You are on page 1of 75

“SECURITY ACCESS CONTROL

SYSTEM FOR COLLEGE OF


ENGINEERING LABORATORIES”

A Thesis Proposal Presented to the Faculty


of the Department of Electronics Engineering
College of Engineering

In Partial Fulfillment
of the requirements for the Degree
of Bachelor of Science in
Electronics Engineering

Submitted by:

DECENA, Qarnayn Gerson Ali T.


FERNANDO, Kevin Jeremy DC.
GARRIDO, Ana Mariel D.
IGNACIO, Alvin B.
ROBLES, Ira Keenwell B.
ROQUE, Rachel Ann S.
SUMERA, Ira Katrina C.
TANIO, Mayrejoice SJ.

BSECE 5D

Engr. Dion Michael Mendoza Mr. Issachar Dela Cerna


Thesis Adviser English Adviser

Engr. Albert Ian Javier


Subject Instructor

Page | 1
REPUBLIC OF THE PHILIPPINES
BULACAN STATE UNIVERSITY
CITY OF MALOLOS, BULACAN
COLLEGE OF ENGINEERING

APPROVAL SHEET

This thesis is hereby entitled:


SECURITY ACCESS CONTROL SYSTEM FOR COLLEGE OF ENGINEERING
LABORATORIES

Prepared and submitted by:


DECENA, Qarnayn Gerson Ali T., FERNANDO, Kevin Jeremy D.C, GARRIDO,
Ana Mariel D., IGNACIO, Alvin B., ROBLES, Ira Keenwell B., ROQUE, Rachel Ann S.,
SUMERA, Ira Katrina C., and TANIO, Mayrejoice SJ. In partial fulfillment of the requirements
for the degree of Bachelor of Science in Electronics Engineering, has been examined and is
recommended for acceptance and approval for ORAL DEFENSE.

Mr. Isachar Dela Cerna Engr. Dion Michael Mendoza


English adviser Thesis Adviser

Approved by the committee on Final Defense with a grade of on January 2015.

Engr. Emmylyn Roque


Chairman

Engr. Jenette Centeno Engr. Dennis Dela Cruz Engr. Mervin Albalate
Mentor Mentor Mentor

Accepted in partial fulfillment of the requirements for the degree of Bachelor of Science in
Electronics Engineering.

ENGR. ALBERT IAN JAVIER


Subject Instructor

ENGR. NASHER JIMENEZ ENGR. ROMEO ROBLES


Department Head, ECE Dean, College of Engineering
ACKNOWLEDGEMENT

It is our genuine pleasure to express our deepest gratitude to our parents for

continuously inspiring and motivating us to be more productive, for supporting us morally

Page | 2
and financially, and for their unconditional love and understanding throughout our research

period.

We would also want to express our deep appreciation to our adviser, Engineer Dion

Michael Mendoza for constant support and timely suggestions, for without his guidance and

persistent help this study would not have been possible.

It is our privilege to thank our subject professor, Engineer Albert Ian Javier for the

consistent encouragement and scholarly advice to accomplish this research.

Moreover, we would also want to acknowledge our English adviser, Mr. Issachar

Dela Cerna for his generous and valuable help in editing this paper.

Also, we owe a debt of gratitude to all of our colleagues and loved ones who serve

inspiration and to all those who gave their beneficial contributions for the success of this

undertaking.

Last but not the least, we would like to give all the praises to Almighty God for

giving us love, life, blessings, strength, wisdom, guidance and good health to withstand all

the trials that we encountered to complete this research. From Him we owe all that we have

and all that we are.

ABSTRACT

Our beloved College of Engineering has suffered several cases of thieving

inside its premises. As of today, according to the head of security personnel and tools and

equipment management, there has been quite a number of reported cases.

In the laboratory rooms of BSU’s College of Engineering, the said rooms are

still locked with the simple metallic lock and key. The trend of technology in security has

been continuously evolving with increase in surveillance, motion and sound detection and

Page | 3
recording, wireless access, and data feeding. But the technological increase in security can

be very costly and/or inefficient, and the result may vary from cost-effective to a waste of

funding and resources.

The statements above summarize the problems of the laboratory rooms of

College of Engineering with regards to security. The existing solution, however, can be

improved with the increase of security access wireless data feed. This study focuses not only

in security access, but also to instantaneous transfer of data by utilizing the RF (Radio

Frequency) technology. Initially, the authorized person who wishes to access the laboratory

room must present his/her RFID tag to the RFID reader in front of the door. After tapping

his/her respective tag, the PC of the faculty in College of Engineering receives notification

that an authorized person has accessed the laboratory room. Thus, this study aids to increase

the security access and monitoring.

TABLE OF CONTENTS

Chapter I: Problem and its Background

1.1. Background of the Study 1

1.2. Statement of the Problem 2

1.3. General Objectives of the Study 4

1.4. General Objectives of the Study 4

1.5. Scope and Limitations 4

1.6. Significance of the Study 6

Page | 4
Chapter II: Theoretical Framework

2.1. Related Theories 7

2.1.1. RFID 7

i. RFID Components 9

ii. RFID Tags 9

iii. Qualitites of an RFID Tag 10

iv. RFID Systems 13

v. Applications 14

2.1.2. Microcontroller 15

2.1.3. Solenoid Lock 16

2.1.4. Data Feed 17

2.2. Related Literature 18

2.2.1. Security Entry System Using RFID System 18

2.2.2. RFID Wireless Door System 19

2.2.3. Design And Implementation Of Bank Locker Security 20

System Based On Fingerprint Sensing Circuit And RFID Reader

2.3. Conceptual Framework 21

2.4. Notes in Chapter II 22

Chapter III: Development of the Project

3.1. Project Description 23

i. Programming 24

3.2. Project Design 26

3.2.1. System Block Diagram 26

3.2.2. Process Flowchart 27

3.2.3. Server Program Flowchart 28

Page | 5
3.3. Project Specification 29

3.3.1. Passive RFID Tag 29

3.3.2. RFID Tag Reader 30

3.3.3. Relay 32

3.3.4. Solenoid Lock 33

3.3.5. 4x3 Keypad 34

3.3.6. LCD Display 35

3.3.7. Arduino Mega 36

3.3.8. RF Transceiver 37

3.3.9 PC 39

3.4. Notes in Chapter III 40

Chapter IV: Project Growth

4.1. Project Description 41

4.2. Project Design 42

4.2.1. PCB Schematic Diagram 42

4.2.2. PCB Design 42

4.2.3. PCB Parts and Placement 43

4.2.4. RFID Card Reader Schematic Diagram 44

4.2.5. Arduino Mega Schematic Diagram 45

4.2.6. LCD Schematic Diagram 46

4.2.7. 4x3 Matrix Keypad Schematic Diagram 46

4.3. Fabrication Process 47

4.3.1. Door Fabrication Process 47

4.3.2. Programming Process 48

4.4. Tools and Equipment 49

Page | 6
4.4.1. Tools 49

4.4.2. Equipment 56

4.5. Project Development Cost 58

4.6 Timetable of Activities 59

4.7. Survey Form 60

Chapter V: Results and Discussions

5.1. Project Technical Specifications 63

5.2. Project Evaluation 64

5.2.1. Evaluation Procedure 64

5.2.2. Evaluation Criteria 64

5.2.3. Interpretation of the Collected Data 66

5.2.4. Summary 67

5.3. Operating Procedure 69

5.4. Project Capabilities and Limitations 70

5.2.4. Capabilities 70

5.2.4. Limitations 71

5.5. Safety and Control Measures 72

5.6. Maintenance 72

5.7. Sample Installation 73

Chapter VI: Summary, Conclusion and Recommendations

6.1. Summary 74

6.2. Conclusion 75

6.3. Recommendations 76

Page | 7
CHAPTER 1

INTRODUCTION

This chapter discusses the background of the project, general and specific objectives,

scope and delimitation, and significance of the proposed research.

1.1 Background of the Study

Automated monitoring systems are becoming the trend. It is an undeniable fact that

Bulacan State University’s College of Engineering has been left behind in this

modernization. Majority of the laboratory rooms in Natividad Hall (College of Engineering)

at today’s academic institutions face a common set of business challenge in security system.

Without the presence of security personnel, monitoring who is liable for the

misplacement and loss of things inside a laboratory room would be a difficult task; having a

door locked is the only means of securing the room. There are scenarios of postponement of

laboratory experiments due to the absence of some equipment, unaware where the keys are

and who was the last one who used the laboratory rooms. “At the end of the day, the goals

are simple: safety and security”. (Jodi Rell, n.d)

In this research, RFID (Radio Frequency Identification) is a wireless communication

technology that lets objects to be identified using electromagnetic energy. This type of

technology will eliminate the use of keys and make it handier for the authorize person,

particularly, for the professors. Arduino, on the other hand, is an open-source prototyping

platform based on an easy-to-use hardware and software. It has been the main platform of

most of microcontroller-based prototypes. These will be the main components of the

proposed dissertation.

Page | 8
Biometrics, smart cards, Bluetooth access controls are just a few of the latest

innovation of improving the technology of security. This research intends to apply the

technology of RFID to the facilities of the College of Engineering at Bulacan State

University. The research will immensely tighten the security and reduce the chance of

problems encountered in these facilities.

1.2 Statement of the Problem

Security is one, if not the most, profound concerns in our daily venture. Being a main

part of a security system, access control system which controls the entryway of a building, or

a closed area like houses or rooms where valuable possessions are found should be given a

great consideration.

Alongside with the advancements in technology are the improvements in a culprit’s

art of robbing. Yet, the research to improve security locks is still vast, broad and only differs

to the technology used (Biometric Door Entry Control System, Cappellano and Freed 2002;

Door Access Using Smart Card, Foo Tze Yaw 2004; Bluetooth Access Control,

Mehlomakulu 2010). However, with regards to application, it is a known fact that even up to

this 20th century, people widely choose to use security locks using the simplest of locks: the

metallic lock and key. A simple lock and key, though, would not suffice the security needed

to protect properties.

Going after the old-fashioned locks for their convenience and this being an old habit

has proven to have an enormous number of drawbacks which make a supposedly secured

room vulnerable, considering that these locks can now be opened conventionally with

skillset from lock-pickers or by means of lock-picking tools. Another fact is that the key,

which only opens to a specific lock, can be duplicated even through unauthorized means.

Not to mention that keys are likely to be lost and misplaced. These signify the problem

which leads to having the contents secured in a room widely open to robbers.

Page | 9
A number of burglary cases in the laboratory rooms have already been reported in the

College of Engineering. Based on statistics, 22 burglary cases are reported since 2015 (as

stated by the college laboratory technician who is responsible for the maintenance and

inventory of equipment). Overwhelming instances of computer processor downgrade, from

Intel Core i5 to Intel Core i3, and nowhere to be found computer mouses are just some

examples of the troubles that some professors have encountered. The amount of work and

loss emphasizes that the access control system should not be taken lightly.

This study aims to improve the technology of a conventional door lock system,

which includes the need for a modernized scheme.

1.3 General Objective of the Study

The general objective of the study is to design a RFID-based door lock system in

which data feed is possible that includes securing a room with authentication using

identification card.

1.4 Specific Objectives of the Study

The objective of the thesis is to design a RFID-based door lock system in which data

feed is possible. The specific objectives that must be attained are as follows:

 Establish an easier and more reliable access in a laboratory room by using RFID

technology.

 Have a more secured room for the safekeeping of the laboratory equipment.

Page | 10
 Authorize faculty personnel the admittance to a room as per schedule affirms.

 Allow staff in the dean’s office to see the personnel who accessed a certain room.

1.5 Scope and Limitations

The study aims to provide a modernized access system that could help improve the

security system in the College of Engineering, laboratories to be particular. This research

makes use of the ability of RFID technology to authenticate so as to safeguard the laboratory

equipment.

Scope

The scope of this study is to design a RFID door lock laboratory room system that

will provide advanced and more secured door lock accessibility; a system that identifies and

displays who can only access the room in a set of time (scheduled time of the professors).

This project is divided into two main parts: the hardware and the software part. The

hardware part is composed of a RFID reader connected to a monitoring system in the main

office meanwhile; the 2x16 LCD display is used to display the output of the reader. The

software part is to load the Arduino with the C programming.

This coding acts as the command to a circuit which controls the door itself.

Limitations

Every design has its own drawback(s), and here are the limitations to be put into

consideration for the coverage and potential of the study:

Page | 11
 RFID tags can be cloned with readily available equipment. Anyone with an RFID

reader can “skim” the data from a tag of interest and make a new ID badge with the

desired access permissions.

 Tag collision may occur if a reader picks up signals from multiple tags at the same

time.

 The system can be bypassed if an unauthorized person tracks an authorized person.

1.6 Significance of the Study

The main advantage of this research is the development of a higher degree of security

for an access control system. Problems encountered in using the typical door lock like being

able to be opened conventionally by means of lock-picking tools can be solved. With the use

of RFID (a unique, read-only or read-write code), access is easy and protected.

Page | 12
CHAPTER 2

THEORETICAL FRAMEWORK

This chapter presents a brief analysis of previous researches and literature related to

the project, and concepts regarding keyless access control system that can be of great help to

the researchers as they hypothesize ideas to come up with a proficient project. This chapter

also includes the conceptual framework of the system that explains the basic system

architecture and function of the research project.

2.1 Related Theories

2.1.1 RFID

Radio Frequency Identification (RFID) is the process of transferring data wirelessly,

and can contactless read-write data into an RFID memory through Radio Frequency (RF)

waves. 1 The technology centers on electronic "tags" which store data and respond to a radio

frequency reader device. In addition, RFID applies the principle of electromagnetic

induction. When an RFID tag, having a metal or copper coil that acts as the antenna, passes

through an electromagnetic field, a small amount of current is induced. An amount fair

enough to give power or wake up the onboard chip which causes the tag to spew out all

information stored in it that is then picked up by the reader’s antenna.

RFID technology which was just sitting in the corner for quite some time has finally

made its way in the limelight. Meeting today’s demands, it is of no doubt that this

technology is aggressively making an enormous impact on sectors such as but not limited to:

Page | 13
transport operations, supply chain, asset tracking and access control systems. Evidently, this

shows that the simplicity of a concept can lead to greater, both in terms of attributes and

numeral, inventions. For instance, WLAN (Wireless Local Area Network) that uses Radio

Frequency (RF) signals to transmit data over air eliminating the need for wired connectors or

a line of sight connection, but is limited to a certain range has a wide array of possibilities.

Bluetooth technology, a type of wireless communication, is one in which pairing is needed.

Devices must be in close distance to one another, too, for it is limited by a short transmission

distance. Barcoding which is also popular among access control systems uses a card with an

identification number on it that is read or scanned by a device via swiping. RFID technology

displays characteristics from each one aforementioned. RFID also uses radio frequency

signals to transmit data and does not need a line of sight connection for communication to be

possible. Furthermore, RFID may be limited by a short span, depending on the frequency

spectrum incorporated, and it also has a unique onboard identification number stored in a tag

or label that is to be captured by a device.

To wrap things up, an RFID system encompasses a tag, each with a unique

identification number, an antenna which is used for broadcasting of the number, and a

scanner or reader which receives the signals from the tags and converts these into a digital

information that can be passed to a computer system where it can be further developed as a

business information. These are the basic fundamental building blocks that will help in

understanding the functionality of an RFID system.

RFID COMPONENTS

Transmission of radio waves to the reader from the tags is possible through the use of

a transponder, a part of an RFID tag, which is an integrated circuit containing the radio

Page | 14
frequency circuitry and information to be transmitted, and an antenna and transceiver, which

read the radio frequency and transfer the information to a processing device, called reader.

RFID TAGS

Page | 15
RFID tag is contactless card, referred to as Proximity Integrated Circuit Card (PICC).

There are two general categories of RFID tags: active and passive. While both use radio

frequency

(RF) to convey message between a tag and a reader, the way they accumulate power is

different. Active RFID has internal power source (battery) within the tag which powers the

tag and its circuitry continuously, whereas, passive RFID depends on energy from the reader

for the tag to be powered. Thus, does require a high level of energy from the reader. Because

of the fact that passive tags are not powered, their reading range is typically a few meters.

And a reader must “wake up” the tag so as to transfer the information stored in it. On the

other hand, an active tag can utilize a low-level reader since it uses an internal power source

and unlike a passive tag, can deploy a high-level signal back to the reader. Moreover, an

active tag has a farther read distance when compared to a passive tag therefore, alongside

with the previously stated facts, making it more expensive and exquisite.

[2] The active tag is battery-powered and always, well, active. It is consistently on the

lookout for a reader’s signal. The passive tag relies on energy transferred from a reader to

power up and transfer its information. (http://atlasrfid.com/jovix-education/auto-id-

basics/active-rfid-vs-passive-rfid/).

QUALITIES OF AN RFID TAG

An RFID tag has the following qualities:

Page | 16
Unique Identification

In most cases, an Electronic Product Code (EPC) is encoded on RFID tags which can

be used to identify classes of products as well as individual items. EPC is a one of a kind

number stored in a chip of an RFID tag that is used to track objects, and to provide unique

identification and standardized identification scheme to RFID tags.

No Line of Sight Requirement

An RFID reader is still able to read RFID tags without direct line of sight even in

cases like: the tag is dirty, covered or is obscured from view.

Storage Capacity

RFID tags can typically store data of up to 2 kilobytes which is enough to carry basic

item information. It also is significantly an amount more than an identification number is

able to carry.

Dynamic information

With the read-write capability of RFID tags, information can be updated or changed

whenever it is necessary.

RFID READER

RFID technology allows several items to be quickly scanned and enables fast

identification of a particular product, even when it is surrounded by several other items. An

RFID system consists of a tag reader (also called the interrogator but in most cases is called

an RFID reader) and a tag. All communication between the tag and reader occurs completely

Page | 17
through a wireless link that is sometimes called an air interface. The RFID tag must be

within the range of an RFID reader, which ranges from 3 to 300 feet, depending on the

frequency band it consumes, in order to be read.

A radio frequency identification reader (RFID reader) is a device used to gather

information from an RFID tag, which in its early applications, is most often used to track

individual people or objects. The reader uses an antenna to send and receive signals to and

from the tags. The antenna can be mounted either internally or externally. Readers can also

be fixed or hand-held. Fixed readers are mounted readers that are ideally used for warehouse

management, asset tracking, and theft prevention applications. This type of reader may be

located at the entry or exit point of any facility or anywhere an item must pass by, and can be

used without human intervention. Hand-held reader works similarly to a barcode scanner.

The key difference is that this reader does not require the tag to be clearly visible to the

reader. Main advantage of hand-held readers is that it can read pallets without being

interfered by nearby pallets. Lastly, mobile RFID reader is a type of RFID reader that is

movable. Its advantage includes the absence of wires used in fixed readers and it can cover a

large area without the use of a massive number of fixed readers.

Note that many RFID readers and measurement systems actually use a three-port RF

component called a circulator that gives both transmit and receive front ends the ability to

use the same antenna. Note that with many RFID, standards, timing information between

transmit and receive commands is defined by strict guidelines. In fact, a sort of

“handshaking” is required between the tag and reader to complete an interrogation round.

This actually creates a unique test challenge because the instrumentation must be capable of

the same behavior. On an interrogator, an embedded processor is required to decode and

generate commands within a tight timing interval. As discussed in a later section, this design

Page | 18
is quite similar to field-programmable gate array (FPGA)-enabled RFID measurement

systems, which use similar embedded processing to fully emulate either a tag or a reader.

RFID SYSTEMS

RFID systems can be set apart according to the system’s range (may be a few

centimeters to a hundred meters) and the frequency band within which they operate (low

frequency, high frequency, and ultra-high frequency).

An RFID system which operates at low frequency (30 Khz to 300 Khz) has short

read range, typically an inch or two, but is ideal for reading objects near or on metallic

surfaces or objects with high water content. This band has lower sensitivity to radio wave

interference, but, compared to higher frequencies, is slower in terms of data read speed.

Typical applications of RFID system in this frequency include access control.

High frequency tags operating on frequencies between 3 and 30 MHz have read

ranges from 10 centimeters to 1 meter, and experience moderate sensitivity to interference. It

can work well with objects made of metal, and with medium to high water content. High

frequency RFID is commonly used for ticketing, and inventory management.

Ultra-high frequency band operates at frequencies between 300 MHz and 3 Ghz,

thus, offers the longest read range, up to 50+ ft. depending on the set up of an RFID system.

This band, having a short wavelength, makes it more likely to be weakened when

interference is encountered. But, amongst the three frequency bands, it has the fastest data

transfer rate. It is the most widely used band and include applications in the field of

transportation, toll collection or parking system.

Page | 19
APPLICATIONS

With the endless possibilities of what an RFID can do, here are the key areas in

which this technology is typically incorporated:

Public Transport

RFID system has been a widespread tool for the public ticketing system. Implication

and achievement of the said system has reached big cities like London, Shanghai, Istanbul

and many others. RFID can be implemented on transport areas which include subways,

railways, public bus services, and even electronic toll collection.

Retail

With mobile RFID devices being widely available on the market, the set-up is also

beginning to grow for payment methods. Those cards used on fast-food chains and coffee

shops are RFID-based. And if you are to look at a consumer’s discernment, RFID is a fairly

simple approach; however, this technology’s implications on the supply chain are massive

thereby profiting the retailer a lot. “The cost benefit analysis of implementing tags on all

products to have real time asset management, warehouse management and supply chain

visibility is immensely valuable. Each product can now be accurately tracked from its raw

materials, straight through to the manufacturing process and finally to the individual end

user.”

Access Control

The popularity of RFID on access control is all due to its ability to eliminate the

involvement of manual aspects of entry which include keys. The use of RFID upon entering

a building increases convenience and security. The use of RFID to uniquely identify who

Page | 20
and when an entry was accessed with the aid of microcontrollers and other security control-

based equipment will let authorities have a real time view on the safeguarding of their entity.

2.1.2 MICROCONTROLLER

A microcontroller is a small computer on a single integrated circuit (IC) that contains

a microprocessor, memory, and programmable input/output peripherals. It is built for

specific tasks which contain memory, storage, and automatic control of devices. By its

reduced size and cost, microcontroller makes it economical to control devices than when

compared to a project design that uses separate microprocessor, memory, and input/output

peripherals.

The fundamental blocks of a microcontroller are similar to those of a microprocessor.

The main difference between the two is that microcontrollers incorporate RAM, EPROM

(for data storage and program). This arrangement simplifies the design of microcontroller

systems. On the other hand, the peripherals are generally simpler than external device and

the amount of available memory would be much smaller.

2.1.3 SOLENOID LOCK

A locking solenoid is a conventional solenoid — a wire coil that is magnetized when

paired with an electrical current — that is made to lock a door or device. The coil is small

enough to fit into a lock, where it keeps the locking mechanism from moving unless

an electromagnetic force is used to gain access. When the door is locked, no power is used,

so the solenoid has a long duty cycle and tends to run off batteries. While most are very

small, there are some large ones made for heavy-duty equipment and safety devices. The

Page | 21
most common places a locking solenoid is used are in doors, vending machines, and

turnstiles.

When a door or device locks via a solenoid, it uses basic electromagnetic forces to

control the lock. The solenoid fits in the locking mechanism and, when locked, will expand

so the device cannot be unlocked by sheer force. An electromagnetic force, such as a

keycard, is needed to tell the solenoid to move, allowing the device to unlock and open.

2.1.4 DATA FEED

Data feed is a mechanism used by data aggregators to gather or receive an up-to-the-

minute digital information directly from data sources rather than copying it from a displayed

peripheral. “The data feed is usually a defined file format in which the client application

detects timely information that may be useful to the application itself or to the user.” Simply

put, data feed is a way of delivering structured data from a server to a user. The most popular

form of data feed would be the Web feed. It carries information useful for Web applications.

The most common feed under Web feed is the rich site summary (RSS) feed. It allows blogs

and other websites to automatically send notifications or updates to those who have

subscribed to their newsletter.

Data feed is often used to send out an information that contains aggregations of data

records or files, such as product inventories, customer profiles, employee profiles and

timetable of activities. The information delivered may be arranged in tabular form, with

columns and rows. The file types may vary, but some applications support plain text files in

order for a non-technical individuals to easily create their own data feeds.

Page | 22
2.2 RELATED LITERATURE

2.2.1 Name of thesis: Security Entry System Using RFID System

Inventor: Wan Noormaheran Wan Hussin

Abstract: This control system is designed for places which need a high security to control

the opening and closing of the door or gate. It can be used at building like office, hostel,

home etc to protect important room in that building. In a conventional building office

system, employees enter the building via the door and punch the employee card as a proof of

their attendance. The system used ordinary key for opening and closing of door or gate, and

it is not secure. The key can be either missing or duplicated by an illegal user. The employer

record the employees’ attendance based on the working hours of the employees reflected in

the punch card. The problems of this conventional system are; the building is not secure as

outsiders can easily enter the building, the employees might ask their colleagues to punch

the card and they also can easily hang out during working hours. This security entry system

will overcome these problems by introducing door entry system. However, this project was

designed to control the access entrance for one office department entrance only. The

attendances of the employees will be recorded to the database system automatically when

the door opened.

(http://portal.fke.utm.my/libraryfke/files/1615_WANNOORMAHERANWANHUSSIN2006.pdf

Page | 23
2.2.2 Name of thesis: RFID Wireless Door System

Inventor: Ashvaany Egambaran

Abstract: The goal of this project is to develop a simple wireless door system using two

different technologies. One of them is the RFID technology and the other one is an XBee

Pro wireless device that conform the ZigBee standard. In most door applications, RFID is

utilized as the primary technology for data identification and this data is used as a main

source for controlling the operation of a door. In this project, RFID technology is also used

for data identification, but the data obtained will be interfaced with XBee Pro wireless

technology. Then the data will be sent wirelessly to the receiver XBee Pro which in turn

controls the opening and closing of a door. So, the need for wired communication between

the RFID system and the door is eliminated. Furthermore, the door can be controlled from

long distance as wireless technology is implemented into the project. Intermediate between

RFID and XBee Pro wireless technology is a microcontroller that works on the instructions

build from the C programming language. The same applied between XBee Pro wireless

technology and a door which is represented by a LED in the recipient part.

(http://umpir.ump.edu.my/349/1/3251_Ashvaany.pdf)

2.2.3 Name of thesis: Design And Implementation Of Bank Locker Security System Based

On Fingerprint Sensing Circuit And RFID Reader

Inventor: Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun

Page | 24
Abstract: The main goal of this system is to design a locker security system using RFID and

Fingerprint. In this system, only authenticated person can open the door. A security system

is implemented containing door locking system using passive type of RFID which can

activate, authenticate, and validate the user and unlock the door in real time for secure

access. The advantage of using passive RFID is that it functions without a battery and

passive tags are lighter and are less expensive than the active tags. This system consists of

fingerprint reader, microcontroller, RFID reader, and PC. The RFID reader reads the id

number from passive. The fingerprint sensor will check incoming image with enrolled data

and it will send confirming signal for C# program. If both RFID check and fingerprint image

confirmation are matched, the microcontroller will drive door motor according to sensors at

door edges. This system is more secure than other systems because two codes protection

methods are used.

(http://www.ijstr.org/final-print/july2015/Design-And-Implementation-Of-Bank-Locker-

Security-System-Based-On-Fingerprint-Sensing-Circuit-And-Rfid-Reader.pdf)

Page | 25
2.3 Conceptual Framework

Figure 2.3 Conceptual Model of an RFID-based Security Access Control System

2.4 Notes In Chapter II

[1] http://science.opposingviews.com/basic-principle-rfid-18215.html

[2] http://atlasrfid.com/jovix-education/auto-id-basics/active-rfid-vs-passive-rfid/

Page | 26
[3]http://www.electrical4u.com/servo-motor-servo-mechanism-theory-and-working-

principle/

[4] https://www.techopedia.com/definition/30320/data-feed

[5] https://www.techopedia.com/definition/720/voice-response-system-vrs

[6] http://www.webopedia.com/TERM/V/voice_response_system.html

[7] http://blog.atlasrfidstore.com/which-rfid-frequency-is-right-for-your-application

[8] http://searchsqlserver.techtarget.com/definition/database

[9] http://www.brighthub.com/computing/hardware/articles/63693.aspx

[10]http://drcharlesbell.blogspot.com/2013/04/introducing-mysql connectorarduino_6.html

[11] http://www.w3schools.com/sql/sql_intro.asp

[12] http://www.simonsothcott.com/2011/11/what-is-rfid-10-examples-of-rfid.html

Page | 27
CHAPTER 3

DEVELOPMENT OF THE PROJECT

This chapter covers the various aspects governing the development of the project.

Included in this chapter are the project description, project design, and specifications of tools

and materials that are needed in the implementation of the project.

3.1 Project Description

One of the main purposes of this study is to secure expensive laboratory equipment

with the use of a more advanced technology – RFID technology.

The users will be provided with tags, which have unique serial numbers on it,

registered to the system. Once a close contact of an RFID tag to the module is made, its

corresponding serial number will be detected and will be compared with the recorded serial

numbers in the schedule database. With the aid of a software, the RFID reader will be

capable of neglecting the access of an unregistered or restricted RFID tag.

To further ensure higher complexity to the intruders, at the installation, users will be

asked to set-up a password – a 4-digit pin code. Higher complexity in a sense that, similar to

a biological identification, a password is unique to each individual, thus, cannot be easily

forged and it will give an assurance.

Page | 28
Once an access is requested, this information will be sent wirelessly to the dean’s

office. Using a graphical user interface (GUI), the administration will be able to see the entry

of every laboratory room.

Security can be attained by designing various door locks such as mechanical locks or

electrical locks. A simple lock and key, however, has proven to have an enormous number of

drawbacks which makes a supposedly secured room susceptible to burglary, considering that

these locks can now be opened conventionally with skillset from lock- pickers or by means

of lock-picking tools, hence, making electronic locks better than mechanical ones. Simply,

this project gives you the opportunity of minimizing the number of intruders, thereby, giving

a more secured laboratory room where high-end equipment are stored.

Programming

To perform the specific function of the prototype the Arduino must have the set of

instructions to communicate with the microprocessor. Arduino programming language and

Arduino Software IDE will be the ones to make it possible. Programming is done not on the

Arduino, but on a host computer. Programming is the art of writing text that can be

understood by people, and translating it into binary form for the processor to understand.

Source code is the data written by humans. Source code is written in text format so most

people use Integrated Development Environment as simple text editor. Sketch is also known

as an Arduino program. The principal language used in Arduino is C language. This

language is difficult to understand for beginners so Arduino team develop the standard

programming Arduino library that will provide much easier and simpler way of coding.

Arduino Software IDE is an easy to use application for writing and uploading codes

into the board. The environment is written in Java and based on Processing and source

software. It runs on Windows, Mac 0S X, and Linux. This application has add-ons designed

Page | 29
for developers. These add-ons range from text auto-completion to debugging and often

include tools to handle different source files that contain source codes. After the codes are

written the compiler reads the source codes and creates the binary files. These binary files

are later uploaded into the Arduino and the microcontroller will process and execute these

codes.

C/C++ Programming Language is the language used in Arduino. It is first developed

in Bell Laboratories in early 1970 for UNIX operating system. C uses a procedural language

syntax that needs to be processed by a compiler to convert Human written code to machine

codes. Unique Arduino code like pinMode(), digitalWrite(), and delay() are specific codes

from Arduino library. Microcontroller Codes written in C language consumes less amount of

memory than those written in other language. Simplicity and flexibility are the benefits of

writing in C language. This will benefit developer to create and develop more powerful

prototypes.

3.2 Project Design

3.2.1 System Block Diagram

COMMAND CENTER RFID MODULE

Relay Arduino Uno  RFID Reader

 RFID Tag

Solenoid lock Data feed

INTERNET Page | 30
ADMIN
Host PC

Database

Figure 1

Page | 31
3.2.2 Process Flowchart

Figure 2

3.2.3 Server Program Flowchart

SYSTEM ON

X
SCAN RFID
TAG
INPUT 4-DIGIT
PIN CODE
Page | 32
IS CARD
NOT A
MASTER
Z
CARD?
NO
NO IS PIN
VALID Y
?
YES
YES
ACCESS SYSTEM
TIME AND DATE PRINT
ACCESS
GRANTED

ACCESS
SCHEDULE
Z
DATABASE
OPEN SOLENOID
LOCK

IS USER
ASSIGNED AT
SEND DATA TO
CURRENT HOST COMPUTER
TIME AND
Y
DAY? NO
Y

END
YES

LCD START UP X
Figure 3

Page | 33
3.3 Project Specification

The research is a security system based in Natividad Hall (College of Engineering)

that could be accessed by tapping an authorized RFID card and entering the correct pin code,

as faculty members follow their respective schedules, and propels information via the

internet to give the administration a monitored data regarding the admittance to every

laboratory room that could further help in the investigation of the recent burglary cases.

3.3.1 Passive RFID Tag

A passive tag is an RFID tag that does not contain a battery; the power is supplied by

the reader. When radio waves from the reader are encountered by a passive RFID tag, the

coiled antenna within the tag forms a magnetic field. The tag draws power from it,

energizing the circuits in the tag. The tag then sends the information encoded in the tag's

memory.

Features:

 Tag power source: Energy transferred from the reader via RF

 Tag battery: No

 Availability of tag power: Only within the field of reader

 Required signal strength (reader to tag): Very high

 Available signal strength (tag to reader): Very low

 Communication range: Short or very short (3m or less)

 Data Storage: Small read/write data storage (e.g. 128 bytes)

 Able to read and transfer sensor values only when tag is powered by reader; no

date/time stamp

Page | 34
3.3.2 RFID Tag Reader

It is a stand-alone RFID card reader, with 2 seconds delay after tapped. It can show the

actual serial number indicated on the card. Passive tag RFID card reader can also detect the

type. Ease of card reading through distant detection is possible. It can detect and discern

between registered and unregistered cards. Its internal memory can register up to 100 RFID

cards. It is easy "Enroll & Delete" user with commands.

Features:

 Operating Voltage: 7.5 to 9V DC

 On-board IC: MCU ATmega168

 Address Bit Amount:  7 bits

 Maximum Cards Registered: 100 (from internal memory alone) 

 Radio Frequency: 125KHz

 RFID Card Type: 64 bit

Page | 35
 PCB Dimensions: 46 mm x 64 mm

3.3.3 Relay

A relay is an electrically operated switch. Many relays use an electromagnet to

mechanically operate a switch, but other operating principles are also used, such as solid.

Relays are used where it is necessary to control a circuit by a low-power signal (with

complete electrical isolation between control and controlled circuits), or where several

circuits must be controlled by one signal.

Features:

 12VDC SPDT Relay

 Rated up to 10A (@125VAC)

Page | 36
 Fully Sealed

 Can be mounted directly into breadboard - 300mil spacing

 Omron part #: G5Q-0609

3.3.4 Solenoid Lock

A solenoid is a coil of insulated or enameled wire wound on a rod-shaped form made of

solid iron, solid steel, or powdered iron. Devices of this kind can be used as electromagnets,

as inductors in electronic circuits, and as miniature wireless receiving antennas. In a

solenoid, the core material is ferromagnetic. It concentrates magnetic lines of flux. This

increases the inductance of the coil far beyond the inductance obtainable with an air-core

coil of the same dimensions and the same number of turns. When current flows in the coil,

most of the resulting magnetic flux exists within the core material. Some flux appear outside

the coil near the ends of the core; a small amount of flux also appears outside the coil and off

to the side.

Features:

 Standard voltage: 10, 12, 20, and 24 volts D.C.

Page | 37
 Ambient operating temperature: 212°F/ 100°C

 Magnet wire: All 100 series are thermal class 200°C

 Encapsulating material: Thermoplastic polyester (PET) (RYNITE 415 HP)

 Lead wires: 18/10 gauge meets sae J1128XLPE, type SXL

3.3.5 4x3 Keypad

Keypads are collection of push switches which are arranged in the form of a matrix.

So there are rows and columns of switches. The two connections of a switch are also

connected in the matrix, so that the row has common connection and the column has a

common connection. Thus when a button is pressed in a row and a column, where the button

is pressed, it gets connected internally.

Features:

 4 x 3 Matrix Membrane Keypad

 7 pin connector

 Adhesive mounting (sticker on the back side)

 Operation Temperature: 0 to +60 centigrade

 Humidity: 40 centigrade, 90%-95%, 240 hours

 Flexible Circuit Length: Approx. 3.3 inch / 83 mm

Page | 38
3.3.6 LCD Display

Liquid crystal display is the technology used for displays in notebook and other

smaller computers. Like light-emitting diode (LED) and gas-plasma

technologies, LCDs allow displays to be much thinner than cathode ray tube (CRT)

technology.

Features:

 LCD display module with Yellow Backlight

 Size : 20x4 (2 Rows and 16 Characters Per Row)

 Can display 2-lines X 16-characters

 Operate with 5V DC

 Wide viewing angle and high contrast

 Built-in industry standard HD44780 equivalent LCD controller

 LCM type: Characters

Page | 39
3.3.7 Arduino Mega

The Arduino Mega is a microcontroller board based on the ATmega1280. It has 54

digital input/output pins (of which 14 can be used as PWM outputs), 16 analog inputs,

4 UARTs (hardware serial ports), a 16 MHz crystal oscillator, a USB connection, a power

jack, an ICSP header, and a reset button. It contains everything needed to support the

microcontroller; simply connect it to a computer with a USB cable or power it with a AC-to-

DC adapter or battery to get started. The Mega is compatible with most shields designed for

the Arduino Duemilanove or Diecimila.

Features:

 Microcontroller  ATmega1280
 Operating Voltage  5V
 Input Voltage
 7-12V
(recommended)
 Input Voltage (limits)  6-20V
 Digital I/O Pins  54 (of which 15 provide PWM output)
 Analog Input Pins  16
 DC Current per I/O Pin  40 mA
 DC Current for 3.3V Pin  50 Ma
 128 KB of which 4 KB used by
 Flash Memory
bootloader
 SRAM  8 KB
 EEPROM  4 KB
 Clock Speed  16 MHz

Page | 40
3.3.8 RF Transceiver

The serial RF module is a low cost, high performance transparent FSK transceiver

operating at 434 MHz. it features a small size, high output power, high sensitivity, long

transmission distance (1-40m) and high communication data rate with auto set up for

communication change and data receiving transmission control.

Specifications:

 Working frequency: 434Mhz

 Supply voltage: 3.3V to 5VDC

 Communication distance: 1m to 40m indoor

 Serial baud rate: 1.2Kbps to 115.2Kbps (default 9.6Kbps)

 Receiving sensitivity: -112dBm to -95dBm

 Transmit power: -30dBm to 10dBm

 Interface protocol: UART/TTL

 Operating temperature: -40℃ to +85℃

 Dimensions: 27.8 x 14.4 x 4mm

Page | 41
3.3.9 PC

It is a laptop computer utilized to monitor the admission of every laboratory room.

With the aid of an internet connection, real time viewing is made possible.

Specifications:

 Processor: Core I3- 4030U -1.90GHz

 HDD: 930GB

 RAM: 4GB

 System Type: 32-bit Operating System

 1024 MB video RAM

 Nvidia GeForce 820M 1GB

 14 inch HD LED

 At least 3 2.0 USB port

 Windows 7 Ultimate

Page | 42
3.4 Notes In Chapter III

[1] https://www.arduino.cc/en/Guide/Introduction

[2] https://www.safaribooksonline.com/library/view/programming

interactivity/9780596800598/ch04.html

[3] http://www.reliance-jcs.com/pro-electromechanical-solenoid.php

[4] http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=47

[5] https://drive.google.com/file/d/0BxdLxDCD6HidR0V0UW5DdEgxZkE/view?pli=1

[6] http://emoonim.com/eng/sidearticles/relays/

[7] http://www.circuit-help.com.ph/product/arduino-uno-rev3/

[8] http://www.circuit-help.com.ph/product/lock-style-solenoid-12vdc/

[9] http://www.icreateproject.info/uncategorized/arduino-save-data-to-database/

Page | 43
[10] http://www.instructables.com/id/interface-keypad-with-arduino/

CHAPTER 4

PROJECT GROWTH

4.1 Project Description

The researchers’ goal is an innovation of the security of door locks. RF and Arduino

are to be utilized in this research whereas RFIDs serve as the keys to unlock the door and an

RFID reader, the Arduino, and a password protected LCD display is used to mechanically

operate the locking and unlocking function. The RFIDs are stored in database at the central

office. If an RFID is presented in the reader, the program confirms its validity. Once proven

valid, the user then types the password and the system unlocks. After validation, it will send

signal to the database in the central office, recording and confirming the RFID. With the RF

technology, securing a vast area will be optimized and give accurate authorization.

Specifically, the researchers applied this innovation to the security of the Lab Rooms in

Natividad Hall (College of Engineering) that has reportedly experienced rare cases of theft.

Page | 44
4.2 Project Design

PCB Schematic Diagram

PCB Design

Page | 45
PCB parts and placement

Page | 46
RFID Card Reader Schematic Diagram

Page | 47
Arduino Mega Schematic Diagram

Page | 48
Liquid Crystal Display Schematic Diagram

4x3 Matrix Keypad Schematic Diagram

4.3 Fabrication Process

4.3.1 Door Fabrication Process

Page | 49
1. Assemble the door frame.

2. Mount the solenoid lock to the door.

3. Make a rectangular hole on the door.

4. Create a power supply.

5. Upload the code in the microcontroller.

6. Build a rectangular box and mount the LCD display on the upper left side and place

the Keypad at the bottom of the LCD.

7. Place the RFID reader, power supply, and Arduino board inside the box.

8. Put the RF transceiver on the side of the box. (Be sure to place it away from the

RFID reader to avoid interference)

9. Connect the RFID reader, transceiver, LCD Display, and Keypad to their respective

pins in the Arduino board.

10. Make sure to connect the TX pin of the RFID Reader to the RX of the Arduino and

TX of the Arduino to the RX of the RFID reader (Same for the RF transceiver)

11. Connect the Arduino to the power supply.

12. Insert the Box in the rectangular hole on the door.

13. Connect the solenoid lock to the Arduino.

14. Connect to the power source.

15. Make sure a beeping sound is heard from the RFID reader and the LCD displays a

message.

16. Connect another RF transceiver to the USB to UART converter.

17. Connect the USB to UART converter to the computer.

18. Swipe RFID Card and test the system.

4.3.2 Programming Process (Arduino and Visual Studio 2010)

1. Start Arduino IDE.

Page | 50
2. Create a code.

3. Import libraries needed for the program.

4. Compile the program to check for errors.

5. Upload the program to the Arduino board.

6. Start Visual Studio 2010.

7. Create a code.

8. Declare the right Serial port for the USB to UART converter.

9. Run and test the program.

4.4 Tools and Equipment

4.4.1 Tools

1. Wire stripper

It is a hand-held device used to strip the electrical insulation from electric wires. A

simple manual wire stripper is a pair of opposing blades much like scissors or wire

cutters. The addition of a center notch makes it easier to cut the insulation without

cutting the wire. This type of wire stripper is used by rotating it around the insulation

while applying pressure in order to make a cut around the insulation. Since the

insulation is not bonded to the wire, it then pulls easily off the end. This is the most

Page | 51
versatile type of wire stripper. Another type of manual wire stripper is shown below.

It is very similar to the simple design previously mentioned, except this type has

several notches of varying size. This allows the user to match the notch size to the

wire size, thereby eliminating the need for twisting and thus making it ideal for

working with smaller gauge conductors. Some wire stripper also consist of serrated

pliers-type nose for wire pulls and loops.

2. Diagonal Plier

Also known as “side cutter”, is specifically designed for cutting copper, brass,

aluminum and steel wire. The bladed jaws are excellent for cutting, but are not

suitable for gripping or twisting. Some diagonal pliers have a specially ground edge

which makes a flush cut. This leaves a flush or flat surface, as opposed to the pointed

tip made by diagonal cutters. It is very useful when cutting the wires sticking out

from the bottom of a printed circuit board (PCB) after soldering a part in place.

Page | 52
4. Soldering Iron

It is a hand-held device whose metal tip heats to temperatures well above the melting

point of solder. It supplies heat to melt the solder and allow it to flow into a joint

between two work pieces. A soldering iron is composed of a heated metal tip and an

insulated handle. Heating is often achieved electrically, by passing an electric current

through a resistive heating element. For electrical and electronics work, a low-power

iron, a power rating between 15 and 35 watts, is used. A soldering iron stand and

cellulose sponge and flux pot for cleaning the tip is also very useful to avoid burning

your work surface.

5. Soldering Wire

It is a fusible metal alloy used to join together metal work pieces and having a

melting point below that of the work piece(s). It is used to make electrical,

mechanical, and thermal connections in a wide variety of applications. For

electronics work, 22 gauge solder should be used as it allows much greater control

over the quantity of solder delivered, and the chances of accidentally bridging a gap

due to over-application or the wire's width are greatly reduced. While a Rosin core

solder should always be used, as it has channels inside filled with rosin flux. Since

flux melts before the solder, the embedded flux automatically cleans the joint before

the solder flows into it, resulting in a better quality of the soldered joint. Without

flux, a dry joint may be formed, making a poor connection.

Page | 53
6. Desoldering Pump

Also known as “solder sucker”, it is a manually-operated device which is used to

remove solder from a printed circuit board. It has a cylinder with a spring-loaded

piston which is pushed down and locks into place. When triggered by pressing a

button, the piston springs up, creating suction motion that sucks the solder off the

soldered connection. The pump’s bottom head contains a hole through which the

molten solder is sucked when the pump is triggered. The head is designed such that

the extracted solder does not solidify and block it. Consequently, the sucked metal

can be removed and discarded easily.

6. Breadboard

Also known as “protoboard”, it is a type of solder less electronic circuit building for

temporary prototype with electronics and test circuit designs. Another common use

of breadboards is testing out new parts, such as Integrated circuits (ICs). Most

electronic components in electronic circuits can be interconnected by inserting their

leads or terminals into the holes and then making connections through wires where

appropriate. The breadboard has strips of metal underneath the board and connects

the holes on the top of the board. Note that the top and bottom rows of holes are

Page | 54
connected horizontally and split in the middle called ravine which acts as Dual In-

line Package (DIP) support for Integrated Circuits while the remaining holes are

connected vertically is referred to as the power rails.

7. PCB (Printed Circuit Board)

Also called “printed wiring board” or “etched wiring board”, it is used to

mechanically support and electrically connect electronic components using

conductive pathways, tracks or signal traces etched from copper sheets laminated

onto a non-conductive board. Components are connected through the conductive

material below a non-conductive board, the common conductive material used in

packaged PCBs are usually copper, since copper is cheap and common while the

common non-conductive material used in PCBs are usually epoxies or phenolics

which lack the durability of FR4 but are much less expensive and they have a very

distinctive bad smell. A PCB allows signals and power to be routed between physical

devices.

8. Electric Drill and Drill Bits

Electric drill and drill bits in the range of 1/8 inch to 1/2 inch is used to drill holes on

the printed circuit board that has been etched.

Page | 55
9. Alligator Clips

The primary use of alligator clips is in establishing quick and temporary electrical

connections. When manufactured for electronics testing and evaluation, one jaw of

the clip is typically permanently crimped or soldered to a wire, or is bent to form the

inner tubular contact of a 4 mm female banana jack, enabling quick non-permanent

connection between a circuit under test and laboratory equipment or to another

electrical circuit. The clip is typically covered by a plastic shroud or "boot" to

prevent accidental short-circuits. Alligator clips also used as heat sinks.

10. Pin Header and Header Wire

A pin header (or simply header) is a form of electrical connector. It consists of one or

more rows of male pins typically spaced 2.54 millimeters (0.1 in) apart, but sometimes 2

millimeters (0.079 in) or 1.27 millimeters (0.05 in) is used as well. The distance between

pins is commonly referred as pitch in the electronic community. Pin headers are often

associated with ribbon cable connectors, pin headers often also function as recipients for

jumpers. Pin header connectors are thus "male" connectors (female counterparts do exist,

Page | 56
but these are normally just called "header connectors", without "pin") and are mostly

used inside equipment, rather than being used as a connector on the outside of the

device. Pin headers are cost-effective due to their simplicity. Headers are often sold as

long strips (typically 40 pins for the dual row versions) which can easily be broken off to

the right number of pins.

4.4.2 Equipment

1. Multimeter

Also known as a VOM (Volt-Ohm meter or Volt-Ohm-milliammeter ), is an

electronic measuring instrument that combines several measurement functions in one

unit. A typical multimeter would include basic features such as the ability to measure

voltage, current, and resistance. Multimeter can be an analog or digital. Digital

multimeters are now far more common but analog multimeters are still preferable in

some cases, for example when monitoring a rapidly varying value. They can be used

to troubleshoot electrical problems in a wide array of industrial and household

Page | 57
devices such as electronic equipment, motor controls, domestic appliances, power

supplies, and wiring systems. A multimeter has a knob, which selects the

measurement function, and a pair of test leads for connecting the device to a circuit.

2. Power Supply

The primary function of a power supply is to provide a precise and stable source of

direct current to power electronic circuits. It converts 120-V AC electricity from a

standard outlet into a DC voltage you can set with a front panel control, as a result,

power supplies are sometimes referred to as “electric power converters”. Some

power supplies are discrete, stand-alone devices, whereas others are built into larger

devices along with their loads. Examples of the latter include power supplies found

in desktop computers and consumer electronics devices. A power supply may obtain

energy from various types of energy sources, including electrical energy transmission

systems, energy storage devices such as a batteries and fuel cells, electromechanical

systems such as generators and alternators, solar power converters, or another power

supply.

Page | 58
4.5 Project Development Cost

Product Name Quantity Price (Php)

Lock Style Solenoid – 12VDC 1 785.00

RFID Card Passive 3 105.00

RFID Reader 1 690.00

Arduino Mega 1 2649.00

LCD display 1 219.00

4x3 keypad 1 137.00

RF Serial 434 Mhz Module 2 1150.00

USB to UART converter 1 250.00

Page | 59
Hardware 2287.00

Miscellaneous 552.00

Total: 8824.00

4.6 Time Table of Activities

July August September October November December January

Activities
01-04
08-13
17-22

03-09
09-16
19-21
26-30
03-06

05-08

13-16
20-23
25-27
25-29
02-12
14-21
20-25
26-29

10-13
17-20
26-30
06-10
14-17
21-24
28-30

14-18
19-21

06-08
28
Formulation

Materials research

and canvassing

Researching and

write up for

introduction

Purchasing the

needed materials

Assembling basic

connections in

breadboard
Arduino and

Visual studio

programming
Preliminary

testing and

troubleshooting

Page | 60
4.7 Survey Form

Bulacan State University


College of Engineering
Department of Electronics Engineering
City of Malolos, Bulacan

Dear Ma’am / Sir,

We are Electronics and Communications Engineering Students from Bulacan State


University who are currently making a feasibility study about RFID based door locking
system.

In relation to this, we would like to conduct a survey to help us in our study. Below are
few questions that we would like to be answered.

Demographic Data:
Name of Respondent (Optional): _________________________________________
Age: ____
Gender: ___________
Contact No. (Optional): ___________________

Instruction: Put a check mark () to indicate to what extent you agree with the following.

5 – Strongly Agree 4 – Agree 3 – Undecided 2 – Disagree 1–Strongly

Disagree

I. User-friendliness

  5 4 3 2 1
The RFID interface is easy and accessible          
The user-interface program is easy to
operate.          
The RFID door lock is operational.          

II. Functionality

  5 4 3 2 1
Easy to use and to operate.          
Functions according to the purpose of unlocking the
door.          

Page | 61
Can provide information in a given time.          
Can provide information in a given time.          

III. Reliability

  5 4 3 2 1
Reliable in terms of assessing the secured area.          
Can satisfy by giving the needed information for the
faculty          
Provides a systematic way for securing the laboratory
room.          

IV. Efficiency

  5 4 3 2 1
More affordable than other surveillance systems.          
More reliable than ordinary door locks.          
Can inform the faculty in a minimum time.          
It can contribute for the development of security
operation.          

V. Accuracy

  5 4 3 2 1
Capable of giving specific access time on the door lock.          
Operates accurately in terms of showing the faculty the scheduled
professors in their respective rooms.          
The RFID door lock interface presents the exact command to present the
laboratory schedule.          

The above survey and questions are used for research and undergraduate study purposes

only.

Comments/Recommendations:

Page | 62
__________________________________________________________________________

__________________________________________________________________________

__________________________________________________________________________

__________________________________________________________________________

__________________________________________________________________________

____________________

Page | 63
CHAPTER V

RESULTS AND DISCUSSION

This chapter discusses the presentation, analysis, and interpretation of data gathered

from various respondents. It shows the proficiency of the project as evaluated by the

respondents. The respondents have seen the operation of the said system and corresponding

results are shown on the following pages of the chapter. The working procedures of the

developed project are also shown in this chapter.

5.1 Project Technical Specifications

The project will operate efficiently based on the following parameters:

 PC Operating Software: ano ba need VS 2010

 RFID Reader Power Supply: batt/outlet

 LCD Power Supply: batt/outlet

 RF Transceiver Power Supply: batt/outlet

 Solenoid Lock Power Supply: batt/outlet

 SACS Software Requirement: Visual Studio 2010

5.2 Project Evaluation

Page | 64
The researchers formulated a set of questions to be answered by various

correspondents to have a clear insight of the project’s significance and to make further

enhancements or modifications as suggested in the survey.

5.2.1 Evaluation Procedure

The main concern of the survey for security access control system for COE

laboratories is to monitor the person who wants to access the room. The researchers

demonstrated how the system/device would work. After the demonstration, the respondents

were asked to evaluate the device by answering the survey questionnaire regarding its user-

friendliness, functionality, reliability, efficiency and accuracy. There were 30 total

respondents, 10 professors and 20 students from different engineering major. The

respondents were selected using the random sampling.

5.2.2 Evaluation Criteria

The evaluation was based on the following criteria:

1. Functionality - It refers to the purpose that is designed or expected to be fulfilled by the

system.

2. Reliability - It deals with the extent to which the system yields the satisfying results on

repeated trials.

3. Usability - It pertains to the ratio of the useful work performed by the system compared

to the cost and reliability of other system.

4. Workability - It refers to the capability of the device to show the schedule of the

professors and give the specific access time on the door lock.

Page | 65
Each criteria was evaluated based on the scale shown in Table 5.1

Rating Criteria

4.01 – 5.0 Excellent

3.01 – 4.0 Very good

2.01 – 3.0 Fair

1.00 – 2.0 Poor

Table 5.1 Rating, Scale and Criteria

5.2.3 Interpretation of the Collected Data

The developed device was analyzed and evaluated according to its level of acceptance

in terms of User-friendliness, Functionality, Reliability, Efficiency and Accuracy. The result

was then interpreted using the mean distribution; X =


∑x
n

The following table shows the summary and interpretation of collected data:

Page | 66
Criteria Mean Remarks

Functionality 4.60 Excellent

Reliability 4.52 Excellent

Usability 4.45 Excellent

Workability 4.52 Excellent

Weighted Mean 4.54 Excellent

Table 5.2 Mean distribution of the System in Terms of Operation as Evaluated

Table 5.2 above shows the General Weighted Mean of all the data gathered regarding

the operation of the system. Based on the conducted survey, the system was over-all rated

4.61 for user-friendliness, 4.60 for functionality, 4.52 for reliability, 4.45 for efficiency and

4.52 for accuracy. To sum up, the general weighted mean is 4.54 which shows that the

respondents agreed that the security access control system is excellent.

5.2.4 Summary

Page | 67
Page | 68
5.3 Operating Procedures

1. Tap the RFID card.

2. The authorized person will decide if the professor can enter the laboratory room.

a. If the professor is scheduled to enter the lab room, the interface displays a

message "Prof A wants to access the room.", the authorized person clicks

"Ok", then clicks "Yes".

b. If the professor is not scheduled to enter the lab room, the interface displays a

message "Prof A wants to access the room.", the authorized person clicks

"Ok", then clicks "No". The LCD, then, displays "Unauthorized" and returns to

startup.

3. If the professor is scheduled to access the lab room, he/she may now enter the security

PIN code.

a. If the entered PIN code is correct, the door unlocks, then, the LCDwill display

"Sucess" then the professor may now enter.

Page | 69
4. After the scheduled time has been terminated or upon leaving the lab room, the

professor simply pushes the red button to exit.

*If error occurs

5. If the professor enters incorrect PIN code thrice, the LCD will display "Terminated".

6. Tap the master card to access again.

*For emergency

7. If a power shortage occurs, the professor inside the laboratory room may connect the

system to a powerbank or place 8 double AA batteries to power up the system and

proceed to exit.

5.4 Project Capabilities and Limitations

5.4.1 Capabilities

 The system is able to provide convenient and more secured door lock accessibility of

the laboratory room with the use of RFID technology and pin code.

 The software is able to identify and display who can enter the room in a set time

depending on the scheduled time of the professors.

 With the use of Radio Frequency transceivers, the system is able to send data feed to

the main server to monitor and authorize the person before entering the laboratory

room.

 The system is able to operate continuously in times of power shortage through the

use of power bank and batteries.

5.4.2 Limitations

Page | 70
 RFID Readers and RF transceivers are both prone to interference.

 The system does not catch the burglar.

 Solenoid driven locks are high power consuming device.

 The whole device needs a more efficient power supply.

 Monitoring of a person entering the laboratory is concentrated on the card holders

only.

 Data transmissions may be interrupted if one of the transceivers is blocked.

 Command center should be transferred to laptop during brownout.

 RFID cards are prone to cloning.

 The device does not monitor the equipment inside the laboratory.

5.5 Safety and Control Measures

As long as the device is properly used, there should be no real issues in terms of

malfunctioning of the system and damages to the device. User must follow the proper

guidelines in operating and handling the equipment.

Listed below are safety precautions and control measures that must be followed:

 Follow the instructions provided in the user’s manual.

 Make sure that the parts of the device are properly attached or connected.

 Avoid giving others personal information (eg. pin code, or the card itself).

5.6 Maintenance

Page | 71
 Regularly check the connections/wirings inside the system.

 Regularly check the battery capacity in case of emergency procedure.

 Use the lab room door with care because the connections inside the system may be

detached due to strong impact.

5.7 Sample Installation

Page | 72
CHAPTER 6

SUMMARY AND CONCLUSION

This chapter presents the general summary of the study, conclusion, and

recommendations.

6.1 Summary

Lately, there were reported scenarios of loss of equipment inside the laboratory

rooms at Natividad Hall (College of Engineering). One of the major reasons for this event is

that the laboratory rooms, up to this day, use security locks using some of the basics which

are the padlock and the metal key. These simple security devices have been proven

inefficient for the security needed in the area concerned.

The researchers coordinated with the maintenance and security personnel to confirm

the issue. This signifies the problem. Due to missing components inside the laboratory room,

there were cases of classes being delayed and personnel downgrading the version of their

technology to compensate for the missing parts or to lessen the cases. This signifies that it is

a hard task to monitor the laboratory rooms and the people liable inside the room. With this

Page | 73
in mind, the researchers utilized the use of wireless communication of RF technology to

innovate the security of the laboratory rooms.

6.2 Conclusion

In conclusion, the researchers have concluded that security is still lacking in the

laboratory rooms of College of Engineering and the study proposed will contribute to the

advancement of the technology of the security. The S.A.C.S. improves the accessibility,

security and monitoring of the area concerned. By a simple tap of the RFID tag and a unique

PIN code, the S.A.C.S. is able to innovate the way the professors as well as the students

enter the room. The unique PIN code, which every professor keep in using the room,

possesses additional layer of security in response to misplacement or theft. The wireless data

feed allows the faculty secretary to be notified if a professor is to access the laboratory room

which will aid in monitoring the specified rooms.

From the respondents’ point of view, the security system helps aid security and

monitoring, which means that the maximum capablity of the system benefits the College of

Engineering. The respondents rated the user-friendliness highest during the survey

conducted by the researchers. This implies that the system has greater reliability than the

current security system. Overall, the security system was rated mostly excellent and the

respondents look forward to the implementation of the system.

Page | 74
6.3 Recommendations

Based on the respondents’ opinion, evaluation and suggestion, the researchers came

up with some recommendation for the improvement of their project.

1. Use a more durable solenoid lock for better security stability.

2. Employ a more efficient power source to improve the functionality of the system.

3. Create an indicator in monitoring the back-up power source.

4. Be sure to transmit and receive information using GSM incase the command center runs

out of power.

Page | 75

You might also like