You are on page 1of 42

Republic of Iraq

Ministry of Higher Education


and Scientific Research
University of Babylon
College of Information Technology
Department of Information
Networks

Design and implement a RFID system for automated


laboratory accessing door
A Project
Submitted to the council of the College of Information Technology at
University of Babylon in Partial Fulfillment of the Requirement for the
project In the fourth stage

By

AizAldeen Haider Abd Alameer

Supervised by

…..

2020 A.D 1441 A.H


Supervisor Certification

I certify that project entitled “Design and implement a RFID system for

automated laboratory accessing door.” was prepared at the Department of

Information Networks / College of Information Technology / University of

Babylon, by AizAldeen Haider Abd Alameer

as partial fulfillment of the requirements for the Bachelor Degree in

Information Technology.

Signature:

Name: Asst. Prof.Dr.

Data:
The Head of Department Certification

In view of the available recommendation, I forward the dissertation


entitled “Design and implement a RFID system for automated
laboratory accessing door.” for debate by the examination committee.

Signature:

Name: Dr. …..

Date:
‫(سورة زمزم‪ » ‬اآلية‪) 36 -‬‬
Dedication

This dissertation is dedicated to my beloved parents and all of my


friends, without whom none of my success would be possible. To my
supervisor and respected teachers whose their efforts, commits and
opinions are a grateful support.
Abstract
RFID door lock is an easy to install lock and allows the user to lock it easily
and that when the employee enters through his card and this card has a single
number that cannot be repeated and from here all this data in the card is
displayed in the program and then we pull it in a way Specified so that it is
displayed a second time on a website that was previously hosted on one of
the servers in the cloud and this site displays all the data of the cards to the
site administrator and this data is represented by the card number along with
the date of logging in. In order to, Open the doors RFID reader / writer and
magnetic door lock for simple use. All users will need an RFID tag to be able
to open and lock the door. The LED will be used to inform the user When the
door is actually closed. The components included in the unit are small and
compact. In addition, the door lock is simple and easy to install which does
not require the consumer to disassemble the door or door frame, because the
door lock is only accessories. This also leaves the consumer with Option to
use the original lock and key if they choose. All in all, this RFID door lock
must be Simple and cost-effective upgrade for the convenience and security
of the average consumer.
Table of Contents 

1.1 Introduction.........................................................................................1

1.2 Background.........................................................................................2

1.3 Literature review.................................................................................2

1.4 Aim of project.....................................................................................2

1.5 Outline.................................................................................................3

2.1 Introduction....................................................................................23

2.2 Embedded System.............................................................................24

2.3 IOT....................................................................................................27

2.4 RFID..................................................................................................28

2.5 Arduino UNO....................................................................................30

2.6 Solenoid Lock-style...........................................................................31

2.7 Asp.NET Core...................................................................................32

2.8 Why do we need another web framework?.......................................33

2.9 .NET Core and .NET Standard..........................................................33

2.10 The parts of an ASP.NET Core project..........................................34

2.11 MVC basics....................................................................................35

2.12 C# (pronounced "C Sharp")...........................................................36

3.1 Main design.......................................................................................36

3.2 Steps of building................................................................................42


4.1 Conclusion....................................................................................108

4.2 Future work.....................................................................................109


List of Tables
FIGURE 2.1. MODREN EXAMBLE OF EMBEDED SYSTEM.......................................................18
FIGURE 2.2. RFID SENSOR.................................................................................................22
FIGURE 2.3. LOCK DOOR DEVICE........................................................................................24
FIGURE 3.1.MAIN DESIGN....................................................................................................30
FIGURE 3.6. CHOSSE COM FROM LIST................................................................................31
FIGURE 3.2. PROGRAM OF C#..............................................................................................32
FIGURE 3.3.CONNET OF PROGRAM OF C#............................................................................33
FIGURE 3.4. UPLOAD DATA FROM ARDIUNO........................................................................34
FIGURE 3.5. MAIN DESIGN WITM MOBILE............................................................................35
Overview
Chapter One
Overview

1.1 Introduction
The project that we will be working on is an RFID door lock that will be
available to the general public at an affordable price. The goal of this project
is to create a more convenient way to unlock your door than the traditional
key. In the key’s place is an RFID tag that will unlock the door by proximity.
However, the improvements of this RFID door lock must outweigh the
complications of implementation. The list of customer needs (in the
Requirements and Specifications section) was constructed with that
fundamental goal in mind. The design consists of two components. The first
component is the actual door lock that must be installed in the doorframe.
This will be controlled by a magnetic lock and will need to be powered. The
second component is a relatively small module that you can install anywhere
near the door. This module is responsible for the RFID sensing. Chapter 2
goes over the requirements and specifications determined for the RFID door
lock. The requirements are inspired by surveys of various groups as well as
personal interest. The specifications are designed in order to meet these
requirements. These are created before the actual design of the RFID door
lock had been created so the requirements and specifications may not exactly
meet the final product. However, the final product is still designed with these
ideas in mind. In the Functional Decomposition (Chapter 3), the design of
the final product is shown and explained. This chapter also documents the
tests and complications confronted throughout the design. The design is split
into 5 modules which were tackled individually until finally bringing the
whole product together. The necessity of each module is included.

1.2 Background
An RFID lock, also called the IC card lock, is the electronic lock adopting
the radio frequency card as the key. With the RFID technology, the radio
frequency card can be contactless to open the lock while the old-style
contactable card requires the physical contact with a reader.
The Arduino is an open-source electronics platform based on easy-to-use
hardware and software. Arduino boards are able to read inputs - light on a
sensor, a finger on a button, or a Twitter message - and turn it into an output
- activating a motor, turning on an LED, publishing something online. You
can tell the board what to do by sending a set of instructions to the
microcontroller on the board.
(Arduino RFID Solenoid Lock , Rohan Ahlawat 2013)

1.3 Literature review

1.4 Aim of project


Benefit from the project to facilitate the process of managing the entrance of
employees to the laboratory through the electronic card of each employee, as
it allows the official to control the process of entering the employees to the
laboratory by displaying the data on the electronic card for each employee
with recording the date and time of entry.
1.5 Outline
Chapter One: the background of the study is explained the research

problem, research benefit and the purpose of this system to do this study and

the research goals.

Chapter Two: literature review is made for the research. The background of

a database was explained from its history and development. Meanwhile,

some example of the database systems was discussed as well as related

works to know better of this project was conducted the interface, security and

the tools used were also reviewed in this chapter.

Chapter Three: the screenshot was presented in this chapter to explain

about the system, its function, and operation. The permission level and

functions of each level of users were explained in detail.

Chapter Four: as the last chapter of this project, the conclusion was made

in this chapter, the researcher makes a review to see whether this project has

reached the research objectives. The researcher concludes the project and the

suggestions are made for the future researchers as well.


Theory Part
Chapter Two
Theory Part
2.1 Introduction
The previous chapter discusses an overview about the project, the problems

that can be solved with it, brief description about similar projects and lastly

the main goal of it.

In this chapter, we provide the theoretical background that is needed for

this work. We discussed all platforms and software used in this project, in

addition to some important terms with the definition of the web application

and its characteristics. The project that we will be working on is an RFID

door lock that will be available to the general public at an affordable price.

The goal of this project is to create a more convenient way to unlock your

door than the traditional key. In the key’s place is an RFID tag that will

unlock the door by proximity. However, the improvements of this RFID door

lock must outweigh the complications of implementation. The list of

customer needs (in the Requirements and Specifications section) was

constructed with that fundamental goal in mind. The design consists of two

components. The first component is the actual door lock that must be
installed in the doorframe. This will be controlled by a magnetic lock and

will need to be powered. The second component is a relatively small module

that you can install anywhere near the door. This module is responsible for

the RFID sensing. Chapter 2 goes over the requirements and specifications

determined for the RFID door lock. The requirements are inspired by surveys

of various groups as well as personal interest. The specifications are

designed in order to meet these requirements. These are created before the

actual design of the RFID door lock had been created so the requirements

and specifications may not exactly meet the final product. However, the final

product is still designed with these ideas in mind. In the Functional

Decomposition (Chapter 3), the design of the final product is shown and

explained. This chapter also documents the tests and complications

confronted throughout the design. The design is split into 5 modules which

were tackled individually until finally bringing the whole product together.

The necessity of each module is included.

(RFID Door Lock by Ralph Ting Mackenzie Keane Senior Project Electrical
Engineering Department California Polytechnic State University San Luis
Obispo 2014)

2.2 Embedded System


An embedded system is a computer system designed to perform one or
a few dedicated functions often with real-time computing constraints. It is
embedded as part of a complete device often including hardware and
mechanical parts. By contrast, a general-purpose computer, such as a
personal computer (PC), is designed to be flexible and to meet a wide range
of end-user needs. Embedded systems control many devices in common use
today.

Embedded systems are controlled by one or more main processing


cores that are typically either microcontrollers or digital signal processors
(DSP). The key characteristic, however, is being dedicated to handle a
particular task, which may require very powerful processors. For example,
air traffic control systems may usefully be viewed as embedded, even though
they involve mainframe computers and dedicated regional and national
networks between airports and radar sites.

Since the embedded system is dedicated to specific tasks, design


engineers can optimize it to reduce the size and cost of the product and
increase the reliability and performance. Some embedded systems are mass-
produced, benefiting from economies of scale.

Physically embedded systems range from portable devices such as


digital watches and MP3 players, to large stationary installations like traffic
lights, factory controllers, or the systems controlling nuclear power plants.
Complexity varies from low, with a single microcontroller chip, to very high
with multiple units, peripherals and networks mounted inside a large chassis
or enclosure.

In general, "embedded system" is not a strictly definable term, as most


systems have some element of extensibility or programmability. For
example, handheld computers share some elements with embedded systems
such as the operating systems and microprocessors which power them, but
they allow different applications to be loaded and peripherals to be
connected. Moreover, even systems which don't expose programmability as a
primary feature generally need to support software updates.

On a continuum from "general purpose" to "embedded", large


application systems will have subcomponents at most points even if the
system as a whole is "designed to perform one or a few dedicated functions",
and is thus appropriate to call "embedded". A modern example of embedded
system is shown in fig: 2.1.

Fig 2.1 A Modern Example of Embedded System

Labelled parts include microprocessor (4), RAM (6), flash memory


(7).Embedded systems programming is not like normal PC programming. In
many ways, programming for an embedded system is like programming PC
15 years ago. The hardware for the system is usually chosen to make the
device as cheap as possible. Spending an extra dollar a unit in order to make
things easier to program can cost millions. Hiring a programmer for an extra
month is cheap in comparison. This means the programmer must make do
with slow processors and low memory, while at the same time battling a
need for efficiency not seen in most PC applications. Below is a list of issues
specific to the embedded field.(Embedded SystemDesign 2018 Embedded
System)

2.3 IOT
Internet of Things, commonly abbreviated "IoT," is an umbrella term that
refers to anything connected to the Internet. It includes traditional computing
devices, such as laptops, tablets, and smartphones, but also includes a
growing list of other devices that have recently become Internet enabled.
Examples include home appliances, automobiles, wearable electronics,
security cameras, and many other things.

In order for a device to be part of the Internet of Things, it must be able to


communicate with other devices. Therefore, it requires some type of built-in
wired or wireless communication. Most IoT devices are Wi-Fi enabled, but
Bluetooth can also be used to transfer data to nearby devices. Anything that
connects directly to the Internet must have a unique IP address, which is one
of the reasons the adoption of IPv6 has been so important.

IoT devices are commonly called "smart devices," since they are able to
communicate with other things. For example, you can't control a traditional
oven when you are away from home. However, a smart oven that is
connected to the cloud can be accessed remotely via a web interface or an
app. You can check the status of the oven and start preheating it before you
get home. Other smart home devices, such as smart thermostats, light
fixtures, wall outlets, and window treatments are considered part of the IoT
since they can be accessed and controlled over the Internet.
Along with the capacity to communicate, many IoT devices also include an
array of sensors that provide useful information. For example, a wearable
device may include sensors that track your heart rate and activity level. It can
automatically upload your data to your personal account on the Internet. A
security system might include motion detectors that send you an alert if any
suspicious activity is recorded. Lighting systems can be automated using
sensors that detect how dark it is outside.

While the Internet of Things is still in its infancy, it provides promising


opportunities for the future. For example, connecting medical devices to the
Internet will make it easier for doctors to track patients' health, providing
more consistent data and requiring fewer appointments. Agricultural
products will be able to self-adjust based on weather forecasts, creating more
efficient farming methods. Internet-connected cars will communicate with
each other, providing better traffic information and paving the way for self-
driving cars. In time, the Internet of Things will become less of an abstract
idea and more of a way of life

2.4 RFID
Stands for "Radio-Frequency Identification." RFID is a system used to track
objects, people, or animals using tags that respond to radio waves. RFID tags
are integrated circuits that include a small antenna. The are typically small
enough that they are not easily noticeable and therefore can be placed on
many types of objects.
Like UPC labels, RFID tags are often used to uniquely identify the object
they are attached to. However, unlike UPCs, RFID tags don't need to be
scanned directly with a laser scanner. Instead, they can be recorded by
simply placing the tag within the range of an RFID radio transmitter. This
makes it possible to quickly scan several items or to locate a specific product
surrounded by many other items.

RFID tags have many different uses Some examples include :-


-Merchandise tags - These tags are attached to clothing, electronics, and
other products to prevent theft from retail stores. These tags are typically
deactivated at the place of checkout. Tags that have not been deactivated will
sound the alarm system near the store's exit.
-Inventory management - Products stored in warehouses may be given RFID
tags so they can be located more easily.
-Airplane luggage - RFID tags may be placed on checked bags so they can
be easily tracked and located.
-Toll booth passes - E-ZPass and I-Pass receivers may be placed in
automobiles, allowing cars and trucks to pass through toll booths without
needing to stop. This enables drivers to make toll payments automatically.
Credit cards - Some credit cards have built-in RFIDs so they can be "waved"
rather than "swiped" near compatible readers. The SpeedPass wand is an
example of an RFID-only payment device.
-Animal tags - RFID tags can be placed pet collars to make help identify pets
if they are lost. Tags may also be placed on birds and other animals to help
track them for research purposes.
-The above list includes just a few of the applications of radio-frequency
identification. There are many other existing and potential applications for
RFID tags as well.

Figure 1.2. RFID Sensor

2.5 Arduino UNO


Arduino is an open-source electronics platform based on easy-to-use
hardware and software. Arduino boards are able to read inputs - light on a
sensor, a finger on a button, or a Twitter message - and turn it into an output
- activating a motor, turning on an LED, publishing something online. You
can tell your board what to do by sending a set of instructions to the
microcontroller on the board. To do so you use the Arduino programming
language (based on Wiring), and the Arduino Software (IDE), based on

2.6 Solenoid Lock-style


Solenoids are basically electromagnets: they are made of a big coil of copper
wire with an armature (a slug of metal) in the middle. When the coil is
energized, the slug is pulled into the center of the coil. This makes the
solenoid able to pull from one end.

This solenoid in particular is nice and strong, and has a slug with a slanted
cut and a good mounting bracket. It's basically an electronic lock, designed
for a basic cabinet or safe or door. Normally the lock is active so you can't
open the door because the solenoid slug is in the way. It does not use any
power in this state. When 9-12VDC is applied, the slug pulls in so it doesn't
stick out anymore and the door can be opened.

The solenoids come with the slanted slug as shown above, but you can open
it with the two Phillips-head screws and turn it around so its rotated 90, 180
or 270 degrees so that it matches the door you want to use it with.

To drive a solenoid you will a power transistor and a diode, check this
diagram for how to wire it to an Arduino or other microcontroller. You will
need a fairly good power supply to drive a solenoid, as a lot of current will
rush into the solenoid to charge up the electro-magnet, about 500mA, so
don't try to power it with a 9V battery! (https://circuit.rocks/solenoid-lock-
style-12v-dc) 2015 Preston Lauterbach's

Figure 2.3. Lock Door Device

2.7 Asp.NET Core


ASP.NET Core is a web framework created by Microsoft for building web
applications, APIs, and microservices. It uses common patterns like MVC
(Model-View-Controller), dependency injection, and a request pipeline
comprised of middleware. It's open-source under the Apache 2.0 license,
which means the source code is freely available, and the community is
encouraged to contribute bug fixes and new features. ASP.NET Core runs on
top of Microsoft's .NET runtime, similar to the Java Virtual Machine (JVM)
or the Ruby interpreter. You can write
ASP.NET Core applications in a number of languages (C#, Visual Basic,F#).
C# is the most popular choice, and it's what I'll use in this book. You can
build and run ASP.NET Core applications on Windows, Mac, and Linux.

2.8 Why do we need another web framework?


There are a lot of great web frameworks to choose from already:
Node/Express, Spring, Ruby on Rails, Django, Laravel, and many
more.What advantages does ASP.NET Core have?Speed. ASP.NET Core is
fast. Because .NET code is compiled, it executes much faster than code in
interpreted languages like JavaScript or Ruby. ASP.NET Core is also
optimized for multithreading and asynchronous tasks. It's common to see a 5-
10x speed improvement over code written in Node.js. Ecosystem. ASP.NET
Core may be new, but .NET has been around for a long time. There are
thousands of packages available on NuGet (the .NET package manager;
think npm, Ruby gems, or Maven). There are already packages available for
JSON deserialization, database connectors, PDF generation, or almost
anything else you can think of. Security. The team at Microsoft takes
security seriously, and ASP.NET Core is built to be secure from the ground
up. It handles things like sanitizing input data and preventing cross-site
request forgery (CSRF) attacks, so you don't have to. You also get the benefit
of static typing with the .NET compiler, which is like having a very paranoid
linter turned on at all times. This makes it harder to do something you didn't
intend with a variable or chunk of data.

2.9 .NET Core and .NET Standard


.NET Standard is a platform-agnostic interface that defines features and
APIs. It's important to note that .NET Standard doesn't represent any actual
code or functionality, just the API definition. There are different "versions"
or levels of .NET Standard that reflect how many APIs are available (or how
wide the API surface area is). For example, .NET Standard 2.0 has more
APIs available than .NET Standard 1.5, which has more APIs than .NET
Standard 1.0.

NET Core is the .NET runtime that can be installed on Windows, Mac, or
Linux. It implements the APIs defined in the .NET Standard interface with
the appropriate platform-specific code on each operating system. This is
what you'll install on your own machine to build and run ASP.NET Core
applications.
e .NET Core SDK. Regardless of the editor or platform you're using, you'll
need to install the .NET Core SDK, which includes the runtime, base
libraries, and command line tools you need for building ASP.NET Core
applications. The SDK can be installed on Windows, Mac, or Linux.

2.10 The parts of an ASP.NET Core project


The dotnet new mvc template generates a number of files and directories for
you. Here are the most important things you get out of the box: The
Program.cs and Startup.cs files set up the web server and ASP.NET Core
pipeline. The Startup class is where you can add middleware that handles and
modifies incoming requests, and serves things like static content or error
pages. It's also where you add your own services to the dependency injection
container (more on this later). The Models, Views, and Controllers
directories contain the components of the Model-View-Controller (MVC)
architecture. You'll explore all three in the next chapter. Create an ASP.NET
Core project 16 The wwwroot directory contains static assets like CSS,
JavaScript, and image files. Files in wwwroot will be served as static content,
and can be bundled and minified automatically. The appsettings.json file
contains configuration settings ASP.NET Core will load on startup. You can
use this to store database connection strings or other things that you don't
want to hard-code.

2.11 MVC basics


explore the MVC system in ASP.NET Core. MVC (Model-View-Controller)
is a pattern for building web applications that's used in almost every web
framework (Ruby on Rails and Express are popular examples), plus frontend
JavaScript frameworks like Angular. Mobile apps on iOS and Android use a
variation of MVC as well. As the name suggests, MVC has three
components: models, views, and controllers. Controllers handle incoming
requests from a client or web browser and make decisions about what code to
run. Views are templates (usually HTML plus a templating language like
Handlebars, Pug, or Razor) that get data added to them and then are
displayed to the user. Models hold the data that is added to views, or data
that is entered by the user. A common pattern for MVC code is: The
controller receives a request and looks up some information in a database
The controller creates a model with the information and attaches it to a view
The view is rendered and displayed in the user's browser The user clicks a
button or submits a form, which sends a new request to the controller, and
the cycle repeats If you've worked with MVC in other languages, you'll feel
right at home in ASP.NET Core MVC. If you're new to MVC, this chapter
will teach you the basics and will help get you started.

2.12 C# (pronounced "C Sharp")


is a programming language developed by Microsoft. It was introduced in
2002 with version 1.0 of Microsoft's .NET Framework. Since then, C# has
gone through several revisions, corresponding with each .NET update.
Today, it is one of the most popular programming languages for creating
Windows programs and web applications.

C# is a derivative of the C programming language and is similar to C++. It


uses the same basic operators as C++, is object oriented, case sensitive, and
has nearly identical syntax. However, there are several differences between
C# and C++. Below are just a few examples:

Arrays in C++ are pointers, while in C#, they are objects that may include
methods and properties. The bool (boolean) data type is not recognized as an
integer as it is in C++. The keywords typedef, extern, and static all have
different meanings in C# than they do in C++. C# switch statements do not
support fall-through from one case to another. Global methods and variables
are not supported in C#, while they are in C++.Most importantly, C# is
designed specifically for Microsoft's .NET Framework. This allows
developers to take advantage of all the features offered by the .NET API.
However, it also means C# applications can only run on platforms that
support .NET runtime, such as Windows, Windows Server, and Windows
Phone. In order for programs written in C# to run on other platforms, the
code must be compiled using a conversion tool like Microsoft .NET Native.

NOTE: The name "C#" comes from the musical note "C♯," implying it is a
step up from the original version of C. The ♯ symbol is also comprised of
four plus signs, which may imply C# is more advanced than C++ as well.

Practical Part
Chapter Three ……………………………………… Practical
Part

Chapter Three
Practical Part
3.1 Main design
The main interface of the project is to display all the data uploaded by a
program designed in the language of "" "the function of this program is to
send the employee's personal card information with the date and time that the
registration was made with this card as in the figure below(3.1).

Figure 3.1. The Main Design


Chapter Three ……………………………………… Practical
Part

In this interface, the program will be in a state of non-contact with the


Arduino and RFID as shown in the figure below(3.2)

Figure 3.2. program Of C#


Chapter Three ……………………………………… Practical
Part

In this interface, the administrator will choose com3 to be in contact with


Arduino and RFID as shown in the figure below (3.3).

Figure 3.3. Choose USB


Chapter Three ……………………………………… Practical
Part

In this interface, the program will be in contact with Arduino and RFID as
shown in the figure below (3.4).

Figure 3.4. Connect Program with Ardiuno


Chapter Three ……………………………………… Practical
Part

In this interface, the program will be in contact with Arduino and RFID And
then where the employee can pass his card to the card sensor, and after
passing it on RFID sensor, the program will withdraw the information about
the employee card with the time and date that the entry process was
completed, as shown in the figure below (3.5).

Figure 3.5 Data Uploaded from Ardiuno


Chapter Three ……………………………………… Practical
Part

The site that was uploaded to the electronic cloud can be opened through the
mobile phone as shown in the figure below (3.6).
Chapter Three ……………………………………… Practical
Part

Figure 3.6. Main Design of Mobile

3.2 Steps of building


Chapter Three ……………………………………… Practical
Part

-In the first step, all the equipment through which the project will work
properly will be assembled, represented by the following. Arduino device, a
RFID sensor, a card through which the door lock is opened, and a cable.

-In the second step, the program is run in c#.

-In the third step, a connection is made with the equipment mentioned in the
first step through the USB port.

-In the fourth step, all data is withdrawn from the program, as this data is
uploaded to the site via a server located in the electronic cloud, after which
this data is displayed in the site designed by the programmer.
Chapter Three ……………………………………… Practical
Part

Conclusion and Future Works

Chapter four
Conclusion and Future
work
Chapter Three ……………………………………… Practical
Part

4.1 Conclusion
The Basic necessity of security can be attained by designing various door
locks such as mechanical locks or electrical locks. These kind of door locks
are designed with one or more keys, but for locking a large area various
locks are needed. Generally, traditional locks are heavy and that are not
strong as they can damage simply by using some tools. Electronic locks are
better over mechanical locks, to resolve the security problems that are
connected with the mechanical locks. In recent days every device uses digital
technology. For example, identification of digital device using token, door
lock system using digital technology, automatic door opening and closing,
automatic door lock systems, etc. These kind of systems is used for
controlling the movement of a door without using a key.

4.2 Future work


Support of the web application, a database containing data and information

storage to facilitate the process of recovering employee data, where data can

be modified and deleted in the event that the employee's service ends the
Chapter Three ……………………………………… Practical
Part

work assigned to him Adding a warning page shows a warning when the use

of an identification card is not authorized, that is, it was not added by the

administrator.

References
‫‪Chapter Three ……………………………………… Practical‬‬
‫‪Part‬‬

‫‪[1] ". ( Christensson, Per. "Internet of Things Definition." TechTerms.‬‬


‫‪(January‬‬ ‫‪16,‬‬ ‫‪2015).‬‬ ‫‪Accessed‬‬ ‫‪Jul‬‬ ‫‪18,‬‬ ‫‪2020.‬‬
‫‪https://techterms.com/definition/internet_of_things.)".‬‬
‫‪[2] "(Christensson, Per. "RFID Definition." TechTerms. (September 4,‬‬
‫‪2009). Accessed Jul 18, 2020. https://techterms.com/definition/rfid.)".‬‬
‫‪[3] "https://www.arduino.cc/en/guide/introduction".‬‬
‫‪[4] "Christensson, Per. "C# Definition." TechTerms. (June 4, 2014).‬‬
‫‪Accessed Jul 18, 2020. https://techterms.com/definition/c_sharp".‬‬

‫الخالصة‬
‫قفل باب ‪ RFID‬سهل التثبيت ويسمح للمستخدم بقفله بسهولة وأنه عندما يدخل الموظف‪ n‬من خالل‬
‫بطاقته ويكون لهذه البطاقة رقم‪ n‬واحد ال يمكن تكراره ومن هنا يتم عرض جميع هذه البيانات في‬
‫البطاقة في ثم نقوم بسحبه بطريقة محددة بحيث يتم عرضه مرة ثانية على موقع ويب سبق استضافته‬
‫على أحد الخوادم في السحابة ويعرض هذا الموقع جميع بيانات البطاقات لمسؤول‪ n‬الموقع وهذه‬
‫البيانات يتم تمثيله برقم‪ n‬البطاقة مع تاريخ تسجيل الدخول‪ .‬من أجل فتح األبواب ‪ /‬قارئ‪/ RFID n‬‬
‫الكاتب وقفل الباب المغناطيسي‪ n‬لالستخدام البسيط‪ .‬سيحتاج جميع المستخدمين إلى عالمة ‪RFID‬‬
‫لتتمكن من فتح الباب وقفله‪ .‬سيتم استخدام‪ LED n‬إلبالغ المستخدم‪ n‬عندما يكون الباب مغلقًا بالفعل‪.‬‬
‫‪Chapter Three ……………………………………… Practical‬‬
‫‪Part‬‬

‫المكونات المدرجة في الوحدة صغيرة ومدمجة‪ .‬باإلضافة إلى ذلك ‪ ،‬فإن قفل الباب بسيط وسهل‬
‫التثبيت والذي ال يتطلب من المستهلك تفكيك الباب أو إطار الباب ‪ ،‬ألن قفل الباب هو الملحقات فقط‪.‬‬
‫وهذا يترك أيضًا للمستهلك خيارًا الستخدام‪ n‬القفل والمفتاح األصليين في حالة اختيارهما‪ .‬الكل في الكل‬
‫‪ ،‬يجب أن يكون قفل باب ‪ RFID‬هذا ترقية بسيطة وفعالة من حيث التكلفة لراحة وأمن المستهلك‬
‫العادي‪.‬‬

You might also like