح للمستخدم بقفله بسهولة وأنه عندما يدخل الموظف nمن خالل
بطاقته ويكون لهذه البطاقة رقم nواحد ال يمكن تكراره ومن هنا يتم عرض جميع هذه البيانات في
البطاقة في ثم نقوم بسحبه بطريقة محددة بحيث يتم عرضه مرة ثانية على موقع ويب سبق استضافته
على أحد الخوادم في السحابة ويعرض هذا الموقع جميع بيانات البطاقات لمسؤول nالموقع وهذه
البيانات يتم تمثيله برقم nالبطاقة مع تاريخ تسجيل الدخول .من أجل فتح األبواب /قارئ/ RFID n
الكاتب وقفل الباب المغناطيسي nلالستخدام البسيط .سيحتاج جميع المستخدمين إلى عالمة RFID
لتتمكن من فتح الباب وقفله .سيتم استخدام LED nإلبالغ المستخدم nعندما يكون الباب مغلقًا بالفعل.
Chapter Three ……………………………………… Practical
Part
المكونات المدرجة في الوحدة صغيرة ومدمجة .باإلضافة إلى ذلك ،فإن قفل الباب بسيط وسهل
التثبيت والذي ال يتطلب من المستهلك تفكيك الباب أو إطار الباب ،ألن قفل الباب هو الملحقات فقط.
وهذا يترك أيضًا للمستهلك خيارًا الستخدام nالقفل والمفتاح األصليين في حالة اختيارهما .الكل في الكل
،يجب أن يكون قفل باب RFIDهذا ترقية بسيطة وفعالة من حيث التكلفة لراحة وأمن المستهلك
العادي.