You are on page 1of 34

Biometric Lock System with Motion Monitoring Capability

A thesis presented to

the Faculty of the College of Computer Studies

Saint Columban College

Pagadian City

In Partial Fulfillment

of the Requirement for the Degree

Bachelor of Science in Computer Science

By:
Chapter I

Introduction

Project Context

Security in the homes and office/corporate setting is a big concern for everyone these days, whether they are

away from home or at home. It is one of the most effective protection systems available. one of the most pressing

issues in today's fast-paced world, where humans cannot protect their personal belongings manually. Instead, they

develop a different solution that provides stronger, more dependable, and atomized protection. This is an age in

which everything is linked by a network, and Anyone can obtain information from anywhere on the planet. As a result,

the possibility of having one's information stolen is a serious concern. Due to these dangers, it is critical to have

some personal identification in order to access one's own information. In a 448 bits with several sub key arrays

produce a 4168 bytes on a role key expansion (Panda, 2017). Personal identity is becoming increasingly relevant in

today's world. We often see password and identification card techniques among mainstream personal identification

methods. However, passwords and identity cards are now easily hacked (Encarnacion et al., 2020b). These methods

are inaccurate since data can get lost (Encarnacion et al., 2020a; Salunke et al., 2019).

Certain cases are incredibly aggravating, such as when a person locks himself out of his house or office or

leaves his key inside or when a thief breaks the lock. People who use a manual door lock or keys are still troubled by

circumstances like this. While smart cards are used in some areas, there might be a case where someone loses or

holds the card. In another case, some people are responsible for locking up houses or offices and maintaining the

keys secure. However, there are occasions when the person in possession of the keys is unavailable or has gone

through an emergency procedure. This can trigger an unwelcome delay for those who need the key immediately.

These are the problems that people can encounter while using keys or smart cards. That's where our fingerprint-

based lock system comes in handy. Our design is exclusive. They are implemented to improve security by
eliminating the need for users to recall passwords or carry around keys or cards that are often misplaced. If a

person's fingerprint is approved in the system, he will not experience any delays when entering a room.

There are also some instances that many countries now employ both public and private video surveillance system as

a primary tool to monitor people’s movements and to prevent crime and terrorism, both indoor and outdoor setting.

Focusing on the private and indoor sector, the installation of video surveillance is highly recommended to improve

security in a room. But, having a bit obvious or noticeable surveillance camera, robbers can easily remove the

modules and memories of the Video Monitoring System, leaving them committing the robbery safely, and

unrecorded.

Our proposed system overcomes all the security problems in the existing system and provides high security

and efficiency. This is a perfect/optimal solution for saving/protecting one from the hassle of a stolen/lost key or an

unauthorized entry. The fingerprint and camera monitoring is a boon solution for these problems, which provides a

high level of recognition accuracy. The skin on our palms and soles exhibits a flow-like pattern of ridges called friction

ridges. The pattern of friction ridges on each finger is unique and immutable. This makes fingerprint a unique

identification for everyone. A fingerprint scanner scans the fingerprints of users and is used for ensuring

authentication.

Fingerprint scanning is a more accurate and cost-effective method, and duplication is virtually impossible. A

fingerprint recognition system can efficiently perform verification. In verification, the system compares an input

fingerprint to the enrolled fingerprint of a specific user to ensure if they are from the same finger. Now the security of

our home/office is literally in our hands or rather at our fingertips. Installing camera monitoring is highly

recommended to improve safety and security.


Purpose and Description of the Study

The main purpose of this study is to integrate the different concepts from Fingerprint Technology, GSM

technology, SD Module, RTC module, Ultrasonic sensor, Magnetic Sensor, Keypad, PIR sensor , Camera ,

Raspberry pi technology and the Arduino technology. This study was inspired by the knowledge of researchers in

the field of Computer Science. In the implementation of this knowledge, the researcher must meet the objectives of

this study which to embed the use of Fingerprint Reader and Arduino to control the locker.

This system aims to grant access to authorized personnel and deny access to unauthorized personnel by

using the Fingerprint sensor instead of padlocks. An unwanted person cannot easily hack this locker with the use of

the technology mentioned above and devices.

Objectives of the Study

This study aimed to Biometric Lock System with Motion Monitoring Capability that allowed user to control the

locker using the aforementioned devices and monitor.

The following are the primary objectives of the study

 To be aware of the current issues and concerns regarding lock systems and monitoring

 To develop a new locking system with algorithm innovations considering the current issues and concerns

and combine biometric technology, sensors, video cams and motion detector for access monitoring.

 To test the efficiency and reliability of the developed locking system and its monitoring capability for better

security implementation in the physical setting


Scope and Limitations

 The system can open the locker using finger print

 The system sends us an alerts message to the user.

 It can also be used at organizations to ensure authorized access to highly secured places.

 The system has servo motor to control open and close.

 The system has SD card module to save all the data or attempt to open the locker system.

 The system has its own admin to control the locker system

 The systems have Real time module for the time and SD card module for the saving data.

 The systems have Ultrasonic sensor is for the alarm they recognize the presence of any person at the door

if the system is activated and it will make sounds. The sensor module involves an ultrasonic transmitter,

receiver as well as a control circuit. It includes two circular eyes out of which one is utilized to transmit the

ultrasonic wave and the other to receive it.

 The system has magnetic sensor to determine when the locker is open and send us alert message to the

user

 The system has security camera to capture any movement in front of the locker.

 The system can send the video capture to the google drive and the admin can view the video.

The following items need to be considered during the development;

 The Arduino can't control the higher voltage

 The new user or member can enroll in the locker system because they need the fingerprint confirmation of

the admin.

 The camera of the system is not for night vision during at night the video captured is clear

 All movement or motion in front of the system will be detected by the PIR sensor and ultrasonic sensor.
 The system cannot send alert messages to the user if it is shortage of power.

 The system cannot send messages if the GSM module has no load balance.

Definition of Terms:

Algorithm – a procedure or set of rules to be followed in computation or other problem like solving operations 

                    especially by a computer

Arduino – The Arduino is an open-source hardware microcontroller board based on the Arduino UNO R3 and

Alta Mega 2560

Buzzer – It is an electrical device, similar to a bell, that makes a buzzing noise and is used for signaling.

GSM module – It is a chip or circuit that will be used to establish communication between mobile devices.

Matrix keypad – It is a matrix non- encoded keypad consisting of 16 keys in parallel. 

Liquid Crystal Display – It is a flat panel display technology commonly used in and computer monitors it also

used in screens for mobile devices, such as laptops, tablets, and smartphones.

LED – In this study, this refers to a light-emitting diode (a semiconductor diode that glows when a voltage is applied)

Power Adapter– in this study, this refers to a device that will Plugin into a wall outlet and convert AC to a

single DC voltage. 

Resistor– It is a device having a designed resistance to the passage of an electric current.

Servo motor – It is an electrical device that can push or rotate an object with great precision.

SMS – Short Message Service and is the most widely used type of text messaging

Real Time Clock - RTC modules are simply TIME and DATE remembering systems which have battery setup which

in the absence of external power keeps the module running.

SD Card Module - is a breakout board used for SD card processes such as reading and writing with a

microcontroller.

Raspberry Pi - is a series of small single-board computers developed in the United Kingdom by the Raspberry Pi

Foundation in association with Broadcom.


Camera- is an optical instrument used to capture an image. 
References

Encarnacion, P. C., Gerardo, B. D., & Hernandez, A. A. (2020a). Modified Round Function of SIMECK 32/64 Block

Cipher. International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE), ISSN:

2278-3091, May-June.

Encarnacion, P. C., Gerardo, B. D., & Hernandez, A. A. (2020b). Performance Analysis on Enhanced Round

Function of SIMECK Block Cipher. 2020 12th International Conference on Communication Software and

Networks, ICCSN 2020, 270–275. https://doi.org/10.1109/ICCSN49894.2020.9139059

Panda, M. (2017). Performance analysis of encryption algorithms for security. International Conference on Signal

Processing, Communication, Power and Embedded System, SCOPES 2016 - Proceedings, 278–284.

https://doi.org/10.1109/SCOPES.2016.7955835

Salunke, R., Bansod, G., & Naidu, P. (2019). Design and Implementation of a Lightweight Encryption Scheme for

Wireless Sensor Nodes. In Advances in Intelligent Systems and Computing (Vol. 998). Springer International

Publishing. https://doi.org/10.1007/978-3-030-22868-2_41
Chapter II

Review of Related Literature

There are many different studies in accordance with Scanning, Reading, and Access Controls. The

researcher chooses several of these topics that will give enough information and understanding regarding the study

on Biometric Lock System with Motion Monitoring Capability. These are the following.

1. Security
2. Arduino Technology
3. Rasp-pi Technology
4. Fingerprint
5. GSM
6. Face Recognition
7. Sensors
8. Door Access System
8.1. Fingerprint Based Door Access System using Arduino

2.1. Title: “Fingerprint Based Door Access System using Arduino “


This paper is about solving the problem regarding security of unauthorized people trespassing in our home, shops or

offices. Security issues can be fixed using traditional locks but there is always possibility of someone opening the

lock even without breaking it with the use of duplicate key. Using these kinds of locks also create problem if we lose

keys and also we have to carry keys along with us always. Again, using patterns in the locks can increase security

but again it can be opened if somehow the passwords or patterns are known. So, leaving every system in this project

we will implement a system using biometrics. In case of biometrics, the pattern which will be used as key will be

unique. Here, to implement the project we will use fingerprint as the key. This Arduino project will make use of

different devices for the implementation of the security lock where there will be different features to increase the

security level.

Figure 1: Functional Block Diagram of the Fingerprint Based Door Access System using Arduino.

2.2. Title: “ A Biometric Solution for Door Locking System using Real time Embedded System and Arduino

as a Microcontroller”

The biometric fingerprint device is an excellent security solution. This paper proposes and implements a novel

framework for a cost-effective Fingerprint biometric technology. It explains how to detect a fingerprint with the R305,

Arduino Uno, and Ardiono (IDE). This technology comes at a very low price. This project is based on the Arduino
FOSS platform and uses low-cost off-the-shelf components (Free Open Source Software). As a result, the total

implementation cost is low and accessible to a wide range of people a regular citizen. The aim of this low-cost

system is to improve the security system and some recommendation such as the addition of cameras to take a

picture of a bad match outcome. The whole system can be fabricated as economic commercial hardware package.

Figure 2: Functional Block Diagram of the A Biometric Solution for Door Locking System using

Real time Embedded System and Arduino as a Microcontroller

2.3. Title: “Biometrics Authentication Technique for Intrusion Detection System using Fingerprint Recognition”

This research is about using fingerprint recognition as a biometric authentication technique for intrusion detection

systems. Biometrics is a branch of statistics that uses biological terminology to deal with data. It confirms his

individuality by examining his physical characteristics or behaviors (e.g., face, fingerprint, voice, signature, keystroke

rhythms). The systems keep track of the user's information and compare it every time the user is claimed. A biometric

device is a computer that uses biometric recognition algorithms to identify people. Sensing, feature extraction, and

matching modules make up a standard biometric framework. They divided biometric techniques into two categories:

Facial recognition, fingerprinting, hand geometry, retinal analysis, DNA, and measuring a person's physiological

features are examples of physiological-based techniques. A signature, primary stroke, speech, scent, sweat pores

analysis, and behavioral characteristics measurement are all examples of behavior-based strategies. The Iris
recognition is a biometric identification system that employs mathematical pattern-recognition techniques on video

images of an individual's irises, which have complex random patterns that are distinctive and visible from a distance.

Iris cameras analyze the random patterns seen within the iris of an eye from various distances to conduct recognition

detection of a person's identity.

Figure 3: Functional Block Diagram of the Biometrics Authentication Technique for Intrusion Detection System using

Fingerprint Recognition.

2.4. Title: “A Prototype of a Fingerprint Based Ignition Systems in Vehicles”

They implemented a fingerprint-based locker, a robust protection mechanism in various security domains, to replace

the conventional locking systems for bikes. In their prototype, a software module is used to store valid users'

information in a database, and hardware is given for interfacing. Visual Basics, Visual C, and Visual C++ were used

for programming. Visual Basic 6.0 Enterprise Edition was used to program this prototype. Twenty reference images

were stored in the database to test the prototype. The implementation went smoothly and allowed, and unauthorized

users were clearly distinguished on the microcontroller. For approved users, logic one is transferred, while for

unauthorized users, logic 0 is assigned.


Figure 4: Functional Block Diagram of A Prototype of a Fingerprint Based Ignition Systems in Vehicles

2.5. Title: “Security System Based on Knock-Pattern Using Arduino and GSM Communication”

This system made up of devices like Arduino, GSM Module, Servo Motor, and the use of a ‘Secret Knocking

Pattern,’ which is known only to the user of that particular safe or any other possession or object that the device is

installed. The knocking pattern has to be executed only in a specific place for the lock to open and close. Also, that

place is known only to the user. The only way to change a secret pattern is to unlocking first through the secret

knock. This system completely eliminates the fear of replication as there is no key affected to be replicated. The

design is an attempt towards the cost-effective solution for safety. This can also integrated with technology like

CCTV, which can accelerate security.

Figure 5: Functional Block Diagram of the Security System Based on

Knock-Pattern Using Arduino and GSM Communication


The piezoelectric sensor is used to take analog inputs, and a push button is used to allow the information to

be made. The Arduino Uno will manage and control all unit of this system that receives, processes and controls the

data from all the sensors. The GSM Module unit acts as an interface between Arduino and the user’s mobile and is

responsible for communication between them. The sensor detects the knocking pattern and generates pulses that

are read by the Arduino. According to the pattern received by the microcontroller, an alarm is triggered, and an SMS

is established to the mobile station through the GSM module and thus warns about the suspicious activity at home to

the owner. The Piezo sensor can be attached to any place, which can be kept as a secret.

2.6. Title: “Arduino Based Door Access Control”

Arduino Based Door Access Control produces security for homes, offices, shops, banks, etc., through a

security password that is providential for the user alone. Users have the freedom to set a new code for their locking

systems. The system will allow access to the person who knows the security password and not grant access to

unauthorized persons. This is an excellent solution for protecting one from the hassle of illegal entry. This project is

realized using an ATMega 328 board using the Arduino kit, which is the most popular microcontroller having six

analog pins and 14 digital pins.

Figure 6: Functional Block Diagram of the Arduino Base Door Access Control
2.7. Title: “Password Protected Locking System Using Arduino”

This project provides enough security to satisfy the user's needs. The user will be prompted to enter a

password to open the door. On a successful password entered, the door open for a specified amount of time,

enabling him/her to store or restore his/her valuables things. The user enters an invalid password. Then the

corresponding equivalent message will be displayed. This project, "Arduino-based password-protected locking

system," can be used to provide enough security like bank lockers, security doors.

Figure 7: Functional Block Diagram of the Password Protected


Locking System Using Arduino

2.8. Title: “Design And Implementation Of A Door Locking System Using Android App”
Bluetooth technology is a wireless standard for exchanging data over short or near distances from steady

and mobile devices and building a private area network. Invented by telecom vendor Ericsson in 1994, it was initially

conceived as a wireless alternative to RS-232 data cables. It connects to several devices, overcoming problems of

synchronization. Bluetooth technology is many products, such as tablets, media players, robotics systems, laptops,

and console gaming equipment, and some high definition wireless headsets, modems, and watches. The technology
is useful for transferring information or data between two or more devices that are near each other in low-bandwidth

situations.

Figure 8: Functional Block Diagram of the Design And Implementation


Of A Door Locking System Using Android App

2.9. Title: “Microcontroller Based Electronic Digital Lock with Security Notification”

The innovative home design application that allows the user to manage his/her home through the internet

was proposed — using a PC as a server, which increases the price and power consumption. Some need web page

hosting that incurs extra cost. The author concluded that the use of a PC requires a considerable value and can be

reduced by using a microcontroller. The concept behind this project is a door-latch opening using a password. A

microcontroller-based Digital Code Lock that serves the purpose of security was created. The system comprises a

push-button keypad connected to the 8-bit microcontroller ATmega328P. It allows the user to reset a password. The

lock will open if the password is correct, the present one. If the entered password is not matched, a buzzer will be

activated. In this design, the central part of this is a Finite State Machine (FSM). Based on the controller, a function of

the controller is to detect if a user has entered the four digits secret code. Now an FSM is basically a sequential

circuit that follows the user to define number states to control the number of inputs, and every state is a fixed entity

that can be inhabited. The AT89C52 microcontroller is the core mainly composed of the microcontroller, LED, digital
tubes, and relays. And the C programming language completes the functions of unlocking a password, prompt an

error, LED display and timing, and even achieving a task that when power is low, the lock can remember passwords.

The Atmega328 microcontroller was used as the main component in the research. Every part used is directly

or indirectly connected to a microcontroller. The codes for the display all unit, setting, and resetting of the password

are all stored in a microcontroller. The lock was designed such that if any wrong key is pressed in the process of

inputting the password, it resets automatically, thereby sending a signal to a security post, which will let the security

know that if an intruder is accessing the system. As compared to another microcontroller based on a digital lock, it is

easy, and it required less hardware. It doesn’t need an additional Analogue and Digital converter. Also, the distinctive

feature added is the sliding door and the security notification.

Figure 9: Functional Block Diagram of the Microcontroller Based Electronic Digital Lock
with Security Notification

2.10. Title: “Android based security system Using Arduino”

This project uses an electromagnetic lock triggered to open or close using an electric signal from the

controller board. This project uses a controller board called Arduino. This board is simple to use and program
compared to other controller boards available in the open market. It is a open-source physical computing platform

based on a simple microcontroller. Arduino board takes inputs from various sensors or an array of sensors and

makes a respective digital signal. Arduino can quickly establish a link to a computer and controller using the

individual software. Arduino uses an Atmega microcontroller as its heart to perform various operations. In this

project, they established a link between the lock and the android phone using the phone's Bluetooth. The main

Arduino board contains a serial Bluetooth module connected to it. The android phone includes an application that is

openly available to anyone free of cost on the android play store. This application establishes a connection with the

serial Bluetooth modem attached to the Arduino board.

Figure 10: Functional Block Diagram of Android based security system Using Arduino

2.11. Title: “GSM Based Door Lock System”

The security alarm system for residential and other applications had been developed — the central

monitoring system for continuous indication of sensors. Transmitters were connected with sensors, and receivers

were associated with a monitoring system for essential communication. The display with central monitoring, the

message with respect to each transmitter connected with a particular sensor. A home security system with the

GSM/GPRD technology services to achieve control of door lock by short message service (SMS). ARDUINO is the

microcontroller that controls the whole driver unit. Keypad, GSM module Buzzer, is connected to the microcontroller.
ARDUINO board can be used as a tool to interchange information with a computer or other microcontrollers. GSM

system for sending the alert message to the mobile for three unsuccessful attempts of the password. At the present

time, door security is the most important, and so we designed and implemented a digital door lock system that works

in three different modules. The Keypad module is used for entering the 4-digit password. GSM module is the most

secure mode in which the owner has to enter the password through his mobile via text message to open or close the

lock.

Figure 11: Functional Block Diagram of GSM Based Door Lock System

2.12. Title: “RFID Base Security System Using Arduino Module

This project provides knowledge of radio frequency identification (RFID) technology. Initially, RFID tags were

made to replace barcodes in different chains eventually. Their advantages are they can be read wirelessly and with

no line of sight, contain more data than barcodes, and are stronger. The paper described the recent technology,

including the frequency ranges used and the standards required. With the increase in the ubiquity of RFID tags,

however, privacy became uneasy. The paper outlines a probable attack that can go against privacy and also

describes the contradictory measures. The RFID technology did not stop at the thing-level tagging. Since the uses for
RFID tags are so extensive, there is a great interest in lowering the costs for the production of RFID tags. It turns out

that printing tags may become a possible alternative to traditional production

Figure 12: Functional Block Diagram of RFID Base Security System


Using Arduino Module

2.13. Title: “Smart Motion Detection System using Raspberry Pi”

The aim of this project is to make a smart surveillance system which can be monitored by owner remotely

through android application. As it is connected with the system with IOT, system will send the push notification to

android device when an intrusion is detected inside the room. It is required to develop and implement and affordable

low cost web-camera based surveillance system for remote security monitoring. Authorized user can access to their

monitoring system remotely via internet with the use a mobile phone and monitor the situation on application. This

entire work is done on raspberry pi with Raspbian operating system ported on it.
Figure 13: Functional Block Diagram of Smart Motion Detection System using Raspberry Pi

2.14. Title: “Smart Surveillance Monitoring System using Raspberry pi and pir sensor”

This paper deals with the design and implementation of Smart surveillance monitoring system using

Raspberry pi and PIR sensor for mobile devices. It increases the usage of mobile technology to provide essential

security to our homes and for other control applications. The proposed home security system captures information

and transmits it to the respective mail using the internet. Raspberry pi operates and controls motion detectors and

video cameras for remote sensing and surveillance, streams live video and records it for future playback. It can also

find the number of persons located with the help of the Infrared sensor. For example, when motion is detected, the

cameras automatically initiate recording and the Raspberry pi device alerts the owner of the possible intrusion having

a smart phone. Raspberry- Pi has two main components interacting with each other. we can able send it to the email

automatically. We can able to alert the people using IOT technology.


Figure 14: Functional Block Diagram of Smart Surveillance Monitoring System using Raspberry pi and pir
sensor Gallo (2015)

Gallo (2015) GAni (2017)

GAni (2017)
Arduino
Security: Door
Accesss Gallo (2015)

GAni (2017)

Gallo (2015)
Raspberry FingerPrint
GAni (2017) pi
2.2. Literature Mapping
Chapter III

Theoretical Background

The theoretical framework is the foundational theory that is used to provide a visual perspective to the

researchers upon which the study is based.

3.1. “Arduino Uno”

               The "Arduino Uno" is an open-source hardware microcontroller board based on the ATmega328. It has a14

digital pins, of which 6 can be used as (Pulse Width Modulation) outputs), 6 analog inputs, and 16 MHz crystal

oscillator, a USB connection, and a power jack, and the ICSP header, and the reset button. It holds everything

needed to help the microcontroller; simply connected to a computer with a USB cable or to power it with an AC or DC

adapter or a battery to get started.

        The "Arduino Uno" can be powered through the USB connections or with an external power supply. The power

source is selected it automatically.

External (the non-USB) power can happen either from an AC or DC adapter or battery. The adapter can attach by

plugging the 2.1mm center-positive plug into the board's power jack. Leads from the battery can be placed in the Gnd

and the Vin pin headers of the power connector.

               The Arduino board can run on an external supply of 6 to 20 volts only. If supplied with less than 7 volts,

though, the 5 volts pin may supply less than five volts, and the Arduino board may be unstable. If employing more

than 12 volts, the voltage regulator may overheat and harm the Arduino board. The recommended span is 7 to 12

volts.

The power pins of the board are as followed:

 "VIN. The input voltage to the Arduino UNO board when it is using an external power source as against to 5

volts from the USB connections or other control power source. You can provide voltage through this pin, or

supplying voltage via the power jack, access it through this pin".
 "5V. The regulated power supply is used to the power microcontroller and the other parts of the board. This

can come either from the VIN through an on-board regulator, or be provided by the USB or other regulated 5

volts supply".

 "3V3. 3.3 volt supply cause by the on-board regulators. Maximum current draw is a 50 mA".

 "GND. Ground pins".

The 14 digital pins in the Arduino Uno it can be used as an input or output, using this pinMode(), digitalWrite(),

and digitalRead() functions. They operated at 5 volts. Each of the pins can provide or receive a maximum of 40 mA

and has internal pull-up resistors it is disconnected by default of 20-50 kOhms. In the addition some board pins have

specialized functions:

 Serial: (0 RX) and (1 TX). It is used to received 0 (RX) and transmitted it to 1 (TX) TTL (Transistor-

Transistor Logic) serial data. The pins are attached to the corresponding pins of the ATmega8U2 USB to

TTL Serial chip.

 PWM: The 3, 5, 6, 9, 10, and 11. Provided 8-bit PWM output with the analogWrite() functions.

3.3. “SIM900 GSM/GPRS shield”

The SIM900 GSM/GPRS shield is a GSM modem that can be used in a variety of IoT projects. You can use this

shield to do almost everything a regular cell phone can, including sending and receiving SMS text messages, making

and receiving phone calls, and connecting to the internet through GPRS, TCP/IP, and more! To top it off, the shield is

compatible with a quad-band GSM/GPRS network, which means we can be used almost anywhere in the world.

 Connect into any global GSM network with any 2G SIM

 Make and receive voice calls using an external earphone & electret microphone

 Send and receive SMS messages

 Send and receive GPRS data (TCP/IP, HTTP, etc.)

 Scan and receive FM radio broadcasts


 Serial-based AT Command Set

 U.FL and SMA connectors for cell antenna

There are three LEDs on the SIM900 GSM/GPRS shield which indicates connectivity or power status.

 PWR: This LED is connected to the shield’s power supply line. If this LED is on, the shield is receiving

power.

 Status: This LED indicates SIM900’s working status. If this LED is on, the chip is in working mode.

 Netlight: This LED indicates the status of your cellular network. It’ll blink at various rates to show what state

it’s in.

 64ms on, 800ms off: The SIM900 chip is running but not registered to the cellular network yet.

 64ms on, 3 seconds off: The SIM900 chip is registered to the cellular network & can send/receive voice and

SMS.

 64ms on, 300ms off: The GPRS data connection you requested is active.

 The SIM900 can be a relatively power-hungry device. The maximum current draw of the chip is around 2A

during transmission burst. It usually won’t pull that much, but may require around 216mA during phone calls

or 80mA during network transmissions.

 The operating voltage of SIM900 chip is from 3.4V to 4.4V. To keep supply voltage safe at 4.1V, the shield

comes with a high current, high accuracy, low-dropout voltage regulator MIC29302WU from Micrel –

capable of handling load currents up to 3A.

 The SIM900 GSM/GPRS shield uses UART protocol to communicate with an Arduino. The chip supports

baud rate from 1200bps to 115200bps with Auto-Baud detection.

 The shield comes with two standard 3.5mm jacks. One for stereo earphone and other for mono microphone.

It allows you to use SIM900’s audio interface to make and receive voice calls and listen FM radio.

 Mic: You can connect an external electret microphone to this jack.

 Earphone: You can connect earphones to this jack. Any ‘iPhone’ or ‘Android’ compatible earphones should

work.
 Antenna is required to use the SIM900 for any kind of voice or data communications as well as some SIM

commands.

 The shield has two interfaces for connecting antenna viz. a U.FL connector and a SMA connector. They are

connected through a patch cord.

 The shield usually comes with a 3dBi GSM antenna and allows you to put the shield inside a metal case(as

long the antenna is outside).

 The workings of the SIM card socket can take some getting used to. To unlock the latch, push the top part

of the assembly, and then lift it up. Place the SIM card into the bottom part of the socket. Then fold the arm

back into the body of the socket, and gently push it forward towards the LOCK position.

 The SIM900 shield can be configured to keep time. So there is no need for any separate RTC. This will

keep the time even when the power is OFF.

3.4. “Door/window contact magnetic reed switch”

An applied magnetic field operates a door/window contact magnetic reed switch. A white plastic molding

encases the reed switch and magnet. It's made to be recessed into the frame of a door or window.

     Operating Distance :15-25mm

     Rated Power :10W

     Maximum switch current :0.5Amp

     Maximum Voltage :100V

     Maximum Power :10W

3.4. “LCD”

Liquid crystal display is the abbreviation for liquid crystal display. It is a type of electronic display module that is used

in a wide range of circuits and devices such as cell phones, calculators, computers, television sets, and so on. Multi-

segment light-emitting diodes and seven segments are the most popular applications for these displays. The key
advantages of using this module are its low cost, ease of programming, animations, and the fact that there are no

restrictions on showing custom characters, unique and even animations, and so on.Pin1 (Ground/Source Pin): This is

a GND pin of display, used to connect the GND terminal of the microcontroller unit or power source.

 Pin2 (VCC/Source Pin): This is the voltage supply pin of the display, used to connect the supply pin of the

power source.

 Pin3 (V0/VEE/Control Pin): This pin regulates the difference of the display, used to connect a changeable

POT that can supply 0 to 5V.

 Pin4 (Register Select/Control Pin): This pin toggles among command or data register, used to connect a

microcontroller unit pin and obtains either 0 or 1(0 = data mode, and 1 = command mode).

 Pin5 (Read/Write/Control Pin): This pin toggles the display among the read or writes operation, and it is

connected to a microcontroller unit pin to get either 0 or 1 (0 = Write Operation, and 1 = Read Operation).

 Pin 6 (Enable/Control Pin): This pin should be held high to execute Read/Write process, and it is connected

to the microcontroller unit & constantly held high.

 Pins 7-14 (Data Pins): These pins are used to send data to the display. These pins are connected in two-

wire modes like 4-wire mode and 8-wire mode. In 4-wire mode, only four pins are connected to the

microcontroller unit like 0 to 3, whereas in 8-wire mode, 8-pins are connected to microcontroller unit like 0 to 7.

 Pin15 (+ve pin of the LED): This pin is connected to +5V

 Pin 16 (-ve pin of the LED): This pin is connected to GND.

 The operating voltage of this LCD is 4.7V-5.3V

 It includes two rows where each row can produce 16-characters.

 The utilization of current is 1mA with no backlight

 The alphanumeric LCDs alphabets & numbers

 Is display can work on two modes like 4-bit & 8-bit


The data register and the order register are two registers on a 162 LCD. The RS (register select) is primarily used to

switch between registers. It is known as a command register when the register set is ‘0'. When the register set is ‘1', it

is referred to as a data register..

 Command Register-The main function of the command register is to store the instructions of command

which are given to the display. So that predefined tasks can be performed such as clearing the display,

initializing, set the cursor place, and display control.

 Data Register-The main function of the data register is to store the information which is to be exhibited on

the LCD screen. Here, the ASCII value of the character is the information which is to be exhibited on the

screen of LCD. Whenever we send the information to LCD, it transmits to the data register, and then the

process will be starting there. When register set =1, then the data register will be selected.

3.5. “SD Card Module”

The MicroSD Card Module is a straightforward way to transfer data to and from a regular SD card. The pinout is

Arduino-compatible, but it can be used with other microcontrollers as well. It enables you to add data logging and

mass storage to your project.

This module has an SPI interface that works with any SD card and uses a 5V or 3.3V power supply that works with

the Arduino UNO/Mega.

Data logger, audio, video, and graphics are just some of the applications for the SD module. This module can

significantly increase the capabilities of an Arduino's limited memory.

 Working Voltage: 5V/3.3V

 Size:20x28mm

 Interface: SPI

 Compatible: MicroSD
3.6. “Finger Print Sensor”

Fingerprint Sensor (R305) -TTL UART is a TTL UART interface fingerprint sensor module. The user can save the

fingerprint data in the module and use it to identify the individual in 1:1 or 1: N mode. The fingerprint module can

connect to a 3v3 or 5v microcontroller directly.

Features of Finger Print Sensor (R305) -TTL UART:

 Power DC : 3.6V-6.0V

 Interface : UART (TTL logical level)/ USB 1.1

 Working current : 100mA

 Peak Current    : 150mA

 Matching Mode:  1:1 and 1:N

 Baud rate (9600*N)bps, N=1-12 (default N=6 57600bps)

 Character file size:  256 bytes

 Image acquiring time :  <0.5s

 Template size :  512 bytes

 Storage capacity:  256

 Security level : 5 (1, 2, 3, 4, 5(highest))

 FAR : <0.001%

 FRR: <0.1%

 Average searching time:  < 0.8s (1:880)

3.6. “Real time clocks”

Real-time clocks (RTC) are clock modules, as the name implies. The DS1307 real-time clock (RTC) IC has an I2C

interface and is an 8-pin unit. The DS1307 is a battery-backed clock/calendar with 56 bytes of SRAM. The
clock/calendar displays data in seconds, minutes, hours, days, dates, months, and years. Each month's end date is

automatically changed, especially for months with less than 31 days.

DS3231 RTC MODULE Features

 RTC counts seconds, minutes, hours and year

 Digital temperature sensor with ±3ºC accuracy

 Two Time-of-day alarms

 Programmable square wave output

 Register for Aging trim

 400Khz I2C interface

 Low power consumption

 Automatic power failure battery switch circuitry

 CR2032 battery backup with two to three year life

 Potable size

3.7. “Ultrasonic sensor”

Ultrasonic sensor is an electronic device that measures the distance of a target object by emitting ultrasonic sound

waves, and converts the reflected sound into an electrical signal. Ultrasonic waves travel faster than the speed of

audible sound (i.e. the sound that humans can hear). Ultrasonic sensors have two main components: the transmitter

(which emits the sound using piezoelectric crystals) and the receiver (which encounters the sound after it has

travelled to and from the target). In order to calculate the distance between the sensor and the object, the sensor

measures the time it takes between the emission of the sound by the transmitter to its contact with the receiver.
Chapter III

Design and Method

3.1. System architecture/ block diagrams and Flowchart

After the figure/Diagram, provide a discussion of it.

3.2. Data Gathering


-
3.3. Data Analysis

3.4. System Design


- Breakdown the Block Diagram according to its major functions by providing the flowchart of each.
3.4.1. Fingerprint Reading Flowchart
3.4.2. Face Recognition Flowchart
3.4.3. others….
3.5. Implementation
3.5.1. Software
3.5.2. Hardware
3.5.3. ???
3.6. Testing and Evaluation
3.6.1. Experiment 1
3.6.1.2. Tools in testing/measuring
3.6.2. Experiment 2
3.6.3. uban….
Chapter IV
Results and Discussion

Refer to your objectives, then your method and discuss here.

1. Objective 1 Algorithm: discussion inyong solution


 Chapter 3.1, 3.2, 3.3
2. Objective 2 Create
 Chapter 3.4, and 3.5

3. Objective 3
 Chapter 3.6

Chapter V
Findings, Conclusions and Recommendations

5.1. Findings

- refer to your results and discussions.

5.2. Conclusions

- refer to your findings

5.3. Recommendations.

- recommend for further studies. – future works.


References

Malabika Sarma, Amlanjyoti Gogoi,Rahul Saikia, Dibya Jyoti Bora School of Computing Sciences -

Information Technology The Assam Kaziranga University, Jorhat, Assam, India

“Fingerprint Based Door Access System using Arduino”

Subhankar Chattoraj , Karan Vishwakarma ” A Biometric Solution for Door Locking System using Real time

Embedded System and Arduino as the Microcontroller”

Department of Electronics & Communication Engineering Techno India University,Salt Lake Main Campus,

EM /4 Salt Lake

2Department of Bio Technology Engineering Techno India University,Salt Lake Main Campus,EM /4 Salt Lake

Smita S. Mudholkar , Pradnya M. Shende , Milind V. Sarode “ BIOMETRICS AUTHENTICATION TECHNIQUE FOR

INTRUSION DETECTION SYSTEMS USING FINGERPRINT RECOGNITION” Department of Computer Science &

Engineering, Amravati University, India.

Omidiora E. O, Fakolujo O. A, Arulogun O. T “ A Prototype of a Fingerprint Based Ignition Systems in Vehicles”

Department of Computer Science & Engineering, University of Ibadan, Ibadan, Nigeria

R.Sai Charan Reddy , P.Vamsi Krishna , M.Krishna Chaitanya ,M.Neeharika4 K Prabhakara Rao. “Security System

Based on Knock-Pattern Using Arduino and GSM Communication” . #1,2,3,4,5 Department of ECE, B V Raju

Institute of Technology, NARSAPUR, Telangana State

Password Protected Locking System Using Arduino. Sriharsha B S, Zabiullah, Vishnu S B and Sanju V

Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA)
“Smart Motion Detection System using Raspberry Pi” Priya B. Patel ,Viraj M. Choksi , Swapna Jadhav Gujar, M.B.

Potdar, PhD Bhaskaracharya Institute for Space Applications and Geo-informatics Gandhinagar-382007 Gujarat,

India.

You might also like